Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Remember Darwin; building a better mousetrap merely results in smarter mice.


computers / comp.mobile.android / Re: Phone AV

SubjectAuthor
* Phone AVEd Cryer
+- Re: Phone AVrichneptune
+* Re: Phone AVAndy Burns
|+- Re: Phone AVJoerg Lorenz
|+* Re: Phone AVVanguardLH
||`* Re: Phone AVRJH
|| `* Re: Phone AVVanguardLH
||  `* Re: Phone AVRJH
||   `- Re: Phone AVVanguardLH
|`* Re: Phone AVIncubus
| `* Re: Phone AVAndy Burns
|  `* Re: Phone AVIncubus
|   `* Re: Phone AVTheo
|    +* Re: Phone AVMarco Moock
|    |`- Re: Phone AVJoerg Lorenz
|    `* Re: Phone AVJoerg Lorenz
|     `* Re: Phone AVVanguardLH
|      `- Re: Phone AVJoerg Lorenz
`- Re: Phone AVJoerg Lorenz

1
Phone AV

<u7jgb2$23thu$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42146&group=comp.mobile.android#42146

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ed...@somewhere.in.the.uk (Ed Cryer)
Newsgroups: comp.mobile.android
Subject: Phone AV
Date: Thu, 29 Jun 2023 09:44:35 +0100
Organization: A noiseless patient Spider
Lines: 5
Message-ID: <u7jgb2$23thu$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 29 Jun 2023 08:45:22 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="4204909fcbaab4b0318477a81509cee3";
logging-data="2225726"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19VNeMCkw8wduCxX2Mb+Pvz"
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.12.0
Cancel-Lock: sha1:ydhAJUeAFKUgfh0VqlQxJPqQP5U=
Content-Language: en-GB
 by: Ed Cryer - Thu, 29 Jun 2023 08:44 UTC

For the last 3+ years I've run Bitdefender daily on my phone. It's never
reported a single hit; not a one in more than (3x365 =) 1,095 runs.
Has anyone ever found any malware? Which AV app were you using?

Ed

Re: Phone AV

<dFbnM.351491$cPO1.102295@fx10.ams4>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42147&group=comp.mobile.android#42147

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!newsreader4.netcologne.de!news.netcologne.de!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer02.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx10.ams4.POSTED!not-for-mail
Newsgroups: comp.mobile.android
From: nnt...@removeme.ilovesausag.es (richneptune)
Subject: Re: Phone AV
References: <u7jgb2$23thu$1@dont-email.me>
X-Face: 3gUw;sl=~A2)"u%5i$t\3%4+zCR_g+4=u<5]N82<tIW|orQjD(1ztX]utO9^'\qIW?3ij
g)XIspq.YH[)chB:+e}R*k5t7$(P$:jq_|%gpA:_Il@dQ:<6N^KXHgZvYzBqmS'-\]POZ(;)CcE1e
%vxPqke<&cz/M*l1v8
User-Agent: slrn/1.0.3 (Linux)
Lines: 12
Message-ID: <dFbnM.351491$cPO1.102295@fx10.ams4>
X-Complaints-To: abuse@easynews.com
Organization: Easynews - www.easynews.com
X-Complaints-Info: Please be sure to forward a copy of ALL headers otherwise we will be unable to process your complaint properly.
Date: Thu, 29 Jun 2023 08:54:33 GMT
X-Received-Bytes: 1450
 by: richneptune - Thu, 29 Jun 2023 08:54 UTC

On 2023-06-29, our chum 'Ed Cryer' wrote:
> Has anyone ever found any malware? Which AV app were you using?

Play Protect is built into most Android installs and pretty much works
like a third party malware scan. I'd say that because it's baked in,
Google likely have the biggest collection of malware as they're
sourcing it from the whole install base. I've never had it flag up an
app, and I suspect that's because most stuff that makes it onto the
Play store is likely safe.

Unless you like downloading stuff from dark corners of the internets, a
third party malware app is pretty much going to be redundant.

Re: Phone AV

<kg50n1Fer8fU2@mid.individual.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42148&group=comp.mobile.android#42148

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: use...@andyburns.uk (Andy Burns)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Thu, 29 Jun 2023 10:20:34 +0100
Lines: 9
Message-ID: <kg50n1Fer8fU2@mid.individual.net>
References: <u7jgb2$23thu$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net r5JFZN2Emvb9VOWGVbC9OQdRb4lRTCxk64R14b3LUob7RyCkox
Cancel-Lock: sha1:nVIhL7x1tGIFQJUgJzotR1fbrSM=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.12.0
Content-Language: en-GB
In-Reply-To: <u7jgb2$23thu$1@dont-email.me>
 by: Andy Burns - Thu, 29 Jun 2023 09:20 UTC

Ed Cryer wrote:

> For the last 3+ years I've run Bitdefender daily on my phone.

No app that runs on the phone is allowed to even see the files belonging
to another app (individual linux file system and linux user per app) so
android AV is largely theatre.

Re: Phone AV

<u7jm3p$1sela$1@solani.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42150&group=comp.mobile.android#42150

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: hugyb...@gmx.ch (Joerg Lorenz)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Thu, 29 Jun 2023 12:23:51 +0200
Organization: Camembert Normand au Lait Cru
Message-ID: <u7jm3p$1sela$1@solani.org>
References: <u7jgb2$23thu$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 29 Jun 2023 10:23:53 -0000 (UTC)
Injection-Info: solani.org;
logging-data="1981098"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.11.0
Cancel-Lock: sha1:a1U7XNEG9zaOZGU64tg6G54XogY=
Content-Language: de-CH
X-User-ID: eJwFwYkRwDAIA7CVwmN8HSeYsP8IlRBlJWahEovtYxbyaVlSs/45Si5OxV5j6xAPb4e4Af8BIfMRUQ==
In-Reply-To: <u7jgb2$23thu$1@dont-email.me>
 by: Joerg Lorenz - Thu, 29 Jun 2023 10:23 UTC

Am 29.06.23 um 10:44 schrieb Ed Cryer:
> For the last 3+ years I've run Bitdefender daily on my phone. It's never
> reported a single hit; not a one in more than (3x365 =) 1,095 runs.
> Has anyone ever found any malware? Which AV app were you using?

None. It does not make sense at all.

