this post was submitted on 27 Jun 2024
858 points (97.5% liked)

Technology

59219 readers
3235 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] dev_null@lemmy.ml 118 points 4 months ago (27 children)

I'm sure Temu collects all information you put into the app and your behaviour in it, but this guy is making some very bold claims about things that just aren't possible unless Temu is packing some serious 0-days.

For example he says the app is collecting your fingerprint data. How would that even happen? Apps don't have access to fingerprint data, because the operating system just reports to the app "a valid fingerprint was scanned" or "an unknown fingerprint was scanned", and the actual fingerprint never goes anywhere. Is Temu doing an undetected root/jailbreak, then installing custom drivers for the fingerprint sensor to change how it works?

And this is just one claim. It's just full of bullshit. To do everything listed there it would have to do multiple major exploits that are on state-actor level and wouldn't be wasted on such trivial purpose. Because now that's it's "revealed", Google and Apple would patch them immediately.

But there is nothing to patch, because most of the claims here are just bullshit, with no technical proof whatsoever.

[–] GenitalHurricane@lemmy.world 67 points 4 months ago (2 children)
[–] MajinBlayze@lemmy.world 72 points 4 months ago* (last edited 4 months ago) (2 children)

Here's the actual relevant part

These are security risks to be sure, and while these permissions are (mostly) on the surface, possibly defensible, together they do clearly represent an app trying to gather all of the data that it can.

However, a lot of info from this report is overblown. For example code compilation is sketchy to be sure, but without a privilege escalation attack, it can't do anything the app couldn't do with an update.

Also, there's some weird language in the report, like counting the green security issues in other apps (like tiktok) as if they were also a problem, despite the image showing that green here means it doesn't present that particular risk.

All of this to say, if you have temu, probably uninstall it. It's clearly collecting all the data it can get.

But it's unlikely to be the immediate threat that will have China taking over your phone like this report implies.

[–] lemann@lemmy.dbzer0.com 11 points 4 months ago (2 children)

This infographic is really helpful. Stuff like this makes me relieved I use the majority of services in a browser, rather than native apps

[–] protist@mander.xyz 15 points 4 months ago

I'm blown away by how many people use apps when they don't have to. There's a reason companies are always trying to get you to download their app, and it's so they can put their software on your phone and harvest more of your data.

[–] A_Random_Idiot@lemmy.world 9 points 4 months ago (2 children)

Exactly why I use browser and not apps, too. and if they try to strongarm me with better prices or degraded services, I just stop using them all together.

[–] Shyfer@ttrpg.network 3 points 4 months ago* (last edited 4 months ago)

It's why I stopped using Reddit on mobile lol. No, I don't want to download your official app, and no you making it so I need it to access NSFW stuff will convince me to.

Same with X/Twitter. I hate when people put information in those now because you can't read more than one at a time in some reply to self thread on there without downloading the app. Especially when it's important news or on the ground reporting. Screw that. All those reporters need to use mastadon.

[–] aStonedSanta@lemm.ee 3 points 4 months ago

Yup. I used to watch TikTok’s sent to me. Now I can’t. They want me to use their app. LOL. Nah.

[–] flambonkscious@sh.itjust.works 3 points 4 months ago

Thanks, that brings done useful context here

[–] freeman@sh.itjust.works 18 points 4 months ago

That.. is not a study by anyone who knows what they are talking about. It also does not mention fingerprints at all.

They seem to believe that the app can use permissions undeclared in the manifest file because they obviously think it's only for the store to show the permissions to the user. Android will not actually allow an app to use undeclared permissions. The most rational explanation is the codebase is shared with different version of the app (possibly not released) that had different manifests.

It also makes a big deal of checking if running as root. That is not evidence of having an escalation exploit. If they have an ability to get root before running the app why would they need to use the app to exploit it? They could just do whatever they wanted and avoid leaving traces in the app. Though I doubt they would root phones to just brick them. It's the kind of mischief you would expect from a kid writing viruses, not an intelligence agency or criminal enterprise.

Users who root their own phones are very unlikely to run temu as root. In fact a lot of apps related to shopping or banking try to detect root to refuse to work as your system is unsafely. In any case it's a very niche group to target.

To keep things short, that 'study' does not really look credible or written by actual experts.

load more comments (24 replies)