> Matthew Forsyth, Director of Product Management, Google Play Developer Experience & Chief Product Explainer, said the system isn’t a sideloading restriction, but an “Accountability Layer.”
And... What about accountability for hosting distributing spyware, malware loaded apps from Google Playstore and hundreds of copy cat, misleading apps?
Why can't they pose a question when the phone is setup?
- Yes, I want to sideload
- No I dont want
If the user says NO then to later enable it to allow sideload Yes, the user needs to factory reset phone. Done.
>And... What about accountability for hosting distributing spyware, malware loaded apps from Google Playstore and hundreds of copy cat, misleading apps?
The rules don't apply to billion dollar corporations. Meta is showing 15 billion scam ads per day.
A somewhat unrelated thing, is I got bombarded with ads for a 'mental health mindfulness' service on one of the major international news websites.
I decided to Google the company after a few days. I was immediately confronted by thousands of reports by angry users, complaining about how after they tried the app, they got locked into a yearly subscription at exorbitant prices and it was impossible to cancel. The company itself is registered in some offshore tax haven.
They used to scare us, that if we went to those shady pirate websites, somebody would steal our credit cards and steal our money. Well...
This right here exposes the bullshittery about the reasons behind preventing sideloading on Android phones.
For Google everything is about protecting revenue, even when doing so exposes their users to real harm, and that's why they will not address the issue of copycat apps, poor practices on play store security or anything else that lowers the number of downloads on apps on play store. But, heaven forbid, I want to download an app that doesn't create revenue for them onto a phone I OWN, Google spends money lavishly.
The Internet cranks are right. Google is run by bean counters and all the invective the cranks heap on the Google leadership is entirely earned.
I’m not sure what to do except encourage others to consider, in the wake of the Snowden revelations and everything else, whether you really want Google to have all your email. And half of mine.
Looks like this article and the one you're replying to are in agreement.
This is definitely an edge case. Most UI/UX from Google is very consistent and just works. Otherwise they won't be in this market.
Only UI/UX issue is that most experienced users want to not adapt to change. It is like people always telling Windows 7 is the best. Don't keep reinventing.
Another one that irks me is every UI/UX dev assumes people have 2 x 4K monitors and menu items overflow.
> Only UI/UX issue is that most experienced users want to not adapt to change
Users will not only adapt, but will even champion your changes if they make sense to said users. For example the web checkout or to name a more drastic example, iPhone and fingers as user interface devices. Once you start convincing the users that the interface is great, but they are too resistant to changes/dumb/uncreative to know how use it... its a different story I´d reckon ;)
This depends on the CDN. Lets say you are using google or cloudflare CDN. They have more engineers and better security processes – and work 24X7 -365 days – continuous monitoring – than you remembering to download jquery update. What about if you are on holiday (post/pre COVID era)? BA is not the best example… Rename your article to: Please stop using ‘unknown CDNs’…
Sure you get a device that you can flash/root/reinstall - but will it be authenticated/allow login by Google/Your company?
> Here our objective was not to break the crypto or recover the data, it was to remove any MDM application and remove all restrictions on the device.
Yes you can remove - resell device. But MDM is not designed to prevent reinstall/selling/whatever.
Beyond Corp principles:
A particular network connection must not determine which services a user can access.
Access to services is granted based on what we know about a user and the device.
All access to services must be authenticated, authorized and encrypted.
Are you able to authorise device with your company/google? We are listening...
Here the scope of the PT was something different than getting access to the filesystem or bypassing corp filters.
Breaking the mdm implemented in the firmware was the crude target.