Adobe integrated runtime (AIR)
Advantages of Adobe Air
However, there are also critical aspects with regard to the use of AIR applications, as they can both connect to the Internet and have the ability to directly interfere with the local file system. Security experts argue that this allows AIR-based malware to load security-critical software onto the system via the Internet, for example. In this context, Adobe has defined a sandbox concept with two different security zones:
- Trusted AIR applications that have access to AIR's Programmable Interfaces.
- Untrusted AIR applications that are isolated.
Also integrated into this security model is application signing. In this case, a version signed only by the AIR application developer generates a warning message prior to installation; however, this warning message can then be easily bypassed in a controlled manner by the user.
The Adobe Air development interface
The interface for the AIR developer is an Application Programming Interface( API). In addition to the aforementioned functions for accessing the local file system, this includes interaction with SQLite databases, the establishment of TCP/ IP connections, the use of binary sockets, the association of file types with an AIR application, drag-and-drop functions, and copy and paste functions.
Version 2 of AIR is expected to add desktop capabilities, according to Adobe. Also included are improved support for mass storage devices , native application processes, peer-to-peer connections and more efficient use of CPU power. An additional framework takes the improvement of accessibility and the support of multi-touch screens.