Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Lord, what fools these mortals be! -- William Shakespeare, "A Midsummer-Night's Dream"


comp / comp.mobile.android / Re: Washington Post says Google sold Android phones with hidden insecure feature

SubjectAuthor
* Washington Post says Google sold Android phones with hidden insecure featureAndrew
`* Re: Washington Post says Google sold Android phones with hidden insecure featureJeff Layman
 `* Re: Washington Post says Google sold Android phones with hidden insecure featureAndrew
  +- Re: Washington Post says Google sold Android phones with hidden insecure featureBill Powell
  `* Re: Washington Post says Google sold Android phones with hidden insecure featureJeff Layman
   +* Re: Washington Post says Google sold Android phones with hidden insecure featuStan Brown
   |`- Re: Washington Post says Google sold Android phones with hidden insecure featureJeff Layman
   `* Re: Washington Post says Google sold Android phones with hidden insecure featureTheo
    `* Re: Washington Post says Google sold Android phones with hidden insecure featureJeff Layman
     `* Re: Washington Post says Google sold Android phones with hidden insecure featureAndrew
      +* Re: Washington Post says Google sold Android phones with hidden insecure featureAndy Burns
      |`- Re: Washington Post says Google sold Android phones with hidden insecure featureAndrew
      `- Re: Washington Post says Google sold Android phones with hidden insecure featureJeff Layman

1
Subject: Washington Post says Google sold Android phones with hidden insecure feature
From: Andrew
Newsgroups: comp.mobile.android
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Thu, 15 Aug 2024 19:07 UTC
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: comp.mobile.android
Subject: Washington Post says Google sold Android phones with hidden insecure feature
Date: Thu, 15 Aug 2024 19:07:44 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 15 Aug 2024 19:07:44 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="23777"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: NewsTap/5.5 (iPad)
Cancel-Lock: sha1:cYuSEGYC2qmIXhqtFUecIQeF8m4= sha256:134EeJY3U5bFSWD5wXrMCXWdWoNGXZrbJoHODe0V8cg=
sha1:oQKOR4YlC0bm3JdIibxZwcHakRM= sha256:os/LwJqB6rdxQcXe8l3XclQ93+AY8Qt1rsgMVy+a/qU=
X-Face: VQ}*Ueh[4uTOa]Md([|$jb%rw~ksq}bzqA;z-.*8JM`4+zL[`N\ORHCI80}]}$]$e5]/i#v qdYsE`yh@ZL3L{H:So{yN)b=AZJtpaP98ch_4W}
View all headers

Google sold Android phones with hidden insecure feature
https://www.washingtonpost.com/technology/2024/08/15/google-sold-android-phones-with-hidden-insecure-feature-companies-find/

We'll need to know more but this is what the Washington Post reported:

"Google's master software for some Android phones includes a
hidden feature that is insecure and could be activated to allow
remote control or spying on users, according to a security company
that found it inside phones at a U.S. intelligence contractor.

The feature appears intended to give employees at stores selling
Pixel phones and other models deep access to the devices so they
can demonstrate how they work, according to researchers at iVerify'
who shared their findings with The Washington Post.

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Jeff Layman
Newsgroups: comp.mobile.android
Organization: A noiseless patient Spider
Date: Thu, 15 Aug 2024 21:31 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Jeff@invalid.invalid (Jeff Layman)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden
insecure feature
Date: Thu, 15 Aug 2024 22:31:17 +0100
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <v9ls35$sf9a$1@dont-email.me>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 15 Aug 2024 23:31:24 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="1106c4c79b921b24e026308b32b0504d";
logging-data="933162"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18IQU2Ns0TlRPXVmEKJWv/NYA0j30K165Q="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:WxrXq65RQtRlNBrX+MIq4Ip6xHg=
Content-Language: en-GB
In-Reply-To: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com>
View all headers

On 15/08/2024 20:07, Andrew wrote:
> Google sold Android phones with hidden insecure feature
> https://www.washingtonpost.com/technology/2024/08/15/google-sold-android-phones-with-hidden-insecure-feature-companies-find/
>
> We'll need to know more but this is what the Washington Post reported:
>
> "Google's master software for some Android phones includes a
> hidden feature that is insecure and could be activated to allow
> remote control or spying on users, according to a security company
> that found it inside phones at a U.S. intelligence contractor.
>
> The feature appears intended to give employees at stores selling
> Pixel phones and other models deep access to the devices so they
> can demonstrate how they work, according to researchers at iVerify'
> who shared their findings with The Washington Post.

