{"id":11182,"date":"2018-01-21T10:45:11","date_gmt":"2018-01-21T18:45:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/01\/21\/news-4953\/"},"modified":"2018-01-21T10:45:11","modified_gmt":"2018-01-21T18:45:11","slug":"news-4953","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/01\/21\/news-4953\/","title":{"rendered":"Want to Avoid Malware on Your Android Phone? Try the F-Droid App Store"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a5920355451ae3d197fcf50\/master\/pass\/googleplay_spying-01.png\"\/><\/p>\n<p><strong>Credit to Author: Sean O&#8217;Brien| Date: Sun, 21 Jan 2018 13:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">In the early <\/span>days of <a href=\"https:\/\/www.wired.com\/tag\/android\">Android<\/a>, co-founder <a href=\"https:\/\/www.wired.com\/tag\/andy-rubin\">Andy Rubin<\/a> <a href=\"https:\/\/link.springer.com\/content\/pdf\/10.1007%2F978-1-4302-6131-5_1.pdf\" target=\"_blank\">set the stage<\/a> for the fledgling mobile operating system. Android\u2019s mission was to create smarter mobile devices, ones that were more aware of their owner\u2019s behavior and location.\u201cIf people are smart,\u201d Rubin <a href=\"https:\/\/web.archive.org\/web\/20110205190729\/http:\/\/www.businessweek.com\/technology\/content\/aug2005\/tc20050817_0949_tc024.htm\" target=\"_blank\">told <em>Business Week<\/em><\/a> in 2003, \u201cthat information starts getting aggregated into consumer products.\u201d A decade and a half later, that goal has become a reality: Android-powered gadgets are in the hands of billions and are loaded with software shipped by Google, the world\u2019s largest ad broker.<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Sean O\u2019Brien and Michael Kwet are visiting fellows at Privacy Lab (<a href=\"https:\/\/www.twitter.com\/YalePrivacyLab\" target=\"_blank\">@YalePrivacyLab<\/a>), an initiative of the Information Society Project at Yale Law School. <a href=\"https:\/\/privacylab.yale.edu\/directory\" target=\"_blank\">Contact them<\/a> securely.<\/p>\n<p>Our work at Yale Privacy Lab, made possible by Exodus Privacy\u2019s app <a href=\"https:\/\/exodus-privacy.eu.org\/\" target=\"_blank\">scanning software<\/a>, revealed a huge problem with the Android app ecosystem. Google Play is filled with <a href=\"https:\/\/www.wired.com\/story\/android-tracks-location-even-when-you-ask-it-not-to\/\">hidden trackers<\/a> that siphon a sm\u00f6rg\u00e5sbord of data from all sensors, in all directions, unknown to the Android user.<\/p>\n<p>As the profiles <a href=\"https:\/\/github.com\/YalePrivacyLab\/tracker-profiles\" target=\"_blank\">we&#x27;ve published<\/a> about trackers reveal, apps in the Google Play store share a wide variety of data with advertisers, in creative and nuanced ways. These methods can be as <a href=\"https:\/\/www.nytimes.com\/2017\/12\/28\/business\/media\/alphonso-app-tracking.html\" target=\"_blank\">invasive<\/a> as ultrasonic tracking via TV speakers and microphones. Piles of information are being harvested via labyrinthine channels, with a heavy focus on retail marketing. This was the plan all along, wasn\u2019t it? The smart mobile devices that comprise the Android ecosystem are <a href=\"http:\/\/www.businessinsider.com\/googles-new-advertising-id-is-now-live-and-tracking-new-android-phonesthis-is-what-it-looks-like-2014-1\" target=\"_blank\">designed to spy on users<\/a>.<\/p>\n<p>One week after our work was published and the Exodus scanner <a href=\"http:\/\/www.lemonde.fr\/pixels\/article\/2017\/11\/24\/des-mouchards-caches-dans-vos-applications-pour-smartphones_5219892_4408996.html\" target=\"_blank\">was announced<\/a>, Google <a href=\"https:\/\/security.googleblog.com\/2017\/12\/additional-protections-by-safe-browsing.html\" target=\"_blank\">said<\/a> it would expand its Unwanted Software Policy and implement click-through warnings in Android.<\/p>\n<p>But this move does nothing to fix fundamental flaws in Google Play. A polluted ocean of apps is plaguing Android, an operating system built upon Free and Open-Source Software (FOSS) but now barely resembling those venerable roots. Today, the average Android device is not only susceptible to malware and trackers, it\u2019s also heavily locked down and loaded with proprietary components\u2014characteristics that are hardly the calling cards of the FOSS movement.<\/p>\n<p>Though Android bears the moniker of open-source, the chain of trust between developers, distributors, and end-users is broken.