Which permission allows replacing apps without data loss? Not even adb can do that.
Conversation
The combination of the ability to install/remove apps in the background with being whitelisted as a backup service. Device-to-device backup support (see Android 11 release notes) implies ability to back up even if the app disables backup support.
2
1
developer.android.com/about/versions is how it's going to work in Android 12 but Android 11 supposedly supports it. I don't really think it actually shipped in the intended / documented form for Android 11 though. It has constants, etc. for it but doesn't seem to be fully implemented.
1
1
We made an attempt to use it in Android 11 (for end-to-end encrypted, non-Play backups) but it didn't really seem to exist yet at least in AOSP. I don't know how much is implemented for the stock OS. It's possible Play services has enough privileges to make it work despite that.
1
2
Ok, let's assume Play Services replace an app on Android11 using this mechanism, and the app hasn't blacklisted its data for backup. The app icon would still disappear from your homescreen and some app settings would probably be reverted. Much more complex than pushing an update.
1
It's definitely more involved but keep in mind a bunch of core OS components are also built by Google now shipped via the Play Store via APEX components (also known as mainline modules or Google Play system update):
1
1
Android with Play is closer and closer to being Google Android instead of an OEM fork where they control everything. Of course, Android exists without Play and the CDD/CTS pass without Play services.
1
1
1
Android with Play is trending towards shipping a Google-built AOSP system image and kernel. I'm sure that's coming in the next couple of years. Mainline modules shipped via Play are already here though and include code loaded into system_server etc.
1
Ok, you've convinced me that if you're worried about backdoors from US state-level attackers, you shouldn't be using Google Play services.
However, there are other reasons why this is bad, for example this one:
1
I wouldn't necessarily say that someone with that threat model shouldn't be using Play services but by using an OS including Play they're using an OS with highly trusted core components built and shipped by Google via the Play Store.
For a user with Play built into the OS on a deep level, the Play Store taking over app signing doesn't really change much for them. For a user installing apps from the Play Store on an OS without Play services via an alternate client like Aurora Store, it does make a difference.
1
Either way, Play Store is trusted for an initial install of an app from it and the OS pinning / downgrade protection only kicks in afterwards. Also note that the way Google Play App Signing has always worked is that for legacy apps, they upload their existing keys to Google.
1
Show replies
Is a "privileged" install/flash of Play Services using OpenGApps different from a stock ROM that ships Play Services (with respect to system permissions)?
1
As part of installing it, they need to add all the privileged permissions and whitelisting in order for it to work properly. They make an attempt to do it. It's not meant to be any less trusted. Play services is only designed to run as a privileged app with a ton of power.
1
1
1
Show replies

