43
submitted 1 day ago by cm0002@lemmy.world to c/android@lemdro.id
top 6 comments
sorted by: hot top controversial new old
[-] hperrin@lemmy.ca 10 points 1 day ago

If only Steve Irwin had this in 2006.

[-] user224@lemmy.sdf.org 9 points 1 day ago* (last edited 1 day ago)

Advanced versions can even instruct your phone to change important settings under the hood and expose you to significant vulnerabilities.

The scariest thing for me.

At one point I got something along the lines of "Your carrier has changed some settings, tap to review.", once again showing me that my phone isn't mine.
In this case it was emergency alerts, but I don't know what all they can change. It wasn't a carrier phone, by the way.
I also found apps related to (I think) multiple carriers, just disabled by default on Moto G52 5G. Orange was definitely one of them.

[-] sbv@sh.itjust.works 2 points 1 day ago* (last edited 1 day ago)

Generally speaking, no programmable networked device is guaranteed to be under your control.

You can make strong arguments about certain types of hardware and software, but it is always possible that it contains a backdoor from the manufacturer, and it is almost guaranteed that it has multiple vulnerabilities that would give a remote attacker full control.

Related

Edit: Generally, I agree with the sentiment that things shouldn't be this way, but that's the world we live in. Given how we build software and hardware, we need to be able to update our devices to fix vulnerabilities. As long as that requirement exists, no device can be considered trustworthy.

[-] JackbyDev@programming.dev 2 points 1 day ago
[-] sbv@sh.itjust.works 3 points 1 day ago

As someone in the software/networking space, I have a hard time with the author's lack of attribution of the control/evasion characteristics of networks to people (developers of protocols, network operators, and users). Yeah, he admits the MPAA exists, but dude doesn't mention Bram Cohen.

Describing files as "artificial life" in

Because peer-to-peer networks on which all files replicate are unpredictable complex systems, the files themselves can be seen as a form of nonorganic life. The reproduction of files can be described with a family tree in the same way that genetic family trees show the relationships between biological relatives.

is tortured.

Yeah, control/evasion is an arms race, but it isn't meaningfully described as interactions within file sharing networks. It's interactions between people, institutions, laws, legislators, courts, and software owned by different actors.

this post was submitted on 28 Jun 2025
43 points (100.0% liked)

Android

19566 readers
237 users here now

The new home of /r/Android on Lemmy and the Fediverse!

Android news, reviews, tips, and discussions about rooting, tutorials, and apps.

🔗Universal Link: !android@lemdro.id


💡Content Philosophy:

Content which benefits the community (news, rumours, and discussions) is generally allowed and is valued over content which benefits only the individual (technical questions, help buying/selling, rants, self-promotion, etc.) which will be removed if it's in violation of the rules.


Support, technical, or app related questions belong in: !askandroid@lemdro.id

For fresh communities, lemmy apps, and instance updates: !lemdroid@lemdro.id

💬Matrix Chat

💬Telegram channels / chats

📰Our communities below


Rules

  1. Stay on topic: All posts should be related to the Android OS or ecosystem.

  2. No support questions, recommendation requests, rants, or bug reports: Posts must benefit the community rather than the individual. Please post to !askandroid@lemdro.id.

  3. Describe images/videos, no memes: Please include a text description when sharing images or videos. Post memes to !androidmemes@lemdro.id.

  4. No self-promotion spam: Active community members can post their apps if they answer any questions in the comments. Please do not post links to your own website, YouTube, blog content, or communities.

  5. No reposts or rehosted content: Share only the original source of an article, unless it's not available in English or requires logging in (like Twitter). Avoid reposting the same topic from other sources.

  6. No editorializing titles: You can add the author or website's name if helpful, but keep article titles unchanged.

  7. No piracy or unverified APKs: Do not share links or direct people to pirated content or unverified APKs, which may contain malicious code.

  8. No unauthorized polls, bots, or giveaways: Do not create polls, use bots, or organize giveaways without first contacting mods for approval.

  9. No offensive or low-effort content: Don't post offensive or unhelpful content. Keep it civil and friendly!

  10. No affiliate links: Posting affiliate links is not allowed.

Quick Links

Our Communities

Lemmy App List

Chat and More


founded 2 years ago
MODERATORS