<\/p>\n<p>Google\u2019s defective privacy and security controls have been made painfully real by a <a href=\"https:\/\/qz.com\/1131515\/google-collects-android-users-locations-even-when-location-services-are-disabled\/\" target=\"_blank\">recent investigation<\/a> into location tracking, <a href=\"https:\/\/www.wired.com\/story\/google-play-store-malware\/\">massive outbreaks<\/a> of malware, <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/11\/drive-by-cryptomining-that-drains-cpus-picks-up-steam-with-aid-of-2500-sites\/\" target=\"_blank\">unwanted cryptomining<\/a>, and our work on hidden trackers.<\/p>\n<p>It didn\u2019t have to be this way. When Android was declared Google\u2019s answer to the iPhone, there was palpable excitement across the Internet. Android was ostensibly based on GNU\/Linux, the culmination of decades of hacker ingenuity meant to replace proprietary, locked-down software. Hackers worldwide hoped that Android would be a FOSS champion in the mobile arena. FOSS is the gold-standard for security, building that reputation over the decades because of its <a href=\"https:\/\/www.schneier.com\/crypto-gram\/archives\/1999\/0915.html#OpenSourceandSecurity\" target=\"_blank\">fundamental transparency<\/a>.<\/p>\n<p>As Android builds rolled out, however, it became clear that Rubin\u2019s baby contained very little GNU, a vital anchor that keeps GNU\/Linux operating systems transparent via a licensing strategy called <a href=\"https:\/\/www.gnu.org\/licenses\/copyleft.html\" target=\"_blank\">copyleft<\/a>, which requires modifications to be made available to end-users and prohibits proprietary derivatives. Such proprietary components can contain all kinds of nasty \u201cfeatures\u201d that tread upon user privacy.<\/p>\n<p>As a 2016 Ars Technica story <a href=\"https:\/\/arstechnica.com\/tech-policy\/2016\/05\/top-programmer-describes-androids-nuts-and-bolts-in-oracle-v-google\/\" target=\"_blank\">made clear<\/a>, there were directives inside Google to avoid copyleft code\u2014except for the Linux kernel, which the company could not do without. Google preferred to bootstrap so-called permissively licensed code on top of Linux instead. Such code may be locked down and doesn\u2019t require developers to disclose their modifications\u2014or any of the source code for that matter.<\/p>\n<p>Google\u2019s choice to <a href=\"https:\/\/arstechnica.com\/uncategorized\/2007\/11\/why-google-chose-the-apache-software-license-over-gplv2\/\" target=\"_blank\">limit<\/a> copyleft\u2019s presence in Android, its <a href=\"https:\/\/www.techrepublic.com\/article\/google-open-source-lets-us-control-our-destiny\/\" target=\"_blank\">disdain<\/a> for reciprocal licenses, and its begrudging use of copyleft only when it <a href=\"http:\/\/www.internetnews.com\/dev-news\/article.php\/3668556\/GPL+v3+Not+a+Concern+For+Google.htm\" target=\"_blank\">\u201cmade sense to do so\u201d<\/a> are just symptoms of a deeper problem. In an environment without sufficient transparency, malware and trackers can thrive.<\/p>\n<p>Android\u2019s privacy and security woes are amplified by cellphone companies and hardware vendors, which bolt on dodgy Android apps and hardware drivers. Sure, most of Android is still open-source, but the door is wide open to all manners of software trickery you won\u2019t find in an operating system like Debian GNU\/Linux, which goes to great length to audit its software packages and protect user security.<\/p>\n<p><a href=\"http:\/\/www.beneaththewaves.net\/Projects\/Motorola_Is_Listening.html\" target=\"_blank\">Surveillance<\/a> is not only a <a href=\"http:\/\/androidsecuritytest.com\/features\/logs-and-services\/loggers\/carrieriq\/\" target=\"_blank\">recurring problem<\/a> on Android devices; it is <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2013\/11\/surveillance_as_1.html\" target=\"_blank\">encouraged by Google<\/a> through its own <a href=\"https:\/\/github.com\/YalePrivacyLab\/tracker-profiles\/blob\/master\/trackers\/DoubleClick%20(Google).md\" target=\"_blank\">ad services<\/a> and developer tools. The company is a gatekeeper that not only makes it easy for app developers to insert tracker code, but also develops its own trackers and cloud infrastructure. Such an ecosystem is toxic for user privacy and security, whatever the results are for app developers and ad brokers.