Deutsch English Français Italiano |
<v9mdek$145d$1@nnrp.usenet.blueworldhosting.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail From: Andrew <andrew@spam.net> Newsgroups: comp.mobile.android Subject: Re: Washington Post says Google sold Android phones with hidden insecure feature Date: Fri, 16 Aug 2024 02:27:32 -0000 (UTC) Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com) Message-ID: <v9mdek$145d$1@nnrp.usenet.blueworldhosting.com> References: <v9ljlv$n71$1@nnrp.usenet.blueworldhosting.com> <v9ls35$sf9a$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Fri, 16 Aug 2024 02:27:32 -0000 (UTC) Injection-Info: nnrp.usenet.blueworldhosting.com; logging-data="37037"; mail-complaints-to="usenet@blueworldhosting.com" User-Agent: NewsTap/5.5 (iPad) Cancel-Lock: sha1:4g1znGMozGxovgilte4dr2xj1Vg= sha256:Irk0fdd3TOI0WcYaQP79Q9/DU6xjNF8XDKVDn2ChEoE= sha1:wj8upMLzELBw62l3whyklWc5SBE= sha256:CPgeigrxyr2Cgp1xQNFXeKcfxmzQRUUgNRcNxuzR0CI= X-Face: VQ}*Ueh[4uTOa]Md([|$jb%rw~ksq}bzqA;z-.*8JM`4+zL[`N\ORHCI80}]}$]$e5]/i#v qdYsE`yh@ZL3L{H:So{yN)b=AZJtpaP98ch_4W} Bytes: 2955 Lines: 33 Jeff Layman wrote on Thu, 15 Aug 2024 22:31:17 +0100 : > I assume that showcase.apk was removed when grapheneOS was installed as > that is intended for use in Pixel phones. You're correct that "showcase.apk" seems to be the culprit, according to this news article about the Pixel flaw which shipped since 2017 apparently. *Researchers claim most Google Pixel phones shipped with exploitable bloatware since 2017* <https://www.engadget.com/mobile/smartphones/researchers-claim-most-google-pixel-phones-shipped-with-exploitable-bloatware-since-2017-185926564.html> "The issue relates to "Showcase.apk," a bit of software made for Verizon and used to put Pixel devices in demo mode while displayed in retail stores. The software downloads a configuration file over an unencrypted web connection, which - because of Showcase's deep access - might allow bad actors to perform remote code execution or remote package installation on the device. The especially troubling part of this discovery is that Showcase can't be uninstalled at the user level. And while it is not enabled by default, iVerify said there could be multiple ways to activate the software. iVerify alerted Google to the vulnerability in May; thus far there's no confirmed evidence it's been exploited in the wild. A Google spokesperson told Wired that Showcase is no longer being used by Verizon and that Google would have a software update to remove the software from all Pixel devices in the coming weeks. Additionally, the rep said Showcase is not present in the line of Google Pixel 9 devices announced during the Made by Google event this week."