Asking Android Developers About Security at Droidcon Berlin

Поділитися
Вставка
  • Опубліковано 1 чер 2024
  • I attended droidcon Berlin 2023 and interviewed some developers about what they know about Android security. Thanks again to everybody who answered my questions, and thanks Egidijus for the dcbln23 ticket.
    Buy the terrible font (advertisement): shop.liveoverflow.com/
    Watch my security conference vlog: • Awkward VLOG at Nullco...
    Egidijus on Twitter: / aegislil
    droidcon: www.droidcon.com/events/droid...
    Chapters:
    00:00 - Intro
    00:37 - Meet Egidijus
    00:57 - The Plan for Today
    02:00 - Developer Interviews
    05:54 - How To Become a Security Researcher?
    07:24 - Conclusion After Interviews
    09:21 - My Conference Experience
    10:55 - Conference Day 2
    13:30 - Conference Day 3
    16:34 - Some Final Thoughts
    =[ ❤️ Support ]=
    → per Video: / liveoverflow
    → per Month: / @liveoverflow
    2nd Channel: / liveunderflow
    =[ 🐕 Social ]=
    → Twitter: / liveoverflow
    → Streaming: twitch.tvLiveOverflow/
    → TikTok: / liveoverflow_
    → Instagram: / liveoverflow
    → Blog: liveoverflow.com/
    → Subreddit: / liveoverflow
    → Facebook: / liveoverflow

КОМЕНТАРІ • 176

  • @LiveOverflow
    @LiveOverflow  10 місяців тому +146

    Watch me go out of my comfort zone approaching strangers and interviewing them.
    The answers were very interesting and as a security consultant their point of view is important to me.

    • @lior_haddad
      @lior_haddad 10 місяців тому +10

      relatable

    • @slendi9623
      @slendi9623 10 місяців тому +6

      relatable

    • @TechnologicNick
      @TechnologicNick 10 місяців тому +1

      Imo it was really cool

    • @kingshukcs
      @kingshukcs 10 місяців тому

      Where can I get started with Android Security? I was a flutter developer and I'm currently learning Jetpack Compose, but I want to see both sides of the coin (developing and hacking).

  • @sobertillnoon
    @sobertillnoon 10 місяців тому +49

    I love how that one app dev said repackaging an app to remove monetization is an improvement

    • @uis246
      @uis246 10 місяців тому +6

      Make slogan "Defective by Design" go to a new level

    • @danieljakob1307
      @danieljakob1307 8 місяців тому +1

      Chances of this being in direct reference to ReVanced?

  • @and_new
    @and_new 10 місяців тому +71

    I can tell you something about security measures in banking apps I used. They have no problem with running on an old android version with known vulnerabilities. But they can detect rooted androids or even androids with unlocked bootloader and lock the user out. At the same time there is no problem with using their banking website.

    • @PhilippDurrer
      @PhilippDurrer 10 місяців тому +4

      That's afaik a Android built-in API called CST attestation, that gives the apps hints if it's running on a rooted device or not.

    • @wetfloo
      @wetfloo 10 місяців тому +9

      thankfully, that is bypassable with some magisk trickery

    • @alang.2054
      @alang.2054 10 місяців тому

      ​@@wetfloowhy thankfully? No one wants to get their bank get hacked. I don't understand you

    • @sven5666
      @sven5666 10 місяців тому

      ​@@alang.2054no root detection is ever going to prevent a bank from getting hacked.

    • @damjandjordjevic1994
      @damjandjordjevic1994 10 місяців тому

      @@alang.2054 If I rooted my phone, I know what I'm doing. No need to "protect" me by not allowing me to use the app(unless the app stores security info in plain text in app's private data)...

  • @superjugy
    @superjugy 10 місяців тому +23

    Hi @LiveOverflow. Love the vids. Just had one small comment. I noticed you put notes in your videos in different parts of the screen, including the bottom part. Since my native language is not english, some times I use subtitles to understand better. Unfortunately the subtitles cover your notes if they are at the bottom, so I'm left to either pause the video continuously, or watch without subtitles. if you could leave a little space for the subtitles at the bottom, or use other parts of the screen, it would help people that need subtitles. Thanks for the content!

