boramalper a day ago

I suspect a strong link between mass surveillance (by corporations for advertising or by states for intelligence purposes) and the very recent targeting of the senior Iranian nuclear scientist and military officers at their homes in Iran.

Wherever you are from or whatever side of the conflict you are on, I think we can all agree that it’s never been easier to infer so much about a person from “semi-public” sources such as companies selling customer data and built-in apps that spy on their users and call home. It allows intelligence agencies to outsource intelligence gathering to the market, which is probably cheaper and a lot more convenient than traditional methods.

“Privacy is a human right” landed on deaf ears but hopefully politicians will soon realise that it’s a matter of national security too.

  • kragen a day ago

    The truth is far outside the Overton window.

    Yes, privacy is a question of civil defense in the drone age. But the existing crop of states will never acknowledge that; their structure and institutions presume precisely the kind of mass databases of PII that create this vulnerability, as well as institutional transparency for public accountability. This makes them structurally vulnerable to insurgencies that expropriate those databases for targeting. The existing states will continue to clutch at their fantasies of adequately secured taxpayer databases until their territorial control (itself an anachronism in the drone age; boots on the ground can no longer provide security against things like Operation Spiderweb) has been reduced to a few fortified clandestine facilities.

    Things are going to be very unpredictable and, I suspect, extremely violent.

    • fpoling 14 hours ago

      This has been going on in Russia on massive scale. For bribes officials sells anything including highly sensitive databases. Those were used to uncover various Kremlin-run assassins targeting oppositions. Then Ukrainian special services used those to target high-ranking Russian military officers. Russia tried to crack down on that but it just increased the database price tag.

      • mattigames 10 hours ago

        If Putin didn't want bribery to go rampant he would set the example, and force other top leaders to do the same, but instead he flaunts his properties, yats, women that he enjoys; but it's probably a price too high for him to pay. I bet Xi Ping enjoys similar privileges but in much more private manner.

    • drewbug 20 hours ago

      I used to feel this way until I learned about counter-UAS tech.

      • kragen 20 hours ago

        That's wishful thinking. Flying drones aren't the only threat, or the main threat, and there isn't such a thing as "counter-UAS tech", only counter-yesterday's-UAS tech. Radio jamming was "counter-UAS tech" until the mass production of fiber-optic-controlled FPV drones starting five months ago, for example. You can still find vendors marketing it as such.

        30 milligrams of high explosive is enough to open your daughter's skull, or, more relevantly, your commanding officer's daughter's skull, and there are a thousand ways to deliver it to her if she can be tracked: in pager batteries, crawling, swimming, floating, waiting for ambush, hitchhiking on migratory birds, hitchhiking on car undercarriages, in her Amazon Prime deliveries, falling from a hydrogen balloon in the mesosphere, and so on. And if 30mg is too much, 2mg of ricin on a mechanical ovipositor will do just as well.

        All of this is technically possible today without any new discoveries. At this point it's a straightforward systems development exercise. And you can be sure that there are bad people working for multiple different countries' spy agencies who know this; they don't need me to tell them.

        • bostik 19 hours ago

          > 30 milligrams of high explosive is enough to open your daughter's skull, or, more relevantly, your commanding officer's daughter's skull, and there are a thousand ways to deliver it

          While we are talking about flying drones, we are not far off from Slaughterbots becoming reality.[0] Why bother with surgical assassinations if you can blanket entire regions with with swarms of autonomous seek-and-destroy explosives?

          After all, as last two years have so amply demonstrated: people are fine with genocide.

          0: https://www.youtube.com/watch?v=O-2tpwW0kmU

          • godelski 15 hours ago

            What's important to remember is that we get to Slaughterbots with "best intentions." Trying to feel safer. Trying to kill our enemies. Trying to protect our friends, families, children. Little by little is how it happens. The road to hell is paved, after all.

          • kragen 18 hours ago

            Slaughterbots is just the beginning; it's definitely too late to prevent that scenario now.

            Why bother? For the same reason to bother with surgical assassinations if you can blanket entire regions with nuclear fireballs. Radioactive wastelands are unprofitable! This is a general problem with genocide: it only gets you land, and since the Green Revolution land is abundant. Protection rackets, on the otehr hand, are highly profitable, but only with some exclusivity; if extortionists multiply, the unique Nash equilibrium is multiple gangs that collectively demand many times the victims' total revenues, resulting in ecological collapse.

            More generally, the threat of violence is only effective as a form of coercion when you can credibly withdraw the violence as a reward for compliance. Violence provides no incentive to comply to someone who believes they are just as likely to be a victim whether they comply or not.

            But swarms of autonomous seek-and-destroy explosives are plausibly the most effective way to provide that surgical-assassination threat, perhaps combined with poisons, solid penetrators, and/or incendiaries. The Minority Report spiders (not yet technically feasible) or a quadcopter can be enormously more selective than a GBU-57, a Hellfire missile, or even a hand grenade, and can choose to avert their attack at the last millisecond upon the presentation of properly signed do-not-assassinate orders, even if long-distance communication is jammed.

          • gruez 19 hours ago

            >After all, as last two years have so amply demonstrated: people are fine with genocide.

            Last two years? Try last few decades at the very least. People only care about the war in Gaza more because it's controversial. For non-controversial cases people just agree it's bad but shrug their shoulders.

            https://en.wikipedia.org/wiki/Bosnian_genocide

            https://en.wikipedia.org/wiki/Rwandan_genocide

            https://en.wikipedia.org/wiki/Darfur_genocide

            • jonah 18 hours ago

              What's ridiculous is that it's even seen as controversial by some.

              • tomalbrc 13 hours ago

                It is will how some people will live in their bubble and not see the controversies

          • MoonGhost 33 minutes ago

            > After all, as last two years have so amply demonstrated: people are fine with genocide.

            And open war crimes like intentionally killing civilians (TV broadcasters in Iran for example, or Gaza en mass)

          • autoexec 12 hours ago

            It's sad that it was only months after that video was released that autonomous drones were being used to kill people in war. That video was meant as a warning but it was totally ignored.

  • VagabundoP an hour ago

    What always shocks me is how much negligence is shown by politicians and cyber inteligence wrt to standard mobiles.

    Anyone who runs a country, especially senior politicians, just shouldn't have a standard mobile.

    It should be a built from the ground up phone by your own countries government services. Running GrapheneOS or something.

    And you shouldn't have a second phone to have your affairs either.

  • mike_d a day ago

    > I suspect a strong link between mass surveillance [...] and the very recent targeting of the senior Iranian nuclear scientist and military officers at their homes in Iran.

    We all like to imagine this super cool clandestine hacking operation using peoples mobile phones to secretly track people who visit nuclear facilities back to their homes.

    The much more logical explanation is someone approached a low level employee at the MEAF who turned over a USB stick with the governments org charts and payroll records in exchange for their kids getting a full ride to a prestigious foreign university.

    • michaelt 19 hours ago

      > The much more logical explanation is someone approached a low level employee at the MEAF who turned over a USB stick with the governments org charts and payroll records in exchange for their kids getting a full ride to a prestigious foreign university.

      If there are spies in foreign countries going around offering life-changing sums of money for USB sticks, which people are accepting

      is it not also plausible that folks at google/samsung/apple/aws/cloudflare/microsoft are getting offered life-changing sums of money for leaving their work-from-home laptop unattended for 5 minutes?

      • AnthonyMouse 13 hours ago

        This is the thing that has always concerned me about Cloudflare. The structure of their operation is "we do a MITM on most of the encryption on the internet". Even if that doesn't make you immediately suspicious that it was set up as a spying operation on purpose (compare "encryption added/removed here" Snowden slide), it makes them a massive state espionage target. Do they really have the ability to resist that level of persistent targeting from every country in the world?

        • scripturial 8 hours ago

          Cloudflare is a US company right? One assumes it’s controlled (if not directly, then indirectly) by US intelligence interests. That would protect it from non US intelligence influence would it not?

          • AnthonyMouse 7 hours ago

            Does the US intelligence apparatus protect its networks with some kind of theurgy preventing the government of Russia or Iran from finding any 0-day before they do from time to time, and have a source of infallible humans immune to bribery or extortion?

      • heavyset_go 18 hours ago

        Yes, this happens. Industrial espionage is popular.

        From what I've seen with bribes, it doesn't even take life-changing amounts of money.

        • bawolff 14 hours ago

          I imagine in a country like Iran where there is a sizable minority that hates the regime, someone might have done it for free.

    • boramalper a day ago

      Israel, like any other state, must be using a variety of methods including good old "human intelligence" so it's not either-or.

      In addition, saying that

      > someone approached a low level employee at the MEAF who turned over a USB stick with the governments org charts and payroll records in exchange for their kids getting a full ride to a prestigious foreign university

      is an oversimplification on multiple levels:

      1. Low-level employees typically don't have access to sensitive information.

      2. With human intelligence, there is always a risk that the person you (e.g. Israel) are in touch with (e.g. an Iranian officer) who pretends to be a "double agent" (e.g. leaking info to Israel), is in fact a "triple agent" (e.g. actually working for Iran to mislead Israel).

      3. You can send your kids to foreign universities but not your siblings, your parents, your wife's family, and so on... Some of your beloved ones are almost certain to suffer the consequences of your actions. High treason is no joke.

      • SirHumphrey a day ago

        > 1. Low-level employees typically don't have access to sensitive information.

        You would think, but when I was interning (well, it was a paid internship) for a company, I was fixing an excel spreadsheet with payroll information for an entire department of a few hundred people. Not the best piece of "opsec", but when you are in a hurry (pay was due in a couple of days) and most people are on vacations "hey the junior kid can probably fix it, he seems fine" is a way too common approach. And it is fine - sometimes for a long time. Until it isn't.

        • aswanson 21 hours ago

          Yeah I recall being a new hire at a defense contractor, getting a login, and accidentally opening an excel sheet with a ton of management user names and logins. People are sloppy.

      • bigfatkitten 2 hours ago

        > 1. Low-level employees typically don't have access to sensitive information.

        Snowden was a contract Sharepoint admin. He was on the absolute bottom of the org chart.

  • FilosofumRex a day ago

    Almost all of Iran's cell network system was originally installed by S. Korean firms. They've changed some to Chinese brands, but apparently the compromised S. Korean brands are still around.

    • Digital28 a day ago

      Changing from SK to CN is a trade from intentional vulnerability to unintentional vulnerability. I’ve yet to see a secure piece of software come out of China in my 30+ years of coding.

      • jeroenhd 20 hours ago

        When a security analysis was done of Chinese parts of the Dutch mobile network, that was pretty much the conclusion: Chinese vendors deliver software and components full of vulnerabilities, but none of them seem to be intentional.

        Since then there has been a movement to reduce Chinese vendors in general our if security concerns, as well as to improve the security posture of the mobile networks by doing things like "encrypting connections" and "switching away from telnet".

        On the other hand, the Chinese managed to break into the US wiretapping system, so it's not like other networks aren't vulnerable either.

        • vardump 20 hours ago

          > Chinese vendors deliver software and components full of vulnerabilities, but none of them seem to be intentional.

          Plausible deniability.

          • GTP 14 hours ago

            If we're talking about cheap products, then it's more likely due to cost savings rather than malice. But yeah, no one can give you defitive proof of this.

      • dragonelite 14 hours ago

        Better to swallow the poison that doesn't kill you(for now) than to swallow the one that is intended to kill you.

      • FirmwareBurner 21 hours ago

        >I’ve yet to see a secure piece of software come out of China in my 30+ years of coding.

        SW coming out of Korea's domestic industry giants isn't any better. Because they used to treat SW like a cost center or another item on the BoM.

        IIRC, the only way to do online banking in Korea years ago, was you needed Internet explorer and some active-X plugin that supported encryption.

        Some Korean giants do have good SW, but a lot of it is developed internationally by offices outside of Korea.

      • Dah00n a day ago

        Yet in telco it is much easier and faster to get a bug fixed in Chinese equipment. IMO it is more likely you don't work with critical infrastructure than the problem being Chinese equipment.

      • ReptileMan a day ago

        Supermicro IPMI comes to mind. If it was compromised we would have known by now.

      • monster_truck 20 hours ago

        Brother you cannot be serious with this racist take

        • bbarnett 19 hours ago

          Saying that a culture is poor at security dev, such as Chinese business culture, is not even remotely rasist.

          There are many ethnicities in China, people of all genetic backgrounds. It is the culture that is the problem, not the race.

          For example, there are many ethnically Chinese people who grew up in the West, working in businesses, in countries where there is a culture of security.

          Now, you could label it 'culturalist', and maybe it is, but there are definitely inferior and superior cultures. Especially, there are parts of cultures which are quite comparable this way.

          • AJ007 18 hours ago

            There's also another point that security is really fucking expensive. Apple on Google spend billions a year on security, yet their phones are broken in to once they are a couple of years old. Big American software companies have large margins and large budgets. Those Chinese companies are running on fumes (and credit.)

            Security and encryption is taken as a given by Western regulators given how many times they pass laws to break encryption. If you look at targeted 0-days, the conclusion would be more along the lines of the very best hardware+software is barely secure.

          • gruez 18 hours ago

            >>Brother you cannot be serious with this racist take

            >There are many ethnicities in China, people of all genetic backgrounds. It is the culture that is the problem, not the race.

            This just seems like nitpicking to me. Colloquially most people would classify discrimination based on country of origin, or "culture" (whatever that means) as racism, even if it doesn't meet the technical definition. For instance Trump's travel bans have been called by many as "racist", even though it covers a bunch of countries, and even though the countries are majority muslim, it also excludes major muslim countries like Pakistan and Indonesia.

            • const_cast 9 hours ago

              It's entirely fair game to criticism or even discriminate based on culture, because culture is composed of actions. If people act in such a way that you do not like, that's a valid reason not to like them.

              Now, we do still need to respect cultural differences where it makes sense and consider the historical context behind cultural differences, such as colonialism.

            • exe34 17 hours ago

              Just because most people are wrong doesn't mean we should encourage the dilution of words.

              • gruez 15 hours ago

                I might be sympathetic to this argument if the severity actually differed, eg. people calling mean tweets "violence" or something, but that's not what's happening there. I don't see any meaningfully difference between "I'm discriminating against you because you're Chinese" (culture/nationality) and "I'm discriminating you're Han Chinese" (ethnicity). I doubt the average racist actually knows the distinction between the two anyways, and I doubt people are going to be like "oh you're discriminating based on culture instead of ethnicity? I guess that's fine then!".

                • exe34 15 hours ago

                  > I don't see any meaningfully difference between "I'm discriminating against you because you're Chinese" (culture/nationality) and "I'm discriminating you're Han Chinese" (ethnicity).

                  It's interesting you would write this as if nobody's pointed out actual cultural differences yet.

            • Dylan16807 17 hours ago

              > This just seems like nitpicking to me. Colloquially most people would classify discrimination based on country of origin, or "culture" (whatever that means) as racism, even if it doesn't meet the technical definition.

              Nobody is going to believe you're talking about real things if you let people call your argument "racism" so it's not nitpicking if you can explain why it's not. Also the word "discrimination" is itself a loaded term.

              And yes areas having cultures is real. Sometimes it's tied to country, sometimes it's not.

              > Trump's travel bans have been called by many as "racist", even though it covers a bunch of countries,

              I'm confused? Covering a whole bunch of countries sharing a demographic is much more likely to be a racist move than picking one or two.

              > and even though the countries are majority muslim, it also excludes major muslim countries like Pakistan and Indonesia.

              That's a good argument against saying "muslim ban" but I'm pretty sure a focus on the middle east makes it more about race.

