Sous iOs je crois que c’est censé être le cas depuis un bon moment. Mais insuffisamment apparemment, seulement pour les apps 3rd party, et Pegasus utilise des bugs d’apps installées d’origine donc non sand-boxées.
Apple - Security of runtime process in iOS and iPadOS - Sandboxing
All third-party apps are “sandboxed,” so they are restricted from accessing files stored by other apps or from making changes to the device. […]
Sous Androis, il y a déjà du sandboxing. Et c’est maintenant étendu au stockage: Scoped Storage a été introduit (désactivé, pour test) dans Android 10, et activé je crois dans A11.
The Android platform takes advantage of the Linux user-based protection to identify and isolate app resources. This isolates apps from each other and protects apps and the system from malicious apps. To do this, Android assigns a unique user ID (UID) to each Android application and runs it in its own process.
Android uses the UID to set up a kernel-level Application Sandbox.
Wiki, TechRep - Android 11 security features and improvements you need to know
Scoped Storage returns
[…] Scoped Storage creates isolated sandboxes for apps, so it no longer requires additional permissions to write files. The biggest draw to Scoped Storage is that an app will not be able to access any other app’s sandbox directly–this should add a considerable level of security to the platform.