  • @ChairmanHehe
    @ChairmanHehe 10 місяців тому +16

    not loving where their heads are at re: blocking access to codebasses, obfuscating, this is how you get closed source security theatre

  • @mu11668B
    @mu11668B 10 місяців тому +65

    Honestly, the mobile apps ecosystem has become quite a nightmare nowadays. It wasn't surprising to me that most devs consider reverse engineering their greatest enemy. But it is a problem and I just cannot complain about it enough. In Asia especially, it's not uncommon to see apps packed with commercial "protectors" that literally behave like advanced malware packers. Such things are just horrible to end users in terms of security. They are so ubiquitous that it's not ideal to ban them on the app store, while no effective method is available to determine whether an app packed with such a "protector" is benign or not. And I do feel the devs' frustration, too. You can not just blame users for being muggles who cannot distinguish the original app from all those cash-grabbing copycats. After all, they are just users, and users bare absolutely no responsibility to serve the devs. As for the copycats, there is no way to detect them, either. The whole situation is just awful, with no obvious solution in sight. Sigh...

    • @AshleyM120
      @AshleyM120 10 місяців тому +4

      The original concept of "protecting client side code" seems deprecated to me, most tech managers don't even understand why they are doing that anymore. While working for banks i often saw that, principles that used to be true but not true anymore due to more advanced algorithms practices that don't get updated. If you are not protecting your JS or wasm in web but you want to protect your android, ios client side code mostly interacting with your backend. Most well designed apps in React native or Flutter don't make critical storage or config mistakes anymore. So you are "protecting your code against what" attackers don't find client side bugs ?

    • @CamaradaArdi
      @CamaradaArdi 9 місяців тому +1

      Keep in mind that apps have to work offline

  • @skyracer-mk8hg
    @skyracer-mk8hg 10 місяців тому +33

    I think those developers dont really know that much about security based on the interviews. They worry about reverse engeneering because of someone stealing their assets. Thats not really application security. Its more like business security in case any competitor gets a benefit. The backend is what gets hacked and where the data is leaked in most cases. Saying that a registration of a username called "root" is forbidden shows me that their backend is most likely not really that robust if it cannot handle that.

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому +1

      Yeah, although it might be defense in depth, it raises a red flag if someone wants to validate something like this in the frontend or even feels that much of a need to validate this at all ...

    • @JordanPlayz158
      @JordanPlayz158 10 місяців тому +3

      Yeah, if you are worried about reverse engineering to prevent others making a better app than your own.... maybe you should spend that reverse engineering prevention time into actually making the app good enough to where an alternative won't have many benefits compared to your own (thus making the alternatives less appealing

    • @JordanPlayz158
      @JordanPlayz158 10 місяців тому +1

      ​@@whannabiyeah, if you use obfuscation to ignore fixing issues with your app, imo you are doing it wrong

  • @sp4ghetticode
    @sp4ghetticode 10 місяців тому +14

    Still gutted we didn't cross paths - thanks so much for all you have done to promote security!
    You were one of my many inspirations to speak and discuss mobilesec. Hope to thank you in person next year 😅

  • @epto
    @epto 10 місяців тому +23

    The anti-reversing protections, at least to me, seem to be very similar to web application firewalls and their bot JS challenges. Many people are discouraged by it, but somebody with motivation and resources will not be stopped by it.

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому +2

      Yeah obfuscation and security through obscurity often gives a false sense of security.

  • @Anton-ih4we
    @Anton-ih4we 10 місяців тому +9

    I really like this type of content! It's a pity that you got those camera issues but thank you for sharing that. The fact that you shared that and told us about it made you even more wholesome and relatable :) One thing that triggered me a bit was that you didn't resolve what movie played at day 2 but maybe you dont know about it either. All in all a great video with nice insights!:)

  • @TheOisannNetwork
    @TheOisannNetwork 10 місяців тому +56

    As someone working for one of the App Security companies at that conference (not shown in the video); it's not so much that these companies care so much about obfuscation, but many of our customers think obfuscation is the important part. I get what you mean when you call it snakeoil, and I agree to an extent, but it is usually just a smaller part of the bigger picture. Unfortunately many developers and especially regulators think obfuscation is very important.

    • @Zappexe
      @Zappexe 10 місяців тому +4

      Yes yes yes! Most of regular apps don't need anything like that but obfuscation and malicious environment detection is critical for finance apps and the game industry. I think people might get a wrong idea from this video

    • @aseidma3576
      @aseidma3576 10 місяців тому +16

      @@Zappexe Why would obfuscation be critical in a finance app? If you need to obfuscate the frontend of a finance app for it to be secure you are probably already in deep shit security-wise. The only apps that might profit from obfuscation are those that have a majority of their actual business logic on the client side. This should never be the case for finance apps.

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому

      ​@@aseidma3576Also, I don't understand why the App platforms aren't developing some kind of "trusted computing", offloading encryption and challenge response based tasks onto a dedicated chip like with WebAuthn for example? Also, isn't 2FA supposed to solve the problem of signing transactions even without such advanced techniques?

