skip to main | skip to sidebar

TechsVilla

HOUSE OF TECH FOR ZEALERS

  • TECH
  • GAME
  • BLOG
  • WINDOW
  • LINUX
  • APPLE
  • SECURE
  • MSN
  • TIPS
  • The Walled Garden Has Won

    Friday, March 18, 2011

    The Walled Garden Has Won

    Ten days ago Google discovered that apparently innocuous Android apps were in fact infested with “DroidDream” malware that included an Android rootkit, with the apparent intent of creating a smartphone botnet. It infected more than a quarter of a million devices before Google intervened. The thriller writer in me immediately began to wonder what would happen ifblack hats built a wildly popular game that doubled as a botnet beachhead. Imagine if Angry Birds was secretly the world’s biggest botnet: even without root access to its install base, those hypothetical black hats could grab private data from tens millions of people, and/or probably DDoS every wireless network in the developed world, especially if it ran as a background service with location access.
    That will never happen, of course: it’s what security guru Bruce Schneier calls a “movie-plot threat.” But it does illustrate that you couldn’t stop a Trojan app like that in advance. Android Market security is based on permission requests when an app is installed: such requests are routinely ignored, since nowadays almost every app asks for full Internet and SD card access.Ah, you might say, if only Android apps were vetted in advance, like Apple’s! In which case you should really stop kidding yourself. Most apps seem to be reviewed in an hour or less (after days in the queue.) Apple appears to check the libraries they link against, and maybe they can decompile to the original source code, too – though I doubt it – but iOS apps are written in Objective-C, which includes support for C itself, a language for which labyrinthine obfuscation has become an art form. Any developer worth his/her salt could write an iOS app that includes code whose use only becomes apparent when the app receives a secret signal.
    Once upon a time, not so long ago, people talked about how “walled gardens” (like AOL and CompuServe, back in the day) would inevitably lose out to the free, wild, open Internet – and most software was preinstalled, shrink-wrapped, or downloaded from a trusted site. But nowadays users download potentially untrustworthy software from trusted sites. (See also: the Mac App Store.) That’s why providers need the remote kill switch that Google used on DroidDream; that Apple has had for years, and is ready to use on “unauthorized” iOS users as well as apps; and that Intel is now building in at the hardware level, so that phones (and computers) running Intel chips can be killed with a simple encrypted SMS.
    Ten years ago people were horrified at the notion of Intel adding a unique ID to all of its processors. Today every phone has a unique ID, and yours is probably uploaded to apps’ servers multiple times a day. Not so long ago, people were outraged that Amazon could anddid arbitrarily delete books from users’ Kindles; last week they clamored for Google to exercise essentially the same power. Giving all that power and control to Amazon, Apple, Google and Intel in exchange for security may ultimately be a reasonable and necessary tradeoff — but that kind of centralization of control still makes me more than a little uneasy.
    As the developing world adopts smartphones as their first and only computers, Android and iOS will increasingly dominate all Internet traffic. (What about RIM and Windows Phone? I expect they both have kill switches too, but really, who cares; wake me up when one of them has won next year’s war for third place.) Android is a walled garden just like iOS, subtler but no less forbidding. And you can’t even escape the app garden via your browser, because your browser is, in and of itself, an app. While we weren’t looking, the walled garden won.
    Posted by Rajan Chatterjee at 12:29 PM Email This BlogThis! Share to X Share to Facebook

    0 comments:

    Post a Comment

    Newer Post Older Post Home
    Subscribe to: Post Comments (Atom)
    Powered by Blogger.
    • Home
    • TWEAK PC
    • MICROSOFT NEWS
    • CYBER SECURITY
    • APPLE
    • LINUX
    • WINDOWS
    • WEB DESIGNING
    • GAMING
    • TECHVISION

    TechsVilla Corner

    Loading...

