this post was submitted on 05 Sep 2023
127 points (95.0% liked)

Android

27951 readers
187 users here now

DROID DOES

Welcome to the droidymcdroidface-iest, Lemmyest (Lemmiest), test, bestest, phoniest, pluckiest, snarkiest, and spiciest Android community on Lemmy (Do not respond)! Here you can participate in amazing discussions and events relating to all things Android.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules


1. All posts must be relevant to Android devices/operating system.


2. Posts cannot be illegal or NSFW material.


3. No spam, self promotion, or upvote farming. Sources engaging in these behavior will be added to the Blacklist.


4. Non-whitelisted bots will be banned.


5. Engage respectfully: Harassment, flamebaiting, bad faith engagement, or agenda posting will result in your posts being removed. Excessive violations will result in temporary or permanent ban, depending on severity.


6. Memes are not allowed to be posts, but are allowed in the comments.


7. Posts from clickbait sources are heavily discouraged. Please de-clickbait titles if it needs to be submitted.


8. Submission statements of any length composed of your own thoughts inside the post text field are mandatory for any microblog posts, and are optional but recommended for article/image/video posts.


Community Resources:


We are Android girls*,

In our Lemmy.world.

The back is plastic,

It's fantastic.

*Well, not just girls: people of all gender identities are welcomed here.


Our Partner Communities:

[email protected]


founded 1 year ago
MODERATORS
all 39 comments
sorted by: hot top controversial new old
[–] [email protected] 36 points 1 year ago* (last edited 1 year ago) (1 children)

Treating their users like idiots and more control. Why can’t this be editable but just under Developer Mode?

I’m just waiting for sideloading to be blocked due to “security.”

FFS, even iOS lets you install certificate profiles

[–] [email protected] 32 points 1 year ago* (last edited 11 months ago) (1 children)

[This comment has been deleted by an automated system]

[–] pimterry 12 points 1 year ago (2 children)

Previously any user could modify these certs directly, even on vanilla OS images from Google themselves, without installing Magisk or any tools at all, just by writing to disk. Right now, that's widely used and included in the setup guides for lots & lots of tools. All of that will start breaking for users when Android 14 arrives.

I totally agree it is possible to work around this restriction, but it's going to be significantly more complicated, and those changes will only be required because the OS used to let you read & write these files all by yourself, and now it doesn't.

I don't think Android should move further in a direction where it's impossible to directly control anything unless you install a 3rd party modification to the root daemon. That's not a good result. These are important settings and the OS itself should allow you to control them (behind reasonable safeguards & warnings, but still).

[–] [email protected] -3 points 1 year ago (1 children)

Wait, what tools, and why would they need you to modify existing certificates? That's super sketchy.

[–] pimterry 8 points 1 year ago

This is modifying system CA certs on your own device, with root access. There's plenty of examples in the article, but most commonly you'd want to add your own CAs so that you can intercept and inspect your own network traffic. There's a wide world of developer/researcher/reverse engineering tools that do exactly that, there's a demo here: https://httptoolkit.com/android/

It could plausibly be malicious, but it requires direct root access on the device, and if somebody has root access there's already far more malicious options available to them so it's not a meaningful threat in any sense.

[–] Telodzrum 31 points 1 year ago (1 children)

The headline reads like an ad for GrapheneOS and LineageOS.

[–] [email protected] 16 points 1 year ago (1 children)

Anything google does is an ad for grapheme and lineage tbh

[–] Telodzrum 9 points 1 year ago

Tough, but fair.

[–] [email protected] 24 points 1 year ago (2 children)

It's an interesting write up. But I don't think it's valid for one reason, company devices often require a company certificate to be fully trusted so that the company firewall can inspect all traffic transiting it.

So there must be a mechanism that allows corporately managed Android devices to adhere to corporate firewall policies.

Not just corporate, there's some countries that require you to install their certificate before you can use the internet.

[–] pimterry 15 points 1 year ago (3 children)

Fully managed corporate devices can do this, there's a separate mechanism for that: https://developers.google.com/android/work/requirements/fully-managed-device

This only works when the corporation fully manages the device though - not for normal work profiles. It's only possible to enable that setup when the device OS is initially installed, and the resulting device is controlled 100% by an IT administrator. It's not something you can do for your own device, and even for small companies it's quite complicated and expensive.

[–] deweydecibel 17 points 1 year ago* (last edited 1 year ago) (3 children)

This is exactly what's happening with Windows, too. Unless you're a business with an Enterprise version, control is being ripped away from you. We're getting to the place now where individuals are no longer permitted to be admins of their own devices unless they're corporations that pay for the privilege. I said it years ago when they took GroupPolicy out of Home edition: it was normalizing admin control as a premium feature, that one day average people will be priced out of.

Combine that with a lot of the other environment integrity/hardware attestation bullshit Google and Microsoft are pushing more and more, so that even if you do manage to wrangle admin control back from them, you can be prevented from participating in the larger internet ecosystem for having the audacity to do so. Even Linux won't be a meaningful retreat when the largest and most popular websites and apps collectively decide you have to use what is effectively a corporate approved kiosk to access them.

