Android: Difference between revisions
m fix hyphens |
m link Termux |
||
| (3 intermediate revisions by the same user not shown) | |||
| Line 28: | Line 28: | ||
==Incidents== | ==Incidents== | ||
This is a list of all consumer protection incidents related to this software. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]]. | This is a list of all consumer protection incidents related to this software. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]]. | ||
===Apps cannot run writable files=== | |||
Apps targeting Android 10 aren't allowed to execute files from their "home" folder, as this is enforced by the system.<ref>{{Cite web |title=Behavior changes: apps targeting API 29+ |url=https://developer.android.com/about/versions/10/behavior-changes-10#execute-permission |url-status=live |archive-url=https://web.archive.org/web/20260209004831/https://developer.android.com/about/versions/10/behavior-changes-10#execute-permission |archive-date=2026-02-09 |access-date=2026-03-02 |website=Android Developers}}</ref> While "targeting" any version is an opt-in choice, the [[wikipedia:Google_Play|Google Play Store]] policy forbids apps that target old Android versions.<ref>https://developer.android.com/google/play/requirements/target-sdk</ref><ref>[https://support.google.com/googleplay/android-developer/answer/16561298?hl=en https://support.google.com/googleplay/android-developer/answer/16561298]</ref><ref>https://support.google.com/googleplay/android-developer/answer/11926878</ref> This negatively impacts apps such as [[wikipedia:Termux|Termux]],<ref>{{Cite web |first=n0n3m4 |date=2019-03-18 |title=No more exec from data folder on targetAPI >= Android Q |url=https://github.com/termux/termux-app/issues/1072 |access-date=2026-03-02 |website=GitHub}}</ref> which must be "[[Sideloading|sideloaded]]" so that the policy is not applicable, otherwise they must find a way to bypass it (risks legal issues).<ref>{{Cite web |last=Kang |first=Jinoh |date=2021-07-03 |title=Revisit the Android W^X problem |url=https://github.com/termux/termux-app/issues/2155 |access-date=2026-03-02 |website=GitHub}}</ref> | |||
===Blocking sideloading of unverified Android apps (2026-2027)=== | ===Blocking sideloading of unverified Android apps (2026-2027)=== | ||
{{Main|Google blocking sideloading of unverified Android apps}} | {{Main|Google blocking sideloading of unverified Android apps}} | ||
Starting September 2026, unmodified Android devices in Brazil, Indonesia, Singapore and Thailand will no longer be allowed to install applications outside of the | Starting September 2026, unmodified Android devices in Brazil, Indonesia, Singapore and Thailand will no longer be allowed to install applications outside of the Play Store unless the developer has verified their identity with Google<ref>{{Cite web |last=Whitwam |first=Ryan |date=26 Aug 2025 |title=Google will block sideloading of unverified Android apps starting next year |url=https://arstechnica.com/gadgets/2025/08/google-will-block-sideloading-of-unverified-android-apps-starting-next-year/ |url-status=live |archive-url=https://web.archive.org/web/20250826032858/https://arstechnica.com/gadgets/2025/08/google-will-block-sideloading-of-unverified-android-apps-starting-next-year/ |archive-date=26 Aug 2025 |access-date=26 Aug 2025 |website=ArsTechnica}}</ref><ref>{{Cite web |date=26 Aug 2025 |title=Google's plan to end sideloading on Android |url=https://xdaforums.com/t/googles-plan-to-end-sideloading-on-android.4756353/ |url-status=live |archive-url=https://web.archive.org/web/20250826161809/https://xdaforums.com/t/googles-plan-to-end-sideloading-on-android.4756353/ |archive-date=26 Aug 2025 |access-date=26 Aug 2025 |website=XdaForums}}</ref>. The policy is aimed to be enforced worldwide in 2027. Devices without Google Mobile Service (GMS) or running a third-party ROM will be unaffected. However it's hard for users to bypass/spoof [[Google Play Integrity API|Google Play Integrity]] to hide their ROM or [[Jailbreak|root]] status to use utility apps such as most of banking apps<ref>{{Cite web |date=3 Apr 2022 |title=[Discussion] The root-and-mod-hiding/fingerprint-spoofing/keybox-stealing cat-and-mouse game |url=https://xdaforums.com/t/discussion-the-root-and-mod-hiding-fingerprint-spoofing-keybox-stealing-cat-and-mouse-game.4425939/ |url-status=live |archive-url=https://web.archive.org/web/20250823095950/https://xdaforums.com/t/discussion-the-root-and-mod-hiding-fingerprint-spoofing-keybox-stealing-cat-and-mouse-game.4425939/ |archive-date=23 Aug 2025 |access-date=26 Aug 2025 |website=XdaForums}}</ref>. | ||