--
Gutta cavat lapidem (Ovid)

Re: Phone AV

<u7jm5e$1sela$2@solani.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42151&group=comp.mobile.android#42151

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: hugyb...@gmx.ch (Joerg Lorenz)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Thu, 29 Jun 2023 12:24:45 +0200
Organization: Camembert Normand au Lait Cru
Message-ID: <u7jm5e$1sela$2@solani.org>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 29 Jun 2023 10:24:46 -0000 (UTC)
Injection-Info: solani.org;
logging-data="1981098"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101
Thunderbird/102.11.0
Cancel-Lock: sha1:y02R6PH09HjNgQMF/2urwbX5Vjc=
Content-Language: de-CH
X-User-ID: eJwNxcERACEIA8CWgoZkaMdD+i/hnH1sboU+UynmPCwGVUbbAOXXNMYXnavgvJvREwvk8Q/tOg+I
In-Reply-To: <kg50n1Fer8fU2@mid.individual.net>
 by: Joerg Lorenz - Thu, 29 Jun 2023 10:24 UTC

Am 29.06.23 um 11:20 schrieb Andy Burns:
> Ed Cryer wrote:
>
>> For the last 3+ years I've run Bitdefender daily on my phone.
>
> No app that runs on the phone is allowed to even see the files belonging
> to another app (individual linux file system and linux user per app) so
> android AV is largely theatre.

Money for nothing ...

--
Gutta cavat lapidem (Ovid)

Re: Phone AV

<bozg02jlzdgn$.dlg@v.nguard.lh>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42175&group=comp.mobile.android#42175

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V...@nguard.LH (VanguardLH)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Thu, 29 Jun 2023 16:15:54 -0500
Organization: Usenet Elder
Lines: 34
Sender: V@nguard.LH
Message-ID: <bozg02jlzdgn$.dlg@v.nguard.lh>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net E67AAEGNrtSG7T24GyQ++QKNU7hFbo3VT7GOi17P0LA5sA6Gi2
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:LIBEQdDaOZaKNPBMXPUfQFQUiCE=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Thu, 29 Jun 2023 21:15 UTC

Andy Burns <usenet@andyburns.uk> wrote:

> Ed Cryer wrote:
>
>> For the last 3+ years I've run Bitdefender daily on my phone.
>
> No app that runs on the phone is allowed to even see the files belonging
> to another app (individual linux file system and linux user per app) so
> android AV is largely theatre.

Mobile AVs don't have an on-access (real-time) scanner. The best they
can do is use triggers to initiate a scan, like when installing an app.
Well, checking if a newly installed app is malicious is still some
malware coverage. Else, they are denigrated to an on-demand scanner
that walks through the file system, but even that's some malware
coverage.

The mobile AV app should ask for your permission to make it a phone
administrator (aka device administrator). For example, for an app that
wants to prevent misuse of your phone and locate it, like Google's Find
My Device, it requests permissions to erase all data (you can remotely
erase your phone to prevent data theft when the phone is stolen), change
the screen-unlock password (so a thief that knows your current unlock
password still gets locked out with a new password you issue remotely),
lock the screen (some users set very long lockout timeouts), and other
features to prevent misuse of a stolen phone, or to find your phone.
When I used to have Sophos InterceptX on my phone, it requested admin
privs to perform all its security tasks. Many AVs incorporate the same
features: lock the phone remotely, erase the phone remotely, locate the
phone, trigger on app installs to scan its files, and more. They need
to be granted privileges of a phone administrator; else, most of their
features are lost. In fact, you may not be able to uninstall the AV app
until you remove them as a phone administrator; i.e., first deactivate
their phone administrator status, then uninstall their AV app.

Re: Phone AV

<u7l9r2$2a4un$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42183&group=comp.mobile.android#42183

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: u9536...@gmail.com (Incubus)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 01:06:43 -0000 (UTC)
Organization: One with the night
Lines: 18
Message-ID: <u7l9r2$2a4un$1@dont-email.me>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Injection-Date: Fri, 30 Jun 2023 01:06:43 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="540487f221971db7251e82972252c47d";
logging-data="2429911"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+oYLpqp4ag07YOYblzz9kKtG6jbQQwbLQ="
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:WEZhT3bveageuJLIDF17WWYF3WA=
 by: Incubus - Fri, 30 Jun 2023 01:06 UTC

On 2023-06-29, Andy Burns <usenet@andyburns.uk> wrote:
>> For the last 3+ years I've run Bitdefender daily on my phone.
>
> No app that runs on the phone is allowed to even see the files belonging
> to another app (individual linux file system and linux user per app) so
> android AV is largely theatre.

Google claims over a hundred billions (yes, more than a hundred billion!)
of scans every single day on Android phones using AV heuristics to seek out
installed malware applications.

Obviously they're scanning something - so what are you saying is the case
in light of the fact that Google Play Protect is already scanning devices?

https://developers.google.com/android/play-protect
"Google Play Protect scans 125 billion apps daily to make sure that
everything remains spot on. That way, no matter where you download an app
from, you know it's been checked by Google Play Protect."

Re: Phone AV

<u7lael$2a6sn$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42184&group=comp.mobile.android#42184

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: patchmo...@gmx.com (RJH)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 02:17:46 +0100
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <u7lael$2a6sn$1@dont-email.me>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net> <bozg02jlzdgn$.dlg@v.nguard.lh>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 30 Jun 2023 01:17:10 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="fa3c5af42997deddbf673720f1c26617";
logging-data="2431895"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18/D0Lk0Ld9aZ48DXN31Jww"
User-Agent: Usenapp/1.07.3/l for MacOS - Full License
Cancel-Lock: sha1:QlZOt1gkh2r4tlCnmDk0XQv4XEY=
 by: RJH - Fri, 30 Jun 2023 01:17 UTC

On 29 Jun 2023 at 10:15:54 PM, VanguardLH <V@nguard.LH> wrote:

> Mobile AVs don't have an on-access (real-time) scanner.

Every day, the default Android scanner checks all apps, so it's not just
real-time scanning upon the installation of the apps which is occurring.
https://support.google.com/googleplay/answer/2812853?hl=en

> The best they can do is use triggers to initiate a scan,
> like when installing an app.

The default Android scanner can also "deactivate & remove" apps.
https://support.google.com/googleplay/answer/2812853?hl=en

> Well, checking if a newly installed app is malicious is still some
> malware coverage. Else, they are denigrated to an on-demand scanner
> that walks through the file system, but even that's some malware
> coverage.

See above. The default Android scanner runs once a day, whether or not you
are using the phone and whether or not you recently installed any apps.