I assume that showcase.apk was removed when grapheneOS was installed as
that is intended for use in Pixel phones.

--
Jeff

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Andrew
Newsgroups: comp.mobile.android
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Fri, 16 Aug 2024 02:27 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
Date: Fri, 16 Aug 2024 02:27:32 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v9mdek$145d$1@nnrp.usenet.blueworldhosting.com>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com> <v9ls35$sf9a$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 16 Aug 2024 02:27:32 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="37037"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: NewsTap/5.5 (iPad)
Cancel-Lock: sha1:4g1znGMozGxovgilte4dr2xj1Vg= sha256:Irk0fdd3TOI0WcYaQP79Q9/DU6xjNF8XDKVDn2ChEoE=
sha1:wj8upMLzELBw62l3whyklWc5SBE= sha256:CPgeigrxyr2Cgp1xQNFXeKcfxmzQRUUgNRcNxuzR0CI=
X-Face: VQ}*Ueh[4uTOa]Md([|$jb%rw~ksq}bzqA;z-.*8JM`4+zL[`N\ORHCI80}]}$]$e5]/i#v qdYsE`yh@ZL3L{H:So{yN)b=AZJtpaP98ch_4W}
View all headers

Jeff Layman wrote on Thu, 15 Aug 2024 22:31:17 +0100 :

> I assume that showcase.apk was removed when grapheneOS was installed as
> that is intended for use in Pixel phones.

You're correct that "showcase.apk" seems to be the culprit, according to
this news article about the Pixel flaw which shipped since 2017 apparently.
*Researchers claim most Google Pixel phones shipped with exploitable bloatware since 2017*
<https://www.engadget.com/mobile/smartphones/researchers-claim-most-google-pixel-phones-shipped-with-exploitable-bloatware-since-2017-185926564.html>

"The issue relates to "Showcase.apk," a bit of software made for
Verizon and used to put Pixel devices in demo mode while displayed
in retail stores.

The software downloads a configuration file over an unencrypted
web connection, which - because of Showcase's deep access - might
allow bad actors to perform remote code execution or remote
package installation on the device.

The especially troubling part of this discovery is that Showcase
can't be uninstalled at the user level. And while it is not
enabled by default, iVerify said there could be multiple ways
to activate the software. iVerify alerted Google to the
vulnerability in May; thus far there's no confirmed evidence
it's been exploited in the wild.

A Google spokesperson told Wired that Showcase is no longer being
used by Verizon and that Google would have a software update to
remove the software from all Pixel devices in the coming weeks.

Additionally, the rep said Showcase is not present in the line
of Google Pixel 9 devices announced during the Made by Google
event this week."

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Bill Powell
Newsgroups: comp.mobile.android
Organization: Hispagatos.org
Date: Fri, 16 Aug 2024 02:39 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.hispagatos.org!.POSTED!not-for-mail
From: bill@anarchists.org (Bill Powell)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
Date: Fri, 16 Aug 2024 04:39:04 +0200
Organization: Hispagatos.org
Message-ID: <v9me47$b6ur$1@matrix.hispagatos.org>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com> <v9ls35$sf9a$1@dont-email.me> <v9mdek$145d$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 16 Aug 2024 02:39:04 -0000 (UTC)
Injection-Info: matrix.hispagatos.org;
logging-data="367579"; mail-complaints-to="abuse@hispagatos.org"
User-Agent: XanaNews/1.19.1.372 (x86; Portable ISpell)
View all headers

On Fri, 16 Aug 2024 02:27:32 -0000 (UTC), Andrew wrote:
https://iverify.io/blog/iverify-discovers-android-vulnerability-impacting-millions-of-pixel-devices-around-the-world
iVerify Discovers Android Vulnerability Impacting Millions of Pixel Devices Around the World
Published Aug 14, 2024

Earlier this year, iVerify's EDR capability flagged an Android device at
Palantir Technologies as unsecure, which launched an investigation in
partnership with Palantir and Trail of Bits. The investigation revealed an
Android application package, Showcase.apk, that is part of the firmware.
When enabled, Showcase.apk makes the operating system accessible to hackers
and ripe for man-in-the-middle attacks, code injection, and spyware. The
impact of this vulnerability is significant and could result in data loss
breaches totaling billions of dollars. iVerify notified Google with a
detailed vulnerability report following their 90-day disclosure process.
It's unclear when Google will issue a patch or remove the software from the
phones to mitigate the potential risks.

