Stuff like this is why all sw/browsers MUST REMOVE SUPPORT for adding custom root CAs.https://twitter.com/konklone/status/672127239987798017 …
@ch3root Proprietary OS's/ecosystems should keep 3rd-party malware out of the core system. Of course they should be replaced by FOSS ones.
-
-
@RichFelker What you are proposing -- app protection from a user with full hw access -- is a move in the opposite direction: DRM, locked OSs -
@ch3root You're misinterpreting what I'm proposing, but Twitter and 140 characters... not a good medium for this. -
@RichFelker Ok. Should I as a user be able to inspect what Chrome sends to Google? If not via mitm, how? -
@ch3root Via the js console or editing the source. Or manually allowing individual invalid certs. But not a root CA. -
@RichFelker Can you do it for service requests (updates, safe browsing etc.)?
End of conversation
New conversation -
-
-
@RichFelker@ch3root FOSS variants of Android can ship https://f-droid.org/ for a catered repository of trustworthy applications. -
@RichFelker@ch3root And installing third party apps could be more hidden. At the moment it even redirects users to the option when needed. -
@RichFelker@ch3root Can remove the redirection so at least they need to find the option themselves, and could hide it in developer options. -
@RichFelker@ch3root The same thing applies to adding CAs. It can be hidden away in the already hidden developer options. -
@RichFelker@ch3root When F-Droid is bundled as a privileged app, it doesn't count as a third party source (similar to other app stores).
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.