• TacoButtPlug@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      3
      ·
      2 years ago

      I’m a time where ios is beating Android’s ass. I guess 2023 is the year all the dumbest tech bros tell their competition to take over.

    • dashydash@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      2 years ago

      This will also make https filtering that is used by ad blocking apps impossible since you need to trust a certificate in order for it to work

  • jadero@programming.dev
    link
    fedilink
    arrow-up
    42
    arrow-down
    1
    ·
    2 years ago

    I learned that Android was not open under my personal definition of “open” right from the outset, because there was no programmatic access to telephony. My first project was to build an on-board answering machine with call screening capabilities.

    I used an answering machine on my landline to avoid paying for caller id and voicemail and wanted to do the same with my cellphone. I was very disappointed to learn that this was not possible, at least with my skillset.

    I knew that things were going the wrong way when my Tasker script to manage airplane mode stopped working when Android required locked it away. My use case there was that lack of connectivity at the gym and at home meant that connection attempts were draining my battery and heating up the phone. Now, of course, Android does a much better job of that particular task on its own, but it still makes me cranky. :)

    Everything that has happened since has only cemented my opinion that Android is not actually an open platform. I do see many of the changes as potentially valuable security measures for the masses, but I wish that it wasn’t quite so difficult for a power user to use the power of the little computer we carry in our pockets.

  • jemikwa@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    16
    ·
    2 years ago

    From an IT perspective with little context on this change other than what’s in the article, if there’s no way to import your own certs using an MDM, this change is terrible for businesses.

    You need custom certs for all kinds of things. A company’s test servers often don’t use public CA certs because it’s expensive (or the devs are too lazy to set up Let’s Encrypt). So you import a central private CA cert to IT-managed devices so browsers and endpoints don’t have a fit.

    For increased network security, private CAs are used for SSL decryption to determine what sites devices are going to and to check for malware embedded in pages. In order to conduct SSL decryption, you need your own private CA cert for decrypting and re-encrypting web content. While this is on the decline because of pinned certs being adopted by big websites, it’s still in use for any sites you can get away with. You basically kill any network-level security tools that are almost certainly enabled on the VPN/SASE used to access private test sites.

    • alr@programming.dev
      link
      fedilink
      arrow-up
      1
      ·
      2 years ago

      Re: too lazy for Let’s Encrypt, a) last I used LE (for my personal site), your site had to be publicly available on the Internet so that you could prove you controlled the site. Most test servers are not public. and b) many (most?) companies would throw a fit if you started generating your own certificates for their domains.

      But there are always solutions. I was able to talk my company into getting properly signed certs for our test servers.

    • mrkite@programming.dev
      link
      fedilink
      arrow-up
      23
      arrow-down
      2
      ·
      2 years ago

      Maybe read the article and not look like an idiot. All they did was move the certificates into a signed package that is updated through Google Play. They can revoke certs even faster now because it doesn’t require a system update.

      • ArbiterXero@lemmy.world
        link
        fedilink
        arrow-up
        13
        ·
        2 years ago

        Cool, so I can’t revoke the certs myself? Still bad.

        I can’t add my own for testing? Still bad.

        They manage it via an app that I can’t change at all? Still bad.

    • mathemachristian[he]@lemm.ee
      link
      fedilink
      arrow-up
      7
      ·
      2 years ago

      I mean thats what its mainly for? To quickly update CAs without needing to do it as a system update that the vendor needs to vet first

  • colonial@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    2 years ago

    I’m pretty sure I can’t even connect to my university’s network without installing a custom certificate.

    What brainlet at Google thought this was a good idea?

  • Solemarc@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    2 years ago

    By all means correct me if I’m wrong, but looking at the PR this article links to. It looks like all that’s happening is that Google’s trusted certs are being added to an android security API and are now immutable. Any non Google certs are still going to be saved to ANDROID_ROOT/etc/security/cacerts the same as they currently are.