The Showcase.apk package was developed by Smith Micro, a software company
operating in the Americas and EMEA that provides software packages for
remote access, parental control, and data-clearing tools. Smith Micro
likely designed the package to enhance sales of Pixel and Android phones in
Verizon stores. The app is part of the firmware image, so millions of
Android Pixel phones worldwide could have this application running at the
system level.

The application package is designed to retrieve a configuration file over
unsecured HTTP. It allows the app to execute system commands or modules
that could open a backdoor, making it easy for cybercriminals to compromise
the device. Since this app is not inherently malicious, most security
technology may overlook it and not flag it as malicious, and since the app
is installed at the system level and part of the firmware image, it can not
be uninstalled at the user level.

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Jeff Layman
Newsgroups: comp.mobile.android
Organization: A noiseless patient Spider
Date: Fri, 16 Aug 2024 07:17 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Jeff@invalid.invalid (Jeff Layman)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden
insecure feature
Date: Fri, 16 Aug 2024 08:17:28 +0100
Organization: A noiseless patient Spider
Lines: 81
Message-ID: <v9mue8$1bgdu$1@dont-email.me>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com>
<v9ls35$sf9a$1@dont-email.me>
<v9mdek$145d$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Aug 2024 09:17:28 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="05dd96727a2feb1a1f321b669b54f205";
logging-data="1425854"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+2XKTFgnw5SsEk0eonghP4HIZNZnQgPDA="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:MQSHabPqmrWmilVymK+Ge8RBj9g=
In-Reply-To: <v9mdek$145d$1@nnrp.usenet.blueworldhosting.com>
Content-Language: en-GB
View all headers

On 16/08/2024 03:27, Andrew wrote:
> Jeff Layman wrote on Thu, 15 Aug 2024 22:31:17 +0100 :
>
>> I assume that showcase.apk was removed when grapheneOS was installed as
>> that is intended for use in Pixel phones.
>
> You're correct that "showcase.apk" seems to be the culprit, according to
> this news article about the Pixel flaw which shipped since 2017 apparently.
> *Researchers claim most Google Pixel phones shipped with exploitable bloatware since 2017*
> <https://www.engadget.com/mobile/smartphones/researchers-claim-most-google-pixel-phones-shipped-with-exploitable-bloatware-since-2017-185926564.html>
>
> "The issue relates to "Showcase.apk," a bit of software made for
> Verizon and used to put Pixel devices in demo mode while displayed
> in retail stores.
>
> The software downloads a configuration file over an unencrypted
> web connection, which - because of Showcase's deep access - might
> allow bad actors to perform remote code execution or remote
> package installation on the device.
>
> The especially troubling part of this discovery is that Showcase
> can't be uninstalled at the user level. And while it is not
> enabled by default, iVerify said there could be multiple ways
> to activate the software. iVerify alerted Google to the
> vulnerability in May; thus far there's no confirmed evidence
> it's been exploited in the wild.
>
> A Google spokesperson told Wired that Showcase is no longer being
> used by Verizon and that Google would have a software update to
> remove the software from all Pixel devices in the coming weeks.
>
> Additionally, the rep said Showcase is not present in the line
> of Google Pixel 9 devices announced during the Made by Google
> event this week."

Firstly, I tried finding out the answer to my question about
Showcase.apk and grapheneOS but I couldn't tie the search down enough,
as "showcase" is a word often used!

Does/did it affect only Pixel phones? The Washington Post article states
"The feature appears intended to give employees at stores selling Pixel
phones *and other models*..." (my emphasis).