        • greenchair 19 hours ago

          is it racist to wonder why I rarely see a chinese restaurant with inspection score above 80? culture differences are a real thing (if you don't have your head buried in the sand that is).

    • throw123xz a day ago

      It's a mistake to assume that a very capable country can't get into a network that uses Chinese equipment/software.

      • Dah00n a day ago

        It's also a mistake to assume that a very capable country can't get into a network that uses US equipment/software... especially Cisco equipment with all the "forgotten" hardcoded logins. Iran is better off with Chinese equipment than American or Korean.

        • kragen a day ago

          Nobody knows enough to say whether Iran is better off with Chinese equipment, because most of the intentional backdoors on every side of this struggle remain undiscovered by the other sides.

          • dse1982 a day ago

            Well, China is more on the side of Iran than the US or US allies. So there is that.

            • kragen a day ago

              Yes, but that doesn't imply they want Iran's telecommunications network to be a black box to the PLA.

  • lm28469 21 hours ago

    If you're a valuable enough target, like these Iranians generals/scientists they just need to find you once and then they can continuously track your movements via satellite. They don't need much precision, just which building to level

    • mousethatroared 19 hours ago

      "Just which building to level"

      What's "just" a war crime amongst friends?

      • bawolff 14 hours ago

        Some of the footage coming out of Iran of the aftermath of these assinations have shown specific rooms in buildings targeted, leaving the rest of the building in-tact. For a high value military target like chief of the armed forces, it seems unlikely that would be a warcrime as the civilian casualities would be low compared to the military advantage of the target.

        [The nuclear scientists on the other hand are much more questionable because its pretty unclear if they are legal targets at all]

        • mousethatroared 7 hours ago

          Since Israel started the war without authorization being the security council, it's legally the aggressor. Which means the actions in of themselves are crimes, regardless of where they are conducted.

          Of course, Israel has hit hospitals in Tehran. And condos. War crimes.

          So, no matter how you slice it, Israel commits war crimes as a matter of course.

          Now, one could object and say that Israel has to commit war crimes because it's so endangered. If that's the case, why doesn't it go to the security council and get authorization for lethal military action? Who on the security council would vote against Israel if the threat was remotely real?

          • bawolff 4 hours ago

            I meant my response specificly in the context of the post i was responding to - namely that Israel was tracking some high level officials and then bombing the building they were in - which is what i assume the parent was claiming was a war crime.

            Other actions in this conflict of course could be crimes and require appropriate analysis.

            > Since Israel started the war without authorization being the security council, it's legally the aggressor. Which means the actions in of themselves are crimes, regardless of where they are conducted.

            I disagree with the way you phrased this. The analysis of if the use of force is legal in general should be separate from if individual actions are war crimes. See https://www.icrc.org/en/law-and-policy/jus-ad-bellum-and-jus... which emphasizes that jus ad bellum is separate from jus in bello.

            Israel is probably going to claim self-defense here (you do not need UNSC permission for a defensive war). The claim is probably pretty far-fetched unless there is some bombshell evidence we are not privy to, as the threat does not seem imminent the way self-defense normally requires.

            OTOH - the last time anyone cared about the crime of agression was germany in WW2 (although there are some voices about ukraine & russia). People tend to care much more about war crimes than crimes of aggression.

            > Israel has hit hospitals in Tehran

            I'm not aware of this allegation. I did hear an allegation from Iran about a hospital in Kermanshah. Regardless, if it is true, it would indeed probably be a war crime. (Generally speaking. Details do matter in these sorts of things)

            > And condos

            I think the analysis of this would require knowing what specificly was targeted. Generally of course, civilian housing is not an acceptable target, but if for example,it was housing for senior military leadership, that might change things.

            > Now, one could object and say that Israel has to commit war crimes because it's so endangered.

            If by war crime you mean commit "agression" (to be clear, the crime of agression is not a war crime. These are two separate categories of crimes), this would be an argument that the act is not "agression", since defensive wars are allowed to be done without UNSC approval. You only need UNSC approval if you are not facing an imininent threat.

            > Who on the security council would vote against Israel if the threat was remotely real?

            Security council is largely about geopolitics, and russia & iran are allies.

      • Henchman21 16 hours ago

        When there is no one willing to prosecute it, is it still a crime?

        • mousethatroared 8 hours ago

          Of course it is. Is a rapist innocent if he gets away?

        • bawolff 15 hours ago

          Nothing stopping Iran from joining the ICC. Except that the investigations would go both ways.

          • mousethatroared 7 hours ago

            Palestine is a member and we all saw what happened there. The US has personally threatened the judges.

            • bawolff 3 hours ago

              I mean, the ICC did issue a warrant for individuals on both sides of that conflict and seems willing to prosecute. The Palestinian national died in the conflict, so obviously could not be prosecuted. The Israeli nationals are regrettably refusing to surrender themselves, which would be an issue no matter which body attempted to prosecute (unless it was a domestic Israeli court). That is hardly a situation unique to this conflict - lots of people with warrants attempt to evade capture.

              The US behaviour is despicable, but ultimately it hasn't really changed anything.

        • consp 16 hours ago

          Yes, though one without consequences. Until the next guy comes along and actually enforced it.

    • beeflet 15 hours ago

      this is a totally illogical way of understanding warfare in terms of absolutes. Not every target is worth leveling a building over. It isn't that black and white

  • chaosbolt a day ago

    I suspect Israel has backdoor access to most CPUs.

    Here is how Pegasus seems: - China has 1.5 billion people, lots of resources, would profit a lot economically if they found a way to hack iOS, etc. But yet couldn't hack it. - Israel with its 7 million people, not only hacks iOS multiple times, but does it to spy on its allies.

    Now I've seen the threads analysing Pegasus' complexity, I don't know if it's been reproduced, and if it has then I guess it logically proves me wrong (the tinfoil hatter in me still thinks its right though).

    Here is why:

    Israel has a lot of silicon fabs or R&D centers, now it makes ZERO sense for the US to have fabs or R&D centers in Israel, since that country is (allegedly) always at the risk of being bomber for no reason at all (yeah right).

    Intel has had fabs in Israek since the 80s, why not in Japan or France or the UK (France and the UK are close allies to the US and have no earthquakes or risk of being bombed), why not even Canada?

    And I compared the dates of when intel started putting the Intel Management Engine in all of their CPU and the date of which they built their biggest fab in Israel, then I went down the rabbit hole of when AMD started using PSP (similar tech to Intel ME), and it coinciding with it buying a large pentesting startup in Israel, then starting to build its R&D centers there, Apple and Qualcomm have similar stories.

    Obviously this is all tinfoil, and while the dates coincide it's obviously not enough.

    But to each their own, and I choose to treat my tech as if it was all was backdoored already, because for me the evidence (while not enough to be sure) is enough for how much I value my privacy.

    • saagarjha 21 hours ago

      > China has 1.5 billion people, lots of resources, would profit a lot economically if they found a way to hack iOS, etc. But yet couldn't hack it.

      What makes you think China can't hack iOS?

    • Hizonner 19 hours ago

      > Here is how Pegasus seems: - China has 1.5 billion people, lots of resources, would profit a lot economically if they found a way to hack iOS, etc. But yet couldn't hack it.

      That you know of. Maybe they just don't indiscriminately sell the results to anybody who shows they have money. Or maybe they have different strategies for spying.

      > - Israel with its 7 million people, not only hacks iOS multiple times,

      NSO and friends find zero-days or buy them on the open market (not just from Israel). Citizen Lab has identified specific vulnerabilities used to install Pegasus. The exploits don't require or use CPU back doors.

      ... and you think Israel's smaller population somehow translates into better infiltrators than China has, but not better hackers than China has? Israel also makes better halva than China, by the way.

      That kind of "logic" is what turns you into a loony raving on a street corner somewhere.

      > but does it to spy on its allies.

      Everybody spies on their allies, at least opportunistically. But Pegasus is a commercial product, sold to basically every government and mostly used to spy on normal people, not other governments. The people writing it have ties to Israeli spies, and I'm sure it's been used by Israeli spies, but it's general-purpose.

      > Israel has a lot of silicon fabs

      As far as I can tell, Israel has one facility capable of making remotely serious CPUs. It's owned by Intel. There are no phones using Intel processors.

      The processors in iPhones are "Designed by Apple in Cupertino" and fabbed by TSMC in Taiwan. The processors in basically all other phones are ARM, and most of them also come from TSMC. Pegasus does not run on Intel processors, ever.

      > And I compared the dates of when intel started putting the Intel Management Engine in all of their CPU and the date of which they built their biggest fab in Israel

      So the fab somehow reached out into the rest of Intel and retroactively caused it to develop a heavily advertised feature?

    • 1oooqooq 17 hours ago

      pegasus Occam's razor:

      - the smaller country hacked ios, have to sell it to recoup r&d costs, got caught many times.

      - the larger country hacked ios, don't need to sell it around, haven't been caught.

    • bsaul a day ago

      [flagged]

      • cma a day ago

        Many are also US citizens who could work at research labs in the US without a visa. Something like 50K or 100K of the illegal settlers in the occupied West Bank alone are US citizens.

  • aussieguy1234 a day ago

    Weather apps are one of the worst offenders here. Almost all share your location info with data brokers if you give them location access.

    Check the weather today, get bombed tomorrow.

    • FridayoLeary 9 hours ago

      To be fair that's pretty much the forecast in both Iran and israel at the moment.

  • htowi3j4324234 a day ago

    If a state actor is after you, cookie and GAIA-id tracking should be the least of your concerns.

  • larrled 18 hours ago

    “hopefully politicians will soon”

    The gop is controlled by donors who are mostly free market liberals. Elon won’t let anyone “censor” (regulate) x. The democrats don’t care about national security historically, and it’s not currently an issue their cosmopolitan TikTok loving base cares anything, at all, about. “Security” is something that most democrats I talk to now associate with deportation or military spending, both of which they ferociously hate. Across parties, policy and discourse are reactive. Security requires a proactive orientation that it seems the public sector may structurally lack.

  • crawsome 20 hours ago

    Someone needs to go into congress and demonstrate to them, live, how easy it is to lift their phone numbers and call them all at once.

  • bongodongobob a day ago

    Politicians are just the sales and marketing department for multinational corporations and defense contractors. They will never care.

  • PartiallyTyped a day ago

    Europol now argues that privacy is not a right and that we need to “think of the children”. EU is now pushing some abhorrent policies and legislation to demand backdoors.

    We, the people, need to demand and force our politicians to work for us.

AlotOfReading a day ago

Because the link is down:

https://web.archive.org/web/20250506145643/https://smex.org/...

The article leaves out quite a lot about what AppCloud is, but it's essentially how Samsung monetizes their non-flagship device users and can do things like insert installation advertisements into the notification tray, and silently install apps.

Personally, if I found this on my device it'd be the final straw to grit my teeth and finally get a personal apple device.

  • andrewflnr a day ago

    Or just don't get Samsung? I guess I don't know for sure that my phone brand doesn't do anything similar, but it at least hasn't hit the news yet.

    • boramalper a day ago

      > AppCloud—pre-installed on Samsung’s A and M series smartphones.

      Samsung’s A and M series smartphones are their cheapest models so their buyers probably cannot afford better phones. I don’t know of any other brands selling in the region with similarly priced models that have better privacy practices than Samsung either—they’re all the same at that price point I’m afraid.

      • anonymars a day ago

        In my case I wanted a damn SD card slot. And more than 2 years of security updates.

        • lmm a day ago

          Sony still sells flagship phones with an SD slot. I wish my Xperia was cheaper but other than that I'm very happy with it.

        • pomian a day ago

          Motorola. Plus it still has an audio port.

          • anonymars 12 hours ago

            I miss the flashlight chop, but at the time I moved away updates were short and migration was "you're on your own"

        • imp0cat a day ago

          Ano now you see why Samsung is able to provide all that at an attractive price. The real costs are hidden.

          • anonymars 12 hours ago

            The more expensive phones don't have SD card slots!

            But yeah, presumably in the cheaper markets the Candy Crush whales are subsidizing the phones. Like with Windows these days. Anyway time to go back to playing Fortnite and Marvel Rivals

          • more-nitor a day ago

            hmm have you actually read the article? did you find anything of "substance" other than hand-wavy "this company is from israel, so must be mosad" or "has notorious for its questionable practices" (without even giving actual examples or incidents)?

            I mean, if I was the mosad guy planting a deal with samsung, I wouldn't even name the app "AppCloud"

            heck, why would you even make it appear to the user?

            this is a classic competitor-bashing article -- no substance, only hand-wavy "this guys bad!"

            I'm guessing this can be traced to others like xiami/huawei/etc who definitely want to get samsung's slice of the market there

      • j-bos a day ago

        Motorola has well priced excellent phones with minimal bloat.

        • andrewflnr 4 hours ago

          I wasn't going to give them a plug but this is in fact where I landed. The ability to install other ROMs was also a factor.

      • rs186 19 hours ago

        From first hand experience, I can confirm that AppCloud is installed on certain carrier versions of S series phone as well.

      • chaosbolt a day ago

        No there are lots of Chinese phones with minimal bloatware, like the nothing phone cmf 1, sure they only come with 2 years of updates but what you gonna do at that price...

        If you're in the middle east, I'm sure you'd rather be spied on by China.

        Do you imagine that shit? You're a nuclear scientist, working on a program for generating electricity, your country is open to being audited and complies with the restrictions and has no weapon's program, one day you come home and then a fucking rocket comes right inside your appartment and kils you and your whole family.

        Ain't that a bitch? I get Khamas was hiding there too... And since they have all that precise rockets that can take a single appartment down, why did they reduce Gaza to rubble?

        The ramifications of this make me sick: evil not only wins but also writes history... And yeah the midwits here will unironically look you in the eye and explain how killing children is ok because of this of that... You being able to explain horrors doesn't make you smart or pragmatic, it makes you have no self respect and makes your personal boundaries weak, and the same mind that finds arguments to cope with the horror his tax money funds will find arguments to cope with a lot more until it's his turn on the grinder and by then it'll be too late.

        • danieldk 2 hours ago

          Even if Nothing phones are made in china, it's a UK company.

      • hedora a day ago

        Looking around, you can get an A series or unlocked iPhone 13 new from a prepaid mvno for $0.

        A refurbished iPhone 13 is $300 on amazon, which is close to the cheapest M ($250). I can’t find new 13’s for sale except via budget carriers.

        (Sent from my 12 mini which is better than all that followed it: $200-ish for excellent condition, refurbished.)

        • boramalper a day ago

          > A refurbished iPhone 13 is $300 on amazon

          Is this Amazon US? Because even in Ireland, iPhone 16 costs 41% higher than in the US (979 EUR = 1,128 USD in Ireland vs 799 USD in the US).

          • beagle3 a day ago

            Half of the difference is likely VAT, which is included in European listings but the similar US sales tax is more often NOT included in listings.

            (Some US states have no sales tax, but most do)

        • bigyabai a day ago

          You're better off getting a preowned Pixel to flash with a secure ROM in this scenario. Getting an iPhone won't help if you if later down the line Apple decides to push an OTA update that forces the same functionality. A Pixel won't protect you from every vulnerability, but it goes much further towards stopping these sorts of attacks than the iPhone does.

          Now hey, I won't suggest that Apple would stoop as low as Samsung has here. But discerning customers might not want Tim Apple's phone if he's been cozying up to a crusty politician that can remember to stay for dinner but can't recall his name.

    • aucisson_masque a day ago

      All Android phone but pixel ones have bloatware preinstalled. Some are worst, like Xiaomi.

