←back to thread

194 points sleirsgoevy | 1 comments | | HN request time: 0s | source
Show context
cyberax ◴[] No.45777655[source]
This "attack" is not even theoretical. Android apps can just download arbitrary binary code, mprotect(PROT_MAYEXEC) some area in RAM, link the code there, and run it.

Google will simply revoke the keys for the "loader" APK. But that's fine for malware, its authors will just use the next stolen credit card to register a new account.

That's also why this has nothing to do with security.

replies(1): >>45778834 #
clueless ◴[] No.45778834[source]
what does it really have to do with?
replies(1): >>45786017 #
1. baby_souffle ◴[] No.45786017[source]
> what does it really have to do with?

Giving google control over what code runs on $device regardless of how that code got onto the device.

A revoked key doesn't care about how the APK got there...