    • @codahighland
      @codahighland 9 місяців тому

      ​@@aseidma3576 The argument is that if the protocol can be reverse-engineered, then attackers can try to attack the backend directly. If you can steal credentials but you can't spoof requests then it's harder to scale up an attack. And if you're phishing, the more you can do to replicate the real behavior of the app, the more likely it is that you can trick users into thinking nothing is wrong. And if it's harder to analyze the behavior of the app, it's harder to use it for something like a confused deputy attack.
      Yes, of course it doesn't actually STOP anything. Backend security and fraud detection is way more important. But that doesn't mean front end security doesn't matter.

    • @celivalg
      @celivalg 9 місяців тому +2

      @@Zappexe obfuscation only gives you time, it doesn't prevent something from being reverse engineered

  • @Player_X_YT2
    @Player_X_YT2 10 місяців тому +10

    Obfuscation is just another way of saying security through obscurity

  • @lexer_
    @lexer_ 10 місяців тому +17

    It's obvously nice to have a good camera for an interview but you really shouldn't be ashamed to just record it with a phone. That isn't nearly as unprofessional nowadays as you might think. Especially on an android developer conference!
    It's too late now, but maybe for next time. Just using your phone as a backup is acceptable.

    • @LiveOverflow
      @LiveOverflow  10 місяців тому +15

      imagine pulling out an iPhone at an Android development conference :P

  • @stefan3816
    @stefan3816 10 місяців тому +4

    Hey! Your videos have taught me so much. Thank you!

  • @rogo7330
    @rogo7330 10 місяців тому +14

    At one point I become so frustrated that "everything is app" in my smartphone that I just switched to web where I could and other junk just dumped and started using my laptop more. I hope that one day smartphones will stop being frontshop for corporates to sell their products and start being what they really are - computers in our pockets.

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому +1

      Nowadays devs are lazy and apps are more and more just packaged web apps, lol

    • @lemonsh
      @lemonsh 9 місяців тому +1

      Yea same, I simply stopped using services that require a mobile app and do as many things as reasonable on my laptop or desktop instead of my phone

    • @craigslist6988
      @craigslist6988 9 місяців тому +1

      it's so frustrating how bad it is and how stupid people most people are to just let it happen.
      Phones in the last five years have regressed in usability while getting absolutely minimal / mediocre feature improvements. There's a reason apps force updating now.. if they didn't a good chunk of people wouldn't update, because updates degrade the product now.
      It's like we started out with houses, and naturally people wanted better houses. So someone came along and says hey we upgraded your house to this hotel room! The TV is 4" larger than the old one! And no you don't have a choice, either you move into the hotel now or be homeless.
      And everyone just blindly jumped on board... then the next they start charging you to turn on the TV and opening the minibar... and idiots are shocked. Like yeah geniuses, that is why some of us tried to push back on making everything a f'ing hotel.

  • @chibby0ne
    @chibby0ne 8 місяців тому

    I did find it funny, but props on you for owning it in camera and then asking for help on the twitterverse. Thanks for making the video and bringing forward the insights from your perspective.

  • @nug203
    @nug203 10 місяців тому +2

    lmao the day 2 and day 3 camera issues had me actually laughing out loud. Great video
    edit: I dont know how feasible it is, but a liveoverflow font that supports nerdfont style icons that I could use as a terminal font would be awesome.

  • @jonathanhoyos8191
    @jonathanhoyos8191 10 місяців тому

    congratz for new format. I like this a lot

  • @HxN0n3
    @HxN0n3 10 місяців тому

    superb! hope, I'll be there with you one day

  • @y666p
    @y666p 9 місяців тому +1

    lol you rock with the camera stuff indeed!

  • @notapplicable7292
    @notapplicable7292 10 місяців тому +7

    Client side obfuscation seems insane to me

    • @ndm13
      @ndm13 10 місяців тому

      Decompiling an APK is incredibly easy. When that's the only thing keeping a stranger from what is more or less a copy of your source code, I can see why that would be worrying for a closed source app, unless you go the extra mile to run everything on the server side or require an always-online app (with the new worry of that being patched out), neither of which is a good user experience. So the stopgap for many people is obfuscation, and plenty of companies are happy to oblige. Data security isn't the priority for most local apps, IP security is.