      If you don’t want bloatware (spyware), it’s either pixel or iPhone.

      • burnt-resistor a day ago

        The trick is to define "bloatware". Is that known knowns (stuff that's visible), known unknowns (stuff that's added that's not visible), and/or unknown unknowns (stuff added we are pretty sure is there but can't prove)? Apple adds all kinds of carrier-specific crap on every phone, but it's not readily discoverable. Android mfgrs must also because of carrier contracts and country-specific regulatory approval requirements. There's likely little means of escaping this without a BYOD non-Android, non-overseas, non-Apple phone that may or may not exist. Surely there is an obvious, viable alternative somewhere I'm missing that I hope exists.

        • scarface_74 20 hours ago

          What carrier specific crap does Apple add?

      • bobsmooth 3 hours ago

        I like the Samsung apps on my Galaxy.

      • Danjoe4 20 hours ago

        OnePlus has a phenomenal software experience

      • sabellito a day ago

        That's incorrect. Zenphone is a bliss.

  • rs186 20 hours ago

    I can assure you that they do the same thing with flagship phones, especially carrier versions of the phones -- speaking from first hand experience. I have seen notifications from apps I have never heard of multiple times.

    That's what I have been thinking recently -- given that Samsung is quietly doing these shady things with my phone, and other annoyances like Samsung forcing Galaxy AI on me (try selecting some texts in a browser or webview) which cannot be uninstalled and the terrible Samsung Pay interface, I am questioning my device choice every day.

    • chrisjj 13 hours ago

      > Samsung forcing Galaxy AI on me (try selecting some texts in a browser or webview)

      I did. No Galaxy AI.

      • rs186 12 hours ago

        Open an email from any email client and give it a try.

  • torginus a day ago

    Just buy a 5 year old iPhone - it's likely to be still better than the cheapo phone, and will get longer support as well, while being sold at rock bottom prices.

    I just replaced my iPhone XS, not out of necessity, but I wanted to see what the new ones were like. The 16 is barely better and I was suprised to find just how little the old one was worth second hand, considering it still runs circles around most midrange Android handsets.

  • hkt 20 hours ago

    No need to ditch Android. Fairphone exists: https://fairphone.com

    Their stock android is fine. If you want more privacy, installing e/OS/ is trivial. It blows my mind that anyone is concluding Samsung stuff is worth buying under any circumstances.

    • subscribed 15 hours ago

      Fairphone has astonishingly bad upgrades and patches policy. Very late, very delayed, not all of them.

      Sure, better than, say, Sony (and as an ex-Sony user I kind of know what I'm talking about), but far from calling it good.

    • rs186 19 hours ago

      What about people who are not in Europe?

      And for US carriers, you are basically locked out of Wi-Fi calling if you are not using one of the whitelisted devices.

      • subscribed 15 hours ago

        GrapheneOS if you can live without Google Wallet and hardened Google Pixel (the only secure Android device family to date).

grishka a day ago

The "unremovable" part is inaccurate. While you can't completely remove it because it resides on the system partition, you most probably can still disable it with an adb command:

    adb shell pm uninstall --user 0 com.package.name
This command is very powerful as it works for any app, even those that have "disable" greyed out in the settings. I disabled the Galaxy Store on my S9 this way for example.
  • hysan a day ago

    > "unremovable"

    > you can't completely remove it

    Maybe my English isn’t very good but that sounds like the definition of unremovable.

    • grishka a day ago

      To be pedantic, yes, but not in a way that matters. The system partition is read-only. Mounting it read-write would require root and any modifications would break system updates. The apk will still be physically present in the file system, however, none of its code will run and it will be removed from your launcher and installed app list in settings, which IMO still counts as a removal.

      Also, English is not my native language. I feel like I did get my point across anyway.

      • hmcq6 a day ago

        It's not being pedantic. Disabling the application does not give me the storage space back.

        If people are paying for upgrades to storage space it's completely reasonable for them to be annoyed by bloatware

        • grishka a day ago

          The system partition is usually the same size regardless of which storage option of the same phone model you get.

          • bracketfocus a day ago

            But if the system partition could be smaller, other partitions could be larger.

            • grishka a day ago

              The system partition is made some fixed size, the same way disk partitioning works on PCs, and never resized, because resizing file systems is still a non-trivial task. It often has some free space too to accommodate future system updates.

              On my 128 GB Pixel 9 Pro, /data is 109 GB. The rest is /system (although `df -h` doesn't show it explicitly, no idea what's up with that) and various other system-related partitions.

              • bracketfocus 18 hours ago

                Yes, but if the phone shipped with less bloatware on the system partition, then maybe that partition would be made smaller initially.

                Meaning the user would have access to more of the phone’s advertised storage.

                • Henchman21 12 hours ago

                  You have succeeded in splitting hairs down to the atomic level. Fissionable HN comments!!

                • charcircuit 8 hours ago

                  Or perhaps there would be less incentive for the OEM optimize for disk space and it ends up taking the same amount of space.

        • Dylan16807 17 hours ago

          Even with the outrageous prices for phone storage upgrade, an entire gigabyte of inactive bloat would be a $1 impact. It's not a big deal.

    • sedatk a day ago

      There’s an enormous difference between “it can’t be stopped” and “its storage area can’t be reclaimed” though.

    • charcircuit a day ago

      It's in a read only filesystem. You can't modify read only data, but you can choose to ignore it.

      • ashirviskas 15 hours ago

        Only because it is mounted as one. It is like saying that you can't have your house in pink because it is green.

        • charcircuit 14 hours ago

          If you modify a file on the partition the device will fail to boot. Your metaphor is not equivalent because it ignores security.

    • a012 a day ago

      [flagged]

      • bryant 11 hours ago

        Regardless of the point, this language is extremely unhelpful here, especially considering op tried with good intent to help people dealing with the issue.

        And there are other analogies too, e.g with certain diseases being "functionally cured" vs "cured." Did the GP use the wrong word? Sure. But making that the sole focus of criticism misses the intent of the GP and the greater value of the whole comment, which instructs people on how to disable it so that it's functionally non-impactful.

      • themaninthedark 21 hours ago

        ...doesn't sound removed to me, there are still copies sitting on other phones and servers somewhere.

        No, still not removed...the idea and possibility for implementation still exists in people's minds.

  • kotaKat 20 hours ago

    This does not work on all phones. Some OEMs (like Motorola) leverage the 'nodisable' feature to prevent this and other APKs from being disabled.

    On my 2025 Motorola RAZR 5G, in /product/etc/nondisable are a series of XML files listing carrier and activation apps for Dish Wireless, Tracfone/Verizon Value, T-Mobile, the Amazon App Manager, and two apps provided for finance providers PayJoy (who lock and disable phones for financial product recovery) and one for Claro internally (that operates similar to Payjoy).

  • scalableUnicon a day ago

    I had a Samsung phone and did the same with mine. Wrote a small tutorial here(https://harigovind.org/notes/removing-samsung-android-bloatw...). But even then, these apps will pop right back after system updates and those were becoming more frequent. I got rid of it shortly after, nowadays I use Moto where bloatwares are comparatively minimal.

    • gblargg a day ago

      I've had a few Moto phones and have also been pleased with the fairly stock OS and durability.

  • npteljes a day ago

    Words don't just have a literal, technical meaning. If the phone itself doesn't allow a straightforward, user friendly happy-path for removal, it might as well be "unremovable" in a sense that it is indeed unremovable for most users. "adb shell etc" implies that one has a PC with this tool correctly installed, and many people don't even have a PC in the first place. Then comes the case of installing adb, setting it up correctly, and having a cable to connect the two, enabling debug mode, and doing the thing. This is much more like a service thing, than a do it yourself at home thing. Not much unlike "chip tuning" for cars.

    • Zak a day ago

      The article claims the app can only be removed with root access, which requires more difficult and technical steps to attain than running an adb command. If uninstalling the app with adb works and doesn't result in the app being promptly reinstalled, then the article has a significant factual error.

      • Concept5116 17 hours ago

        Except uninstallining the app does not equal removing it, as you claim. Removing it from list of apps to load is not removal. Not to mention it resets back to installed and you have to rerun the command.

    • grishka a day ago

      This doesn't strictly require a PC. There's this trick with using the wireless debugging feature to connect the phone to itself. You can do it with a terminal app like Termux but Shizuku is a nice GUI that streamlines this process and exposes an API for other apps to use. After a quick web search I found https://github.com/samolego/Canta which is, again, a GUI app that uses Shizuku to uninstall apps via adb.

      I agree that it's not easy, but anyone sufficiently annoyed by these non-otherwise-removable apps who is able to follow instructions should be able to get it done without needing a computer or special knowledge or messing with the command line.

  • acdha a day ago

    Samsung has an entire PR team who get paid to misrepresent things — you should at least get paid for what you’re doing. You’ve already admitted that it can’t be removed and if it takes some shell work you’re not even sure about to disable it, that almost certainly means it’s coming back on every update.

  • AzzyHN a day ago

    Yes, but for most people (I'd guess 99% or more), they would never know to use the above, and I'm those who did find a guide might have issues using adb on their likely Windows or MacOS machine.

  • subscribed 15 hours ago

    It's not trivial for most and will most likely get reenabled after the firmware upgrade.

  • johnisgood 18 hours ago

    How would one go about using adb? Motorola, stock Android. Do I need to root my phone for this to work or what are the requirements, or how do I perform it?

    • contingencies 18 hours ago

      1. Install android SDK / android studio on your computer.

      2. Plug phone in to computer using USBC cable.

      3. Answer prompt on phone granting permission to computer.

      4. Run adb commands.

      • danieldk 12 hours ago

        You also have to enable developer options (tap the Android build number N times) and then enable USB debugging. You can disable USB debugging and the developer options afterwards (keeping USB debugging on is insecure).

        The universal android debloater makes uninstalling packages easier, it has descriptions and categorizes packages by how safe they are to uninstall.

      • johnisgood 18 hours ago

        Thanks, my issue so far was with the 2nd step, as if my Linux did not recognize my device. I might have a go on Windows if Linux will not work again.

        • homebrewer 9 hours ago

          Have you tried 'sudo adb start-server' before running any adb commands?

          • johnisgood 8 hours ago

            No. Do I have to?

            • homebrewer 7 hours ago

              Using adb directly runs it under your user, which will probably be unable to access the necessary USB device.

              Starting the server manually under a privileged user is the easiest way to circumvent those restrictions if you don't want to fiddle with udev rules, which is the recommended solution, but is more work.

        • Izkata 14 hours ago

          It only works for me with one of my two USB ports, and my Kobo ereader has the same issue. Not sure why, best guess is one might be USB 2.0 and the other 3.0

          • johnisgood 14 hours ago

            That could very well be the issue. We will see. I think I only have 2.0 working right now. I hope it works with 2.0 too. :/

        • catlikesshrimp 14 hours ago

          Knoppix has an old android adb and drivers. Still recognizes Samsung A and chinese androids and is functional.

          Other dristros surely offer the same support

          • johnisgood 13 hours ago

            Not sure what the issue was, I did not debug it. I will try again and see if it works or not, and will debug it further if it does not work. Arch Linux or Void Linux definitely should offer the same or more (or better) support.

  • mvdtnz a day ago

    So you're saying it can't be removed?

  • awaisraad a day ago

    Do you know if the same apps remain installed in "Secure Folder" as well?

  • ehnto a day ago

    Don't even need that, you can disable it within the OS app settings.

  • encom a day ago

    I had a OnePlus whatever as a work phone in my last job. Every time I used adb to purge the OnePlus crap, it would somehow find its way back. Eventually I settled on disabling autoupdates from the play store, so it was stuck at whatever outdated, and hopefully broken, version the phone shipped with.

  • catlikesshrimp 14 hours ago

    that doesn't work for every package. Some packages aren't authorized to be disabled this way, i.e. you can't disable them this way. * Some packages can technically be disabled this way, but they cause unrelated issues like the phone wasting processing resources, even overheating the device; or bootloops. * Less relevant, but the package is disabled, but removed. The system can still reenable it, reinstall it, or upgrade it. * Edit: I can't find a way to format this. It shows as a text block.

the-anarchist a day ago

As this post is trending quicker and more than I would have expected it to, I would like to add to this story:

It appears to be a similar case across the MENA region. While the SMEX post primarily focuses on WANA, it is possible to find other reports (e.g. [1]) from the MENA region that describe similar practices by Samsung. There, however, the stories talk about "Aura", rather than "AppCloud".

[1] https://www.moroccoworldnews.com/2025/06/212144/samsung-embe...

  • averysmallbird a day ago

    Same same. SMEX is based in Lebanon — (S)WANA is an obnoxious term that’s going around for MENA.

    • Mistletoe a day ago

      We don't know what any of these acronyms mean!

      • hmcq6 a day ago

        MENA - Middle East & North Africa

        WANA - West Asia & North Africa

        SMEX - "a non-profit that advocates for and advances human rights in digital spaces across West Asia and North Africa." (from their website)

        • more-nitor a day ago

          "non-profit" doesn't mean "this guys are morally right and only conveys truths"

          it just means that they don't pay taxes

      • bapak a day ago

        "Arab countries"

  • nacos a day ago

    I used to manage an enterprise fleet of mobile devices.

    This AppCloud crap has also been pushed to devices in the Europe Open Market.

    I also know that this shouldn't have been installed on enterprise devices (either Android Enterprise managed by MDM or E-FOTA managed - don't remember exactly). We had an akward conversation with some Samsung representatives..

  • eddythompson80 a day ago

    What is the difference between WANA and MENA. Sounds like the same territory

    • the-anarchist a day ago

      Yes, but, no. It's one of these things where multiple terms mean the same thing but then again come from different times/areas and, upon closer inspection, mean different things. But they're the same. But not really. [1]

      A.k.a. I tried to be as politically correct and cite the term used by the respective reporting. The main point I was trying to bring across was that apparently there are two apps involved, not only a single one.

      [1] https://en.wikipedia.org/wiki/Middle_East_and_North_Africa

      • eddythompson80 a day ago

        Ah, I see. Trying to find a way to include Pakistani, Afghanistan, Somalia i.e non-Arab or Persian Muslim states in the vicinity.

  • ehnto a day ago

    Was installed on my device bought in Australia as well.

thenthenthen a day ago

AppCloud, developed by the controversial Israeli-founded company ironSource (now owned by the American company Unity)

Yes the Unity 3D engine company wow.

  • willtemperley a day ago

    So Unity can now be considered malware by association.

  • Nition a day ago

    The weirdest part of that merger was Unity paid $4.4billion for IronSource.

    • JohnHaugeland 20 hours ago

      ironsource was the owner and runner of the largest sleazy game ad network, which was unity specific

      unity was dying for lack of revenue

      • Nition 12 hours ago

        The fact that they were struggling for revenue just made the massive spend seem even weirder to me, but I suppose it could make sense if they truly expected to somehow get >4.4 billion back from ad revenue eventually. They also bought Wētā FX for $1.6 billion around the same time and did basically nothing with it.[1]

        [1] https://www.fxguide.com/quicktakes/unity-software-with-a-com...

      • airstrike 7 hours ago

        no, unity was dying for low profitability and ads had higher margin

        I argued against the acquisition at the time, including against accepting the framing that it was a "merger", and I think everything that's transpired since then has validated my views.

        Sadly, I was outnumbered and “it is difficult to get a man to understand something, when his salary depends on his not understanding it” applied as it always does.

        John Riccitiello was a terrible CEO

        I think there's non-zero chance this company will go down in flames. I think its only hope at this point is a sufficiently motivated activist shareholder.