This Tom's Guide implies that the default scanner looks for viruses too.
https://www.tomsguide.com/reviews/google-play-protect

Take a look at that article and see if it changes your opinion above.
--
Cheers, Rob

Re: Phone AV

<1kbc7nx609oul.dlg@v.nguard.lh>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42193&group=comp.mobile.android#42193

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.imp.ch!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V...@nguard.LH (VanguardLH)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Thu, 29 Jun 2023 23:12:06 -0500
Organization: Usenet Elder
Lines: 112
Sender: V@nguard.LH
Message-ID: <1kbc7nx609oul.dlg@v.nguard.lh>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net> <bozg02jlzdgn$.dlg@v.nguard.lh> <u7lael$2a6sn$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-7"
Content-Transfer-Encoding: 8bit
X-Trace: individual.net VnBFWvi2bVGYVS0l/af9WAeSGy0Rr8Ww+z0FI++gp577OYZCaa
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:4D8xNxt33+2VD+BA3cpL/KGzYvY=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Fri, 30 Jun 2023 04:12 UTC

RJH <patchmoney@gmx.com> wrote:

> On 29 Jun 2023 at 10:15:54 PM, VanguardLH <V@nguard.LH> wrote:
>
>> Mobile AVs don't have an on-access (real-time) scanner.
>
> Every day, the default Android scanner checks all apps, so it's not just
> real-time scanning upon the installation of the apps which is occurring.
> https://support.google.com/googleplay/answer/2812853?hl=en

None of that qualifies as an on-demand (real-time) scanner. The Protect
feature of the Play Store app is check what apps you have installed
against a blacklist.

- It runs a safety check on apps from the Google Play Store before you
download them.
Yep, a blacklist.
- It checks your device for potentially harmful apps from other sources.
These harmful apps are sometimes called malware.
Yep, a blacklist.
- It warns you about potentially harmful apps.
Yep, a blacklist.
- It may deactivate or remove harmful apps from your device.
This catches some users by surprise. They were using an app, and it
disappeared, because Google got around to blacklisting it, and the
Play Store app then complied with Google's blacklist.
- It warns you about detected apps that violate our Unwanted Software
Policy by hiding or misrepresenting important information.
Where do you think that policy is enforced? Up on the server, and
Play Store app warns you.
- It sends you privacy alerts about apps that can get user permissions
to access your personal information, violating our Developer Policy.
Again, a blacklist that warns you about Google's concerns with apps.
- It may reset app permissions to protect your privacy on certain
Android versions.
It also monitors how long since you last used an app, and will
"archive" it. The latest versions of Android has a setting to
override this auto-archiving. Took awhile, but it eventually got
pushed to earlier versions of Android (Play Store app, settings ->
General -> Automatically archive apps). Before the setting got added,
you had to keep answering No to the archive prompt. Archiving the app
meant it lost its permissions. You had to guess which ones to
reactivate when reenabling the app.

None of that equates to an on-demand AV scanner. It is, however, some
protection by regulating which apps you can download and install, or
even keep.

>> The best they can do is use triggers to initiate a scan,
>> like when installing an app.
>
> The default Android scanner can also "deactivate & remove" apps.
> https://support.google.com/googleplay/answer/2812853?hl=en

I was speaking about AV apps, not the Play Store's Protect feature, not
it checking a blacklist to see which to delete.

>> Well, checking if a newly installed app is malicious is still some
>> malware coverage. Else, they are denigrated to an on-demand scanner
>> that walks through the file system, but even that's some malware
>> coverage.
>
> See above. The default Android scanner runs once a day, whether or not you
> are using the phone and whether or not you recently installed any apps.
>
> This Tom's Guide implies that the default scanner looks for viruses too.
> https://www.tomsguide.com/reviews/google-play-protect

Stop calling it the default scanner. It doesn't scan. Looking at the
list of apps installed on a phone is not scanning it for malware.
That's like saying File Explorer in Windows is the default scanner
because it can look at filenames.

> Take a look at that article and see if it changes your opinion above.

Nope. Monitoring and managing app installations is nowhere the same as
an on-demand AV scanner. Someone at Google deciding an app is bad, and
the Play Store complying with the red/green list, is not the same as an
on-demand AV scanner that locally checks the contents of the files for
the apps.

"Google Play Protect may be free, but it’s not as effective mobile
security as some third-party options."

This is very similar to enterprise inventory software that decides what
can be installed on a company's workstations. A client runs on the
workstation to monitor what got installed on it, and checks with the
server if those are allowable programs. That's not AV detection.
That's software inventorying.

If you look at the Play Store Protect settings, you'll realize that it
also incorporate cloud scanning by sending unknown apps to Google to get
analyzed. The Play Store app isn't making the decision. Someone up at
Google decides, and the blacklist may get updated.

I'll grant that Play Store Protect does offer some anti-malware
protection, but is nothing like AV on-demand scanning (which you get on
desktops, not with AVs on Android). Yes, I have left Play Store Protect
enabled, but I don't confuse it with AV programs that run on desktops.
AV apps on Android do little more than Play Store Protect, and why many
users pooh-pooh their use. Many have additional features, but many of
those are duplicated by Google's Find My Device. Between Play Store
Protect and Find My Device, there's little left of the pie for AV apps
to chew on. They instead look at other protections, like web filtering
(identify malicious pages from a DNSBL), lint checker (on hyperlinks),
app blocking (decide which apps can run), wi-fi network security flaws,
privacy advisor (list of known apps with questionable access to your
personal data), add a password vault (e.g., KeePass compatible),
authenticators (used to assist 2FA, TOTP, and HOTP), remote device
management (so companies can control the mobile devices given to their
employees). So, they add more protections, but none of them equate to
an on-demand AV scanner you get on a desktop.

Re: Phone AV

<kg7hnuFqq52U1@mid.individual.net>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42198&group=comp.mobile.android#42198

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: use...@andyburns.uk (Andy Burns)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 09:23:26 +0100
Lines: 14
Message-ID: <kg7hnuFqq52U1@mid.individual.net>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net>
<u7l9r2$2a4un$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net Rugpg09KBl5Q7kC4Nv4WUQ4O227J0sYx5P7XrLRYDh/jd2ck+e
Cancel-Lock: sha1:ccx28b7nuYc89mAlfwR6O6euEwA=
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101
Thunderbird/102.12.0
Content-Language: en-GB
In-Reply-To: <u7l9r2$2a4un$1@dont-email.me>
 by: Andy Burns - Fri, 30 Jun 2023 08:23 UTC

Incubus wrote:

> Andy Burns wrote:
>
>> No app that runs on the phone is allowed to even see the files
>> belonging to another app (individual linux file system and linux user
>> per app) so android AV is largely theatre.
>
> Google claims over a hundred billions

As part of the O/S, google can run stuff as root, which an app (on a
non-rooted device) cannot do.

Re: Phone AV

<u7m8qh$2grcf$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42201&group=comp.mobile.android#42201

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: u9536...@gmail.com (Incubus)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 09:55:30 -0000 (UTC)
Organization: One with the night
Lines: 14
Message-ID: <u7m8qh$2grcf$1@dont-email.me>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net> <u7l9r2$2a4un$1@dont-email.me> <kg7hnuFqq52U1@mid.individual.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Injection-Date: Fri, 30 Jun 2023 09:55:30 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="540487f221971db7251e82972252c47d";
logging-data="2649487"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/rC/j9ruu7RX6j57qC96Y21V2ClS0E/HM="
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:N21TSJbzlvk/qFoP9nSOcj+Ig2M=
 by: Incubus - Fri, 30 Jun 2023 09:55 UTC

On 2023-06-30, Andy Burns <usenet@andyburns.uk> wrote:
>>> No app that runs on the phone is allowed to even see the files
>>> belonging to another app (individual linux file system and linux user
>>> per app) so android AV is largely theatre.
>>
>> Google claims over a hundred billions
>
> As part of the O/S, google can run stuff as root, which an app (on a
> non-rooted device) cannot do.