<\/p>\n<p>Apple is currently under fire for its own lack of software transparency, admitting it had <a href=\"https:\/\/www.wired.com\/story\/apple-iphone-battery-slow-down\/\">slowed down<\/a> older iPhones. And iOS users should not breathe a sigh of relief in regard to hidden trackers, either. As we at Yale Privacy Lab noted <a href=\"http:\/\/privacylab.yale.edu\/trackers\" target=\"_blank\">in November<\/a>: &quot;Many of the same companies distributing Google Play apps also distribute apps via Apple, and tracker companies openly advertise Software Development Kits compatible with multiple platforms. Thus, advertising trackers may be concurrently packaged for Android and iOS, as well as more obscure mobile platforms.\u201d<\/p>\n<p>Transparency in software development and delivery leads to better security and privacy protection. Not only is auditable source code a requirement (thought not a guarantee) for security, but a clear and open process allows users to evaluate the trustworthiness of their software. Moreover, this clarity enables the security community to take a good, hard look at software and find any noxious or insecure components that may be hidden within.<\/p>\n<p>The trackers we\u2019ve found in Google Play are just one aspect of the problem, though they are shockingly pervasive. Google does screen apps during Google Play\u2019s app submission process, but researchers are regularly finding <a href=\"http:\/\/www.zdnet.com\/article\/this-android-malware-wants-to-steal-your-facebook-login-and-bombard-you-with-ads\/\" target=\"_blank\">scary new malware<\/a> and there are no barriers to publishing an app <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.facegrok\" target=\"_blank\">filled with trackers<\/a>.<\/p>\n<p>Yale Privacy Lab is now collaborating with Exodus Privacy to detect and expose trackers with the help of the <a href=\"https:\/\/f-droid.org\/en\/2017\/12\/14\/new-collaborations-on-exposing-tracking.html\" target=\"_blank\">F-Droid app store<\/a>. F-Droid is the best replacement for Google Play, because it only offers FOSS apps without tracking, has a strict auditing process, and may be installed on most Android devices without any hassles or restrictions. F-Droid doesn&#x27;t offer the millions of apps available in Google Play, so some people will not want to use it exclusively.<\/p>\n<p>It\u2019s true that Google does screen apps submitted to the Play store to filter out malware, but the process is still mostly automated and very quick\u2014 too quick to detect Android malware before it&#x27;s published, as we&#x27;ve seen.<\/p>\n<p>Installing F-Droid isn\u2019t a silver bullet, but it\u2019s the first step in protecting yourself from malware. With this small change, you\u2019ll even have bragging rights with your friends with iPhones, who are limited to Apple\u2019s <a href=\"https:\/\/medium.com\/@johnnylin\/how-to-make-80-000-per-month-on-the-apple-app-store-bdb943862e88\" target=\"_blank\">App Store<\/a> unless they jailbreak their phones.<\/p>\n<p>But why debate iPhone vs. Android, Apple vs. Google, anyway? Your privacy and security are massively more important than brand allegiance. Let\u2019s debate digital freedom and servitude, free and unfree, private and spied-upon.<\/p>\n<p>WIRED Opinion <em>publishes pieces written by outside contributors and represents a wide range of viewpoints. Read more opinions <a href=\"https:\/\/www.wired.com\/opinion\">here<\/a>.<\/em><\/p>\n<p><strong>More on Android, Malware, and Copyright<\/strong><\/p>\n<p class=\"related-cne-video-component__dek\">You Can&#39;t Buy a Better Android Phone Than the Pixel 2. In almost every way, the Pixel 2 is the iPhone of Android phones. And that&#39;s a compliment.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/android-users-to-avoid-malware-ditch-googles-app-store\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5a5920355451ae3d197fcf50\/master\/pass\/googleplay_spying-01.png\"\/><\/p>\n<p><strong>Credit to Author: Sean O&#8217;Brien| Date: Sun, 21 Jan 2018 13:00:00 +0000<\/strong><\/p>\n<p>Opinion: Researchers from Yale Privacy Lab argue that the scourge of trackers in Android apps means users should stop using the Google Play store.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[234,714],"class_list":["post-11182","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-opinion","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11182"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11182\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11182"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}