There's a lot more info at
<https://iverify.io/blog/iverify-discovers-android-vulnerability-impacting-millions-of-pixel-devices-around-the-world>.
In particular, the "Conclusion" has some real food for thought. I'll
repeat it here:

"The Showcase.apk discovery and other high-profile incidents, like
running third-party kernel extensions in Microsoft Windows, highlight
the need for more transparency and discussion around having third-party
apps running as part of the operating system. It also demonstrates the
need for quality assurance and penetration testing to ensure the safety
of third-party apps installed on millions of devices.

Further, why Google installs a third-party application on every Pixel
device when only a very small number of devices would need the
Showcase.apk is unknown. The concern is serious enough that Palantir
Technologies, who helped identify the security issue, is opting to
remove Android devices from its mobile fleet and transition entirely to
Apple devices over the next few years. On most devices iVerify
researchers analyzed, the app was inactive by default and had to be
manually enabled. To avoid endangering users, we are redacting our way
of enabling the app in the full report. There might be other ways to
enable the app or situations where the app is enabled by default."

Anyway, I'm not at all surprised by this little episode. I've said many
times before that I don't trust Google or any of the phone manufacturers
(and it will no doubt get worse with the independent Chinese
manufacturers putting their heavily adapted versions of android on their
phones) to not spy on their customers. Or, as in the case of showcase,
to mess up enough so that others can!

So good luck with the iverify.io comment "... highlight the need for
more transparency and discussion around having third-party apps running
as part of the operating system". And what about first-party apps
running that we don't know about, and probably never will?

--
Jeff

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Stan Brown
Newsgroups: comp.mobile.android
Organization: Oak Road Systems
Date: Fri, 16 Aug 2024 19:09 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: the_stan_brown@fastmail.fm (Stan Brown)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
Date: Fri, 16 Aug 2024 12:09:05 -0700
Organization: Oak Road Systems
Lines: 14
Message-ID: <MPG.412943af7531b8a099034e@news.individual.net>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com> <v9ls35$sf9a$1@dont-email.me> <v9mdek$145d$1@nnrp.usenet.blueworldhosting.com> <v9mue8$1bgdu$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net ocK07hcJqYzY0JkPPQczqgsKUwwQCnAfneuAUNaNpOuGZmZTXe
Cancel-Lock: sha1:69y4HFQ9d9tBHlOwcT4XJZGU1/0= sha256:1CgTkjosc5umwiw12OX5/9TzOrfBij4C8ullnhUOzmQ=
User-Agent: MicroPlanet-Gravity/3.0.11 (GRC)
View all headers

On Fri, 16 Aug 2024 08:17:28 +0100, Jeff Layman wrote:
> Firstly, I tried finding out the answer to my question about
> Showcase.apk and grapheneOS but I couldn't tie the search down enough,
> as "showcase" is a word often used!
>

Sometimes quotes still work. Try "showcase.apk" with the quotes.

When I did, every single result on the first two pages was for
showcase.apk. (I didn't look further.)

--
Stan Brown, Tehachapi, California, USA https://BrownMath.com/
Shikata ga nai...

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Theo
Newsgroups: comp.mobile.android
Organization: University of Cambridge, England
Date: Fri, 16 Aug 2024 19:47 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!newsfeed.xs3.de!nntp-feed.chiark.greenend.org.uk!ewrotcd!.POSTED.chiark.greenend.org.uk!not-for-mail
From: theom+news@chiark.greenend.org.uk (Theo)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
Date: 16 Aug 2024 20:47:59 +0100 (BST)
Organization: University of Cambridge, England
Message-ID: <3al*7S+Rz@news.chiark.greenend.org.uk>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com> <v9ls35$sf9a$1@dont-email.me> <v9mdek$145d$1@nnrp.usenet.blueworldhosting.com> <v9mue8$1bgdu$1@dont-email.me>
Injection-Info: chiark.greenend.org.uk; posting-host="chiark.greenend.org.uk:93.93.131.173";
logging-data="25756"; mail-complaints-to="abuse@chiark.greenend.org.uk"
User-Agent: tin/1.8.3-20070201 ("Scotasay") (UNIX) (Linux/5.10.0-28-amd64 (x86_64))
Originator: theom@chiark.greenend.org.uk ([93.93.131.173])
View all headers

Jeff Layman <Jeff@invalid.invalid> wrote:
> Firstly, I tried finding out the answer to my question about
> Showcase.apk and grapheneOS but I couldn't tie the search down enough,
> as "showcase" is a word often used!

