Conversation

PSA: Starting in August this year, for newly published Android apps, Google will require that *they* sign apps, not you. This means that the Android security model is fundamentally broken, because the app is signed by the distributor and not by the developer. (1/3)
10
419
This means that Google can (or can be forced to) distribute backdoored versions of popular apps to targeted people. The app you are downloading may be different from the app your neighbour is downloading. And the app signature will be perfectly valid for both of them. (2/3)
6
201
Since this tweet is now on HN, some clarification: On Android, if you install an app for the first time, the OS remembers the signing certificate. Any update that is not signed by the same cert will be rejected (TOFU). The Play Store cannot circumvent this.
2
33
Replying to
It can't directly circumvent it but it can do it by uninstalling the app and reinstalling it in the background since the OEMs building it into their OS grant it those privileges. Play services can backup the app data beforehand and restore it after installing the new variant.
1
Replying to
Is that using the "android backup" mechanism, or can it actually backup all private app data? Android backup isn't used by all apps, so the user might notice.
1
Replying to
Using the standard backup mechanism. Apps don't have a choice about whether they support it anymore. They can still blacklist files or provide their own implementation of the backup service for themselves, so they can disable it by blacklisting files or using a no-op service.
1
Show replies