  • @codeanalyzed1445
    @codeanalyzed1445 10 місяців тому

    can u plz do more such videos as they really feel refreshing

  • @nosystemissaf3
    @nosystemissaf3 10 місяців тому

    its okk we dont want anything just the content that you create that enough for making our day wonderfull :))

  • @MemeConnoisseur
    @MemeConnoisseur 10 місяців тому

    Great video as always, it was funny how unlucky you were haha there is always next con

  • @berndeckenfels
    @berndeckenfels 10 місяців тому +1

    There are typical mobile security topics (beside insecure backends M1,M2), especially unsafe credential storage (M5 not using proper Api, M9 not proteting local data), exposing insecure interfaces (share handlers, url handlers), app secrets and a lot of Trojan/malicious dependencies (M3)

  • @Merlin-gl7zp
    @Merlin-gl7zp 10 місяців тому

    I had a very similar fackup with my rocket computer recently, when I firstly forgotten to change the batteries and the forgotten the SD and then batteries again

  • @james-cucumber
    @james-cucumber 10 місяців тому +4

    Friendly reminder to double check ai generated captions. I assume you wouldn’t have transcribed “root” as “roots”. Thanks for the fantastic video as always :)

  • @FuzzyLitchi
    @FuzzyLitchi 10 місяців тому

    you're a professional youtuber in my heart ❤❤

  • @Kolor-kode
    @Kolor-kode 10 місяців тому +4

    I hear a lot of examples of security through obscurity here

  • @eughenes95
    @eughenes95 10 місяців тому +2

    Not an android developer, but im pretty sure the disproportional concern about reverse engineering is due to java and other languages with runtime such as C#
    It is quite trivial to de-compile a java app, and i suspect its much easier to get insights into the architecture compared to revere engineering a c++ program.
    Obfuscating is a pain in my ass in my experience, especially if the system surrounding the software wasn't built for it. Kinda makes you wonder why projects like GCJ aren't more used, especially considering that (no matter what oracle says) you can never assume that your target machine has the JRE you need.

  • @maratmkhitaryan9723
    @maratmkhitaryan9723 10 місяців тому +9

    I hate security by obsecurity bullshit. That makes so much harder for new hackers to enter the field. I understand it when you make something like malware that is supposed to harm and be secret about its functionality. But banks/productivity apps?
    Most of their functionality is based on server side! Also game anti cheats are now obsolete. Nowadays everything goes into server side!

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому +5

      As a developer, I never understood those either. Also arguments made from some developers on the interview like "Oh they could reverse engineer und could see how our API works." And? What's the problem with that? If I wanted to intercept API calls I would rather install a self signed certificate on my device and intercept the traffic with a proxy ... I would agree if people would argue with defense in depth, but just saying "I need to obfuscate" is just fishy

  • @JJJMMM1
    @JJJMMM1 10 місяців тому +4

    So what was the movie?

  • @itsm3dud39
    @itsm3dud39 9 місяців тому

    is smali reveresing, frida still possible? if no then what developers security developers use to prevent those?

  • @theoriginalneckbeard
    @theoriginalneckbeard 10 місяців тому +1

    Lmao, that video was comedy gold, exactly my kind of humor! :D

  • @superjugy
    @superjugy 10 місяців тому +1

    Which movie was in the end? Hackers? The Net?

  • @Fr_g
    @Fr_g 10 місяців тому +9

    Isn't hiding the source code pretty infective in trying to get better security?

    • @FurriousFox
      @FurriousFox 10 місяців тому +1

      it's often also to prevent modifications of the app to remove the ads, etc.

    • @vaisakhkm783
      @vaisakhkm783 10 місяців тому +3

      most dev's only gives a little care security of the users, obfuscation is done just people don't steal code for their app... :) you know, making android apps are hard and expensive....

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому +2

      ​@vaisakhkm783 Yeah and we all know apps are always so innovative and are never just trashy copycats of each other ...

    • @vaisakhkm783
      @vaisakhkm783 10 місяців тому +1

      @@ES-cf4ph but the manager who pays for the employees doesn't know app is a amalgamation of some random github repo and a 1000 stackoverflow answers..... :)

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому

      @@vaisakhkm783 loool

  • @GNARGNARHEAD
    @GNARGNARHEAD 10 місяців тому +28

    🤣 good to know that there is next to no effort put into protecting users 😡

    • @TheVertical92
      @TheVertical92 10 місяців тому +10

      I mean these days you're using a framework for almost everything. So if they are safe, then you're safe (if you dont fuck up things like CSRF, XSS, SQL-Injections etc.).
      The people on the conference are probably mostly app developers and not framework developers.

    • @GNARGNARHEAD
      @GNARGNARHEAD 10 місяців тому

      @@TheVertical92 🤔, thanks

    • @kneesnap1041
      @kneesnap1041 10 місяців тому +1

      ​@@TheVertical92no framework can protect against bad security, that's not a thing. Any tool that doesn't allow a developer to do something stupid probably just isn't a very capable tool.

