• invertedspear@lemmy.zip
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    7
    ·
    10 hours ago

    Counterpoint: my software allows you to access your banking needs. I’m financially on the hook if fraud occurs. Fraud occurs because your favorite “slap the monkey” game also installs a keylogger and network monitor. So I don’t allow my software to work if you have that installed.

    I think you’re right that companies should not be able to tell you what software you can run, but users also can’t be trusted to keep their devices safe.

    A lot of network, banking, and telephony protocols historically rely on trusting that there are no bad actors in the chain. Technology has added more links to the chain increasing the opportunities for bad actors to tap into it.

    It’s a situation that needs better fixes. Maybe we just need to hand the current internet over to the bots and start a new one with security and privacy built in from the ground up.

    • feannag@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 hours ago

      Maybe banks could use a way to authenticate the user a second way, that doesn’t involve a password. If only. (Sidenote: why do banks still insist on sms 2FA?)

    • OrganicMustard@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      7 hours ago

      Android runs apps sandboxed, so no app can access what you write in another like your banking app, or the unencrypted packages it sends.

      • Pika@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        7 hours ago

        Yea the argument stated works better for rooted environments than rootless environments or sideloading.

        In a non-root scenario, you would need to specify a few permissions to give a keylogger that amount of access. I think that a big issue is people not understanding that there is a difference between a rooted device or root installed app, and a sideloaded application.

        Just because you have a non-google device or a rooted device != you have a compromised device. Applications aren’t going to magically install running as root, every rom worth their salt keeps it a clear isolation between the layers, and some roms don’t even allow you to use the root environment after installing it.

        In your standard google phone install? A keylogger wouldn’t be able to be installed without enabling an accessibility permission. It’s not like you can just “oops I just sideloaded a keylogger haha silly me” like described. Both google installed and side loaded applications would require prompting a warning page that very clearly states it allows logging of the screen for the logging part of it to work.

    • kkj@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 hours ago

      You’re liable if someone shares their credentials? Even if they did it accidentally by installing a keylogger, that seems like user error.