- cross-posted to:
- [email protected]
- [email protected]
- [email protected]
- cross-posted to:
- [email protected]
- [email protected]
- [email protected]
cross-posted from: https://sh.itjust.works/post/26302348
cross-posted from: https://sh.itjust.works/post/26302348
Mostly fair, but I’ll push back on the security issue.
Side loading an apk is extremely dangerous, and an easy attack vector.
While there are plenty of malicious apps that make it on the Google store, they do attempt to do some automated and even manual curation. This is fact.
I think it’s wholly appropriate to warn the user that they’re bypassing that standard, if imperfect, Google security coverage. And granting extensive app permissions is done at your own risk.
3rd party app stores may do their own security curation as well, and it’s up to them to communicate that and educate their users on why they still get the Google warning.
You could make exactly the same argument for installing software onto your computer, it is an attack vector and going through microsoft’s store or your distro’s repos gives a level of curation. So should desktop users be prevented/scared off from installing what software they want because it’s a security issue?
You mean that warning that they all give when you’re installing a 3rd party app? And the warning is more aggressive when it’s an unregistered (licensed?) App.
They all do it. Windows, MacOS for sure. I don’t remember seeing it on Linux, but I’m usually not installing sketchy binaries on Linux.
If malicious apps can make it way to Play Store, this means it is not 100% safe and make it subject to the same security warnings is reasonable, and not give it exceptions and makes it like the only safe option.