0rzech a day ago

Same thing in Europe and North America. AppCloud is present on Samsung devices. Sometimes from the get go, sometimes after system update, sometimes after security update (the irony of that!). Carrier-locked or not, it doesn't matter. Sometimes it's visible only after switching the "Show system applications" toggle on application list in device settings. There are many people reporting that their Galaxy S series phones have it too. This AppCloud stuff is absolutely outrageous!

userbinator a day ago

making it nearly impossible for regular users to uninstall it without root access, which voids warranties and poses security risks

Stop parroting the corporate propaganda that put us into this stupid situation in the first place. Having root access on devices you own should be a fundamental right, as otherwise it's not ownership.

  • ulrikrasmussen a day ago

    We need regulation which defines that any hardware device capable of running software developed by a third party different from the hardware manufacturer qualifies as a general purpose computing device, and that any such device is disallowed to put cryptographic or other restrictions on what software the user wants to execute. This pertains to all programmable components on the device, including low-level hardware controllers.

    These restrictions extend outside the particular device. It must also be illegal as a commercial entity to enforce security schemes which involve remote attestation of the software stack on the client device such that service providers can refuse to service clients based on failing attestation. Service providers have other means of protecting themselves, taking away users control of their own devices is a heavy handed and unnecessarily draconian approach which ultimately only benefits the ad company that happens to make the software stack since they also benefit from restricting what software users can run. Hypothetically, they might be interested in making it impossible to modify video players to skip ads.

    • miki123211 a day ago

      I agree, but I think three extra conditions would need to be added here.

      1. Devices should be allowed to display a different logo at boot time depending on whether the software is manufacturer-approved or not. That way, if somebody sells you an used device with a flashed firmware that steals all your financial data, you have a way to know.

      2. Going from approved to unapproved firmware should result in a full device wipe, Chromebook style. Possibly with a three-day cooldown. Those aren't too much of an obstacle for a true tinkerer who knows what they're doing, but they make it harder to social engineer people into installing a firmware of the attackers' choosing.

      3. Users should have the ability to opt themselves into cryptographic protection, either on the original or modified firmware, for anti-theft reasons. Otherwise, devices become extremely attractive to steal.

      • xg15 a day ago

        > Devices should be allowed to display a different logo at boot time depending on whether the software is manufacturer-approved or not.

        Not sure how to phase this legally, but please also add a provision against manufacturers making the "custom firmware" logo hideously ugly on purpose to discourage rooting - like e.g.Microsoft did for Surface tablets.

        > 3. Users should have the ability to opt themselves into cryptographic protection, either on the original or modified firmware, for anti-theft reasons.

        Full agreement here. I very much would like to keep the bootloader locked - just to my own keys, not the OEMs.

        • harvey9 21 hours ago

          Someone with the motivation to install custom firmware would consider the bootsplash aesthetic a deal breaker?

          • AshamedCaptain 21 hours ago

            Yes -- bootsplash showing "DANGER! YOUR SECURITY AT RISK! HACKERS CAN NOW STEAL YOUR GIRLFRIEND AND SHUFFLE YOUR PAIRS OF SOCKS!" in big bold red letters only because you enabled root to remove manufacturer malware (which if anything likely _increases_ your security) is a deal breaker, because it will frighten most users from doing it .

          • xg15 21 hours ago

            If you want to promote alternative bootloaders or OSes for wider, nontechnical audiences (like LineageOS etc), then absolutely.

            I think it's a difference in mindset whether you view custom firmware as a grudging exception for techies (with the understanding that "normal" people should have a device under full control of their respective vendor), or whether you want an open OS ecosystem for everyone.

      • xg15 20 hours ago

        > Devices should be allowed to display a different logo at boot time depending on whether the software is manufacturer-approved or not.

        Another thought on that point: Why of all things is manufacturer approval so important? We know manufacturers often don't work for - or even work against - the interests of their end users. Manufacturer approval is not an indicator for security - as evidenced by the OP article.

        If anything, we need independent third parties that can vet manufacturer and third party software and can attach their own cryptographic signatures as approval.

      • gmueckl a day ago

        4. Apps with special security needs are allowed to detect whether a device is unlocked and can either disable themselves or go into a mode that shifts ALL related liability onto the user. It's not the bank's fault if the user disabled protections and some spyware logs the online banking password or something like that.

        • Zak a day ago

          I'm pretty sure I'm against this. I could be convinced otherwise by documentation of significant fraud involving compromised devices (especially Android phones) that would have been stopped by a device attestation scheme.

          I should note Google has such an attestation scheme, and there are reliable defeats for it in most situations given root access. Apps have been able to insist on hardware-backed attestation which has not been defeated for some time, but that isn't available for old devices. Almost none do so.

          If this had a meaningful impact on fraud, more apps would insist on the hardware-backed option, but that's quite rare. Even Google doesn't; I used Google Pay contactless with LineageOS and root this week. I'm currently convinced it's primarily a corporate power grab; non-Google-approved Android won't be a consumer success if it doesn't run your banking app, and the copyright lobby loves anything that helps DRM.

          • ulrikrasmussen 21 hours ago

            Also, online banking has been a thing for so long on PCs which never had that kind of remote attestation. I also do not believe the security argument, but I believe that the banks believe it.

            • Zak 20 hours ago

              I suspect the banks want to do checkbox-based compliance with regulators and insurers without any deep understanding of the underlying issues.

            • gmueckl 15 hours ago

              Online banking doesn't need remote attestation. Some additional locked down hardware with its own minimal display is enough. My banks force me to use devices like those made by Kobil or ReinerSCT.

        • ulrikrasmussen 18 hours ago

          My bank app refuses to work on LineageOS, but I can use the web interface just fine which has the exact same UI and functionality as the app. In both the native app and the web app I have to authorize any transactions using my national ID, which for me is a hardware token (the app for my national ID also refuses to run). Why is it somehow insecure to initiate this flow from a native app on LineageOS while it is not insecure to do the exact same via a browser on LineageOS? If the app can be compromised, so can the browser - the bank cannot trust all its browser based clients anyway.

          The web app has been running with this security model for decades on PCs, and it has been fine. The whole narrative about remote attestation being necessary to protect users is an evil lie in my opinion, but it is an effective lie which has convinced even knowledgeable IT professionals that taking away device ownership from users is somehow justified.

          • gmueckl 15 hours ago

            A hardware device that doesn't confirm transaction details on its own locked down display enables man in the middle attacks. I have to use such devices with my bank card when banking online.

        • mmh0000 a day ago

          It is the banks fault if they allow non-reversible, weird or large transactions without a secondary authorization capability.

          The bank’s bad processes are not an end device fault.

        • xg15 a day ago

          Yeah, nope. All apps have "special security needs" according to their manufacturers. Every app that relies on spying for revenue will use that to disable itself. (Or worse, actively malfunction - e.g. that banking app could switch into a special mode where it does transactions on its own that are not in the interest of the user. If the user has accepted all liability, there isn't much they could do against that)

          I'm alright with limiting liability for an unlocked/customized phone (for things that happen from that phone) - but that's a legal/contractual thing. For that to work, it's enough for a judge to understand that the phone was customized at that time - it doesn't require the app to know.

        • Dylan16807 17 hours ago

          Screw that. I want nearly the opposite. I don't really own my device if apps will look at my ownership flag and refuse to run.

          We can talk about the consequences of spyware but definitely not a total liability shift. Also preventing root doesn't prevent spyware.

    • Sophira a day ago

      While I agree in theory, this is never going to happen. There's too much DRM in use for it to work out.

      • jimjimwii a day ago

        Repeal and outlaw drm. It was a mistake that violates everyone's constitutional rights.

        • mmh0000 a day ago

          “constitutional rights”

          Words written on toilet paper. Only thing that exists today are “billionaire rights”.

          • reactordev a day ago

            Exactly. DRM isn’t going anywhere so long as copyrights exist.

            • xg15 a day ago

              Not even that. Companies are already lobbying massively for selective enforcement of copyright as to not harm the AI boom (immediate jail terms for individuals torrenting a movie, "it's a complex issue" for AI companies scraping the entire internet)

              But even the DRM that is already there often only uses copyright laws as suggestions. E.g. YouTube's takedown guidelines are defined through their TOS, not through the DMCA.

          • mensetmanusman 21 hours ago

            Are there billionaires in the room with us right now?

      • const_cast 9 hours ago

        DRM can still stick around and be popular. For example, consider an Apple TV. They make the hardware and software, so it can be locked down under the provided rules. Or a console. We might consider devices which are used for streaming or movies to not be general purpose computation devices. Which, historically, they haven't been.

        Watching copyrighted stuff on general purpose computers is a very new phenomena, and it's still quite atypical IMO.

      • AshamedCaptain 21 hours ago

        What there are is many people utterly convinced that this brings some security to end-users. See the other messages in this thread. DRM is only a fraction of the problem.

      • al_borland a day ago

        DRM is a barrier to legally protected purchasing digital media for me. I will buy an album from iTunes (no DRM), but I will not buy digital movies the same way.

    • akoboldfrying a day ago

      > any such device is disallowed to put cryptographic or other restrictions on what software the user wants to execute

      Won't this also forbid virus scanners that quarantine files?

      > This pertains to all programmable components on the device, including low-level hardware controllers.

      I don't think it's reasonable to expect any manufacturer to uphold a warranty if making unlimited changes to the system is permitted.

      • fc417fc802 a day ago

        It wouldn't forbid shipping the device with a virus scanner. It would only forbid refusing the user control over what software does and does not run.

        There might be a couple messy edge cases if applied at the software level but I think it would work well.

        Applied at the hardware level it would be very clear cut. It would simply outlaw technical measures taken to prevent the user from installing an arbitrary OS on the device.

        Regarding warranties, what's so difficult about flashing a stock image to a device being serviced? At least in the US wasn't this already settled long ago by Magnuson-Moss? https://en.wikipedia.org/wiki/Magnuson%E2%80%93Moss_Warranty...

        • akoboldfrying 7 hours ago

          > what's so difficult about flashing a stock image to a device being serviced?

          Yes, I think that would cover most cases if we take it to its logical conclusion of wiping all device state (hard disk). OTOH, a few points:

          1. I would accept the need to wipe the hard disk if I had messed with firmware or the OS, but not if a couple of keys on the keyboard had stopped working. This implies that (for me at least) a meaningful distinction remains between these two "levels" of warranty service. Do you agree?

          2. Activities like overclocking or overvolting a CPU have the potential to cause lasting damage that can't be reversed by re-flashing. Under the policy you're suggesting, it would be illegal for manufacturers to offer users the option "You can pull this pin low to overclock outside the supported range, but you will void the warranty by doing so", and too expensive for them to endlessly replace parts damaged by these activities for free under warranty, so that consumer option, rare as it already is, would go away completely.

          3. I still think there may be some devices that are impractical to completely re-flash. According to this 2021 Porsche article [0], modern cars contain 70-100 ECUs (microcontrollers), each of which will have its own flash/EEPROM.

          [0]: https://medium.com/next-level-german-engineering/porsche-fut...

      • afeuerstein a day ago

        > Won't this also forbid virus scanners that quarantine files?

        Yes. If I really _want_ to execute malware on my device, I should be allowed to do so by disabling the antivirus or disregarding a warning.

        > I don't think it's reasonable to expect any manufacturer to uphold a warranty if making unlimited changes to the system is permitted

        It is very reasonable and already the rule of law in "sane" jurisdictions, that manufacturer and mandated warranties are not touched by unrelated, reversable modifications to both hard- and software.

        • akoboldfrying 7 hours ago

          > Yes. If I really _want_ to execute malware on my device, I should be allowed to do so by disabling the antivirus or disregarding a warning.

          I agree.

          > already the rule of law in "sane" jurisdictions, that manufacturer and mandated warranties are not touched by unrelated, reversable modifications to both hard- and software.

          Do you have any examples of such jurisdictions? I think whether this is reasonable turns on how "reversible" is interpreted. If it means "reversible to factory settings", including wiping all built-in storage media, then it seems reasonable to me that manufacturers should support this (possibly modulo some extreme cases like cars that have dozens of CPUs). But I would not be happy with having my hard disk wiped if I sent in my laptop for repairs because a couple of keys stopped working, which tells me that (to me) there remain at least two classes of "problem that should be fixed for free under warranty by the manufacturer".

      • encom a day ago

        >virus scanners

        You can (and should, imho) remove anti-virus software.

  • perching_aix a day ago

    Didn't we backslide hard enough at this point that it is now architecturally ensured that there is a security downside to rooting? Prevents verified boot for example, since the attestation is tied to said corporations, and not you.

    • fc417fc802 a day ago

      AFAIK that's true for many vendors but for example Pixels (and IIRC also OnePlus at least a few years ago) you can relock the bootloader with other keys.

      The crazy thing is that on all the devices I've had AVB is implemented on top of secureboot. Being able to set your own secureboot keys is bog standard on corporate laptops. The entire situation makes absolutely no sense.

      Also for the record I think it's a silly attack vector for the average person to worry about. A normal person does not have secret agents attempting to flash malicious images to his phone while he's in the shower.

      • acdha a day ago

        > A normal person does not have secret agents attempting to flash malicious images to his phone while he's in the shower.

        No, but millions of women have controlling partners or friends who betray their trust and, for example, many people going through U.S. Customs are being asked to surrender control of their devices so they can be used without their knowledge. There’s a well-funded malware industry with a lot of customers now.

      • perching_aix a day ago

        > AFAIK that's true for many vendors but for example [on] Pixels you can relock the bootloader with other keys

        Oh that's pretty cool, wasn't aware.

        > The crazy thing is that on all the devices I've had AVB is implemented on top of secureboot. Being able to set your own secureboot keys is bog standard on corporate laptops. The entire situation makes absolutely no sense.

        Hold on, could you elaborate a bit on this? I thought it was an either/or type deal cause they do the same thing.

        • fc417fc802 a day ago

          Many devices if you load up fastboot mode (is that the right name?) it will give you chipset and other information and it will have secureboot info there. It's permanently locked to chain into the AVB image. AVB is a much more complicated beast that specifies the existence of multiple partitions including (IIRC) one for storing authorized keys, one for the recovery, and a bunch of other stuff.

          It's possible this has changed or was never widespread in the first place. I have a very limited (and historic) sample size.

    • franga2000 a day ago

      Not having verified boot is not a security downside for most people. Unless your threat model includes the evil maid attack, which it doesn't for thr vaaaaaast majority of people, verified boot is just another DRM anti-feature.

      • ignoramous a day ago

        Verified Boot isn't merely to thwart Evil Maids, but by and large provide what's known as "Trusted Computing Base". And yes, given the proliferation of smartphones and the nature of sensitive applications built on top, most people, even if they don't realise it, need it.

        • userbinator a day ago

          but by and large provide what's known as "Trusted Computing Base".

          In other words, DRM.

          https://en.wikipedia.org/wiki/Trusted_Computing#Criticism

          (I knew from the beginning that this was known as the Palladium project, and until recently, a search for "Palladium TCG" would find plenty of information about that history, yet now references to that group and its origins in DRM have seemingly disappeared from Google. Make of that what you will...)

          • perching_aix 20 hours ago

            This should not be a surprise. Mechanistically enforced trust (like in trusted computing), and even better, mechanistically assured trust (like in verifiable computing), will be relied upon by anyone seeking trust. This means both consumers and producers, and anyone else in-between.