    • @TheVertical92
      @TheVertical92 10 місяців тому

      @@kneesnap1041 That was not my point. The devs on the conference probably build just frontends to a service API. So if they dont fuck up some common security practices on the frontend, they should be fine if the tools (frameworks) are secure. Ofc a framework cant protect your user data from being stolen if you built your authorization wrong.

  • @st4nt
    @st4nt 10 місяців тому +2

    Lol we can see these guys never tried to reverse engineer their own app, probably easier to just re-code their empty frontend app in most cases.. Maybe they're just super proud of their responsive design and think it's something others could want to steal😂?

  • @DjShinter
    @DjShinter 10 місяців тому

    Conference Day 3's audio is so messed up, surely a camera man would've been helpful 😅

  • @0dWHOHWb0
    @0dWHOHWb0 10 місяців тому +3

    So? Which movie was it?

  • @DamianVaz
    @DamianVaz 10 місяців тому +1

    Why didn't you use yout phone to record it? Mic doesn't work on phone?
    Also I'm pretty sure when they were saying obfuscation, they were thinking security for them as the developer, not for the users.
    The intent thing is just dangerous for the user, cause it can potentially access user data and things its not supposed to.

  • @olaola-yh5ge
    @olaola-yh5ge 10 місяців тому +1

    Can you create a short video on Active Directory?

  • @ReadThisOnly
    @ReadThisOnly 10 місяців тому

    i like this guy man

    • @ReadThisOnly
      @ReadThisOnly 10 місяців тому

      thank you for the video :-)

  • @SharkInsanity
    @SharkInsanity 10 місяців тому

    Although, It's a good point that we can download mod apps anytime.

  • @y_arml
    @y_arml 10 місяців тому +7

    what's the deal with reverse engineering the app lol do they keep private keys in the frontend???

    • @IceExtremeGamers
      @IceExtremeGamers 10 місяців тому +4

      Their "security" concern around that seems only to be regarding around ensuring that their code can't be so accessible to their competitors, it seems.

    • @Zappexe
      @Zappexe 10 місяців тому +2

      Stealing intellectual property (code); Finding vulnerabilities in the (for instance, bad usage of intents) to abuse it later from malware; Cheating in mobile games; Repackaging applications;
      I can go on, but too lazy

    • @y_arml
      @y_arml 10 місяців тому +3

      ​@@ZappexeI could maybe understand the stealing intellectual property argument for some code that does something innovative, and frontend code is usually anything but innovative or worth protecting tbh, i mean it just connects to the backend then draws a ui. Cheating in mobile games eehh if its an online game then protections should be in the backend, since any kind of client side anti cheat can be circumvented, and if its single player then nobody cares. Also the trying to hide vulnerabilities part is not good either, if they have a vulnerability with some intent, then they should fix that since obfuscation won't fix the problem lol.
      The reason obfuscation really pisses me off when it's unnecessary(which most of the time it is) is that, i feel like it would deter a lot of people from being interested in cyber security, cuz when a kid just starts out discovering that they can decompile apps etc and modify them in some ways, when it works it gives them a huge push to keep them interested in the field, if everything is obfuscated people just getting into the field would mostly just quit out of frustration.

    • @VivekYadav-ds8oz
      @VivekYadav-ds8oz 10 місяців тому +1

      @@Zappexe This is just the security-by-obscurity argument. "Finding bad usage of intents or vulnerabilties to abuse later" basically means instead of trying to vet their app properly, they're trying to hide the mistakes by putting a drape over it. This never works out.
      I totally get the "stealing UI/UX IP and the general look-and-feel of an app to create a very convincing fake" argument. They may get their reputation damaged by proxy of what the fake app does, or worse be a vector for phishing attacks.

    • @VivekYadav-ds8oz
      @VivekYadav-ds8oz 10 місяців тому +2

      @@y_arml I get you, but you kinda proved his point with the "frustrating lower level thugs enough that they move on or quit" 💀. Most people's threat model is satisfied by warding away curious eyes and script kiddies.

  • @user-ez3uj6gi1s
    @user-ez3uj6gi1s 9 місяців тому +1

    So...was the movie Hackers?

  • @seifelsallamy620
    @seifelsallamy620 9 місяців тому

    Setting the username to a root or to a dot can give high privileges, never thought about that 🤔

  • @Lampe2020
    @Lampe2020 10 місяців тому +1

    12:20 From behind you look basically identical to Tomary...

