"Sideloading" is the rentseeker word for "being able to run software of your choosing on a computing device you purchased". There is no reasonable case for an operating system developer having a say over what programs you run on your hardware.

#Android #Google

in reply to Eugen Rochko

I agree in spirit, but man... Its only 50% rentseeking... My elderly parents and computer illiterate siblings and coworkers would get in trouble fast if they weren't constrained by 3 software platforms: mint software manager, android play, and MS whatchamacallit. I have pounded it into their heads: never download software candy from strangers. (I live in an anti-apple pocket of the world)

But then, i guess all three of those do let you do your own thing to varying degrees.

Kevin Karhan reshared this.

in reply to AdventureTense

@adventure_tense My best friend migrated his parents to Linux (20 y ago). The separation of admin and user accounts actually worked, software did not assume you were admin all the time, and he could let his parents only install software from trusted repositories. There is absolutely a case to be made for locking down the system. Don't forget, this is a pretty technically minded echo chamber we are in, what works for us is bad for others.
But I agree: It should be possible to do stuff!
in reply to Kevin Karhan

@kkarhan @drchaos @adventure_tense
I only know how it works on GrapheneOS, currently.
It doesn't ask credentials for me upon install. It just wants me to allow alternative app stores or the Files app (for downloaded APK files) as an installation source for "unknown apps". It also asks that for the Play Store, given that that is a third-party optional app on GrapheneOS.
The "install unknown apps from source" permission doesn't have anything to do with who signed the app, just seems to have to do with the fact that it's not a bundled/default app installer like GrapheneOS App Store is on GrapheneOS.
in reply to AdventureTense

This is about a platform mandating DRM, to control/manipulate revenue streams.

I think Google (and Apple) are fully capable to manage platform security without gatekeeping access to our devices. They could improve OS immutability, or better admin rights without root privileges.

As irritating as they can be, even the banks have developed secure financial platforms that still allow us to purchase WHAT we want, from WHO we want.

#OpenSource #NoDRM #DeGoogle #GrapheneOS #DeApple #AOSP

This entry was edited (4 months ago)
in reply to Eugen Rochko

Imagine buying something from a local store instead of amazon was called "sideshopping" and there's a massive campaign to delegitimize buying items from stores not approved by amazon. Completely absurd. Why accept that exact ideology when it comes to installing software on your phone?
in reply to Eugen Rochko

the review process at Google can be a PITA, but for a good reason. Permissions to access more than an app really needs can be exploited for harvesting private information on a seemless update that most won't even notice. Side loaded apps downloaded from say APK mirror can have been tampered with using smali edits and you won't know. What Google should do is certified dev signing keys to trace and confirm if an APK is legit or not and coming from the actual dev, regardless of being side loaded.
in reply to Chickerino

@Chickerino that's not true, you do need to raise admin rights to install something not digitally signed on Windows, and admin credentials to install on Linux. On Linux you have Flatpaks that do have permissions in place, and the software runs on a sandbox with only access to what you allow. Windows does not do any of that - hence I'm not gonna even recommend it.
in reply to Chickerino

@Chickerino yes 😅 btw Google is doing exactly what I said: verification of dev certificate on the .APK allowing you to side load authentic apps. Only unverified .APK are blocked arstechnica.com/gadgets/2025/0…
in reply to Billie

@Billie we are talking about Google Certified devices here. Google is the root trust CA, and as a developer that wants to publish on the Play Store, you want people not to be able to side load malicious versions of your app. That's what this is about. If you put your own ROM, without GMS, nothing stops you from side loaded apks. It is the same for iPhones. This will affect and prevent the spread of malicious and randonsomware that scammers use.
in reply to JuMi

@jumianr @Chickerino I understand this. But we are a minority who want to tinker. For Google, the priority is to protect the large majority of Android users from installing apps that are not legitimately packaged by developers who did publish their app on the Play Store. Developers will be able to install their own apps on their devices if developer mode is enabled and via ADB. And a user will be able to adb install an app if compiled with debug keys. The thing here are release keys, which need to match the play store version of legit apps. This also attempts to prevent repackaging of apps with malware. This is the same on Apple devices. I think people are overreacting to be honest. EU also dictated alternative play stores are possible and pretty sure Google will not be able to enforce Play Store only verified apps to install.
in reply to Denzil Ferreira

@denzilferreira @jumianr this is not a reasonable excuse to remove the freedom that users have to install whatever they want, i would be ok with this if and only if the user was given a clear warning before installing an application and given a choice to do so anyway

besides, apps on android are sandboxed, the damage they can cause (notwithstanding any security vulnerabilities) is limited to the permissions that the user gives, if theres any place this would make sense, i dont think its android, especially considering that mallicious apps or just data stealing apps are very common place on the play store anyway

in reply to Denzil Ferreira

@denzilferreira
You can still run (potentially malicious) software without installing it. Lots of portable software out there on windows, AppImages or statically compiled binaries on Linux, etc. And you don't need admin permissions to ransom the user's documents, run a cryptominer, change the user's browser settings, adding itself to the user's startup applications, etc.
@Chickerino @Gargron
in reply to Kitlith

@denzilferreira @Chickerino @kitlith espechally with all the #JavaScript bullshit and #Browser #permissions...

