• johannesvanderwhales@lemmy.world
    link
    fedilink
    arrow-up
    74
    ·
    9 months ago

    Isn’t saying that allowing apps to have root lets them access anything just describing what root is? A rooted phone doesn’t have to give superuser access to every app.

    • dan@upvote.au
      link
      fedilink
      arrow-up
      28
      arrow-down
      3
      ·
      9 months ago

      A rooted phone doesn’t have to give superuser access to every app.

      Sure, but apps that run as superuser can access anything, including the data and memory for banking apps. A big part of Android’s security model is that each app runs as a different user and can’t touch data that’s exclusively owned by another user.

      • johannesvanderwhales@lemmy.world
        link
        fedilink
        arrow-up
        35
        arrow-down
        1
        ·
        9 months ago

        It just means you need to trust apps that you give root access to, or only give elevated privileges during the very specific times when apps need them. Root isn’t something people who don’t know what they’re doing should be messing around with, I guess. But I’d think a lot of people who root their phone know and accept the risks.

        • dan@upvote.au
          link
          fedilink
          arrow-up
          17
          ·
          edit-2
          9 months ago

          People like you or I may know what we’re doing with a rooted device, but I think the issue for the banks is that they can’t guarantee that someone with a rooted phone knows what they’re doing or isn’t using a malicious app, so they have to be cautious and block all rooted phones.

          An app that requires root may look like a normal app but it could be a trojan that modifies banking apps in the background (eg patches them on disk or in RAM so transfers done through the app go to a different recipient). There’s been malicious apps in the Play Store in the past, and rooted apps have way less oversight - some are literally just APK files attached to XDA-Developers posts or random blog sites.

          • johannesvanderwhales@lemmy.world
            link
            fedilink
            arrow-up
            12
            arrow-down
            1
            ·
            9 months ago

            I take your point, and I’m sure you’re right about the banks’ rationale, but in my own view it does not seem like it should be the banks’ decision to make.

            • qjkxbmwvz@startrek.website
              link
              fedilink
              arrow-up
              8
              ·
              9 months ago

              As soon as a bank offers any sort of fraud protection, though, security becomes a bank issue (in addition to a “you” issue).

              Not at all saying I agree with the banks on this, but I think that may be part of the thinking.

              • dan@upvote.au
                link
                fedilink
                arrow-up
                2
                ·
                9 months ago

                This is a good point. The bank needs to do as much as they can to reduce fraud risk, and they’ve probably found some correlation between rooted phones and a higher likelihood of fraudulent transactions. Some banks block VPNs for a similar reason - when logging in from a VPN, it’s harder for them to tell that it’s actually you vs if it’s an attacker that uses the same VPN service as you.

            • markstos@lemmy.world
              link
              fedilink
              arrow-up
              1
              ·
              9 months ago

              Your risk exposure is that you could lose your bank account balance. The banks risk exposure is that they could lose every bank account balance exploited by the same rooted phone vulnerability. So they evaluate risk differently than you do.

          • sepi@piefed.social
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            9 months ago

            bro I gave my nana root on her eye phone and by the end of the week she had hacked half of North Korea - the other half thought her actions were a good example of juche ideals. It was crazy ngl

    • cybersandwich@lemmy.world
      link
      fedilink
      arrow-up
      8
      ·
      9 months ago

      I think he was trying to say apps get access to “root features” through an abstraction layer/API calls that is controlled.

      They don’t/wouldn’t have carte blanche root access to the underlying system. It’s kinda like a docker container or VM or flatpaks/snap packages on Linux. They are sandboxed from everything else and have to be given explicit premission to do certain things(anything that would need root privileges/hardware access).