- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
cross-posted from: https://lemmyf.uk/post/5813538
First ever iOS trojan discovered — and it’s stealing Face ID data to break into bank accounts
cross-posted from: https://lemmyf.uk/post/5813538
First ever iOS trojan discovered — and it’s stealing Face ID data to break into bank accounts
Because Google already lets apps do anything they want no matter how malicious. There’s no reason to leave the Play Store.
Apple has people sneak past their rules on occasion because screening is hard, but they have and enforce rules that protect your privacy that malware companies like Facebook don’t want to follow.
Android has a permission system (with flaws) not too dissimilar to iOS.
Both systems had apps sneak past it in clever but very similar ways to bypass them. Both were curbed by screening after being found.
I really doubt Facebook will force anyone to install their app from outside the store. You are talking about something that normies will barely be able to do.
I’m not talking about permissions.
I’m talking about their store policies. Google is far more permissive about malicious behavior than Apple is. Companies that have no reason to bypass the play store because it already allows them to spy to an obscene degree will bypass the App Store when given the opportunity, because it does not.
I dont think Google is as permissive as you say, but regardless, they won’t. Try and get a normie to enable and install a sideloaded app on Android and you will see what I mean.
The amount of social engineering required just makes this point moot. Might as well get them to do the same MDM attack illustrated in this article. Its not any less secure.
Facebook can and will.
The entire reason they don’t on Android is because there’s literally no benefit to it.
They won’t because most users won’t be able to.
The permission system on both OSes is baked into the OS itself not the store. Theres literally no benefit to it on either platform unless Meta starts distributing actual OS exploits.
This is very unrealistic.