. . "All activities, such as installing or running applications, take place in this security context." . .