this post was submitted on 16 Aug 2025
1137 points (97.5% liked)
RetroGaming
24463 readers
1634 users here now
Vintage gaming community.
Rules:
- Be kind.
- No spam or soliciting for money.
- No racism or other bigotry allowed.
- Obviously nothing illegal.
If you see these please report them.
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The app store and permission model hasn't stopped malicious code from making it onto users devices. So if security was the concern, I'd say that's a failure. But I think the primary concern was control. Control by manufacturers (And eventually, thereby states) of what people see and do on their phone. Make sure they have to pay for access to features. Easily surveil what they do.
Security is very often the excuse for control.
Your confusing different parts of the system here, and showing a lack of understanding of the security and privacy concepts involved.
Stopping malicious apps is not the point of the permissions model or of the file structure. It's meant to restrict what malicious apps can do, not prevent them from being installed. It applies to side loaded apps just as much as ones from the play store. Malicious code ending up on users devices does not make that system a failure, as that was never the aim.
As for spying, the permissions model makes that harder as apps can't just access all the files made by the other apps. These kinds of mechanisms also exist on desktop Linux via flatpak and snapcraft for similar reasons. Mandatory and discretionary access control is important for both security and privacy. The two are not at odds here, they are in fact very much aligned.
The app store part is separate and not at all what was being discussed. That is meant to stop malicious apps from getting onto devices. In the case of Apple this is definitely also about control, but android has always allowed third party apps and sideloading.
Google's own services and Apple's own services are part of the OS and potentially have access to things others don't so can very much engage in spying. That could be said of any Android manufacturer with their own ROM. You can do whatever you want if you made the ROM, android permissions model be damned.
Sorry, I thought you were the kind of person who could handle a little casual disagreement. I don't mind that you think security was the primary purpose of phone OS app land, and I definitely wouldn't presume you arrived at that assessment from ignorance as you're a stranger who I don't know and that would be both foolish and needlessly insulting. But everything I've watched phone companies do over the past 20 years demonstrates to me that a desire for control was the main intent. You don't have to agree, in fact I think it's silly to spend all day debating it because it really is a subjective matter.
What makes you think I can't handle disagreement? If If think someone is using shaky reasoning I am allowed to call them out, and use my actual knowledge on the subject to defend my point.
I am not saying google or apple have the best of intentions. They don't and that's why I use GrapheneOS.
Sandboxing is generally a good thing so long as it's done in a transparent way that can be controlled by the user. Hence the popularity of flatpaks, AppArmor and why GrapheneOS has even stricter sandboxing options than stock android. Walled garden ecosystems aren't good, and neither is spying. Apple is guilty of both of those, with google being guilty of the latter. You're painting all of these distinct things with the same brush even though they are basically cross purposes to each other. Different mechanisms are made for different reasons. The current state of mobile is the result of more than one decision made with different aims in mind. I am not saying that security is the primary consideration for all of these, certainly telemetry wasn't added for security reasons. Just that it's not as simple as you want to think. Nuances exist.
This is not subjective either. Someone somewhere will know the actual reasons these decisions were made. Even though we don't know the exact thought process behind them, we can still reason about what these mechanisms do and are useful for. Android itself is open source and these mechanisms are reviewed by other security researchers. You're just saying that to get out of the leg work of actually understanding the nuts and bolts of this stuff and what is and isn't supporting the end user.