• @roastpotatothief@lemmy.ml
    link
    fedilink
    2
    edit-2
    2 years ago

    yes there’s few things i can think of

    • centralized. One vulnerability exposes billions of devices
    • closed source. cannot be audited easily. so bugs remain undiscovered and backdoors can be built in
    • you can’t verify android software with a hash. so infected versions can be selectively pushed to particular people.
    • monopoly. manufacturers are barred my Google from making/selling non android phones and probably lots of other contributors. all of the above could be fixed with laws, or good regulation.
    • Jesse
      link
      fedilink
      12 years ago

      you can’t verify android software with a hash. so infected versions can be selectively pushed to particular people.

      This would be NSO group’s dream I reckon.