Feeds

All Android apps are not made equal

Google's are more equal than others

Top three mobile application threats

With Android developers finally let loose with real hardware, some of the limitations of the Android SDK are coming to light - though it seems that applications coming out of the Googleplex aren't limited in quite the same way.

The first evidence of a hierachical strata of developers comes with access to APIs for installing applications, a capability that Google likes to restrict to their own Android Marketplace app. The issue has highlighted the lack of equality amongst developers, upsetting some idealists though Android reckons the community will have to give up a little openness for the sake of security.

Marketplace comes pre-installed on Android phones; Google's application repository can't be accessed any other way, and as such it has access to capabilities that won't be available to third-party developers. Specifically, the Android Marketplace can install other applications onto an Android phone without warning, or alerting, the user.

Here's the official Android response.

"At this point, we think it is too dangerous to give a third party application blanket access to install applications without the user being involved. That may change in the future, but for now that is the way it is."

This isn't going to affect most developers, of course, but should Handango decide to port InHand - an on-device application for buying apps from Handango - then application installation could well be complicated by repeated dialog boxes warning users of potential risks: in contrast to the smooth process promised by Marketplace.

There are significant security risks with allowing a third-party application carte blanche to do what it likes, but that was supposed to be part of the Android experience - allowing punters to take responsibility for their own security. Still, Google clearly believes that users can only be trusted so far. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
Turnbull gave NBN Co NO RULES to plan blackspot upgrades
NBN Co faces huge future Telstra bills and reduces fibre footprint
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.