Workflow
基于风险的安全更新系统(RBUS)
icon
Search documents
手机总弹系统更新,谷歌准备出手解决这个麻烦
3 6 Ke· 2025-09-29 23:17
Core Viewpoint - Google is planning to introduce a "Risk-Based Update System" (RBUS) for the Android operating system to reduce the frequency of system update prompts for users while focusing on high-risk vulnerabilities [1][3]. Group 1: RBUS Implementation - The primary goal of RBUS is to change the Android security update mechanism, limiting monthly updates to only high-risk vulnerabilities, while medium and low-risk vulnerabilities will be addressed in quarterly updates, marking a significant shift in Android's security strategy over the past decade [3][11]. - Google has consistently released monthly security updates since 2015, with the latest update fixing 84 vulnerabilities, including two actively exploited zero-day vulnerabilities [3][11]. Group 2: User Experience and OEM Pressure - While the monthly security updates enhance device reliability, frequent prompts for updates can frustrate users, especially in an era where smartphones are integral to daily life [5][7]. - The introduction of RBUS aims to alleviate pressure on OEM partners, encouraging them to prioritize system security updates, as many manufacturers have previously neglected timely updates, contributing to malware proliferation in the Android ecosystem [7][9]. Group 3: Technical Challenges and Solutions - The fragmentation of the Android ecosystem complicates the update process, with various manufacturers and chip suppliers involved, leading many to only update flagship products [9][10]. - Google has previously attempted to address these challenges with initiatives like Project Treble and Project Mainline, which aimed to simplify the update process but have not fully resolved the issue of frequent security patch updates [9][10]. Group 4: Security Implications of RBUS - RBUS may reduce the number of security patches that OEMs need to handle each month, thereby decreasing their testing and release pressures [10][11]. - However, this approach raises concerns that it could lead to a deterioration of Android's overall security posture, as only actively exploited vulnerabilities will be prioritized, potentially leaving other known vulnerabilities unaddressed [10][11][13].