I went on the GrapheneOS forum and searched 'showcase':
https://discuss.grapheneos.org/d/14984-is-grapheneos-an-answer-to-recent-wired-headline-about-showcaseapk

But I could have told you the answer anyway - GOS builds from Google's
sources, so they don't include closed source apps like this. If you choose
to install Google Play then that's closed source, but they carefully vet what
gets installed.

GrapheneOS also have an official statement which debunks the whole story:
https://discuss.grapheneos.org/d/14993-debunking-fake-stock-pixel-os-vulnerability-from-an-edr-company

Theo

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Jeff Layman
Newsgroups: comp.mobile.android
Organization: A noiseless patient Spider
Date: Fri, 16 Aug 2024 20:46 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Jeff@invalid.invalid (Jeff Layman)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden
insecure feature
Date: Fri, 16 Aug 2024 21:46:39 +0100
Organization: A noiseless patient Spider
Lines: 21
Message-ID: <v9odrf$1bgdv$1@dont-email.me>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com>
<v9ls35$sf9a$1@dont-email.me>
<v9mdek$145d$1@nnrp.usenet.blueworldhosting.com>
<v9mue8$1bgdu$1@dont-email.me>
<MPG.412943af7531b8a099034e@news.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Aug 2024 22:46:48 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="05dd96727a2feb1a1f321b669b54f205";
logging-data="1425855"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+15fnhnOLc1RK2pvEt0aNy9BOrw49ymKY="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:hhuoEyjyAFnra1j5JFiGf8KmC2M=
In-Reply-To: <MPG.412943af7531b8a099034e@news.individual.net>
Content-Language: en-GB
View all headers

On 16/08/2024 20:09, Stan Brown wrote:
> On Fri, 16 Aug 2024 08:17:28 +0100, Jeff Layman wrote:
>> Firstly, I tried finding out the answer to my question about
>> Showcase.apk and grapheneOS but I couldn't tie the search down enough,
>> as "showcase" is a word often used!
>>
>
> Sometimes quotes still work. Try "showcase.apk" with the quotes.
>
> When I did, every single result on the first two pages was for
> showcase.apk. (I didn't look further.)

I think I searched too early this morning! I was using Startpage anyway,
not Google directly. There seems to be a slight difference in the
results using showcase.apk or "showcase.apk".

Anyway, as you note, there are quite a few hits now.

--
Jeff

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Jeff Layman
Newsgroups: comp.mobile.android
Organization: A noiseless patient Spider
Date: Fri, 16 Aug 2024 20:56 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Jeff@invalid.invalid (Jeff Layman)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden
insecure feature
Date: Fri, 16 Aug 2024 21:56:30 +0100
Organization: A noiseless patient Spider
Lines: 22
Message-ID: <v9oedu$1bgdv$2@dont-email.me>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com>
<v9ls35$sf9a$1@dont-email.me>
<v9mdek$145d$1@nnrp.usenet.blueworldhosting.com>
<v9mue8$1bgdu$1@dont-email.me> <3al*7S+Rz@news.chiark.greenend.org.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 16 Aug 2024 22:56:31 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="05dd96727a2feb1a1f321b669b54f205";
logging-data="1425855"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+kp4BrXg9+QjhlHVHrlTtRyI/LXBkbD9I="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:+gohR6vMvWWNcv8XdCPXB/D2dak=
Content-Language: en-GB
In-Reply-To: <3al*7S+Rz@news.chiark.greenend.org.uk>
View all headers

On 16/08/2024 20:47, Theo wrote:
> Jeff Layman <Jeff@invalid.invalid> wrote:
>> Firstly, I tried finding out the answer to my question about
>> Showcase.apk and grapheneOS but I couldn't tie the search down enough,
>> as "showcase" is a word often used!
>
> I went on the GrapheneOS forum and searched 'showcase':
> https://discuss.grapheneos.org/d/14984-is-grapheneos-an-answer-to-recent-wired-headline-about-showcaseapk
>
> But I could have told you the answer anyway - GOS builds from Google's
> sources, so they don't include closed source apps like this. If you choose
> to install Google Play then that's closed source, but they carefully vet what
> gets installed.
>
> GrapheneOS also have an official statement which debunks the whole story:
> https://discuss.grapheneos.org/d/14993-debunking-fake-stock-pixel-os-vulnerability-from-an-edr-company