Isn't the Google Play Store just another app?

Why then can the Google Play Protect (whose settings are inside the Google
Play Store app) "run stuff as root", but something like Samsung Knox can't?

Re: Phone AV

<u7mc80$2h6h6$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42204&group=comp.mobile.android#42204

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: patchmo...@gmx.com (RJH)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 11:54:28 +0100
Organization: A noiseless patient Spider
Lines: 250
Message-ID: <u7mc80$2h6h6$1@dont-email.me>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net> <bozg02jlzdgn$.dlg@v.nguard.lh> <u7lael$2a6sn$1@dont-email.me> <1kbc7nx609oul.dlg@v.nguard.lh>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 30 Jun 2023 10:53:53 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="fa3c5af42997deddbf673720f1c26617";
logging-data="2660902"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/kWsop04YLCTxfZRnFmV4S"
User-Agent: Usenapp/1.07.3/l for MacOS - Full License
Cancel-Lock: sha1:IXfokYhFNKJkuKWN07T8NmAp78Y=
 by: RJH - Fri, 30 Jun 2023 10:54 UTC

On 30 Jun 2023 at 5:12:06 AM, VanguardLH <V@nguard.LH> wrote:

>> Every day, the default Android scanner checks all apps, so it's not just
>> real-time scanning upon the installation of the apps which is occurring.
>> https://support.google.com/googleplay/answer/2812853?hl=en
>
> None of that qualifies as an on-demand (real-time) scanner. The Protect
> feature of the Play Store app is check what apps you have installed
> against a blacklist.

While I'm sure once Google Play Protect scans find a bad apple they add it
to a blacklist, the Google description specifically says it uses complex
heuristics (just like any AV scanner would do) and not just a blacklist.

"Play Protect leverages Google's powerful machine learning algorithms to
combat PHAs. Google's systems learn which apps are harmful and which are
safe by analyzing our entire app database. The algorithms look at hundreds
of signals and compare behavior across the Android ecosystem to see if any
apps show suspicious behavior, such as interacting with other apps on the
device in unexpected ways, accessing or sharing personal data without
authorization, aggressively installing apps (including PHAs), accessing
malicious websites, or bypassing built-in security features. These
algorithms also help us understand where PHAs come from and how they make
money, so we can determine the motivation behind these types of apps."
https://developers.google.com/android/play-protect/cloud-based-protections

> - It runs a safety check on apps from the Google Play Store before you
> download them.
> Yep, a blacklist.

No. You don't fundamentally understand Google Play Protect, probably
because you've convinced yourself that it's nothing more than a blacklist.

"Backed by Google's machine learning, it's always adapting and improving.
Every day, Google Play Protect automatically scans all of the apps on
Android phones and works to prevent the installation of harmful apps,
making it the most widely deployed mobile threat protection service in the
world." https://developers.google.com/android/play-protect

> - It checks your device for potentially harmful apps from other sources.
> These harmful apps are sometimes called malware.
> Yep, a blacklist.

No. Not a blacklist. You have to understand what Google says it does versus
what you think Google does as it's way more sophisticated than a blacklist.
https://www.howtogeek.com/355504/what-is-google-play-protect-and-how-does-it-keep-android-secure/

Saying the most sophisticated anti virus protection available to consumers
is a blacklist is like saying a slingshot will do what a space rocket does.

It's clear you fundamentally don't understand how sophisticated AV
heuristics works when it comes to intense deep scanning on the device of
not only every installed app but even the memory that it's running inside.

> - It warns you about potentially harmful apps.
> Yep, a blacklist.

If you think the most sophisticated anti virus protection in the world is
nothing more than a blacklist, then you can't be convinced otherwise.

> - It may deactivate or remove harmful apps from your device.
> This catches some users by surprise. They were using an app, and it
> disappeared, because Google got around to blacklisting it, and the
> Play Store app then complied with Google's blacklist.

This happened once out of billions upon billions upon billions of apps.
And you're worried about that?

You may as well be worried about an asteroid landing on your own home.
Seriously. Only you would complain about a one-in-billions chances.

Do you play the lottery? You must. People like you always do.

I suspect you put thousands of dollars into the lottery every day since you
don't seem to be able to comprehend what it means to be one in a billion.

> - It warns you about detected apps that violate our Unwanted Software
> Policy by hiding or misrepresenting important information.
> Where do you think that policy is enforced? Up on the server, and
> Play Store app warns you.

Google Play Protect runs those safety checks whether or not you download
the app from the Google Play Store or from any developer web site also.

It even runs those safety checks if you install from your own hard drives.
https://www.rd.com/article/google-play-protect/

> - It sends you privacy alerts about apps that can get user permissions
> to access your personal information, violating our Developer Policy.
> Again, a blacklist that warns you about Google's concerns with apps.

"Google Play Protect is now using a new "Protected Download" API to verify
the integrity of models and heuristics downloaded onto devices, ensuring
malware authors haven't tampered with them."
https://www.reddit.com/r/Android/comments/1195hvn/mishaal_rahman_google_play_protect_is_now_using_a/

> - It may reset app permissions to protect your privacy on certain
> Android versions.
> It also monitors how long since you last used an app, and will
> "archive" it. The latest versions of Android has a setting to
> override this auto-archiving. Took awhile, but it eventually got
> pushed to earlier versions of Android (Play Store app, settings ->
> General -> Automatically archive apps). Before the setting got added,
> you had to keep answering No to the archive prompt. Archiving the app
> meant it lost its permissions. You had to guess which ones to
> reactivate when reenabling the app.

"There's one detail rarely mentioned about Google's splashy new Android
security effort-and it's a critical point for everyone to understand."
https://www.computerworld.com/article/3210587/google-play-protect-android.html
"1. It scans Play Store apps for any signs of malware.

An essential measure, to be sure-and one Google's been doing in this same
basic manner since 2012.

2. It monitors apps on your device for any signs of shady behavior.

Google also introduced this in 2012 (and then launched it more broadly in
2013) with the initial goal of addressing apps installed from unofficial,
non-Play Store sources. It expanded the system in 2014 to include
continuous monitoring of all apps on all devices.

3. It allows you to remotely locate, lock and optionally wipe your device.

A handy and highly useful function that-yup, you guessed it-has been
natively available in Android since 2013.

