• 0 Posts
  • 203 Comments
Joined 2 years ago
cake
Cake day: June 22nd, 2023

help-circle


  • That’s already how it functionally worked for each major release

    Here’s their previous strategy: https://web.archive.org/web/20220917195332/source.android.com/docs/setup/about/codelines

    Google works internally on the next version of the Android platform and framework according to the product’s needs and goals

    When the n+1th version is ready, it’s published to the public source tree

    The source management strategy above includes a codeline that Google keeps private to focus attention on the current public version of Android.

    We recognize that many contributors disagree with this approach and we respect their points of view. However, this is the approach we feel is best and the one we’ve chosen to implement for Android.

    As far as I can tell, this would really only affect QPRs, since the public experimental branches that get made after they throw the next release over the wall is going away








  • ozymandias117@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    19
    ·
    edit-2
    2 months ago

    The article is a security company trying to hype their company with a theoretical attack that currently has no hypothetical way to be abused

    The article has an update now fixing the wording to “hidden feature” but, spoilers, every BT device has vendor specific commands.

    The documentation of the part just wasn’t complete and this companies “fuzzing” tool found some vendor commands that weren’t in the data sheet

    The China part just came from OP







    • They don’t offer the government a “backdoor” to make it easy to decrypt user data.

    Is what’s being discussed. Since Apple has a backdoor in the default configuration of their phone, they’re able to comply with 90% of all data requests.

    The UK is demanding they remove the option to disable the backdoor in their encryption

    You can kind-of sort-of use local only, but Apple makes that very inconvenient and almost 0 users do

    Your definition of “rolling over” is different than mine. … What would you have them do differently when the warrants issued are valid in the legal sense/approved by a judge?

    Again, your comments are agreeing with their decision to not allow full end to end encryption.

    I would have them not able to decrypt my data at all