            If I want my device to be secure, I want this trust. If I want to sell a copy of my virtual asset to only be used in ways I approve of, I want this trust. You can't have only one of these at the same time, either your device can provide this trust or it cannot. That's not the battle in my view. The battle is to implement this appropriately, such that e.g. if we're representing access control, identity, and ownership, then that representation should match reality. So if I'm said to own a device, the device can and will attest so, and behave accordingly. It's just that instead of that, I'm always somehow just being loaned these things, only have some specified amount of control over these things, and am just a temporary user somehow. That's the issue. And that these systems are not reimplementable, and as such entitlements do not carry around.

    • torginus a day ago

      I don't follow the reasoning behind this - even in a verified boot scenario you can just choose to not load the offending kernel module without compromising security.

  • Incipient a day ago

    I'm pretty sure the recent switch 2 "license to use the hardware" has entirely killed any notion that you actually own the hardware and are free to do anything with it.

    Especially in Africa, where privacy and consumer rights are probably less relevant than the US/EU.

    • hilbert42 a day ago

      ""license to use the hardware"…."

      Well, then it's high time the laws of ownership in just about evey country in the world were updated.

      As it stands, if I buy something then I own it.

      • makeitdouble a day ago

        > if I buy something then I own it.

        That's the point: you can't buy it, only license.

        • hilbert42 a day ago

          I've never had to license hardware I've bought, only software. There's no way I do so.

          • makeitdouble 20 hours ago

            I'm not saying it's a good thing. But we shouldn't hide from the fact that door has been opened and I see no practical reason we won't see more of it.

            The minute Apple sees a clear path to get away with it, iPhone will essentially become licensed devices.

            Then other phone makers will jump through the opening, at some point it becomes the standard, and we'll laugh at the "voting with your wallet" joke again.

            > software

            We're already full in licensing books, as truly the most pragmatic choice. Amazon opened the door, and many other ebook stores have jumped on the bandwagon.

            • hilbert42 15 hours ago

              This can end in several ways, users and third-party repairers will reverse-engineer phones encryption notwithstanding—simply remove the 'offending' chips and replace tbem with open tech.

              To say it's unlawful is moot. Apple may have jurisdiction in the US but not across the globe, there are plenty of places I can think of to send an iPhone to have it fixed the way I want (and I'd do so the moment that market is established). There's no way Apple can police what people do with their hardware once it's in their hands, it's fanciful to think otherwise.

              Open hardware is on the move, eventually considerably cheaper open products will become popular just on price alone. Competition will then be fierce, Apple will have to change its policies if changes to laws don't beat them to it. Remember also the US isn't the whole world, so those changes are likely to be enacted first outside the US. If Apple wants to sell there then it'll have to comply with those laws just as it did with USB-C in Europe.

              Also keep in mind Apple, Google, Microsoft etc. have become the richest and fastest growing corporations in human history—they even beat out the previous contenders the Dutch and British East India Companies of the 17th and 18th Centuries.

              These corporations became so rich so quickly because of a confluence of circumstances—the new tech paradigm of the personal computer, the wow factor that took the world by storm and a compete lack of regulations worldwide. Without regulations to keep these corporations in check they simply ran amuck.

              That's now over. Yes, it will be some while before they're brought to heel but they'll never get such a straight run again.

              Apple is on top now but let's see where it'll be in 20 years.

  • npteljes a day ago

    The current legal reality might be corporate propaganda, but not exclusively corporate propaganda, it's the current legal reality as well. "root access voids warranties" is a fact in many jurisdictions, regardless of how it came to be. Hence, it's not as much parroting propaganda, as in furthering a cause, but just stating it how it is.

  • jrflowers a day ago

    This is a good point. While there is nothing factually incorrect in the statement “rooting your phone can void your warranty and pose a security risk”, if you imagine factual statements are the same thing as value judgments it becomes very problematic.

    Similarly it is pretty messed up when people say stuff like “fire can burn you if you aren’t careful” because so many people rely on fire for food and warmth.

    • fc417fc802 a day ago

      Having your vehicle serviced by someone other than the dealer could void your warranty and poses a safety risk.

      Cooking animal products at home poses a health risk. You should be sure to only ever consume animal products prepared by a duly licensed establishment.

      The chauffeur's union would like to take this opportunity to remind you that amateurs operating their own motor vehicles risk serious injury and even death.

      The FSD alliance would like to point out that hiring a licensed chauffeur also poses a non-negligible risk. Should you choose to make use of a personal vehicle it is strongly recommended that you select one certified by the FSD alliance. Failure to do so could potentially impact your health insurance premium.

      • theluketaylor a day ago

        > Having your vehicle serviced by someone other than the dealer could void your warranty and poses a safety risk

        Good tongue in cheek post, but in the US Magnuson-Moss prohibits warranty claim denials merely on the basis of non-OEM parts and service. It also puts the burden on the manufacturer to demonstrate the defect or failure was the direct result of the non-OEM part. Other jurisdictions have similar laws on the books.

        Right to repair already exists in certain aspects and needs to be expanded (and enforced. Tons of those ‘will void warranty’ stickers are lies and you have legal rights to poke around)

      • jrflowers a day ago

        You make an interesting point here. While “rooting your phone can void your warranty and pose a security risk“ may be a factually true statement, we must also consider some entirely unrelated and possibly untrue statements that could be theoretically uttered in another reality.

        We can get so bogged down with “things that are real” and “exist in this universe” that we completely fail to focus on the vital stuff like “Bigfoot is circumcised” and “Who did it?” and “Why?”

        • fc417fc802 a day ago

          On the contrary. My statements bear equivalent accuracy to yours in our current reality. My statements are also very obviously FUD. So is yours.

          Or do you dispute that you could be hospitalized for salmonella if you botch cooking poultry at home? Or perhaps you feel that there is no straightforward way to inadvertently endanger your life by servicing your vehicle incorrectly?

          • jrflowers a day ago

            Interesting. While there is no such thing as a chauffeurs union or an FSD alliance, if we say that they exist maybe they do. Similarly, if you say something is “FUD” then maybe it becomes that.

            I genuinely do not understand the last two sentences. Are you pro- or anti- “telling people that salmonella exists” ? Is saying “salmonella exists and can be a problem” FUD or what? Do you think salmonella isn’t real

            • fc417fc802 a day ago

              Yes, the final two were tongue in cheek but follow the same pattern and thus serve to illustrate the point being made. You don't seem to be engaging in good faith.

              > Is saying “salmonella exists and can be a problem” FUD or what?

              Obviously that depends on context. If a bunch of restaurants form a PAC and start lobbying with that message to restrict the sale of animal products at the grocery store then it is. If the FDA mentions it on a page about basic food handling safety then it probably isn't (depending on the surrounding text ofc).

              Rooting your device is a security risk the same way that servicing your own car is a safety risk. When I hear "security risk" or "safety risk" I'm expecting something that's inherently dangerous like wingsuit jumping or cave diving. I'm not expecting something that should only ever fail if I don't exercise due diligence. This difference in perceived meaning is being exploited by those spreading the message similar to when Coca-Cola got sued for a label that implied pomegranate juice when the bottle contained only 0.3 percent.

              When device vendors lock end users out of their own devices and then aggressively spread such a message to justify doing so it qualifies as FUD or propaganda. A vested interest has disenfranchised people as part of a long term strategy to enrich themselves and is attempting to manipulate the public narrative regarding their actions.

    • franga2000 a day ago

      In fact there is a lot factually incorrect.

      For starters, in most places, warranty is a legal requirement and the manufacturer isn't allowed to void it for whatever reason they want. If my phone's battery starts getting really hot in normal use, or I start getting dead pixels on my screen or whatever else, the fact I have a custom OS on my phone isn't relevant to the warranty claim any more than having it in a case or putting some stickers on it. Yes, it'll make claiming it more difficult, but that doesn't mean it's void, just that you'll have to fight through a few more tiers of support agents to get it fixed.

      More importantly, rooting is only a security risk in the sense that it increases the attack surface for exploits. The same can be said for any other system-level software. Like if you buy an Nvidia graphics card in your computer and that loads its kernel driver, malware now has one more place to exploit. Are Nvidia graphics cards a security risk?

      We've come an incredibly long way from just dropping /xbin/su and calling it a day. Modern (as in the last 10 years) root solutions have caller checks based on a user-defined whitelist and really modern implementations use kernel-level checks to make sure the app wanting root access is allowed to get it. The only way this can be dangerous is if one of those apps or the root solution itself has a code execution exploit. But again, the same can be said for the plethora of system-level bloatware vendors install these days.

      • jrflowers a day ago

        >For starters, in most places, warranty is a legal requirement and the manufacturer isn't allowed to void it for whatever reason they want.

        This only makes the statement untrue if you use “can” and “will” interchangeably.

        >More importantly, rooting is only a security risk in the sense that it increases the attack surface for exploits.

        This is a good point. What even is “attack surface” anyway? Does anybody actually consider it when “evaluating security posture”? If I simply choose not to care about attack surface because I don’t want to, then doesn’t it simply become a factual nonissue? There are no answers to these questions

  • menzoic a day ago

    How is the security risk propaganda?

    • msgodel a day ago

      If your security model means me having access to my own hardware is a security risk you're malicious and your security model is bad.

    • flotzam a day ago

      It's not (only) propaganda. Rooting disables or bypasses verified boot, allowing exploits to persist across a reboot.

      • franga2000 a day ago

        Malware van persist across reboots regardless of verified boot. What it can't do is persist through a factory reset.

        But if you really want a thorough reset, simply re-lock the bootloader and flash stock firmware from there. Nothing can persist through that without an exploit in the verification chain and if you have that kind of exploit, you don't need the bootloader to be unlocked in the first place.

        Also, there are devices out there that let you enroll your own keys, like the Google Pixel series.

        • flotzam a day ago

          > Malware [c]an persist across reboots regardless of verified boot.

          Some can, some can't. Even when it can persist, escalating to root after every reboot may be unreliable or noisy (e.g. 70% chance of success, 30% crash) compared to straight persistence as root without verified boot.

          > Also, there are devices out there that let you enroll your own keys, like the Google Pixel series.

          This still applies to those devices. It's the main reason GrapheneOS (which exclusively runs on Pixels, with the bootloader relocked to a GrapheneOS key) is opposed to building in root access: Verified boot would be "enabled", but effectively bypassed. https://xcancel.com/GrapheneOS/status/1730435135714050560

    • ahoka a day ago

      It's the hardware vendor's "think of the children".

  • bongodongobob a day ago

    [flagged]

    • potamic a day ago

      You can default to a hardened, secure setup but provide an option to override to those who want to. I don't think anyone is against secure defaults, but many people have a problem with designs that say you must not even have an option to override.

      • burnt-resistor a day ago

        It creates a Hobson's choice of no tinkering and less malware, or tinkering and greater risks from malware. There should be a "maintenance mode", but the onus of responsibility for breakage should be on the user for system update compatibility without the user being held hostage. This is a false choice and ostensible customizability. If the manufacturer wants to add an "OS warranty void sticker" flag because things maybe broken from tweaking, that's cool, but leaving the user less secure as punishment is wrong.

        • sprinkly-dust a day ago

          It is my experience that this is what Google does with their Pixel phones. It is really quite simple to unlock the bootloader and do whatever you want on a Google Pixel you own (i.e unlocked, no carrier). They even give you this really handy Android flash tool which uses WebUSB to fully restore your device when you mess up. Heck, custom ROMs like GrapheneOS and CalyxOS are even able to sign their own images and allow you to lock the bootloader with a non Google OS.

          However, all this comes with the caveat that SafetyNet will flay you alive. The cat and mouse game with Magisk and other methods to maintain root undetected is moot when I've used apps these days that make a fuss when you have developer settings enabled. To be honest, that seems acceptable to me, I can do what I want with my device, software vendors like banks and the like have a say in how I choose to access their more convenient services. I can play nice with them if I want, even using a second phone perhaps, but I have a choice.

          • burnt-resistor 21 hours ago

            Nice. I wish Pixels (and recent iPhones Pros) were more repairable. Pixels are the least repairable phone around, so don't drop it at least not without a rugged case. ;)

          • encom a day ago

            >banks and the like have a say in how I choose to access their more convenient services

            I disagree. I don't understand how it's fine that I can access my banking services with my Gentoo machine, with everything compiled from source by myself, but it's somehow a problem when I'm not using either Apple or Google certified OS on my phone.

            I'm sure they want to prevent the first scenario, like various streaming cartels already do, but I hope something like EU throws a fit if they do.

            • keyringlight a day ago

              What kind of actions can gentoo do with your financial accounts, and what levels of user authentication does it use to do it? My phone can effectively act as a bank card with contactless payment or I can transfer up to a daily allowance (that would be painful to me if it was misused) of thousands with biometric auth. Similar to the OS if you're doing that with any browser with a web login you could potentially compile it to behave how you like or lie about what it's doing

              Because it's a bank there's going to be insurance behind the scenes to cover them if something goes wrong, and I assume part of that is ticking off enough points to be confident a transaction is secure or different payment limits on confidence levels.

        • JumpCrisscross a day ago

          > There should be a "maintenance mode", but the onus of responsibility for breakage should be on the user for system update compatibility without the user being held hostage

          Isn’t this just a second device? How can you hold a manufacturer liable if the user was given unsupervised time as root?

          • hilbert42 a day ago

            "How can you hold a manufacturer liable if the user was given unsupervised time as root?"

            PCs had root access by default, so why wasn't it a significant problem for them? Banking is possible on a PC without a banking app.

            As Noam Chomsky has said, as in politics, manufacturers and OS vendors such as Google and Microsoft have been deliberately "manufacturing concent" — a widespread belief in the population of users that benefits them to the disadvantage of many of said users.

            • burnt-resistor 21 hours ago

              Manufactured consent requires media complicity to achieve acceptance of Hobson's choice Accept or Don't Use EULAs and corporate, technofeudal non-ownership and the "shame" of specialized knowledge, tinkering, and modifying things. Nerds were frowned upon until electronics and software people became billionaires in the 80's, and technical vocations are still frowned upon in socially most of America.

              PS: While he maybe in effectively hospice now, at least he outlived Kissinger.

              • hilbert42 19 hours ago

                "Manufactured consent requires media complicity to achieve acceptance of Hobson's choice Accept or Don't"

                Right, I've never fully understood why the media was (and still is) so complicit. There's a long history of the media, especially the tech media, mags etc. ass-licking the likes of Microsoft, Google et al. It's been horrible sight to watch over the decades. Perhaps it's because of kickbacks, fear of exclusion from events, press releases, or handouts—free software etc., or that many had/have shares in such entities—or the belief that those who run such entities are only one step removed from the gods—hero worshiping.

                We users would now be in a damn side better prosition if the media had done its job professionally.

                "technical vocations are still frowned upon in socially most of America."

                Right again, and America is not the only place, such thought is endemic across the anglosphere.

            • JumpCrisscross a day ago

              > PCs had root access by default, so why wasn't it a significant problem for them?

              They weren't networked. They were notoriously buggy. And most importantly, they weren't warrantied [1].

              Root should always be an option. But once you root, it's fair for the warranty to be voided.

              > OS vendors such as Google and Microsoft have been deliberately "manufacturing concent"

              Nitpick, the propaganda model [2] attempts to describe traditional mass media. Two of its five pillars (ownership and sourcing) fall apart in a world with smartphones and social media.

              [1] https://www.studocu.com/ph/document/university-of-rizal-syst...

              [2] https://en.wikipedia.org/wiki/Propaganda_model#Criticism

              • burnt-resistor 21 hours ago

                My PCs were homebuilt and networked in 1994. All warranties void, except the hardware. Windows 3.1 and Netscape over 28.8 sucked, but it worked.