    Blog Archive

    • ▼  2011 (156)
      • ►  April (5)
      • ▼  March (151)
        • PC won't boot up? How to find out why it so....
        • Mac OS X 10.7 Lion: what you need to know
        • In Depth: Our preview of the best of the new phone...
        • Kinect For Xbox 360 Hacked To Work With Sony PlayS...
        • Next Generation Xbox Hardware To Surface By 2015?
        • Tethered Jailbreak for iOS 4.3.1 Now Available (Bu...
        • iOS 4.3.1 Jailbroken Already Using PwnageTool. Her...
        • 3DS Crashing To “Black Screen Of Death”?
        • Panasonic And Partners Announce New M-3DI Active-S...
        • MIT Scientist Claims To Have Created Practical “Ar...
        • SSDs have been on my Amazon Wishlist for over ...
        • Windows Phone 7 gets copy and paste update
        • Windows 8: everything you need to know
        • The Only Secure Password Is the One You Can’t Reme...
        • Honeywell’s Home Automation Touchscreen: Security ...
        • How to research your users
        • Bulletstorm review
        • Homefront Review
        • Forza Motorsport 4: Capitalising on GT5's missteps?
        • Crash Time 4: The Syndicate Review
        • iPad 2 review Apple's new tablet is the best of i...
        • Firefox 4 review It's the best Firefox yet. Is it...
        • How Mozilla turned the corner with Firefox 4
        • Fly or Die: The Nintendo 3DS, Rockmelt, And Mobile...
        • Robocast Sues Apple For Infringing Its ‘Automated ...
        • Drunk On Licensing Fees And Patents, Microsoft Has...
        • http://techcrunch.com/2011/03/22/googlers-buy-more...
        • This tip will explain How to open a file manager o...
        • Social Media Risks: The Basics
        • 9 Dirty Tricks: Social Engineers' Favorite Pick-Up...
        • 3 reasons trustworthy sites can no longer be trusted
        • Facebook is biggest mobile malware threat, says se...
        • Malware exploding, especially on mobile devices
        • Local ethical hackers nurtured in Kenya
        • Mobile security moving to the forefront? Extending...
        • Expert: RSA security breach compromised key federa...
        • Anonymous Exposed: Hacker Group Infiltrated, Chat ...
        • How your operating system works
        • Libre Graphics Meeting: Cutting Edge Creative Tool...
        • Red Hat Announces EMEA Partner Summit: Dublin Ireland
        • Create a social media icon
        • Nintendo 3DS released
        • SPLIT/SECOND
        • HALO REACH
        • Assassin’s Creed: Brotherhood
        • SPIDER-MAN: SHATTERED DIMENSIONS
        • Apple: Judging an app by its icon
        • Master the Windows 7 Action Center
        • Share files between Windows Vista and Windows 7
        • Download and install the best gadgets
        • CES 2011: More details about the Windows Phone 7 u...
        • Netbook ultimate guide
        • Get more from email
        • Reinstall Windows For The Last Time
        • HTC Incredible S To Come In Strawberry Red?
        • The Magic Connector Unifies The Apple Wireless Key...
        • Every Super Nintendo Game Ever – Yours For $9999!
        • Prevent E-mail Disasters: 5 Tools to Protect You f...
        • Apple Tweaks In-App Purchase To Prevent Accidental...
        • Analyst: Non-iPad Tablets Will Be Collecting Dust ...
        • PS3 To Be Re-Secured by 3.60 Firmware
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • AT&T DSL Adopts 250GB Monthly Bandwidth Cap
        • Google Maps Can Now Locate EV Charging Stations
        • M-Edge’s Case Designer Lets You Customize Your iPa...
        • MicroCenter Takes Up To $200 Off MacBook Pro
        • Bang And Olufsen Bring 16 Speakers To The New BMW ...
        • Protect your home with your webca
        • 9 Steps to get Windows Vista help from your friend...
        • The Best Flash Sites Ever
        • Web fonts: the .net top 20
        • Best web design: How to create better layouts from...
        • Best Graphics/Design Tool
        • Best Digital Photo Management Tool
        • Best IRC Client Pidgin Honorable Mention/Runner Up...
        • Best Single Office Program
        • Best Office Suite
        • Best Microblogging Client
        • Best IM Client
        • Best E-mail Client
        • Best Web Browser
        • Best Desktop Environment
        • Best Mobile OSGoogle Android Honorable Mention/Run...
        • Best Distribution for Netbooks/Limited Hardware
        • Best Linux Distribution
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • Adobe Just Made Medialets Its Mobile Ad Server
        • Apple Keeps Right On Approving Amazon And Netflix ...
        • Study: Mobile Ad-Tracking Systems Are “Blind” To 8...
        • The Ever-Elusive Mobile Wallet: Why NFC Chips Are ...
        • It’s A Good Day To Be An iPad Competitor . . . Oh ...
        • Why Payments Are Hard, Even For Apple And Google
        • Dear Apple, Please Copy This Notification System F...
        • Explor, Touch-Based App Discovery To Get Around Th...
        • Adobe’s Wallaby Can’t Jump Very High
        • As Apple Ponders Their Subscription Ruling, Readab...
        • Video: Hands-On With An Engineering Prototype 64GB...
        • On Apple TV Special Apps, Sports, And The Slow Ble...

    Popular Posts Widget

    • SPIDER-MAN: SHATTERED DIMENSIONS
      RATINGS 4/5 Action Spider-Man: Shattered Dimensions Price       Rs 3,499 (PS3) PUBLISHER          Activision DEVELOPER         Beenox PLA...
    • Web fonts: the .net top 20
      Web fonts: the .net top 20 It’s easier than ever to get creative with typefaces. Elliot Jay Stocks picks 20 web fonts that demand your vis...
    • Mac OS X 10.7 Lion: what you need to know
      Steve Jobs and other senior Apple employees provided   a glimpse   into Mac OS X 10.7 'Lion', making clear Apple's philosophy re...
    • Wireframe tools: the top 10 solutions
      Create your next prototype the easy way with our guide to the best wireframing tools out there Every website design has to ki...
    • PC won't boot up? How to find out why it so....
      You press the power button and your PC won't boot up. What do you do next? Don't write it off just yet. The first thing to do when ...

    Total Pageviews

    Subscribe To

    Posts
    Atom
    Posts
    Comments
    Atom
    Comments

    About Me

    Rajan Chatterjee
    I m Student Of computer Scince Engineering and tech-savvy person have unlimit zeal for programming and technology
    View my complete profile

    Followers

    Copyright © 2010 TechsVilla | Blogger Templates by Splashy Templates
    Css Designed by Hot Website Templates