1 point

All these updates and they let this get by. That’s pretty ridiculous.

permalink
report
reply
8 points

Don’t let this misleading Wired article fearmonger you. I recommend this thread, which provides some nuance to this drama: https://grapheneos.social/@GrapheneOS/112967805820394815

permalink
report
parent
reply
2 points

Many thanks. I’ll check it out.

permalink
report
parent
reply
24 points

The issue relates to a software package called “Showcase.apk” that runs at the system level and lurks invisible to users. The application was developed by the enterprise software company Smith Micro for Verizon as a mechanism for putting phones into a retail store demo mode—it is not Google software. Yet for years, it has been in each Android release for Pixel and has deep system privileges, including remote code execution and remote software installation. Even riskier, the application is designed to download a configuration file over an unencrypted HTTP web connection that iVerify researchers say could be hijacked by an attacker to take control of the application and then the entire victim device.

“flaw”

any idea if de-google phones have this “feature”

permalink
report
reply
8 points

I couldn’t find the APK on my pixel 5 running lineage so I think only stock-based roms should be affected. I checked using an APK extractor app that lists all system apps including things like 3 button navigation bar.

permalink
report
parent
reply
27 points

The app isn’t enabled by default so stock Pixels aren’t even vulnerable without physical access to an unlocked device.

permalink
report
parent
reply
5 points

GrapheneOS doesn’t include this, along with many other unnecessary carrier apps

permalink
report
parent
reply
6 points

Kind of a nothing burger

permalink
report
reply
46 points

iVerify vice president of research Matthias Frielingsdorf points out that while Showcase represents a concerning exposure for Pixel devices, it is turned off by default. This means that an attacker would first need to turn the application on in a target’s device before being able to exploit it. The most straightforward way to do this would involve having physical access to a victim’s phone as well as their system password or another exploitable vulnerability that would allow them to make changes to settings.

Just a bit of alarmism then, with something that can be easily removed in an update.

permalink
report
reply
7 points

Not only can it be removed, they’ve already said it going to happen soon.

permalink
report
parent
reply
10 points

I have doubts that this apk is enabled and running on all pixels, it’s especially not on custom roms such as Graphene (I just checked my own).

permalink
report
reply
7 points

Yeah, doesn’t look like it affects GrapheneOS. More validation of my choice to run Graphene I guess.

permalink
report
parent
reply
-1 points

I’m too stupid to install it. Would’ve liked to plonk it on my old tablet instead of throwing it into the trash.

permalink
report
parent
reply
6 points

It’s only compatible with modern Pixel devices, so unless you’re old tablet is a Google Pixel Tablet, you can’t install it anyway. But the installer is super easy to use (if you have a compatible device). It’s literally all in your web browser.

permalink
report
parent
reply
8 points

The GrapheneOS guys also explained why this isn’t nearly as bad as it sounds, and how Wired is simply fearmongering: https://grapheneos.social/@GrapheneOS/112967309987371034

permalink
report
parent
reply

Android

!android@lemdro.id

Create post

The new home of /r/Android on Lemmy and the Fediverse!

Android news, reviews, tips, and discussions about rooting, tutorials, and apps.

🔗Universal Link: !android@lemdro.id


💡Content Philosophy:

Content which benefits the community (news, rumours, and discussions) is generally allowed and is valued over content which benefits only the individual (technical questions, help buying/selling, rants, self-promotion, etc.) which will be removed if it’s in violation of the rules.


Support, technical, or app related questions belong in: !askandroid@lemdro.id

For fresh communities, lemmy apps, and instance updates: !lemdroid@lemdro.id

💬Matrix Chat

💬Telegram channels / chats

📰Our communities below


Rules

  1. Stay on topic: All posts should be related to the Android OS or ecosystem.

  2. No support questions, recommendation requests, rants, or bug reports: Posts must benefit the community rather than the individual. Please post to !askandroid@lemdro.id.

  3. Describe images/videos, no memes: Please include a text description when sharing images or videos. Post memes to !androidmemes@lemdro.id.

  4. No self-promotion spam: Active community members can post their apps if they answer any questions in the comments. Please do not post links to your own website, YouTube, blog content, or communities.

  5. No reposts or rehosted content: Share only the original source of an article, unless it’s not available in English or requires logging in (like Twitter). Avoid reposting the same topic from other sources.

  6. No editorializing titles: You can add the author or website’s name if helpful, but keep article titles unchanged.

  7. No piracy or unverified APKs: Do not share links or direct people to pirated content or unverified APKs, which may contain malicious code.

  8. No unauthorized polls, bots, or giveaways: Do not create polls, use bots, or organize giveaways without first contacting mods for approval.

  9. No offensive or low-effort content: Don’t post offensive or unhelpful content. Keep it civil and friendly!

  10. No affiliate links: Posting affiliate links is not allowed.

Quick Links

Our Communities
Lemmy App List
Chat and More

Community stats

  • 2.7K

    Monthly active users

  • 2.7K

    Posts

  • 34K

    Comments