4. It warns you about websites that might serve up malware or try to trick
you into providing personal information."

> None of that equates to an on-demand AV scanner. It is, however, some
> protection by regulating which apps you can download and install, or
> even keep.

You fundamentally have no idea of what you're talking about if you think
none of those scans are happening in a way you term "on demand" scanning.

"On-demand PHA scan
In addition to a lightweight, daily, automatic scan, users can start a
full-device scan at any time. Upon request, the device contacts Google
servers for the latest information and scans all apps on the device. If a
harmful app is discovered, Google Play Protect notifies the user to take
action or takes action on their behalf. This visibility gives users peace
of mind that they have the latest protection at all times."
https://developers.google.com/android/play-protect/client-protections

>>> The best they can do is use triggers to initiate a scan,
>>> like when installing an app.
>>
>> The default Android scanner can also "deactivate & remove" apps.
>> https://support.google.com/googleplay/answer/2812853?hl=en
>
> I was speaking about AV apps, not the Play Store's Protect feature, not
> it checking a blacklist to see which to delete.

That you equate the most complicated scanner on earth to a blacklist is
something that nobody is going to get out of your head no matter how many
references show that a blacklist is the least of what any AV program does.

"It's more than a malware scanner."
https://www.androidcentral.com/apps-software/what-is-google-play-protect
"Most people who have heard of Google Play Protect think of it as a great
malware scanner for Android apps. It is, but it encompasses a lot more than
that. It's a full suite of protective services for your Android phone."


>>> Well, checking if a newly installed app is malicious is still some
>>> malware coverage. Else, they are denigrated to an on-demand scanner
>>> that walks through the file system, but even that's some malware
>>> coverage.
>>
>> See above. The default Android scanner runs once a day, whether or not you
>> are using the phone and whether or not you recently installed any apps.
>>
>> This Tom's Guide implies that the default scanner looks for viruses too.
>> https://www.tomsguide.com/reviews/google-play-protect
>
> Stop calling it the default scanner. It doesn't scan. Looking at the
> list of apps installed on a phone is not scanning it for malware.
> That's like saying File Explorer in Windows is the default scanner
> because it can look at filenames.


Click here to read the complete article
Re: Phone AV

<Mhn*Mf7jz@news.chiark.greenend.org.uk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42207&group=comp.mobile.android#42207

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!news.nntp4.net!nntp.terraraq.uk!nntp-feed.chiark.greenend.org.uk!ewrotcd!.POSTED.chiark.greenend.org.uk!not-for-mail
From: theom+n...@chiark.greenend.org.uk (Theo)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: 30 Jun 2023 13:07:54 +0100 (BST)
Organization: University of Cambridge, England
Message-ID: <Mhn*Mf7jz@news.chiark.greenend.org.uk>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net> <u7l9r2$2a4un$1@dont-email.me> <kg7hnuFqq52U1@mid.individual.net> <u7m8qh$2grcf$1@dont-email.me>
Injection-Info: chiark.greenend.org.uk; posting-host="chiark.greenend.org.uk:212.13.197.229";
logging-data="13760"; mail-complaints-to="abuse@chiark.greenend.org.uk"
User-Agent: tin/1.8.3-20070201 ("Scotasay") (UNIX) (Linux/5.10.0-22-amd64 (x86_64))
Originator: theom@chiark.greenend.org.uk ([212.13.197.229])
 by: Theo - Fri, 30 Jun 2023 12:07 UTC

Incubus <u9536612@gmail.com> wrote:
> On 2023-06-30, Andy Burns <usenet@andyburns.uk> wrote:
> >>> No app that runs on the phone is allowed to even see the files
> >>> belonging to another app (individual linux file system and linux user
> >>> per app) so android AV is largely theatre.
> >>
> >> Google claims over a hundred billions
> >
> > As part of the O/S, google can run stuff as root, which an app (on a
> > non-rooted device) cannot do.
>
> Isn't the Google Play Store just another app?

No.

> Why then can the Google Play Protect (whose settings are inside the Google
> Play Store app) "run stuff as root", but something like Samsung Knox can't?

Google Play Services runs with system privilege, which other apps don't.

I assume Knox also runs with system privilege, since it's part of Samsung's
OS.

J. Random Antivirus does not run with system privilege, even if it asks for
it, because user-installed apps can't get system privilege (unless the phone
is rooted).

Theo

Re: Phone AV

<u7mhhb$1vf94$1@solani.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42208&group=comp.mobile.android#42208

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: mo0...@posteo.de (Marco Moock)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 14:24:47 +0200
Message-ID: <u7mhhb$1vf94$1@solani.org>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net> <u7l9r2$2a4un$1@dont-email.me> <kg7hnuFqq52U1@mid.individual.net> <u7m8qh$2grcf$1@dont-email.me> <Mhn*Mf7jz@news.chiark.greenend.org.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 30 Jun 2023 12:24:12 -0000 (UTC)
Injection-Info: solani.org;
logging-data="2080036"; mail-complaints-to="abuse@news.solani.org"
Cancel-Lock: sha1:j+kZG82b8wpEdoSm41qzocDHLKQ=
X-User-ID: eJwFwYEBwCAIA7CXQGiFc7ST/09YgqBTOwkmBhNuVdH3LW8T97c6F7xm9A5Vn1uGWI+7ZW046h6/QNjV3B8vmRUN
 by: Marco Moock - Fri, 30 Jun 2023 12:24 UTC

Am 30.06.2023 um 14:07:54 Uhr schrieb Theo:

> I assume Knox also runs with system privilege, since it's part of Samsung's
> OS.

I have a pixel. Not a Samsung. What does Knox do that the pixel doesn't do?

Re: Phone AV

<u7n0uj$1vobg$2@solani.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42219&group=comp.mobile.android#42219

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: hugyb...@gmx.ch (Joerg Lorenz)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 18:47:15 +0200
Organization: Camembert Normand au Lait Cru
Message-ID: <u7n0uj$1vobg$2@solani.org>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net>
<u7l9r2$2a4un$1@dont-email.me> <kg7hnuFqq52U1@mid.individual.net>
<u7m8qh$2grcf$1@dont-email.me> <Mhn*Mf7jz@news.chiark.greenend.org.uk>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 30 Jun 2023 16:47:15 -0000 (UTC)
Injection-Info: solani.org;
logging-data="2089328"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0)
Gecko/20100101 Thunderbird/102.12.0
Cancel-Lock: sha1:edhpWigtpG7/sQY+iTr4+tmy/2c=
X-User-ID: eJwFwYEBwCAIA7CXhFHAc2ax/59ggi8tWZHIgCB6eI+FrP2AVaoN4sy0bvkfxgP12tPrjvgAHF0Rog==
Content-Language: de-CH
In-Reply-To: <Mhn*Mf7jz@news.chiark.greenend.org.uk>
 by: Joerg Lorenz - Fri, 30 Jun 2023 16:47 UTC

Am 30.06.23 um 14:07 schrieb Theo:
> Incubus <u9536612@gmail.com> wrote:
>> On 2023-06-30, Andy Burns <usenet@andyburns.uk> wrote:
>>>>> No app that runs on the phone is allowed to even see the files
>>>>> belonging to another app (individual linux file system and linux user
>>>>> per app) so android AV is largely theatre.
>>>>
>>>> Google claims over a hundred billions
>>>
>>> As part of the O/S, google can run stuff as root, which an app (on a
>>> non-rooted device) cannot do.
>>
>> Isn't the Google Play Store just another app?
>
> No.
>
>> Why then can the Google Play Protect (whose settings are inside the Google
>> Play Store app) "run stuff as root", but something like Samsung Knox can't?
>
> Google Play Services runs with system privilege, which other apps don't.
>
> I assume Knox also runs with system privilege, since it's part of Samsung's
> OS.