              • hilbert42 a day ago

                Uh? My PCs and corporate PCs I've been responsible for are networked including the internet (they always have been). Moreover, they were warranted with no conditions about what software was run on them.

                Where on earth did you get that notion from? Just because some vendor [your links] has conned the unfortunate client into an unacceptable contract doesn't mean it's commonplace or ever was.

                • JumpCrisscross a day ago

                  > Were on earth did you get that notion from?

                  Literally cited the source.

                  > My PCs and corporate PCs I've been responsible for were networked including the internet

                  These came later, in the mid 90s. If you have a source for any PC having been "warranted with no conditions about what software was run on them," I'd love to see it. Practically every warranty for PCs voided if you e.g. overclocked the CPU. And almost all PC warranties were limited warranties, not the no-questions-asked up-to accidental-damage common today.

                  • hilbert42 a day ago

                    Deliberate abuse and misuse of a product is not covered under any normal warranty, and overclocking the CPU could fall into that category depending on the specific warranty (some CPUs could not be overclocked for that reason so it was irrelevant).

                    User software is another matter altogether. Users could always install whatever they wanted.

                    It seems you are not old enough to remember that the PC was originally designed to be modular and flexible and that applied to both the hardware and software.

                    The whole raison d'être from the S-100 bus of the 1970s and the IBM PC† of the '80 was to provide users with a computer system that was flexible and that users could adjust and alter to suit their needs. This meant that users were actually required to alter the configurations of their PCs. No one would have questioned such action, it was considered completely normal.

                    Moreover, warranties took this into account and it was a normal procedure to add RAM, disk drives and video cards etc. without voiding the warranty. What's more, one could even upgrade the CPU (and if necessary its clock speed) and the rest of the hardware would still remain in warranty—that's why CPUs until recently were 'socketed' and not soldered into place. Of course, the third-party CPU wouldn't be warranted—not on the PC's warranty anyway.

                    What you are referring to is a sleight-of-hand by some sleazy ratbag manufacturers to change the PC from an open system and make it proprietary. Any system administrator or corporate buyer (at least until recently) would have objected to any clauses in the warranty that would have forbidden modifying equipment as mentioned. I know, I was head of a government IT department for years and contacts that included such punitive warranties would never have been awarded—they would never have passed my desk. Not that I ever saw any mind you. (BTW, there some were warranty claims, altering the equipment was a non issue.)

                    What we are seeing now (and this whole discussion) is about reclaiming the open nature of the PC—and our computing equipment in general, our phones, etc.

                    Fortunately, the Right to Repair movement and the Right of Ownership—people like Louis Rossmann and iFixit—are beginning to make inroads into keeping these sleazy carpetbaggers in check. As we've seen Right to Repair laws are getting enacted.

                    † The original IBM PCs had full service manuals that included electronic circuit diagrams and even the BIOS source code! To suggest we weren't meant to alter things is sheer nonsense. (I still have my copies of these manuals.)

                    • JumpCrisscross 13 hours ago

                      > warranties took this into account and it was a normal procedure to add RAM, disk drives and video cards etc. without voiding the warranty

                      Again, very limited warranties that only covered manufacturing defects. Not the warranties integrated products have today. In most cases, a manufacturing-defect warranty is not voided by rooting your device. (It may become more difficult to prove it’s a manufacturing defect, however. The law varies state to state.)

                      What fundamentally changed is warranties expanded as products became more integrated and the market expanded beyond power users. You cannot provide accidental-damage insurance for a user adjusting their BIOS.

      • bongodongobob a day ago

        Yeah, that's rooting your phone. It should be a little difficult. You can do it. And it's good that most people don't.

        • gyello a day ago

          The problem is not that rooting is difficult, it's that in most cases now it permanently renders parts of the phone inoperable or makes it impossible to use contactless payments or any banking apps or content streaming apps etc.

          These additional restrictions are not there for security despite what we are told.

          • WarOnPrivacy a day ago

            > it's that in most cases now it permanently renders parts of the phone inoperable or makes it impossible to use contactless payments or any banking apps or content streaming apps etc.

            I've had to cloak the rooted state from an app or two or they'd choose to withhold functionality. That was a couple of phones ago. I've not had trouble with banking, payments, etc since.

          • miki123211 a day ago

            They're for the bank's (and other customers') security, not yours.

            I think they're supposed to prevent people from reverse-engineering banking app APIs and writing bots that perform millions of requests per second, trying to brute force their way into peoples' accounts.

            As an extra protection, SafetyNet also makes it harder to distribute apps that repackage your genuine banking app, but with an extra trojan added.

            • potamic 21 hours ago

              Every bank of repute also has a web portal for internet banking. If it were about security, leaving this open while closing the mobile route doesn't make sense. The web is also vulnerable to scammers hosting trojan websites but somehow that doesn't seem to be a big problem.

              If a bank (or any entity for that matter) needs to control the client in order to make their systems secure, then it's bad security. The system must be secure despite the client.

  • abtinf a day ago

    [flagged]

    • akdev1l a day ago

      > Seriously, you never had to provide tech support to a parent, relative, or friend whose computer got totally fucked because they had root?

      Literally 0 here, have you really?

      Like I literally do not know anyone who is even using Linux to begin with but also people do have “root” in their Windows and MacOS systems. I do not see anyone destroying their computers at random.

      Also to steal someone’s information you don’t need root access or any administrative access - if you already tricked the user into running your code then you can steal their passwords or whatever, all of that is user-level data.

      • microtherion 9 hours ago

        I can only speak to the Mac situation, but most people there would not have "root" in the traditional sense:

        * Pedantically speaking, you can not even log in as root, any root level access would have to go through sudo (which is indeed enabled for most users).

        * But additionally, even as root, Macs by default have System Integrity Protection enabled, which makes most system files non-modifiable. Users still have full control in that they CAN disable System Integrity Protection, but that involves a reboot and some (documented) command line commands, so most users don't bother doing that.

    • WarOnPrivacy a day ago

      > Seriously, you never had to provide tech support to a parent, relative, or friend whose computer got totally fraked because they had root?

      I accept this metric. It means non-rooted devices are unsafe.

      I'm career IT support. In the entire age of smartphones, 100% of the malware/crapware I've seen was on non-rooted devices - most of it pushed on users by manufacturers, carriers and OS devs.

      • user_7832 a day ago

        > I'm career IT support. In the entire age of smartphones, 100% of the malware/crapware I've seen was on non-rooted devices - most of it pushed on users by manufacturers, carriers and OS devs.

        To add on, almost all the money people I know who have lost to scams have been through non-rooted devices. Sending an OTP or making a bank transfer because "you're under police investigation" is cheerfully easy even without the user knowing what "root" is.

        Also see: the recent phish on Krebs (on security). A malicious email and entering a password to a webpage does not need root access, for better or worse. In fact, a rooted device might block your bank app, actually making money transfer scams tougher, ironically.

      • hilbert42 a day ago

        "I accept this metric. It means non-rooted devices are unsafe."

        Same here. It's manufacturers and software vendors such as Google and Microsoft that we need to most guard against.

        Fully agree wirh your second paragraph, I've only seen viruses on non-rooted devices and I've never had a virus on any of the many rooted phones I've owned over the years.

        Sure there are viruses and they can be troublesome but when you look below the surface much of the hype about locking down one's devices comes from manufacturers and software vendors, Google, MS et al, who benefit financially from not allowing users to control what runs on their phones.

        It's not only phones, what Microsoft has done with TPM and Windows 11 and the deliberate obsoleting of millions of perfectly good PCs/forcing users to buy new hardware when it's unwarranted is simply outrageous.

        Microsoft ought to be sued for committing environmental vandalism. …And that's just for starters.

    • ulrikrasmussen a day ago

      I cannot fathom how you can hold this position. It is such an authoritarian view to willingly give up control to let some higher power protect you, at the expense of having absolutely no way out of that higher power suddenly starts acting against your interests. Sure, when people are in control of their own lives they sometimes fuck up and get hurt, but that is absolutely not an excuse to take away their freedoms.

    • phito a day ago

      ... What? You make no sense. Just let users that know what they are doing root their device while normies stay in userland.

      • acdha a day ago

        The neat thing here is that we don’t have to make uninformed speculation about this, we can just look at how it worked in the past. Anyone who did family tech support in the 2000s knew that every family visit involved removing all of the malware their relatives had installed – ESPECIALLY the ones who “knew” what they are doing! – and it was even odds that you’d see stuff like that on computers at businesses, libraries, banks, etc. All you had to do was say it’d improve system performance, give them free coupons or porn, and they’d trip over themselves to install it. This is why iPads and ChromeOS devices became so popular because everyone who actually knows how to use a computer safely knows people who say they do but absolutely do not.

        It’s also important to learn how the modern abuse industry works. Since the 2000s, malware has grown into a multi-billion dollar highly professional industry used by governments around the world and the scammers have professionalized as well. You should look at some of the YouTube videos of scammers social engineering people into giving them remote access, approving bank MFA challenges, or talking them into making cryptocurrency purchases - and while we might sneer and say they’re uneducated or careless, most of them are distracted or old, just like most of us will be some day. If there’s a prompt, millions of people will approve it and if it means their device can no longer be trusted that’s a lot of money and e-waste.

        I don’t like any of this. I want to have root on every device because I grew up with unfettered PCs (first installed Linux .9 using a disk editor, etc. etc.) but the landscape has changed since then. We can’t pretend otherwise, but we could call for regulation to balance the interests of owners and device manufacturers just as we allow people to customize their cars without giving up the concept of safety or emissions testing.

    • StanislavPetrov a day ago

      >You people don’t know or have forgotten what a god damn wasteland computers were 20 years ago.

      Computers were utopia 20 years ago as compared to today - especially when it comes to privacy, security and user-control.

      • burnt-resistor a day ago

        20 years ago (2003-2006), Welchia, Blaster, Code Red... Windows boxes that weren't patched were infected within about 35 ± 5 seconds when connected to lightly-filtered Internet when it was still a capitalized proper noun. Ask me how I know and used JScript and psexec to mass remote into LAN machines to try to stop some of the madness and downtime.

        • throwanem an hour ago

          Oh boy, tell me about it. The first real job I ever had, the first thing I did as a "network engineer" was say "Wow, I've never seen Windows XP machines on the public Internet before. Uh, is it just me or are these all really slow? Like a lot slower than they should be? And what's all this in Task Manager?" 2004 was a different time.

      • throwanem a day ago

        Spoken like someone who knew no one other than fellow practitioners in the field. My God, the 2000s were the Wild West in every kind of way - were you even there to see it? I note you do not say that you were.

        • burnt-resistor a day ago

          That's fine if they weren't. Probably not cool to attack them personally though.

        • StanislavPetrov a day ago

          I got started with my first computer as a child over 40 years ago. I'll take the Wild West over the Matrix any day.

          • throwanem 21 hours ago

            That's an interesting contrast, in that the Wild West is a halfway house for Civil War burnouts and the Matrix is a deliberately and expensively constructed and maintained, largely successfully hyperreal (in the original sense, ie so convincing that whether it's 'real' ceases to be either distinguishable or meaningful) simulacrum of what the Wachowskis were astute enough in its own historical moment to recognize as the highwater mark of American hegemony.

            Oh, the Matrix is also parasitic, certainly; before it was smoothed over for mass appeal it was I think a story much more obviously inspired by They Live, the central conceit being that the system both runs on and exploits human neural cognitive capacity, ie the brains are the thing being farmed as components of the Machines' own computers, with the rest of the human (including consciousness and experience!) basically tolerated as the best available life support system for the 500 grams or so of brain tissue that's actually worth having. But a cow can live a long and happy life on a farm, be genuinely loved, and still end up as cutlets. Looking at it even from Daisy's end, how unjust can we honestly call that deal?

            For you and me, the gunslinger's life has a decided appeal, sure. If that and Buy-n-Large World are the only two options on the table - which so far they have been, though I agree the real answer is to add a better third - can we really say that, for everyone, the Matrix isn't the less worse of the two?

    • userbinator a day ago

      There's something called "education", and by that I do not mean the propaganda that passes as such these days. Clearly you've drunk the Goog-Aid.

  • throwaway290 a day ago

    Stop parroting orthodox agenda without thinking of what it means. If everyone had root access it would be heaven for ransomware/spyware/malware operators.

    Having root access is not in the interest OR benefit of most regular users. Rooting your phone is a footgun for 99% of people who install random apps and will get hacked and have their life savings transferred or ransomed.

    For them the article does the right thing. For everyone else, like you or me, we will not care what this article says anyway.

    That's why what Samsung does is double bad. Noot rooting phone is good hygiene if your phone respects you. But if it comes with malware then thats a stab in the back.

    • callc a day ago

      > Having root access is not in the interest OR benefit of most regular users.

      What about desktop OSes for the last 40/50 years?

      Sure they aren’t the foam-padded locked down phone OSes, but isn’t this fear a case of leaving said padded room?

      • throwaway290 a day ago

        Computer usage and consequently threat landscape went through a crazy change from 40/50 years ago. Desktops are a minority of devices. If you take personal devices even more so. Most people in the world with a computer have just a pocket one. Especially in WANA countries discussed

        If you talk to regular non IT savvy people many of them don't bother and correctly assume that at some point it will "get a virus" or something. And it is fine for them because almost no one uses desktop for critical stuff like payment or finance. But majority do use phones for that. They jumped from cash straight to phones and now it's a lucrative attack vector.

        Edit to reply because throttled by downvotes: yea I'm in your boat, we live in a bubble. It's hard to believe. But now I'm using a payment system that literally has "get app" on its site and no other way to manage money or even sign up. And apps like that can be the only way for many people to get some sort of plastic card to pay cashless

        And I see how it happened. Many people have no personal desktop computers. Many payment vendors don't trust desktop computers because an ordinary person's windows machine is a malware breeder.

        So many people in the world depend on mobile security (especially underprivileged people). Anyone who wants them all to get fucked for own libertarian ideal of "hardware ownership" is basically a psychopath to me. Especially considering that he is literally free to root his device and not make it a problem for others.

        • mumbisChungo a day ago

          >almost no one uses desktop for critical stuff like payment or finance.

          I'm not saying this is wrong (in fact I assume it is accurate), but relative to my life experience this is crazy to me.

          • tokioyoyo a day ago

            Worked on some financial stuff before, and dashboards showed the opposite of your experience, if I’ll be honest. An average user is very different from us.

            • devilbunny 21 hours ago

              Financially savvy people are much more likely to have a desktop, I would think.

              Mu mother-in-law does not have a laptop or desktop. She barely uses her iPad. If it’s not on the phone, it might as well not exist. My father-in-law has a PC at work and a Mac laptop, but he uses them only for work - his casual internet use is entirely on the phone. My wife uses multiple iPads and her phone, but only uses a desktop at work or when working at home.

              Most people I know don’t actually own personal computers other than their phone or tablet.

        • jjav a day ago

          > almost no one uses desktop for critical stuff like payment or finance

          What? This makes no sense. For something where security matters, using the desktop is the only rational choice. I never, ever, allow any sensitive information through the phone since it is not a trusted device.

          • throwaway290 a day ago

            You are just another example why most people ranting on HN about the topic of rooting phones are out of touch. No offense.

  • charcircuit a day ago

    Root access is an outdated security concept from the previous century. Trying to mandate such a concept is parroting UNIX propaganda. Users can be given control of devices without them having a "root" account.

    • WarOnPrivacy a day ago

      > Users can be given control of devices without them having a "root" account.

