0 votes
by (180 points)

Android 9 is the oldest Android version that is getting security updates. It's worth mentioning that their webpage has (for some purpose) always been hosting an outdated APK of F-Droid, and this remains to be the case at the moment, leading to many users questioning why they can’t set up F-Droid on their secondary consumer profile (because of the downgrade prevention enforced by Android). "Stability" appears to be the main reason mentioned on their part, which doesn’t make sense: both your version isn’t ready to be published in a stable channel, or it's and new users ought to be capable of access it simply. There's little sensible purpose for builders not to increase the goal SDK version (targetSdkVersion) together with each Android launch. They'd this vision of each object in the computer being represented as a shell object, so there could be a seamless intermix between recordsdata, paperwork, system parts, you name it. Building and signing whereas reusing the package title (application ID) is bad follow because it causes signature verification errors when some customers attempt to replace/set up these apps from other sources, even directly from the developer. F-Droid ought to enforce the method of prefixing the bundle name of their alternate builds with org.f-droid for instance (or add a .fdroid suffix as some have already got).<<br>br>

As a matter of reality, the new unattended update API added in API level 31 (Android 12) that permits seamless app updates for app repositories with out privileged access to the system (such an strategy is just not appropriate with the safety model) won’t work with F-Droid "as is". It seems the official F-Droid shopper doesn’t care a lot about this since it lags behind fairly a bit, concentrating on the API level 25 (Android 7.1) of which some SELinux exceptions had been shown above. While some improvements may simply be made, I don’t think F-Droid is in a super situation to unravel all of these issues because some of them are inherent flaws of their structure. While showing a listing of low-degree permissions could possibly be helpful info for a developer, it’s usually a misleading and inaccurate method for the top-user. This just appears to be an over-engineered and flawed strategy since better suited tools resembling signify could possibly be used to sign the metadata JSON. Ideally, F-Droid should totally transfer on to newer signature schemes, and will fully phase out the legacy signature schemes that are nonetheless being used for some apps and metadata. On that observe, additionally it is worth noting the repository metadata format isn’t correctly signed by missing whole-file signing and key rotat


This page summarises key paperwork referring to the oversight framework for the performance of the IANA features. This permission record can solely be accessed by taping "About this app" then "App permissions - See more" at the bottom of the page. To be honest, these brief summaries used to be provided by the Android documentation years in the past, but the permission model has drastically developed since then and most of them aren’t correct anymore. Kanhai Jewels worked for years to cultivate the rich collections of such beautiful conventional jewellery. Because of this philosophy, the principle repository of F-Droid is full of out of date apps from one other era, https://youtu.be just for these apps to have the ability to run on the more than ten years previous Android 4.0 Ice Cream Sandwich. In brief, F-Droid downplayed the issue with their deceptive permission labels, and their lead developer proceeded to call the Android permission model a "dumpster fire" and claim that the working system cannot sandbox untrusted apps whereas nonetheless remaining useful. While these shoppers is perhaps technically higher, they’re poorly maintained for some, and in addition they introduce yet one more social gathering to the
o.


Backward compatibility is commonly the enemy of security, and while there’s a center-ground for comfort and obsolescence, it shouldn’t be exaggerated. Some low-degree permissions don’t even have a security/privacy influence and shouldn’t be misinterpreted as having one. Since Android 6, apps need to request the standard permissions at runtime and do not get them just by being installed, so exhibiting all the "under the hood" permissions without correct context is just not helpful and makes the permission model unnecessarily confusing. Play Store will tell the app may request entry to the next permissions: this sort of wording is more essential than it seems. After that, Glamour can have the identical earnings development as Smokestack, earning $7.40/share. This is a mere pattern of the SELinux exceptions that should be made on older API levels so that you can understand why it issues. On Android, a higher SDK stage means you’ll be ready to make use of trendy API levels of which every iteration brings safety and privacy improvements.

Your answer

Your name to display (optional):
Privacy: Your email address will only be used for sending these notifications.
Welcome to GWBS FAQ, where you can ask questions and receive answers from other members of the community.
...