• roastpotatothief@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    3 years ago

    yes there’s few things i can think of

    • centralized. One vulnerability exposes billions of devices
    • closed source. cannot be audited easily. so bugs remain undiscovered and backdoors can be built in
    • you can’t verify android software with a hash. so infected versions can be selectively pushed to particular people.
    • monopoly. manufacturers are barred my Google from making/selling non android phones and probably lots of other contributors. all of the above could be fixed with laws, or good regulation.
    • Jesse@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      3 years ago

      you can’t verify android software with a hash. so infected versions can be selectively pushed to particular people.

      This would be NSO group’s dream I reckon.