Conversation

Replying to and
The combination of the ability to install/remove apps in the background with being whitelisted as a backup service. Device-to-device backup support (see Android 11 release notes) implies ability to back up even if the app disables backup support.
2
1
Replying to and
developer.android.com/about/versions is how it's going to work in Android 12 but Android 11 supposedly supports it. I don't really think it actually shipped in the intended / documented form for Android 11 though. It has constants, etc. for it but doesn't seem to be fully implemented.
1
1
We made an attempt to use it in Android 11 (for end-to-end encrypted, non-Play backups) but it didn't really seem to exist yet at least in AOSP. I don't know how much is implemented for the stock OS. It's possible Play services has enough privileges to make it work despite that.
1
2
Ok, let's assume Play Services replace an app on Android11 using this mechanism, and the app hasn't blacklisted its data for backup. The app icon would still disappear from your homescreen and some app settings would probably be reverted. Much more complex than pushing an update.
1
Android with Play is trending towards shipping a Google-built AOSP system image and kernel. I'm sure that's coming in the next couple of years. Mainline modules shipped via Play are already here though and include code loaded into system_server etc.
1
Ok, you've convinced me that if you're worried about backdoors from US state-level attackers, you shouldn't be using Google Play services. However, there are other reasons why this is bad, for example this one:
Quote Tweet
4: This will enable further modifications to apps, like injecting DRM libraries or possibly even security scanners, tracking or advertising.
Show this thread
1
Replying to and
I wouldn't necessarily say that someone with that threat model shouldn't be using Play services but by using an OS including Play they're using an OS with highly trusted core components built and shipped by Google via the Play Store.
2
1
Either way, Play Store is trusted for an initial install of an app from it and the OS pinning / downgrade protection only kicks in afterwards. Also note that the way Google Play App Signing has always worked is that for legacy apps, they upload their existing keys to Google.
1
So, the app still appears to be signed by the developer even though it's being signed by Google because the developer chose to hand over their keys to them. This is still entirely optional, even after their announced changes since it's not being made mandatory for old apps (yet).
1
Show replies