  • @TechnicalHeavenSM
    @TechnicalHeavenSM 10 місяців тому

    First time watching you outside home😆😅

  • @pshegger
    @pshegger 10 місяців тому +1

    I was there for the whole duration, and I cannot believe I missed you. I'd loved to at least say hi :(
    Anyway, my takes on the topics you mentioned:
    Repackaging: you already mentioned that you can understand why is it bad for games with in-app purchase, but other apps can also have in-app purchases, or they can even be paid apps, and removing the purchase check and re-uploading the apk is a real issue. Comparing this to being afraid of someone creating a crack for your app/game on desktop is a fair comparison in my opinion.
    Obfuscation: In my opinion it serves two purposes. The first one is connected to repackaging, the better the obfuscation your app has, the smaller the chance that someone will take the effort to reverse it and repackage it. The other one is security related: we want to authenticate our app towards the backend. A lot of the times we need an API key to access a service, but we have to store it somehow. There are multiple options, but they all have compromises, and we have to find the one that's the best for both security and the user.
    Let's have an example: you're working on a weather app, and you're using an external API where you have to pay by the number of requests. Naturally, you want to protect the API key (who wants to pay for someone else's requests?), so you have a few options:
    - get the key after app install and store it somehow
    - you can try your app's private folder, but that can be accessed by anyone with a rooted phone, so that's not good enough
    - most phones nowadays have some kind of secure storage. you can store the key there, but it's a lot of work, and it might require the user to authenticate themselves to access it. most users wouldn't understand why would they need to use their fingerprint to see the weather
    - bundle your key with the app somehow
    Whichever option you choose, a malicious actor will be able to get the key. The best you can do is making it as hard as possible for them, in the hope that they'll decide it doesn't worth the trouble and give up. This is where obfuscation comes into the picture.
    On an other topic: the recordings from the conference were released today, and even though most security talks were basically ads for their company, there was one that was really interesting, you can watch it here: www.droidcon.com/2023/07/31/how-to-attack-and-secure-an-android-app-an-introduction/

    • @VivekYadav-ds8oz
      @VivekYadav-ds8oz 10 місяців тому +6

      The answer seems pretty obvious to me: Only give the API access to the backend, and user app talks to the service via your backend. Not only do you circumvent the need to hide the API key, but you can now manage how many times it's used entirely on your own. Like in your Weather app example, you can cache the weather data regionwise so you don't need to access it again for another user of same area.

    • @VivekYadav-ds8oz
      @VivekYadav-ds8oz 10 місяців тому +4

      I'm surprised people keep secrets on client-side. I think you chose a bad/contrived example.

    • @pshegger
      @pshegger 10 місяців тому

      You're right about the backend, but not every app developer is capable of creating one, and even if you have one, you might want to authenticate your app towards your own backend, then you have the same issue.
      The example might not have been the best, but I can easily think of other cases, when this is a real issue. For example: you're making a third party app for an existing service (maybe Reddit or Twitter). In that case you probably wouldn't want to create a separate backend, since it would be a lot of work and money to keep it running. Asking for a few $ for the app would probably not be enough to cover the costs.

    • @LiveOverflow
      @LiveOverflow  10 місяців тому +1

      you know that obfuscation and repackage protection is not actually solving the problem. It might raise the bar, but if you worry about yoru API key getting stolen, how is that actually preventing it? You cannot, it will always be possible.
      Thus I think effort and worries are spent on the wrong thing. Imo it's wasting money on these kind of "solutions" (which are not solutions because they are not able to solve the problem). It's also the perfect product to sell, because your product is selling a feeling of safety, but the problem wont ever be solved ;)
      Also I would like to see actual data of money "saved" through these methods. Because I doubt that a kid downloading your cracked mobile game would ever have been a paying customer. It's the whole desktop game cracking discussion all over again. In my opinion, the money would be better spent on developing new features, updates or marketing.
      Also one more anecdote. Many mobile games are inherently flawed when changing the mobile phones time (see my video "dont trust time". You can skip stuff in almost every game with in-app purchases! This is a much bigger issue because it's easy to do and doesn't even require untrostworthy app stores and side-loading. Just change your time and easily cheat. And has there been a single talk at droidcon about game developers being aware of system time manipulation? No, of course not. because there is no product to sell for it.

    • @uis246
      @uis246 10 місяців тому

      ​​@@psheggerIf not all developers capable of doing this, then they are not capable enough to create such app in the first place. And why do you need to authenticate app towards your backend?

  • @charmquark0
    @charmquark0 10 місяців тому +1

    So do you or do you not want to be approached ? oh and what movie was it ?

