this post was submitted on 01 Nov 2024
12 points (92.9% liked)
SimpleX Chat
355 readers
1 users here now
Community of SimpleX Chat users – managed by the team.
SimpleX Chat is the first chat platform that is 100% private by design – it has no user identifiers of any kind and no access to your connections graph – it's a more private design than any alternative we know of.
Please ask any questions and make feature suggestions. Your ideas and criticism are very welcome!
https://github.com/simplex-chat/simplex-chat
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
These URIs are the references to technical documentation in Google Android site - they are used in error messages by various libraries.
The presence of the URI in code does not mean that the app communicates with this URI.
On the opposite, the absence of the URI in code does not prove that the app does not communicate with any given URI - the URIs can be obfuscated in many ways.
So this scanning technique to discover potential attacks is completely inefficient, and it creates unnecessary work of removing URIs from code, but achieves absolutely nothing to prevent the actual network connection - any malicious app can hide them and make them invisible to the scanning.
Another example would be simplex.chat domain. While the app contains it in code, the app never communicates with this domain, and it is only used to namespace the links and to allow showing QR code for people who don't have the app.
You cannot establish what URIs any given app communicates with by scanning its code - you need to proxy all traffic and monitor all connections that the app makes.
Thanks Evgeny for your explanation and time (I'm sure we all appreciate it). But you didn't say directly and specifically - does the app make these connections to Google servers?