It's hard to know who to believe these days... :-(

--
Jeff

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Andrew
Newsgroups: comp.mobile.android
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Fri, 16 Aug 2024 23:39 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
Date: Fri, 16 Aug 2024 23:39:58 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v9oo0d$1fbb$1@nnrp.usenet.blueworldhosting.com>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com> <v9ls35$sf9a$1@dont-email.me> <v9mdek$145d$1@nnrp.usenet.blueworldhosting.com> <v9mue8$1bgdu$1@dont-email.me> <3al*7S+Rz@news.chiark.greenend.org.uk> <v9oedu$1bgdv$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 16 Aug 2024 23:39:58 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="48491"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: NewsTap/5.5 (iPad)
Cancel-Lock: sha1:d6LNlM84hxkmqyA1ydgGfR0hKcA= sha256:qH6yub2WyZJWRAeRqy6v/cs2eUE4J3Nkmo/nFbaGdjs=
sha1:YiHVLhkwfBzwqDigSHuBcGq9oOE= sha256:mQTu19xl2Ay1zyiAndzT0RBYx++VjyQ+PiaVWCNY4No=
X-Face: VQ}*Ueh[4uTOa]Md([|$jb%rw~ksq}bzqA;z-.*8JM`4+zL[`N\ORHCI80}]}$]$e5]/i#v qdYsE`yh@ZL3L{H:So{yN)b=AZJtpaP98ch_4W}
View all headers

Jeff Layman wrote on Fri, 16 Aug 2024 21:56:30 +0100 :

>> But I could have told you the answer anyway - GOS builds from Google's
>> sources, so they don't include closed source apps like this. If you choose
>> to install Google Play then that's closed source, but they carefully vet what
>> gets installed.

Since Aurora is the same thing as the Google Play Store is, I can't imagine
that anyone who installs GrapheneOS would ever put the Google Play Store on
it.

What on earth would be the reason to put the Google Play Store on a
non-Googled device when Aurora is a thousand times better anyway?

Makes no sense.

>> GrapheneOS also have an official statement which debunks the whole story:
>> https://discuss.grapheneos.org/d/14993-debunking-fake-stock-pixel-os-vulnerability-from-an-edr-company
>
> It's hard to know who to believe these days... :-(

I have one Occam's Razor rule that a web site that explains BOTH SIDES of
the story is almost always more knowledgeable & more reputable than a web
site (or article) that only explains ONE SIDE of the story.

I read the link that Theo kindly supplied, which changes the picture a lot.
<https://discuss.grapheneos.org/d/14993-debunking-fake-stock-pixel-os-vulnerability-from-an-edr-company>

Anyway, I looked in Muntashirakon App Manager for "showcase.apk" and it's
not on my T-Mobile Samsung Galaxy A32-5G so I'm not going to worry much.

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Andy Burns
Newsgroups: comp.mobile.android
Date: Sat, 17 Aug 2024 10:13 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: usenet@andyburns.uk (Andy Burns)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden
insecure feature
Date: Sat, 17 Aug 2024 11:13:22 +0100
Lines: 6
Message-ID: <libbe3Fhhg9U1@mid.individual.net>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com>
<v9ls35$sf9a$1@dont-email.me>
<v9mdek$145d$1@nnrp.usenet.blueworldhosting.com>
<v9mue8$1bgdu$1@dont-email.me> <3al*7S+Rz@news.chiark.greenend.org.uk>
<v9oedu$1bgdv$2@dont-email.me>
<v9oo0d$1fbb$1@nnrp.usenet.blueworldhosting.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net dpJktRv8A5fPWsP6sxEKLgrHP3iacsFMG/5C0Aoya6D4hz2WWI
Cancel-Lock: sha1:A+wVug5vezuxjrgvlX4m3bMv6+c= sha256:lGHLAGO1EX5QZVeDs4HXDvFFSCfvImn3vjPJetxWGuY=
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <v9oo0d$1fbb$1@nnrp.usenet.blueworldhosting.com>
View all headers

Andrew wrote:

> I looked in Muntashirakon App Manager

Finally v3.1.7 of that app is capable of getting past the opening T&C
screen without hanging ...

