- cross-posted to:
- google@lemmy.world
- googlepixel@lemmy.world
- cross-posted to:
- google@lemmy.world
- googlepixel@lemmy.world
The story isn’t nearly as dramatic as it seems. Maybe this thread can offer some nuance: https://grapheneos.social/@GrapheneOS/112967309987371034
Thanks for sharing!
The issue relates to a software package called “Showcase.apk” that runs at the system level and lurks invisible to users. The application was developed by the enterprise software company Smith Micro for Verizon as a mechanism for putting phones into a retail store demo mode—it is not Google software. Yet for years, it has been in each Android release for Pixel and has deep system privileges, including remote code execution and remote software installation. Even riskier, the application is designed to download a configuration file over an unencrypted HTTP web connection that iVerify researchers say could be hijacked by an attacker to take control of the application and then the entire victim device.
“flaw”
any idea if de-google phones have this “feature”
The app isn’t enabled by default so stock Pixels aren’t even vulnerable without physical access to an unlocked device.
I couldn’t find the APK on my pixel 5 running lineage so I think only stock-based roms should be affected. I checked using an APK extractor app that lists all system apps including things like 3 button navigation bar.
GrapheneOS doesn’t include this, along with many other unnecessary carrier apps
Kind of a nothing burger
All these updates and they let this get by. That’s pretty ridiculous.
Don’t let this misleading Wired article fearmonger you. I recommend this thread, which provides some nuance to this drama: https://grapheneos.social/@GrapheneOS/112967805820394815
Many thanks. I’ll check it out.