  • #NSAbook literally spun up local #webservers on mobile devices to have persistent, cross-app - tracking functionality that breaks out of sandobxing even on #iOS!
in reply to Denzil Ferreira

@denzilferreira @Chickerino on both windows and linux no additional permission is needed to install to a users home directory or simply run without installing. The permission model on both operating systems is more geared towards preventing the system configuration from getting messed up than preventing anything remotely malicious.
in reply to Denzil Ferreira

@denzilferreira
Except that, it doesn't prevent malware. Note that this news article is from today. I went to find the most recent example of this and it turns out that I didn't even have to go back as far as yesterday.

Proper safety is done by reducing kernel attack surface, reducing the size of the TCB, and making it easy for applications to respect the principle of least privilege so that ones that don't stand out as things that obviously request more permissions than they should have.

in reply to Denzil Ferreira

@david_chisnall @denzilferreira in fact all #malware that gets into #GooglePlay works with lies and deciet as in the original account and code submitted is all clean and onlynafterwards do they slowly "update" maliciois functionality.

in reply to Elric

Unknown parent

mastodon - Link to source

Jake

@zeri yeah, that’s the stupidest court ruling ever. ignoring the fact that the modern internet is intolerable without an adblocker, that ruling’s “logic”, if applied to other things, would mean that using inspect element is a copyright violation, or using tracker blockers is a copyright violation, or cutting ads out of a newspaper with scissors is a copyright violation. it’s just absurd
in reply to Eugen Rochko

I'd argue there's a critical reason besides rent-seeking: security.

It's a genuine conflict between user rights and the need to protect the average person. Phones hold our banking apps, 2FA tokens, mics, cameras, and countless secrets.

When a sideloaded app steals data, the user doesn't say, "My sideloaded app failed." They say, "My Android/iPhone got hacked." The OS developer takes the blame.

Android's approach—allowing it, but behind a clear security warning—seems like a decent compromise in this difficult balancing act.

in reply to Navi

@navi OK, now I get it.
In original comment I didn't saw info about this announcement from yesterday (android-developers.googleblog.…)

Seeing this proposition it seems more scary.
First for folks from Brazil, Indonesia, Singapore, and Thailand, rest of the world is more complicated.
Interesting if in Brazil, Indonesia, Singapore and Thailand this will become legal requirement.

Here it is more than security, I would say that hampering user owners rights isn't biggest issue, but this seems as a way to limit free speech. Because Google may be informed by government of some country that they forbid app like Signal, so Google should not allow signing of Signal.
Still if there will be legal requirement they will need to do it. So it may be first step in killing cryptography.

@Navi
in reply to Eugen Rochko

I agree: if someone buys a "computer" or a general purpose device, your point certainly holds.

But on the other side of a fine line I imagine (perhaps older) game consoles: when the original Nintendo came out, that company was not expected to help you run Atari software on their hardware.

They'd not prevent it - if you could figure out it, good on you. But Nintendo shouldn't be expected to make that work.

Not-supporting versus actively-preventing is the key difference for me.

This entry was edited (4 months ago)
in reply to Eugen Rochko

As someone who developed operating systems for 50 years I know that there are reasonable cases; but, as none are relevant to Google’s latest behavior, I will not elaborate.

Since a mobile device is mostly a general purpose system you should be able to run any software that doesn’t violate laws and it’s not the OS vendor’s responsibility to enforce laws except those regulating the radios in the device.

in reply to Eugen Rochko

It is known that sideloading is a real risk for most of Android users*

*The bad guy comes to your home, enable ADB debug, you let him connect your phone, you give him your pin, you let him few moment to load a naughty apk (bring coffees) and VOILÀ ! 🔥

BTW I had today to clean a fully stock up to date Android (you even can install bank app on) because of a "legit" Play Store bloatware setup'd lots of other adware apks 👍

in reply to Eugen Rochko

This list of replies is a hilarious string of people pretending that they’ve never looked at someone’s Windows machine *so completely fucked up with malware and viruses that the owner just blithely clicked on and installed* that the only solution was to nuke it from space and *buy a whole new computer*

For a good fifteen years the number one reason for tossing perfectly good hardware and buying a newer Win PC was virus/malware infestation. Might still be, I have no idea.

This entry was edited (4 months ago)
in reply to Eugen Rochko

Especially as this newest move of Google is redundant: play protect is already built in all Google play services using phones.

It already flashed and remains suspicious Appa and known malware from all sources.

So how exactly is locking down the signing keys for apps that are allowed to run at all and connecting them with government ID for developers helping security?

This purely an anticompetitive measure.