To be honest, I don't know. I also don't know how many devs on Nostr are really focused on or knowledgeable about Android cybersecurity.
Coder friends. I have a question. How could a malicious actor compromise a google play store app on someone's phone without them knowingly downloading another file or clicking another link, e.g., the app was compromised such that within the app a webbrowser overlay is injected essentially intercepting interaction with the device so they aren't really using the app but interacting with a webpage.
#asknostr nostr:nprofile1qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcppemhxue69uhkummn9ekx7mp0qqs8a474cw4lqmapcq8hr7res4nknar2ey34fsffk0k42cjsdyn7yqqhdnr9g #code #blackhat
Discussion
Thank you, it's interesting that no other than nostr:nprofile1qyd8wumn8ghj7enjv4jkccte9eek7anzd96zu6r0wd6z7qgcwaehxw309ahx7um5wgh8xmmkvf5hgtngdaehgtcqypzdc8pdh8plh4a7ayjhan44903ulrzqhtmmv06xu4443gf3ca8sk0sz8qv even had a guess. I wonder if this scam is really well managed and still highly covert.