      Can be given control [by handset manufacturers] is an unfulfilled potential. And it will always be unfulfilled - because otherwise, users could protect themselves from manufacturers/providers foistware.

      Given their reality, users root.

    • Zak a day ago

      I agree. I would love to have an "advanced permissions manager" that lets me specify that AccA can write to the /sys devices for the charge controller and AdAway can write to /etc/hosts, but not the reverse.

      That doesn't give me any less power than root, but does give those apps less power and limits the potential impact if one gets compromised. I think when most people say the device owner should be able to get root, they mean that the owner, rather than the manufacturer or OS vendor should have the final say in all cases, not that it has to literally work just like root on Unix.

    • mrusme a day ago

      How?

      • charcircuit a day ago

        By following the principle of least privilege. Like with apps the user should only have privileges for what they are allowed to control and nothing more. So if the user should have privilege to disable apps, then the settings app could expose a way for the user to do so.

        Yes, this is kind of approach of coming up with a design to security instead of going with the easy route of everything being allowed is harder to do and takes more time, but it leads to better security.

        • tsegers a day ago

          I believe that the top-level comment you replied to is making the point that there should not be any authority that either allows or disallows what a user can do with the device they own. Purchasing a device should make one that authority, free to decide how much security to trade for how much privilege.

          • charcircuit 14 hours ago

            But really it's all about framing. For example on desktop computers it's not possible for people to create new instructions for their CPU to handle. At some layer there will be an API that user needs to use to interact with the device. As times goes on I think it's natural for that layer that users are expected to interact with their device with to become higher level. I believe the top level comment is framing this issue such that current phones don't have an API that matched how it worked for UNIX computers and that is a bad thing. The commenter is too focused on how things worked in the past and doesn't want to allow for things to change.

        • arendtio a day ago

          Okay, and how am I going to give the user the right to wipe all software from the device and use a completely custom software?

          I mean, we all agree that such permissions are not required during everyday operations, but there should be a way for the consumer to have control over the software being used. And I mean all aspects of the software: firmware should be updatable, the OS should be replaceable, and the security concepts within the OS should be customizable by the user as well. I have no problem with hiding such functionality and requiring users to read the documentation to find out how it can be done, but it should still be possible.

          • charcircuit 14 hours ago

            Sure, but such a product requirement can be made to be legally required without legally requiring root access.

      • burnt-resistor a day ago

        By having a "maintenance mode" that can be entered and left.

        • peterbraden a day ago

          Maintenance mode == root

          • burnt-resistor a day ago

            You're projecting your meaning of it, not mine. Not if it can't be undone in a way other than reinstalling everything. A mode that allows changing things with a temporary reduction of security system-wide and restoring them later, but putting all of the upgrade and support liability on the user without sacrificing functionality. Think VMware ESXi. If tech support wants to not support it, that's fine, but payments and such should still work.

    • realusername a day ago

      Well maybe in theory but in practice they don't. How do I restrict or inspect what the Play Store is doing on my device at the moment without root?

  • ozim a day ago

    My grandma should not have root on her phone and a lot of younger people as well.

    Making it easy to root phone makes it easy for scammers to ask people to unlock it.

    It should not void warranty if you unlock the phone. But security concerns are real. Mobile banking apps refuse to run on rooted phones.

    • poisonborz 19 hours ago

      The same people can be scammed to give passwords, click links, perform any human action, so what's the difference besides giving up yet another freedom?

    • const_cast 9 hours ago

      > My grandma should not have root on her phone and a lot of younger people as well.

      I would agree.

      > Making it easy to root phone makes it easy for scammers to ask people to unlock it.

      I would also agree, so then: don't make it easy.

      > Mobile banking apps refuse to run on rooted phones.

      ... but they do run on my web browser. On a computer using open-source software without even secure boot enabled. So, it seems to me this is a cop-out by said banks. They shouldn't require client-side absolute trust to run, and evidently they actually, practically, today, do not require that. It's simply a choice they made, presumably out of laziness or greed.

  • smokel a day ago

    Even though you seem to have a lot of support on Hacker News, I don't think making root access a fundamental right is preferable.

    Historically, computers have not granted you access to everything. Most home computers used to have ROM cartridges, which could not be modified, at least not by an average user. Also, when using unrestricted operating systems, such as as MS-DOS, a simple virus could wipe all your hard work.

    In our current time, devices are connected to other machines, and the problem of security and privacy has increased dramatically. Unfortunately, we still don't have operating systems that are secure enough to be used by untrained persons. It makes perfect sense to lock down these devices.

    I basically see only two ways out:

    1. Allow developers exclusive access to development systems, similar to how console development works.

    2. Implement a secure operating system.

    It will take an extreme amount of effort to do the latter, and it might even be impossible to gradually absorb the mess of interfaces that people and companies expect to work.

    So that probably leaves us with the first option. Personally, I would love devices to be locked down more, so that the crazy threats from hackers will be less severe. But I would also love to keep developing software. Having to jump through some hoops is probably unavoidable. The situation could be compared to requiring a driver's license in order to safely drive on the shared infrastructure.

    As much as I agree with your sentiment to have freedom, it still seems somewhat overly optimistic to expect this to work in our complex society.

    • poisonborz 19 hours ago

      Why? What is the reason root would be dangerous, if it's not the default? People can be scammed to activate it, but those same people can be scammed to click links and give passwords and personal data. Any action requiring root would need a warning and raise suspicion, or put behind an activation mechanism that's complex enough.

      Anything else and you lose freedom, and the whole ethos that enabled the advanced IT landscape of today.

      • smokel 16 hours ago

        Having root access implies that you can do all sorts of things: change files, install new software, new kernel modules, etc. Locking this down makes the attack surface for malicious parties much smaller. Many exploits start in user-space and then obtain root access to install rootkits.

        Of course you lose freedom, but that is exactly what is needed, because some people just cannot help themselves from exploiting that freedom.

        Unless someone figures out a way where we can safely share computing power and connections to real-life services (e.g. banking, having an identity, communication in general), I think there is no real alternative.

        Perhaps having separate internets for various purposes would be an option. Ond where we can socialize anonymously, but not trust each other, and one where it's pretty boring, but where you can safely buy goods using your paycheck.

        • beeflet 14 hours ago

          https://imgs.xkcd.com/comics/authorization.png

          >Unless someone figures out a way where we can safely share computing power and connections to real-life services (e.g. banking, having an identity, communication in general), I think there is no real alternative.

          I think the opposite is true. We don't have adequate sandboxing of userspace on most desktop OSes. If your malware has access to the victim's home directory and can phone home, they've been pwned for all intents and purposes. Root access would matter if userspace programs were well sandboxed.

          On OSes where this is true like android, you have terrible interoperability of userspace programs and it's impossible to get "real work" done. Not to mention that without root access, you are just relying on the corporation to manage your system for you, which isn't tenable for a democracy.

          You don't need all of this trusted computing stuff to have secure, private payments. Chaumian ecash and cryptocurrencies have known this for a while. Just use a digital signature scheme instead of relying on open-source information.

          • smokel 12 hours ago

            I don't think these problems are opposing; both are real.

            I totally agree that user space is not as much of a useful concept on a single-user device. Originally, it helped to shield users of the same system from each other. Most of this was based on file system authorization. This hasn't been extended to internet access in a very useful way.

            However, even on single-user devices, having root access makes it easier to hide malicious processes. Granted that in modern operating systems it is already totally unclear what most processes are doing, so one can simply hide in plain sight.

            I'm still not convinced we can get by without a lot of trusted computing stuff to have secure payments.

mousethatroared 18 hours ago

Not in this field but, if you're willing to sacrifice performance for security (by avoiding closed, western, hardware) how hard would it be to for a group of top hardware and software engineers to make a secure smartphone?

Id gather you could go very far with the following list:

- Proved correct micro kernel

- Encrypted messaging by default

- Encrypted memory

- Encrypted messaging between processes.

- hardware switches for modems, peripherals and battery

  • Henchman21 12 hours ago

    Technical feasibility one way or the other is meaningless in the face of the power of Capital. IMO, Capital won’t allow the creation of devices it cannot control. So truly secure devices are a pipe dream — again my opinion.

    • mousethatroared 8 hours ago

      I'm talking about a nation state doing this to communicate using cell infrastructure it has physical control

  • elternal_love 18 hours ago

    I believe a proven correct micro kernel for a production system in smartphone scale is a sufficiently complex engineering task.

midtake 12 hours ago

Supply chain compromise is maybe one of the most cyberpunk aspects of modern security. It's not mathematical but it depends on allegiances, power, and money. Is it too late to introduce cryptographic verification into the supply chain in a way that the customer can be secure, or is it too late and a cyberpunk dystopia is the only future? Can mathematics change the meta?

reccy a day ago

This article has basically no technical details and scant evidence for the claims made by the authors. It's rage bait that is intended for emotional reaction rather than a curious and intelligent analysis.

  • hamdouni 21 hours ago

    I think this is an open letter addressed to Samsung, not an article trying to convince readers... Perhaps, the takeaway can be the call for transparency as a minimum ?

v5v3 a day ago

Samsung is a South Korean company.

South Korean needs USA to protect it.

Consider everything from South Korea to be under the blessings of the NSA.

msgodel a day ago

I've given up on smartphones. They're all unacceptably bad and for the most part take value out of your life rather than adding it.

I own a $50 Android tablet just for the required certificates to run DUO for work and other than that just use a UMPC with a modem card and VOIP for everything.

  • djrj477dhsnv 10 hours ago

    There is a lot of bad, but GPS maps (Google Maps for business reviews and public transport info and OSMAnd for hiking tracks) is extremely valuable to someone who travels a lot.

    And as much as I hate sending all the data to Google, their Translate app is indispensable for communicating in non-English speaking countries.

    • msgodel 6 hours ago

      Marble-QT works fine for OSM maps on Linux, if you run gpsd you can even use a GPS receiver and have the pin move around with you, I used this to help survey some land I bought recently.

      Google Maps's search/review works fine on the web, I'd imagine the experience is probably nicer on the web than mobile.

      Qwen and gemma both run locally on Linux and are excellent for translation.

Grandeculio 18 hours ago

I found the app on my Samsung phone but I also found something interesting.

Go to Settings->Apps and find the app in the list. Click "Configure in AppCloud" and then click "Personal Data". A form shows up where you can request access to the data or request a deletion of the data.

I just requested access to my data, received an email confirmation where I had to click a link. I am curious to see what they will send me (if they will send me anything).

  • chrisjj 12 hours ago

    > Click "Configure in AppCloud"

    Not found on this Samsung phone.

    • Grandeculio an hour ago

      There was mention of GDPR so maybe this only exists for EU phones.

      ---

      I just received the data inside an email. It is just a HTML file with the headers "Data Privacy Report" and "Aura Up Privacy Report" but other than that it is empty. Obviously this is all just bullshit to pretend to comply with GDPR.

mellosouls a day ago

Editorialized title. Even the original calls it bloatware not spyware.

codedokode 10 hours ago

Good to learn this. Was considering buying Samsung because it seems to be the only non-Chinese [non-spyware ridden] smartphone under $150. But what choices I have left now. Maybe buy a phone that can be reflashed with something open source.

And of course I don't keep anything valuable on the phone, do not login anywhere, do not install apps etc. It is an untrusted device because it does not run Linux.

ArtTimeInvestor a day ago

I sometimes think that "track record" is the main value of Google and Apple. They have been around for decades, and except in their own interest to collect data for themselves, I am not aware of any blatant privacy violations of these companies. And one can hope that in their own interest, they keep it that way. That's not great, but it's better than the other companies.

I don't see how any company can compete with this unless they somehow figure out how to make a vastly superior product.

  • dgb23 a day ago
    • ArtTimeInvestor a day ago

      Do Apple and Google have a choice to legally opt out of it?

      • Zak a day ago

        Yes, by incorporating end-to-end encryption in their services.

      • danparsonson a day ago

        What difference does that make to the outcome? If anything, being automatically subject to that without any option is worse.

  • bapak a day ago

    What's your definition of "collect data for themselves?" Because both do, albeit in substantially different amounts.

    • ArtTimeInvestor a day ago

      Can you elaborate on those "substantially different amounts"?

aszantu 16 hours ago

Couldn't get rid of some assistant that I would have to have registered with Samsung last phone. When it broke I switched over to a used Nokia. Little bit less convenient but I wish they wouldn't keep pushing that annoying spyware stuff on us... I'm perfectly fine to just use my phone for browsing and staying in touch with ppl... Why the f. Do I need Google Assistant which I also can't cancel...I swear, next phone will be one of those bricks for the elderly...

autoexec 12 hours ago

Samsung embeds spyware on every device they sell in the US too, we just don't have any privacy laws to stop them.

like_any_other 16 hours ago

It's time to start treating such actions, including/especially when done by corporations, as criminal hacking or an act of war, because as many commenters noted, that is what it amounts to. It's frustrating seeing the consequence be an open letter, where if an individual did this, there would international warrants issued against them.

ehnto a day ago

Samsung Phone on Australia, it was present on my device also. So not just West Asia and Africa.

I was able to disable it but not remove it, unclear if it will re-enable itself. It had sent about 35mb of data since March 1st, and was enabled as a background service.

  • ahmedfromtunis a day ago

    Did try to see if using blockada (or similar apps) to block the apps access to the internet would work or cause and side effects (like other core apps not loading, ...)?

b0a04gl a day ago

we're past the point of blaming carriers or oems individually. the entire supply chain is complicit. you want clean firmware? you either flash it yourself or buy from the handful of vendors that haven't sold out yet. that’s where we are

anshumankmr a day ago

I observed this when I purchased a Samsung phone in 2022. My phone cost 35K INR. Even I found it alarming, apart from having bs apps pre-loaded. Switched to an iPhone a year or so later. Never looked back.

31337Logic 12 hours ago

Soooo... What do y'all recommend if I want to run a rooted Android phone? Seems like our options are becoming more and more limited each year. :-(

  • djrj477dhsnv 10 hours ago

    Pixel with self-built userdebug version of GrapheneOS. (It's quite easy, just modify one step of their published buiod instructions.)

  • Henchman21 12 hours ago

    The manufacturers will continue to take user choice away until users start tossing their devices in the trash. Sooner is better IMO.

AbuAssar 14 hours ago

IronSource spyware is made by an Israeli company

ggm a day ago

Would sufficient people change purchase decisions in ways which they could recognise this as a root cause?

  • nguyenkien a day ago

    There not much of choice if you don't have money.

    • Zak 21 hours ago

      Used premium phones often cost as little as new entry-level phones. There may be some markets where things get weird because of carrier subsidies though.

noisy_boy 18 hours ago

The only thing that is stopping me from switching to an iPhone is file level access and Syncthing - is that a solved issue? Anyone care to share?

  • armsaw 18 hours ago

    Yes, for ~7 years now the Files app has existed. Sandboxing is still a thing.

    Möbius Sync and Synctrain are the options for Syncthing. Both work, neither are official (nor is the currently-maintained Syncthing fork for Android).

mightyrabbit99 a day ago

The only phone brands that I am aware of which sells phones that are able to be rooted are Samsung and Xiaomi. I'm also in need of a phone that has an SD card slot so I don't see myself switching to any other brand.

akersten a day ago

In my experience, Samsung is a label that means "stay far, far away." From the Galaxy Note fiasco to my microwave to my dishwasher to ... Probably at least three other products before I learned my lesson.

I even refuse to buy QD-OLED monitors out of indignation that Samsung makes the panels. Maybe I'm alone but maybe one day we'll boycott lousy companies out of business.