This shit should be illegal.

[–] [email protected] 6 points 1 year ago (1 children)

The day windows takes away my administrator power is the day I switch to Linux

[–] [email protected] 4 points 1 year ago (1 children)

Go uninstall Edge and get back to me.

You lost your admin privileges years ago.

[–] [email protected] 1 points 1 year ago (1 children)

You can uninstall it, it just breaks some things. Internet explorer was worse

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago) (1 children)

Not through any of the conventional means.

You've gotta find and manually take ownership of all its files then delete them all. You also have to remove it's updater service first (the same way) or it'll re-install itself immediately.

Even then, it'll re-install with system updates.

The only reason it breaks anything is several system services like the general help dialog and news+weather are permanently hard-coded to ignore the default browser setting and use Edge exclusively. There's no good reason for this.

[–] [email protected] 3 points 1 year ago

Yeah, it is rediculous that they do that and I'm surprised they haven't faced another antitrust suit for it.

[–] j4k3 3 points 1 year ago

This guide, in the third section at the bottom talks about using KeyTool to boot into UEFI and is how you get around this issue: https://wiki.gentoo.org/wiki/User:Sakaki/Sakaki%27s_EFI_Install_Guide/Configuring_Secure_Boot

Firmware bootkit vulnerabilities are one of the largest attack surfaces available right now. There are ways to deal with this, it is just added complexity. The intellectual barrier is becoming harder. Secure boot is important though.

[–] slazer2au 0 points 1 year ago

I don't think it should be illegal, there are people who are not technically capable and can give permissions when they shouldn't. I believe there should also be an an option where as a power user you are given those controls again because you have the technical understanding of what you are doing.

[–] sirfancy 4 points 1 year ago* (last edited 1 year ago) (2 children)

Correct me if I'm wrong, but I have a work profile with a cert authority installed in a work profile managed by Intune. If I update to Android 14, I'll lose this?

[–] pimterry 5 points 1 year ago (1 children)

Unless it's a fully managed device (different to a work profile - this has to be configured when the device first boots, it's for phones that are fully corporately owned & managed) then I think that has to be acting as a user-level CA certificate (trusted only by apps who opt in to trust it, which notably includes Chrome) not a system-level CA certificate (trusted by all apps by default). That will keep working just fine.

[–] sirfancy 4 points 1 year ago

Ah okay. I trust Microsoft to figure it out then. Thanks!

[–] [email protected] 4 points 1 year ago

I agree it's a pain in the butt. Using an open source MDM, EMM gives you the ability to configure your device your way.

https://github.com/h-mdm like this

It shouldn't be required though. Totally agreed.

[–] [email protected] 3 points 1 year ago (1 children)

I'd imagine in both cases you'd have to play nicely with google for them to push your certificates to the devices for you and/or give you tools to do so.

IE still available for those with power/money, but any regular citizen can go hump a cactus.

[–] [email protected] 4 points 1 year ago

There's far too many corporations out there for that to be the case. It would cost them far more in managing that controlled access than they could possibly gain from whatever control they're trying to exert here

[–] WhoRoger 14 points 1 year ago (1 children)

I kinda understand why they do this. Android has slowly been going the route to be only for dummies that shouldn't be able to touch anything. And most device makers are completely fine with it, evidently.

What's needed is a really decent alternative OS, or several, with widespread support across devices.

Yea there's Graphene, but in terms of devices, do you want this year's Google, last year's Google, or an overpriced recycled phone? And in terms of firmware the situation is even more difficult.

Even 10 years later I'm still mad at Firefox for letting go of their FF OS.

[–] Willdrick 4 points 1 year ago (1 children)

FirefoxOS lives on as KaiOS

[–] WhoRoger 4 points 1 year ago (1 children)

Yes but not really as a competitor to Android. Its survival just shows that it always was a viable system though, which makes it even worse that FF abandoned it.

[–] Willdrick 2 points 1 year ago

Agreed. I'm in the same way mad as how quickly Canonical dropped support for ubuntu touch. Still lives as ubports but its not enough, as much as I appreciate the community effort, these kinds of things need a company that can liason with manufacturers for widespread support.

[–] [email protected] 4 points 1 year ago (1 children)

I feel like 12 was probably the last decent one. Maybe even 11.

[–] scottywh 3 points 1 year ago

13 seems fine to me so far... Just upgraded to it yesterday though so maybe I'm missing something

[–] InvaderDJ 2 points 1 year ago (1 children)

Besides the listed examples from the article, what would be the impact for normal to even hobbyist root users? It seems like this is a good idea to prevent modification of legit certs and allowing certs to be updated remotely.

As touched on above: if you're configuring your own system CA certificates on Android right now for debugging, reverse engineering, testing or research, that option is going away in Android 14, and presumably all future versions too.

[–] Huhni 2 points 1 year ago (1 children)
[–] [email protected] 3 points 1 year ago (1 children)
[–] Huhni 1 points 1 year ago

I meant https filtering