this post was submitted on 17 Jan 2025
1874 points (98.4% liked)

Microblog Memes

9272 readers
4348 users here now

A place to share screenshots of Microblog posts, whether from Mastodon, tumblr, ~~Twitter~~ X, KBin, Threads or elsewhere.

Created as an evolution of White People Twitter and other tweet-capture subreddits.

Rules:

  1. Please put at least one word relevant to the post in the post title.
  2. Be nice.
  3. No advertising, brand promotion or guerilla marketing.
  4. Posters are encouraged to link to the toot or tweet etc in the description of posts.

Related communities:

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] PhilipTheBucket@ponder.cat 10 points 8 months ago (1 children)

https://www.reddit.com/r/videos/comments/fxgi06/not_new_news_but_tbh_if_you_have_tiktiok_just_get/

"There's also a few snippets of code on the Android version that allows for the downloading of a remote zip file, unzipping it, and executing said binary."

Obviously, the app creator can write whatever code they want into the app. If they want to update it, including to run an AB test, they can do a new version.

The only reason for unzipping and executing random binaries on-demand, outside of the normal app update process, is if you want to specifically target one individual or a group of individuals and enable functionality specifically for them that is custom to those particular people. Maybe you just have specific needs for them that aren't served by the overall process, or maybe what you want to install is secret enough that you don't want security researchers getting their hands on it. That second one would be consistent with the obfuscation around even the stock behavior of the app.

I am obviously not talking about HTTPS when I say "encryption to thwart any attempt to analyze it."