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Andrew
Newsgroups: comp.mobile.android
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Sat, 17 Aug 2024 11:58 UTC
References: 1 2 3 4 5 6 7 8
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.quux.org!weretis.net!feeder9.news.weretis.net!news.cmpublishers.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
Date: Sat, 17 Aug 2024 11:58:50 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v9q39p$2l41$1@nnrp.usenet.blueworldhosting.com>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com> <v9ls35$sf9a$1@dont-email.me> <v9mdek$145d$1@nnrp.usenet.blueworldhosting.com> <v9mue8$1bgdu$1@dont-email.me> <3al*7S+Rz@news.chiark.greenend.org.uk> <v9oedu$1bgdv$2@dont-email.me> <v9oo0d$1fbb$1@nnrp.usenet.blueworldhosting.com> <libbe3Fhhg9U1@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 17 Aug 2024 11:58:50 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="87169"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: NewsTap/5.5 (iPad)
Cancel-Lock: sha1:V6sKYFqN7Mkq/iWCPwtxSMMQ3jk= sha256:kCDwP7piw+JcrUF/HDgc/tMZb4+BhXeZVLEbvvb/SWM=
sha1:s1S0yUSzf0v5CjQo9cPcjCAmsLE= sha256:1ddP9/ssfItj6thdO/GSsEVseZLQBXWryHP7TJf+qTA=
X-Face: VQ}*Ueh[4uTOa]Md([|$jb%rw~ksq}bzqA;z-.*8JM`4+zL[`N\ORHCI80}]}$]$e5]/i#v qdYsE`yh@ZL3L{H:So{yN)b=AZJtpaP98ch_4W}
View all headers

Andy Burns wrote on Sat, 17 Aug 2024 11:13:22 +0100 :

>> I looked in Muntashirakon App Manager
>
> Finally v3.1.7 of that app is capable of getting past the opening T&C
> screen without hanging ...

Finally it's working for you! :)

I feel bad about that happening to you, of all people, especially as I've
extolled the virtues of the Muntashirakon App Manager as the finest.

Glad that it's finally working for you.

What I like best about Muntashirakon App Manager is that it never misses a
package (unlike other app managers) and it always shows the full package
name (again, unlike others) and more importantly, it has all the public and
private shortcuts you can make plus it gives an assessment of each app in
terms of trackers and bloatware and it easily allows you to remove them.

Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature
From: Jeff Layman
Newsgroups: comp.mobile.android
Organization: A noiseless patient Spider
Date: Sun, 18 Aug 2024 08:18 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Jeff@invalid.invalid (Jeff Layman)
Newsgroups: comp.mobile.android
Subject: Re: Washington Post says Google sold Android phones with hidden
insecure feature
Date: Sun, 18 Aug 2024 09:18:50 +0100
Organization: A noiseless patient Spider
Lines: 12
Message-ID: <v9sapb$2abkd$1@dont-email.me>
References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com>
<v9ls35$sf9a$1@dont-email.me>
<v9mdek$145d$1@nnrp.usenet.blueworldhosting.com>
<v9mue8$1bgdu$1@dont-email.me> <3al*7S+Rz@news.chiark.greenend.org.uk>
<v9oedu$1bgdv$2@dont-email.me>
<v9oo0d$1fbb$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 18 Aug 2024 10:18:51 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="2b583402f376f1b9a675f69f42da28e1";
logging-data="2436749"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/LN2mT6jWiff0eCSLXeilPezB03yQWk5s="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:Z28M1ykne+/jw6I1EzJ+0fjqyic=
In-Reply-To: <v9oo0d$1fbb$1@nnrp.usenet.blueworldhosting.com>
Content-Language: en-GB
View all headers

On 17/08/2024 00:39, Andrew wrote:

> Anyway, I looked in Muntashirakon App Manager for "showcase.apk" and it's
> not on my T-Mobile Samsung Galaxy A32-5G so I'm not going to worry much.

Perhaps Samsung have their own version and call it something else... ;-)

FWIW MAM hasn't found it on my Xiaomi either.

--
Jeff

1

rocksolid light 0.9.8
clearnet tor