  • anonymars a day ago

    In favor of what? The Android ecosystem is pretty lousy. Which manufacturers allow you to easily migrate to a new phone (Samsung has Smart Switch) and have, let's say, 4+ years of security updates?

    Genuine question.

    In my case I also wanted an SD card slot so it was slim slim pickings indeed. (And still there are some misfits who insist that there is no such thing as progress!)

    • Thorrez a day ago

      >Which manufacturers allow you to easily migrate to a new phone (Samsung has Smart Switch) and have, let's say, 4+ years of security updates?

      Pixel phones get 7 years of OS and security updates. Do you consider Pixel phones to allow you to easily migrate to a new phone?

      Disclosure: I work at Google, but not on Android or Pixel.

      • throw123xz a day ago

        Going from a phone with a Snapdragon SoC to a Pixel with the Tensor SoC was a big downgrade for me. It gets hotter quicker when doing more demanding tasks, battery drains faster if network conditions are not perfect, etc.

        We've been having some warm weather (~30ºC) around here and the other day my Pixel 8 Pro started warning me about the phone being too hot when I tried to record a video.

        I like Google's Android skin and their long support periods, but Tensor holds these newer Pixels back.

      • amlib 10 hours ago

        Pixel phones are available in very few regions, Samsung is available virtually anywhere.

      • fud101 a day ago

        Pixel phones have been awful hardware since the 5. So there is that. The tensor chip is a dud and can't be fixed. I'm done with Samsung for good after my current phone which I bought a few months ago. I'll probably replace it with an Oppo or something again, never going back to Samsung.

    • ryukoposting a day ago

      LG back in the day. I miss my V20. What a weird, but wonderful phone.

      • gblargg a day ago

        I'm still using a V20 as my main phone. The recent app icons at the extra top section of the screen really make juggling active apps fast. I don't think any phone has had this feature since.

        • ryukoposting a day ago

          I loved the second screen. Does Spotify still work with it? That was a cool thing.

      • moooo99 a day ago

        I was an LG G3 user a long time ago. With the exception of the overheating issue, it was a lovely phone. LG really did have some unique devices

    • tock a day ago

      I love the phones Nothing makes. And they are offering five years of Android updates and seven years of security upgrades on their upcoming Nothing phone 3.

      • mellow-lake-day a day ago

        All the nothing phones are too big. Give me something the size of the s25.

    • npteljes a day ago

      Pixel of course. And yeah the Androids suck mostly. Pixels suck too in some ways, for example, they are quite bulky, and heat up a bunch. But overall, by far the best Android experience in my opinion. No SD slot though.

      • acidburnNSA a day ago

        No SD slot is a showstopper for many.

    • msgodel a day ago

      Get a UMPC with a modem card, put Linux on it, use jmp.chat to do all your carrier value add over IP.

  • danparsonson a day ago

    Great SSDs though, generally speaking

  • blacksmith_tb a day ago

    I have a Samsung clothes washer and a drier, they've been solid (but they aren't net-enabled... luckily).

  • makeitdouble a day ago

    > Galaxy Note fiasco

    Has any smartphone maker succeeded in getting more than a few percent of market share, released more that 2 phones while being immune to that level of fiasco ?

    • Zak a day ago

      Yes. I have never been asked "do you have any weapons, explosives or [phone model]?" before boarding an airplane about any other phone, ever.

      There have been other phones that had very occasional battery fires, but nothing on remotely the same level.

      • makeitdouble 15 hours ago

        On the other side Apple dealt with the BatteryGate of 2017 and Google paid back all remaining users of the Pixel 4a.

        Each of these is also unique and unseen ever before for a phone.

    • brianbest101 a day ago

      It’s really hard to beat the “it’s a felony to knowingly carry our phones on to an airplane” level of fiasco

      • makeitdouble 15 hours ago

        Why does this become a competition where we're looking for a winner ?

  • Gigachad a day ago

    Samsung phones have been filled with preinstalled spyware since the beginning. Outside of fairly unusable Linux phones, Apple seems to be the only one taking privacy seriously.

    • compootr a day ago

      manufacturers aside, grapheneos and lineage work well because of Google's work on their phones

    • sitzkrieg a day ago

      apple privacy is marketing but ok

      • int_19h a day ago

        If it's mostly marketing, why was Facebook so up in arms about forced opt-in for tracking in iOS?

        • Grimeton a day ago

          Because Apple blocks everybody else from spying on you but Apple themselves are still perfectly spying on you. And not just that, by disallowing all other apps to get their hands on your data you even tell Apple which data it can sell for a higher price because it's only available via Apple and noons else...

          Let that sink in.

          • joshstrange 21 hours ago

            Let what sink in? Your completely unprovable/unproven conspiracy theory?

            You are suggesting that Apple is actively tracking you in other apps (apps that aren’t allowed to track you themselves). I find that completely preposterous and a huge risk for Apple to take given their marketing.

            > Because Apple blocks everybody else from spying on you but Apple themselves are still perfectly spying on you.

            Extraordinary claims require extraordinary evidence. Specifically Apple spying on users and collecting info tied to their identities in 3rd party apps.

            • oefrha 17 hours ago

              You mean extraordinary evidence like selling Apple Ads and associated attribution data that third parties aren't allowed to collect? Their ads revenue is now $10B+ and growing. You must know nothing about the mobile measurement industry if you think this very mundane claim is some extraordinary conspiracy theory; it's not even controversial there.

              https://ads.apple.com/app-store/help/attribution/0093-adattr...

      • newdee 15 hours ago

        All marketing? None of it is real? Citation?

Abishek_Muthian a day ago

Even in India the entry level Samsung phones are subsidised by bloatwares, Unfortunately there’s not many options for an entry level phone with regular updates.

So the question is who would we like to be exploited by?

yahoozoo a day ago

That feel when you’re going to make an Israeli spy joke then read the article headline and it’s ACTUALLY about an Israeli spy operation.

viktorcode 21 hours ago

Fact of life: cheap Android phones are funded by ads. Same holds true for TV sets.

Iolaum a day ago

A user may not be able to uninstall it, but can they disable it?

  • angst a day ago

    1. Open Settings on your phone.

    2. Scroll down and tap Apps.

    3. Look for AppCloud in the list of apps. If it’s not visible, tap the three-dot menu in the top-right corner and choose Show system apps to find it.

    4. Once you’ve found AppCloud, tap it, and then tap Disable to stop it from running.

    https://hackerdose.com/tips/remove-appcloud-from-samsung/#:~...

  • rs186 19 hours ago

    User can uninstall via adb (computer required).

TZubiri a day ago

"AppCloud is developed by ironSource, an Israel-founded company (now acquired by American company Unity)"

I did not expect the thing I made games with as a teen to be involved in a global war.

sneak a day ago

Buying a device that only runs OEN Android is ridiculous for this exact reason.

We need to decouple phone hardware from phone software, as we did with computers.

  • bilkow a day ago

    We do, but I don't see it happening anytime soon. Many banking / government apps and even some games use the Play Integrity API, which AFAIK is starting to require remote attestation for newer devices.

    As it's usually not viable to opt-out of those, the solution seems to be having a separate device.

theyinwhy a day ago

Should we expect to have trojans in every unity game now?

gmerc a day ago

If anyone needed another reason to stay the fuck away from Unity

xchip a day ago

> AppCloud, developed by the controversial Israeli-founded company ironSource (now owned by the American company Unity), is embedded into devices

We have new spyware coming from Israel, let's update the list:

- Pegasus

- Candiru

- QuaDream

- Cellebrite

- Paragon Solutions

- Nemesis

- AppCloud

OutOfHere a day ago

Samsung currently has an unremovable spyware app on North American phones that pastes (records) everything copied to the clipboard by any app. It is the Samsung Keyboard app. It cannot be removed. It doesn't matter if you're using any other keyboard app. Samsung Keyboard pastes (records) everything that gets copied to the clipboard by any app. The Samsung Keyboard app cannot even be disabled from Android.

As an aside, I recall getting a lot more ads when I used Samsung Keyboard.

  • noisy_boy a day ago

    Sometimes I will see a small random "copied" floating notification (not in the notification tray) and I always wondered where it came from. Maybe they have put in some code to suppress it but due to some bug, it leaks out. No proof but I can only hypothize.

  • rs186 19 hours ago

    Thanks for mentioning this! I saw it but never put much thoughts into it. Now it seems a huge security risk/active security exploit.

    Strangely enough, I cannot reproduce this now.

    I'll see when it happens again, and if I can uninstall keyboard via adb. It's just a pre-installed app, after all.

    • OutOfHere 16 hours ago

      What do you mean you cannot reproduce it? Enable the setting in your Android to notify you whenever any app pasted from the keyboard.

      Unless you have already used adb to disable or remove the app, the issue is guaranteed.

  • bapak a day ago

    Every day it feels like regulators need to increase enforcement by an order of magnitude. For every fine they dish out, 10 more abuses go unnoticed.

    • logicchains a day ago

      The regulators work for the same governments and intelligence agencies that are making companies add such clandestine spyware.

  • stevenhuang a day ago

    https://www.reddit.com/r/samsunggalaxy/comments/mtakqq/how_t...

    Yeah, all Samsung software is a liability.

    Don't even get me started on the Samsung smart TVs. Just horrible all-around.

    • spinlock_ a day ago

      Thats why my Samsung TV has no internet access and I'm using Apple TV instead.

      • Dah00n a day ago

        From the fire into....

        • spinlock_ a day ago

          Into what? Though I have no illusions about any tech company, I trust Apple more than Samsung right now. It's all relative, not absolute.

          • amlib 10 hours ago

            It's a slippery slope. Apple is as bad as Google was about 10 years ago and things seems to be degrading faster and faster. Give it another 5 years and they will be as bad as Google/Samsung is today.

        • joshstrange 21 hours ago

          Do you wanna expand on that or just make vague statements with no facts?

bdavbdav a day ago

Is this where we discover we’ve got another Pegasus preloaded.

hd4 a day ago

it's now a case of choosing between who you least care about spying on you - think I'll choose a Chinese phone next time, at least they're not currently engaged in genociding children

  • danparsonson a day ago

    They're currently engaged in doing all kinds of awful things that we know about, and no doubt lots of even worse things that we don't. Try looking up Xinjiang, Tibet, or the Falun Gong for a taste.

    There are no innocent world superpowers.

    • Dah00n a day ago

      No, but China has a better track record than the US.

      • danparsonson 19 hours ago

        I disagree; I think all we can really say about China in this regard is that they have more control over the press.

    • anticodon 21 hours ago

      Was situation in Tibet really good before China came?

      I've recently learned that movie "7 years in Tibet" is full of lies, starting with the fact that the main character was hardcore Nazi follower in real life.

      There are a lot of things that we don't know because media are not interested in enlightening people. They are interested in pushing the current agenda.

      E.g. Tibet was a poor feudal state with slavery, but you won't easily find this information, because all you can find now if you search for it is: "China is bad, bad, and Tibet is very good, enlightened people, very warm and kind". It is not like that.

      • danparsonson 19 hours ago

        > Was situation in Tibet really good before China came?

        Well I imagine there was a lot less persecution by the Chinese government at that time.

        > media are not interested in enlightening people

        You're right, the media in China are mostly or exclusively mouthpieces for the state.

TiredOfLife a day ago

"Otherwise please use the original title, unless it is misleading or linkbait; don't editorialize."

Atlas667 a day ago

THEY WILL TARGET YOU too if you ever find yourself against western and/or Israeli interests.

Capitalist technologies are the surveillance state incarnate. They must study people in order to manufacture consent.

Remember democracy is majority rule, when have you ever had true control over your political destiny? You KNOW the answer is never.

Democracy =/= trust.

Democracy = control.

  • v5v3 a day ago

    Many 'democracies' are not democracies, as you can only really vote for one of 2 parties. The system is fully designed to supress smaller parties and independents.

    Only countries with regular coalition governments can be classed as a actual democracies.

    • maigret 21 hours ago

      For Europe that hosts many democracies the exact opposite is happening. Previous systems with two main parties are becoming 5-6 parties system, making decisions and agreement, and just plain majorities, harder.

    • Atlas667 15 hours ago

      The will of the masses is NEVER enacted. This is what bourgeois capitalism is.

      Oh you like phones? Well our phone companies require us to directly or indirectly create proxy wars in this region in order to acquire the raw materials necessary.

      This is the democracy of western nations: policy hidden behind capitalist interests that the people engage with through consumption.

      Its democracy for the rich not for the millions of us.

      That's why they NEED to manufacture consent, in order to get you on board with murder and fabricated poverty in order to have goods and services.

      • beeflet 14 hours ago

        >Oh you like phones? Well our phone companies require us to directly or indirectly create proxy wars in this region in order to acquire the raw materials necessary.

        I think that is the will of the masses.

        I've got this fairphone in my pocket that has a replaceable cobalt-free battery and a replaceable OS for a reasonable price. But people by-and-large don't want fairphones, they want iphones.

        The third worlders fighting over cobalt don't want peace, they want wealth for themselves.

        People don't want niche third parties and alternative stuff, they want to be part of a larger cultural group.

        Captialism is based on individual voluntarism, and the problems you describe are not caused by manufactured sentiment but a lack thereof. The problems are caused by the distributed actions of a silent majority, as opposed to some greater rational plan.

        • Atlas667 10 hours ago

          > The third worlders fighting over cobalt don't want peace, they want wealth for themselves.

          They are enabled into fighting by big, huge interests. They ship them weapons and rationales.

          Who are the customers in the end? Western nations. They create the abject poverty, they use poor governments to exploit and enslave their own people. There is no "poverty" in the world only exploitation. All poverty is fabricated and sustained.

          Why is it that Mali is one of the poorest nations on earth but is also one of the top 10 exporters of gold? How does that work?

          Capitalism is not voluntarism. That is the myth of philosophical liberalism.

          To say that someone who owns as much wealth as a few million people is equal to those same millions of persons who directly own nothing except credit(debt)? It's a myth.

          Voluntarism would only be true if we were on equal economic standing. Therefore voluntarism implies that no one can be coerced or leveraged, its a moot and infantile viewpoint of social dynamics.

          The "silent majority" has no real way to speak. You choose candidates based on talking points who can then REALLY do anything they please. That is called "trusting campaigns", not democracy.

          In reality what happens in elections is that we are choosing a group of people to enact policies based on the market-demands of a society that cannot control its market/production. There is a huge disconnect. It's not a real influence WE have. It's an influence that is given.

          IE. The majority of people dont want to use plastic materials for anything related to their consumption. But plastic is cheap and easy to produce. I'm sure that if given a choice people would rather their society work a bit more, spend a bit more of human-energy if it means we dont have nuts full of microplastics.

          It is how we produce that determines what choices we have, and how we produce is determined by market dynamics which are reduced to sustainability of production and profits. It is profits that determines production, not consumers' will.

          So tell me: if we dont directly control the options we have, but you say we are making a choice, what is that?

          There is another word for that. Coercion, manipulation.

          I dont want child soldiers killing for control over resources or kids mining for 12 hours a day, I want a good, cheap phone. It is not the same.

          Is there really no other way? I would sure as hell try to have it any other way.

          Whoever conflates these is doing so because they profit off of it, not because its the only way.

          In capitalism the heads of production and their profits determine the directions of our societies.

  • weatherlite a day ago

    > THEY WILL TARGET YOU too if you ever find yourself against western and/or Israeli interests.

    I guess you shouldn't find yourself against Western and/or Israeli interests then. It's time you learned to love Big Brother.