Samsung does not have an OS. It is just Android.

--
Prudentia potentia est

Re: Phone AV

<u7n10k$1vobg$3@solani.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42220&group=comp.mobile.android#42220

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: hugyb...@gmx.ch (Joerg Lorenz)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 18:48:20 +0200
Organization: Camembert Normand au Lait Cru
Message-ID: <u7n10k$1vobg$3@solani.org>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net>
<u7l9r2$2a4un$1@dont-email.me> <kg7hnuFqq52U1@mid.individual.net>
<u7m8qh$2grcf$1@dont-email.me> <Mhn*Mf7jz@news.chiark.greenend.org.uk>
<u7mhhb$1vf94$1@solani.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 30 Jun 2023 16:48:20 -0000 (UTC)
Injection-Info: solani.org;
logging-data="2089328"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0)
Gecko/20100101 Thunderbird/102.12.0
Cancel-Lock: sha1:buP+s2uSENPTpX+WRrQMOG/dijM=
Content-Language: de-CH
X-User-ID: eJwFwQcBACAIBMBKCDwjjjL6R/AOYsfK1WCKxfqwgHSI31PkUITsSkxyEqOONF9Et1tx3v0IcBCq
In-Reply-To: <u7mhhb$1vf94$1@solani.org>
 by: Joerg Lorenz - Fri, 30 Jun 2023 16:48 UTC

Am 30.06.23 um 14:24 schrieb Marco Moock:
> Am 30.06.2023 um 14:07:54 Uhr schrieb Theo:
>
>> I assume Knox also runs with system privilege, since it's part of Samsung's
>> OS.
>
> I have a pixel. Not a Samsung. What does Knox do that the pixel doesn't do?

Knox is software. Pixel is hardware.

--
Prudentia potentia est

Re: Phone AV

<wi5o6rpyewnz.dlg@v.nguard.lh>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42232&group=comp.mobile.android#42232

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V...@nguard.LH (VanguardLH)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 14:06:17 -0500
Organization: Usenet Elder
Lines: 255
Sender: V@nguard.LH
Message-ID: <wi5o6rpyewnz.dlg@v.nguard.lh>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net> <bozg02jlzdgn$.dlg@v.nguard.lh> <u7lael$2a6sn$1@dont-email.me> <1kbc7nx609oul.dlg@v.nguard.lh> <u7mc80$2h6h6$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net 4C2aPN336o5FsYiIn54O2AdSpQCV4TAX2LXGnZmF++QguYJQao
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:hxsCxtXiHbxRFO93ntFmjYaozQY=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Fri, 30 Jun 2023 19:06 UTC

RJH <patchmoney@gmx.com> wrote:

> On 30 Jun 2023 at 5:12:06 AM, VanguardLH <V@nguard.LH> wrote:
>
>>> Every day, the default Android scanner checks all apps, so it's not just
>>> real-time scanning upon the installation of the apps which is occurring.
>>> https://support.google.com/googleplay/answer/2812853?hl=en
>>
>> None of that qualifies as an on-demand (real-time) scanner. The Protect
>> feature of the Play Store app is check what apps you have installed
>> against a blacklist.
>
> While I'm sure once Google Play Protect scans find a bad apple they add it
> to a blacklist, the Google description specifically says it uses complex
> heuristics (just like any AV scanner would do) and not just a blacklist.
>
> "Play Protect leverages Google's powerful machine learning algorithms to
> combat PHAs. Google's systems learn which apps are harmful and which are
> safe by analyzing our entire app database. The algorithms look at hundreds
> of signals and compare behavior across the Android ecosystem to see if any
> apps show suspicious behavior, such as interacting with other apps on the
> device in unexpected ways, accessing or sharing personal data without
> authorization, aggressively installing apps (including PHAs), accessing
> malicious websites, or bypassing built-in security features. These
> algorithms also help us understand where PHAs come from and how they make
> money, so we can determine the motivation behind these types of apps."
> https://developers.google.com/android/play-protect/cloud-based-protections" rel="nofollow" target="_blank">https://developers.google.com/android/play-protect/cloud-based-protections
>
>> - It runs a safety check on apps from the Google Play Store before you
>> download them.
>> Yep, a blacklist.
>
> No. You don't fundamentally understand Google Play Protect, probably
> because you've convinced yourself that it's nothing more than a blacklist.
>
> "Backed by Google's machine learning, it's always adapting and improving.
> Every day, Google Play Protect automatically scans all of the apps on
> Android phones and works to prevent the installation of harmful apps,
> making it the most widely deployed mobile threat protection service in the
> world." https://developers.google.com/android/play-protect
>
>> - It checks your device for potentially harmful apps from other sources.
>> These harmful apps are sometimes called malware.
>> Yep, a blacklist.
>
> No. Not a blacklist. You have to understand what Google says it does versus
> what you think Google does as it's way more sophisticated than a blacklist.
> https://www.howtogeek.com/355504/what-is-google-play-protect-and-how-does-it-keep-android-secure/
>
> Saying the most sophisticated anti virus protection available to consumers
> is a blacklist is like saying a slingshot will do what a space rocket does.
>
> It's clear you fundamentally don't understand how sophisticated AV
> heuristics works when it comes to intense deep scanning on the device of
> not only every installed app but even the memory that it's running inside.
>
>> - It warns you about potentially harmful apps.
>> Yep, a blacklist.
>
> If you think the most sophisticated anti virus protection in the world is
> nothing more than a blacklist, then you can't be convinced otherwise.
>
>> - It may deactivate or remove harmful apps from your device.
>> This catches some users by surprise. They were using an app, and it
>> disappeared, because Google got around to blacklisting it, and the
>> Play Store app then complied with Google's blacklist.
>
> This happened once out of billions upon billions upon billions of apps.
> And you're worried about that?
>
> You may as well be worried about an asteroid landing on your own home.
> Seriously. Only you would complain about a one-in-billions chances.
>
> Do you play the lottery? You must. People like you always do.
>
> I suspect you put thousands of dollars into the lottery every day since you
> don't seem to be able to comprehend what it means to be one in a billion.
>
>> - It warns you about detected apps that violate our Unwanted Software
>> Policy by hiding or misrepresenting important information.
>> Where do you think that policy is enforced? Up on the server, and
>> Play Store app warns you.
>
> Google Play Protect runs those safety checks whether or not you download
> the app from the Google Play Store or from any developer web site also.
>
> It even runs those safety checks if you install from your own hard drives.
> https://www.rd.com/article/google-play-protect/
>
>> - It sends you privacy alerts about apps that can get user permissions
>> to access your personal information, violating our Developer Policy.
>> Again, a blacklist that warns you about Google's concerns with apps.
>
> "Google Play Protect is now using a new "Protected Download" API to verify
> the integrity of models and heuristics downloaded onto devices, ensuring
> malware authors haven't tampered with them."
> https://www.reddit.com/r/Android/comments/1195hvn/mishaal_rahman_google_play_protect_is_now_using_a/
>
>> - It may reset app permissions to protect your privacy on certain
>> Android versions.
>> It also monitors how long since you last used an app, and will
>> "archive" it. The latest versions of Android has a setting to
>> override this auto-archiving. Took awhile, but it eventually got
>> pushed to earlier versions of Android (Play Store app, settings ->
>> General -> Automatically archive apps). Before the setting got added,
>> you had to keep answering No to the archive prompt. Archiving the app
>> meant it lost its permissions. You had to guess which ones to
>> reactivate when reenabling the app.
>
> "There's one detail rarely mentioned about Google's splashy new Android
> security effort-and it's a critical point for everyone to understand."
> https://www.computerworld.com/article/3210587/google-play-protect-android.html
> "1. It scans Play Store apps for any signs of malware.
>
> An essential measure, to be sure-and one Google's been doing in this same
> basic manner since 2012.
>
> 2. It monitors apps on your device for any signs of shady behavior.
>
> Google also introduced this in 2012 (and then launched it more broadly in
> 2013) with the initial goal of addressing apps installed from unofficial,
> non-Play Store sources. It expanded the system in 2014 to include
> continuous monitoring of all apps on all devices.
>
> 3. It allows you to remotely locate, lock and optionally wipe your device.
>
> A handy and highly useful function that-yup, you guessed it-has been
> natively available in Android since 2013.
>
> 4. It warns you about websites that might serve up malware or try to trick
> you into providing personal information."
>
>> None of that equates to an on-demand AV scanner. It is, however, some
>> protection by regulating which apps you can download and install, or
>> even keep.
>
> You fundamentally have no idea of what you're talking about if you think
> none of those scans are happening in a way you term "on demand" scanning.
>
> "On-demand PHA scan
> In addition to a lightweight, daily, automatic scan, users can start a
> full-device scan at any time. Upon request, the device contacts Google
> servers for the latest information and scans all apps on the device. If a
> harmful app is discovered, Google Play Protect notifies the user to take
> action or takes action on their behalf. This visibility gives users peace
> of mind that they have the latest protection at all times."
> https://developers.google.com/android/play-protect/client-protections
>
>>>> The best they can do is use triggers to initiate a scan,
>>>> like when installing an app.
>>>
>>> The default Android scanner can also "deactivate & remove" apps.
>>> https://support.google.com/googleplay/answer/2812853?hl=en
>>
>> I was speaking about AV apps, not the Play Store's Protect feature, not
>> it checking a blacklist to see which to delete.
>
> That you equate the most complicated scanner on earth to a blacklist is
> something that nobody is going to get out of your head no matter how many
> references show that a blacklist is the least of what any AV program does.
>
> "It's more than a malware scanner."
> https://www.androidcentral.com/apps-software/what-is-google-play-protect
> "Most people who have heard of Google Play Protect think of it as a great
> malware scanner for Android apps. It is, but it encompasses a lot more than
> that. It's a full suite of protective services for your Android phone."
>
>
>>>> Well, checking if a newly installed app is malicious is still some
>>>> malware coverage. Else, they are denigrated to an on-demand scanner
>>>> that walks through the file system, but even that's some malware
>>>> coverage.
>>>
>>> See above. The default Android scanner runs once a day, whether or not you
>>> are using the phone and whether or not you recently installed any apps.
>>>
>>> This Tom's Guide implies that the default scanner looks for viruses too.
>>> https://www.tomsguide.com/reviews/google-play-protect
>>
>> Stop calling it the default scanner. It doesn't scan. Looking at the
>> list of apps installed on a phone is not scanning it for malware.
>> That's like saying File Explorer in Windows is the default scanner
>> because it can look at filenames.
>
> If you think Google Play Protect doesn't "scan" then no amount of
> references proving that it does scan your memory and your file system and
> all running apps will convince you that the most sophisticated scanner in
> the world is nothing more, to you, than a simple blacklist check.
>
> "Every day, Google Play Protect automatically scans all of the apps on
> Android phones and works to prevent the installation of harmful apps,
> making it the most widely deployed mobile threat protection service in the
> world." https://developers.google.com/android/play-protect
>
>>> Take a look at that article and see if it changes your opinion above.
>>
>> Nope. Monitoring and managing app installations is nowhere the same as
>> an on-demand AV scanner. Someone at Google deciding an app is bad, and
>> the Play Store complying with the red/green list, is not the same as an
>> on-demand AV scanner that locally checks the contents of the files for
>> the apps.
>>
>> "Google Play Protect may be free, but it's not as effective mobile
>> security as some third-party options."
>
> You seem to own the ideas of a very young kid who has never lived through
> the antivirus wars of the Windows era when Windows viruses were rampant.
>
> If you did live through those anti virus wars, you learned nothing from
> them as EVERY anti-virus scanner has its own flaws, pitfalls & foibles.
>
> Google Play Protect is no exception. It's just another anti virus on-demand
> automatic heuristic scanner with the main exception being it runs as root.
> https://www.lifewire.com/what-is-google-play-protect-4773171
>
>> This is very similar to enterprise inventory software that decides what
>> can be installed on a company's workstations. A client runs on the
>> workstation to monitor what got installed on it, and checks with the
>> server if those are allowable programs. That's not AV detection.
>> That's software inventorying.
>
> You fundamentally don't know how heuristic scanning works.
> If you're a young kid, then you need to read up on how these things work.
> https://www.lifewire.com/what-is-google-play-protect-4773171
>
> If you're not a kid, then you probably will never learn how they work.
> https://www.rd.com/article/google-play-protect/
>
>> If you look at the Play Store Protect settings, you'll realize that it
>> also incorporate cloud scanning by sending unknown apps to Google to get
>> analyzed. The Play Store app isn't making the decision. Someone up at
>> Google decides, and the blacklist may get updated.
>
> You fundamentally do not seem to understand that Google Play Protect does a
> LOT of things. It's MORE than just an AV scanner. And what it does is
> constantly improving over time. You don't know any of that because you have
> convinced yourself that it's nothing more than a simple blacklist test.
>
> To provide a balanced view, the OLDER Google Play Protect had huge issues.
> https://www.spiceworks.com/it-security/application-security/news/googles-built-in-defense-tool-for-android-is-actually-pointless-av-test-report/
>
> Google Play Protect used to suck. It's still not perfect.
> But neither is any other Android scanner.
>
> Here is another bad review for Google Play Protect but notice all the bad
> reviews are very old as Google Play Protect is getting better every day.
> https://www.gadgets360.com/apps/news/google-play-protect-android-malware-protection-failed-false-detection-rate-av-test-2497882


