To effectively protect the mobile device system and user private data, the Tizen security architecture is based on privileges and application signing of the Linux basic security model, which includes process isolation and mandatory access control. Since Tizen, as an open mobile platform, provides a wide range of features and experiences for users with a variety of applications, the users must be able to grant privileges for security-sensitive operations.
Tizen provides the following security features:
Applications using security-sensitive APIs must declare the required privileges.
Tizen application packages must be signed with both author and distributor signatures.
The application provides exception handling against the security exception that occurs when you have blocked the access to a privacy-related service in the privacy settings.