    • @LiveOverflow
      @LiveOverflow  10 місяців тому +1

      I like to be approached. I don’t like to approach;)

    • @charmquark0
      @charmquark0 9 місяців тому

      @@LiveOverflow Noted :D

  • @llamasaylol
    @llamasaylol 10 місяців тому

    Just like security in layers, and data redundancy, you seem to need recording equipment redundancy. :p
    Take this as a practice run and learn from it, be glad it wasn't a major security conference you needed to record it or something.

  • @pranaythammineni256
    @pranaythammineni256 10 місяців тому

    lol D2 and D3 are soo funny XD

  • @jfb-
    @jfb- 9 місяців тому +1

    what was the movie though?

  • @dopex1337
    @dopex1337 8 місяців тому

    "let me tell you what i fkd up today" :D

  • @p4ros960
    @p4ros960 10 місяців тому +2

    Im outside... but not for long. hahah

  • @_stigward
    @_stigward 10 місяців тому +7

    To the people in the comments saying that the backend devs are the ones that do the heavy lifting for the security - a LOT of Android specific bug classes are front-end based. Here is a full chain, zero click exploit to get RCE based only on front-end bugs: ua-cam.com/video/-eAR6qduVWY/v-deo.html

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому +1

      I think the sentence is mostly targeted to the impression, that the whole team including backend does not seem to prioritize security really high and just wants to offload their work to a "magical solution" and security through obscurity. Still, a fully client side RCE sounds very interesting :)

  • @heitormbonfim
    @heitormbonfim 9 місяців тому

    As a developer, I think you can be a hacker without knowing how to code, but, if you want to be a really badass motherfucker hacker, it's a must!

  • @ByteBeacon9660
    @ByteBeacon9660 10 місяців тому

    Camera vulnerabilities? 👀👀

  • @philippedelteil1015
    @philippedelteil1015 6 місяців тому

    I will watch this video when I screw something up!

  • @OuterW1ld
    @OuterW1ld 8 місяців тому

    "Hello im outside" - Local Hacker touches grass

  • @willemvdk4886
    @willemvdk4886 10 місяців тому

    Security conferences are usually small, you say? Ever been to Blackhat USA? 😅 Defcon? 😂

  • @DigitalMetal
    @DigitalMetal 10 місяців тому +7

    Fearing reverse engineering is a learned fear. People are told to fear it and they just start to. Reverse engineering is not a security concern. Simple solution, just Open Source your code. People will have no reason to go to someone else for you program if they can get the best copy from you. If someone improves it, and you use a good license(GPL), then the improvements can be pushed back to your code. Both programs will only get better and not one will need to go to shady sources to get your APP. Problem solved.

    • @elon6131
      @elon6131 10 місяців тому +5

      Orrr… they can just copy your code, repackage it with their name on top, and sell it for profit with fancy marketing you can’t afford because your code is free and open source… which is what actually ends up happening in this world.

    • @alang.2054
      @alang.2054 10 місяців тому

      @@elon6131 It does not lol. Look at recent Kick website thing. They literally copied whole UI/UX lmao, still it was not security issue, since UI is not property of the website. Everyone can use this, and it literally happens in web development

    • @LiEnby
      @LiEnby 10 місяців тому

      @@elon6131 there are repackaged VLC media player apps but have you heard of it, or even know what they are?

  • @joshuamahadevan9550
    @joshuamahadevan9550 10 місяців тому +2

    13:36 - 13:48 was the funniest section 😆 I literally pooped my pants on that one

  • @BugMosphere
    @BugMosphere 10 місяців тому +1

    Though it may look like it is just the front end of the app, as the app will be installed on the user's phone, it really concerns us if the code gets stolen, modified, or monetization gets removed. We really do small things in the backend or use Firebase as a backend service.

    • @LiveOverflow
      @LiveOverflow  10 місяців тому +6

      How is that different from the HTML and JS of a website? The complete code bundle typically gets downloaded on the web as well ;)

    • @ReadThisOnly
      @ReadThisOnly 10 місяців тому +2

      @@LiveOverflow my head cannon is that mobile engineers are more like designers, and dislike when other apps look similar (or the idea they can just steal the whole thing!)
      Also, messy code getting out there can be embarrassing haha

    • @BugMosphere
      @BugMosphere 10 місяців тому

      @@LiveOverflow In the case of the web, not the complete code is delivered to the user; only the requested part is delivered. Often, websites do server-side rendering (SSR), and the requested part of the page is delivered.

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому

      ​@@BugMosphereMany websites often do more and more client side rendering, too.

  • @collodionpositive554
    @collodionpositive554 10 місяців тому

    Well this is scary

  • @csgosmoke
    @csgosmoke 10 місяців тому +1

    They are like it's not our job 😅

  • @lefuturiste27
    @lefuturiste27 10 місяців тому

    It's ok everybody make mistake, I also forget my sd card from time to time. Video still interesting.