Click here to read the complete article
Re: Phone AV

<13pkrlklri5f6.dlg@v.nguard.lh>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42234&group=comp.mobile.android#42234

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V...@nguard.LH (VanguardLH)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 14:21:29 -0500
Organization: Usenet Elder
Lines: 32
Sender: V@nguard.LH
Message-ID: <13pkrlklri5f6.dlg@v.nguard.lh>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net> <u7l9r2$2a4un$1@dont-email.me> <kg7hnuFqq52U1@mid.individual.net> <u7m8qh$2grcf$1@dont-email.me> <Mhn*Mf7jz@news.chiark.greenend.org.uk> <u7n0uj$1vobg$2@solani.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Trace: individual.net qdVz0hi3TydepJPT1QestAuNq/rvqesexkZqqBDmHPRUPp07MT
Keywords: VanguardLH,VLH
Cancel-Lock: sha1:+hiTXL+w9yb8tFl5Vm8c8iyMBSM=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Fri, 30 Jun 2023 19:21 UTC

Joerg Lorenz <hugybear@gmx.ch> wrote:

> Samsung does not have an OS. It is just Android.

Just like Google Chrome is a Chromium variant, but with proprietary code
added from Google. As far as I know, Pixel and a few others come with a
stock Android OS. About as pure as you can get. Other phone makers
brand their customized version of Android with separate or different
features or functions. Saying Samsung's variant of Android is just
Android is like saying SUSE is just Redhat.

Google is trying to alleviate the customization effort a phone maker
puts into branding their OS variant. Before Google gave them the code,
and the phone maker would customize it how they wanted. Google wants to
modularize their OS, so customization is separate code instead of
modifying the base code. However, phone makers still create a variant
of Android, and that means they can add or remove whatever they want.

Sorry, I forgot the name of Google's project that was to suppose to
modularize Android to make it easier for phone makers to customize.
However, that phone makers customize mandates that they are not
supplying a pure Android OS. The phone makers want to improve, they
want to brand their phones, and they have their own agenda.

For example, there's Chromium, and there's Google Chrome. One is open
source. The other is open source with added proprietary code. There's
Firefox, and there's Vivaldi. Unless you get a phone with a pure
Android (just a few of those), you get a customized version of Android.
Google has their Find My Device while Samsung instead has Find My
Mobile. Phones can come with different dialers. Each phone maker, when
customizing the Android OS, can add their own services. They have
similarity to Google's Android, and also have differences.

Re: Phone AV

<u7nc8l$1u8dh$1@solani.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=42240&group=comp.mobile.android#42240

  copy link   Newsgroups: comp.mobile.android
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: hugyb...@gmx.ch (Joerg Lorenz)
Newsgroups: comp.mobile.android
Subject: Re: Phone AV
Date: Fri, 30 Jun 2023 22:00:21 +0200
Organization: Camembert Normand au Lait Cru
Message-ID: <u7nc8l$1u8dh$1@solani.org>
References: <u7jgb2$23thu$1@dont-email.me> <kg50n1Fer8fU2@mid.individual.net>
<u7l9r2$2a4un$1@dont-email.me> <kg7hnuFqq52U1@mid.individual.net>
<u7m8qh$2grcf$1@dont-email.me> <Mhn*Mf7jz@news.chiark.greenend.org.uk>
<u7n0uj$1vobg$2@solani.org> <13pkrlklri5f6.dlg@v.nguard.lh>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 30 Jun 2023 20:00:21 -0000 (UTC)
Injection-Info: solani.org;
logging-data="2040241"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0)
Gecko/20100101 Thunderbird/102.12.0
Cancel-Lock: sha1:pFEt/DRJakMkRMNmijle8SxrUD0=
Content-Language: de-CH
In-Reply-To: <13pkrlklri5f6.dlg@v.nguard.lh>
X-User-ID: eJwNwoERACEIA7CVBNoi48if7D+CfwlDpi8hCpzfcicxN4LuUm3rbEOa1pnq2mie4a4Li+ED9A4P7w==
 by: Joerg Lorenz - Fri, 30 Jun 2023 20:00 UTC

Am 30.06.23 um 21:21 schrieb VanguardLH:
> Joerg Lorenz <hugybear@gmx.ch> wrote:
>
>> Samsung does not have an OS. It is just Android.
>
> Just like Google Chrome is a Chromium variant, but with proprietary code
> added from Google. As far as I know, Pixel and a few others come with a
> stock Android OS. About as pure as you can get.

Really?
Guess what! I have a Pixel 7!

Other phone makers
> brand their customized version of Android with separate or different
> features or functions. Saying Samsung's variant of Android is just
> Android is like saying SUSE is just Redhat.

Bullshit. Android is exactly defined.
You are really a Mr. Wisenheimer.

> Google is trying to alleviate the customization effort a phone maker
> puts into branding their OS variant. Before Google gave them the code,
> and the phone maker would customize it how they wanted. Google wants to
> modularize their OS, so customization is separate code instead of
> modifying the base code. However, phone makers still create a variant
> of Android, and that means they can add or remove whatever they want.
>
> Sorry, I forgot the name of Google's project that was to suppose to
> modularize Android to make it easier for phone makers to customize.
> However, that phone makers customize mandates that they are not
> supplying a pure Android OS. The phone makers want to improve, they
> want to brand their phones, and they have their own agenda.
>
> For example, there's Chromium, and there's Google Chrome. One is open
> source. The other is open source with added proprietary code. There's
> Firefox, and there's Vivaldi. Unless you get a phone with a pure
> Android (just a few of those), you get a customized version of Android.
> Google has their Find My Device while Samsung instead has Find My
> Mobile. Phones can come with different dialers. Each phone maker, when
> customizing the Android OS, can add their own services. They have
> similarity to Google's Android, and also have differences.

Are you bored?

--
Prudentia potentia est


computers / comp.mobile.android / Re: Phone AV

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor