Android
The new home of /r/Android on Lemmy and the Fediverse!
Android news, reviews, tips, and discussions about rooting, tutorials, and apps.
πUniversal Link: !android@lemdro.id
π‘Content Philosophy:
Content which benefits the community (news, rumours, and discussions) is generally allowed and is valued over content which benefits only the individual (technical questions, help buying/selling, rants, self-promotion, etc.) which will be removed if it's in violation of the rules.
Support, technical, or app related questions belong in: !askandroid@lemdro.id
For fresh communities, lemmy apps, and instance updates: !lemdroid@lemdro.id
π¬Matrix Chat
π°Our communities below
Rules
-
Stay on topic: All posts should be related to the Android OS or ecosystem.
-
No support questions, recommendation requests, rants, or bug reports: Posts must benefit the community rather than the individual. Please post to !askandroid@lemdro.id.
-
Describe images/videos, no memes: Please include a text description when sharing images or videos. Post memes to !androidmemes@lemdro.id.
-
No self-promotion spam: Active community members can post their apps if they answer any questions in the comments. Please do not post links to your own website, YouTube, blog content, or communities.
-
No reposts or rehosted content: Share only the original source of an article, unless it's not available in English or requires logging in (like Twitter). Avoid reposting the same topic from other sources.
-
No editorializing titles: You can add the author or website's name if helpful, but keep article titles unchanged.
-
No piracy or unverified APKs: Do not share links or direct people to pirated content or unverified APKs, which may contain malicious code.
-
No unauthorized polls, bots, or giveaways: Do not create polls, use bots, or organize giveaways without first contacting mods for approval.
-
No offensive or low-effort content: Don't post offensive or unhelpful content. Keep it civil and friendly!
-
No affiliate links: Posting affiliate links is not allowed.
Quick Links
Our Communities
- !askandroid@lemdro.id
- !androidmemes@lemdro.id
- !techkit@lemdro.id
- !google@lemdro.id
- !nothing@lemdro.id
- !googlepixel@lemdro.id
- !xiaomi@lemdro.id
- !sony@lemdro.id
- !samsung@lemdro.id
- !galaxywatch@lemdro.id
- !oneplus@lemdro.id
- !motorola@lemdro.id
- !meta@lemdro.id
- !apple@lemdro.id
- !microsoft@lemdro.id
- !chatgpt@lemdro.id
- !bing@lemdro.id
- !reddit@lemdro.id
Lemmy App List
Chat and More
view the rest of the comments
This doesn't seem super safe from a security standpoint. Can anyone comment on safety?
Yeah fdroid is vastly preferred over this because you can be sure that the source code provided actually produces the executable.
F-Droid installs an APK that F-Droid compiled. Obtainium installs an APK that the app developer themselves compiled. I'm not sure what you're getting at.
Malicious APKs, built by the developer themselves, not matching their public source code.
Which developer?
E: Lol @ the ninja edit.
That's hardly a meaningful advantage for f-droid and the whole man in the middle risk you're exposing yourself to there. If you don't trust the developer to do the bare minimum of providing a release that matches source then why are you even installing their app? Satyr's response about developers getting compromised has way more weight in that conversation, but still falls short IMO.
Making sure the apk matches public source and running it through VT aren't going to catch a malicious apk that has the nasty bits buried in various commits but checks out in VT and matches the public source code. Sure, it'll burn them as a developer if/when they get caught, but how often does the community truly do code reviews on one-off Android apps? Not often enough to catch that kinda thing before it spreads without getting insanely lucky.
If you think about it, any developer could have their account hacked and the attacker upload an APK that includes malware. Obtainium isn't doing any malware scan or building from source or anything. If you are planning to just install from GitHub anyway, Obtainium should be a no-brainer. But I can see where might argue that having a middleman like F-Droid to validate APK integrity has some merits.
https://f-droid.org/docs/Security_Model/
https://f-droid.org/docs/Reproducible_Builds/
https://apt.izzysoft.de/fdroid/index/info#security
Fair point. I guess it boils down to if you prefer speed of update (obtainium) or the extra checks f-droid has in place and if you continue to trust that f-droid's stuff doesn't get compromised.
It's also worth mentioning f-droid's workflow far from guarantees there's nothing nefarious in a package. The bar looks to be passing virus total and then ensuring the provided apk matches source. If nobody reviews the source each time then every release could be the one that gets a nasty surprise.
I disagree. Using F-Droid introduces another party and middle man that you have to trust, in addition to a single point of failure. Any checks that F-Droid does is very basic and they have said themselves that they can't ensure apps are safe.
https://privsec.dev/posts/android/f-droid-security-issues/
Am I missing something? In my experience using Obtainium it pulls apks from sources I tell it to, usually the developers git releases and even sometimes f-droid repos. This app doesn't compile anything.
The main benefit is watching for updates directly from developers which, again in my experience, has been quicker than waiting on f-droid. You could even have it do just the notification and you can manually go download and install if you're the cautious.
The developer(s) could slip something nefarious in easily. We're putting all our faith into developers that could be anybody
The developer of obtainium or the packages we're installing? I'll assume the former. If you're skeptical about obtainium you could still use it as a source to monitor && notify and then do your install manually.
No, the developers of the apps you are installing through obtainium.
How does f-droid solve this problem? From my understanding they confirm that the
.apk
provided by the dev matches what compiles from source and run it through Virus Total. Those are trivial steps for a malicious dev to take to slip in something nefarious.At that point you're relying on the community to check every commit for nefarious code $x. Not to mention they could simply build up community trust for some time before slipping in the code, since they'd effectively be burned once (if?) their very first shady code commit is found.
I can't imagine f-droid would go on the hook and say everything they build is also code reviewed for malicious stuff, right?
They don't just confirm it, the apk you download from fdroid is compiled by them from the source code. And sure, they're not reviewing all the source code for all apps they build, but it's still one added layer of security.
The apk isn't always what f-droid compiles. There's two scenarios where they publish the apk signed by the developer.
https://f-droid.org/docs/Reproducible_Builds/
It's one added layer of security to you, but to others it's a man in the middle that could be an extra attack vector.
If you don't trust the dev to put out an apk that's compiled from their public source why are you trusting any of your data with them?
I disagree. Using F-Droid introduces another party and middle man that you have to trust, in addition to a single point of failure. Any checks that F-Droid does is very basic and they have said themselves that they can't ensure apps are safe.
https://privsec.dev/posts/android/f-droid-security-issues/
What's your concern exactly? That they'll install malicious apps on your phone?