  • @Stefan-br8jc
    @Stefan-br8jc 8 місяців тому

    You can never pack enough un... SD-cards.

  • @Originalimoc
    @Originalimoc 10 місяців тому

    Why not just interview with your, phone..? Bad audio?

  • @abrikos1100
    @abrikos1100 9 місяців тому

    If a CPU can decode your application, than human can do it too (with sufficient skills & tools)

  • @MijeshDeuja
    @MijeshDeuja 10 місяців тому

    0:02 story of my life.

  • @seifelsallamy620
    @seifelsallamy620 9 місяців тому

    This video reminds me of my life 🤣

  • @Gobillion160
    @Gobillion160 10 місяців тому +2

    make more minecraft videos

  • @seba.d
    @seba.d 8 місяців тому

    ha ha funny :D

  • @bdot02
    @bdot02 10 місяців тому +1

    Also at security conferences filming is sometimes discouraged to protect peoples' identity/privacy

  • @enadalotaibi8181
    @enadalotaibi8181 10 місяців тому

    Plot twist: he intentionally fucked up to not get out of his comfort zone lol jk

  • @muhammadnaufal5046
    @muhammadnaufal5046 10 місяців тому

    :)

  • @NickHermans
    @NickHermans 10 місяців тому +7

    7:40 you are at an android development conf, usually the real security conserns are in the backend; those people are not at the conf.

    • @LiveOverflow
      @LiveOverflow  10 місяців тому +8

      that's why it's interesting to hear what they know ;)

    • @Zappexe
      @Zappexe 10 місяців тому +2

      Not everything revolves around the backend. For instance, bad usage of the platform (e.g. intents, storage, etc.) in the banking app could lead to unauthorized transaction. That's just one thing of many you can do or application can be vulnerable too.

    • @IceExtremeGamers
      @IceExtremeGamers 10 місяців тому +2

      I digress, a unsafe front end can be exploited by a savvy exploiter through an internal middleman.

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому

      Let's be real, backend devs often don't care that much about security either. I had enough discussions with coworkers writing functions which for example just accepts a name and injects it into an SQL query without validation and/or escaping and not documenting this behaviour.

  • @zoenagy9458
    @zoenagy9458 10 місяців тому

    ahh android the spyware of google.

  • @ezbanL
    @ezbanL 10 місяців тому +1

    Hi

  • @greob
    @greob 10 місяців тому

    I really don't see the point of attending these conferences in person.
    All these talks should be recorded and published to the Internet afterward.
    If they are not, then the conference sucks. ;)
    It's never worth it anyway.

    • @bigmistqke
      @bigmistqke 10 місяців тому

      Think it's mostly a network thing

    • @logiciananimal
      @logiciananimal 10 місяців тому

      The "meet others and chat" opportunistically is the main point of conferences in my view - and also to accidentally wander into a session and pick up something by chance.

  • @JothirAdithyan
    @JothirAdithyan 10 місяців тому +1

    Pinnnn

  • @Cornbread2100
    @Cornbread2100 10 місяців тому +2

    First

  • @ebuzertahakanat
    @ebuzertahakanat 10 місяців тому +2

    this episode was way below your standart

    • @LiveOverflow
      @LiveOverflow  10 місяців тому +8

      I talked to people for this video!!!! This is a huge deal :P

  • @Stopinvadingmyhardware
    @Stopinvadingmyhardware 10 місяців тому +2

    Mobile security?
    You’re joking right?
    There’s no such thing. Even if you did have it they could just take the phone from you.

    • @ES-cf4ph
      @ES-cf4ph 10 місяців тому

      Lol, we all know OSI layer 8 is always the heighest security risk

  • @spoon_bomb
    @spoon_bomb 10 місяців тому

    Meh ...

  • @FurriousFox
    @FurriousFox 10 місяців тому

    deobfuscation, modifying and then reuploading is a real issue, there are whole platforms for them which ruins a great part of revenue

    • @LiveOverflow
      @LiveOverflow  10 місяців тому +5

      I see lots of parallels to game cracking on desktop. And there we have seen that all the anti-cracking and obfuscation has never stopped cracks. And most anti-cheat methods also get bypassed. I always feel like those companies spend more on these technologies, than it safes in revenue - but obviously I have no data. It's just my guess, though would love to see proper research on the topic.

  • @va1iduser682
    @va1iduser682 10 місяців тому

    More Minecraft hacking or riot!

  • @va1iduser682
    @va1iduser682 10 місяців тому

    Disliking all videos on multiple accounts until minecraft hacked comes back!!!