===Data collection=== | ===Data collection=== | ||
| Line 45: | Line 48: | ||
In North America, many Android devices like phones or tablets will not allow consumers to unlock and do what they want to modify the software. Therefore, it has been incredibly difficult and nearly impossible to root and install custom ROMs on the device unless an exploit has been found. Some OEMs like [[Samsung]] are now completely blocking [[bootloader unlocking]] on their phones regardless of region. | In North America, many Android devices like phones or tablets will not allow consumers to unlock and do what they want to modify the software. Therefore, it has been incredibly difficult and nearly impossible to root and install custom ROMs on the device unless an exploit has been found. Some OEMs like [[Samsung]] are now completely blocking [[bootloader unlocking]] on their phones regardless of region. | ||
===Android Cast restricted to Google -signed receivers=== | ===Android Cast restricted to Google-signed receivers=== | ||
In Android, streaming over network is referred as "Casting". In Android 4.4 Miracast support was introduced | In Android, streaming over network is referred as "Casting". In Android 4.4, [[wikipedia:Miracast|Miracast]] support was introduced. | ||
In Android 9, Miracast was fully replaced | In Android 9, Miracast (an open standard) was fully replaced by the proprietary [[wikipedia:Google_Cast|Chromecast protocol]] (Google Cast). Google-Cast includes signing key verification of both the Cast source and receiver device, meaning that since Android 9 it is no longer possible to cast high quality content to receivers which aren't signed by Google. This means that unlike AirPlay on Apple devices, there's no way to stream multichannel Hi-Fi audio on Android unless the receiver has a valid vendor signature.<ref>{{Cite web |last=Weiske |first=Christian |date=2025-08-31 |title=Android/Lineage OS and Screen mirroring ("Cast") |url=https://p.cweiske.de/669 |url-status=live |archive-url=https://web.archive.org/web/20250831142415/https://p.cweiske.de/669 |archive-date=2025-08-31 |access-date=2025-08-31}}</ref> | ||
==='''Google delaying AOSP 16 QPR1 update without proper explanation'''=== | ==='''Google delaying AOSP 16 QPR1 update without proper explanation'''=== | ||
| Line 54: | Line 57: | ||
Update : Google is now releasing QPR1 update for AOSP 16 after 2 months delay<ref>{{Cite web |last=Mishaal |first=Rahman |date=12 Nov 2025 |title=The wait is over: Android 16 QPR1's source code is now available on AOSP |url=https://www.androidauthority.com/android-16-qpr1-source-code-available-3614853/ |url-status=live |archive-url=https://web.archive.org/web/20251112032612/https://www.androidauthority.com/android-16-qpr1-source-code-available-3614853/ |archive-date=12 Nov 2025 |access-date=12 Nov 2025 |website=Android Authority}}</ref> | Update : Google is now releasing QPR1 update for AOSP 16 after 2 months delay<ref>{{Cite web |last=Mishaal |first=Rahman |date=12 Nov 2025 |title=The wait is over: Android 16 QPR1's source code is now available on AOSP |url=https://www.androidauthority.com/android-16-qpr1-source-code-available-3614853/ |url-status=live |archive-url=https://web.archive.org/web/20251112032612/https://www.androidauthority.com/android-16-qpr1-source-code-available-3614853/ |archive-date=12 Nov 2025 |access-date=12 Nov 2025 |website=Android Authority}}</ref> | ||
==References== | ==References== | ||
<references /> | <references /> | ||
[[Category:{{PAGENAME}}]] | [[Category:{{PAGENAME}}]] | ||