Trusting clients is probably a security flaw

McDonald’s app & trusting the client

  • Multiple commenters are surprised this is yet another case of McDonald’s apps lacking proper server-side validation, despite wide publicity.
  • Core critique: heavy anti-reverse-engineering and root checks give a false sense of security and encourage developers to “trust the client,” which is fundamentally flawed.
  • Some see the impact as mostly McDonald’s losing money and reputation; others worry about precedent and what else the same teams might build.

Root detection, DRM, and device control

  • Many criticize Play Integrity / SafetyNet–style checks and root detection: they don’t stop serious attackers but punish power users and reduce device ownership.
  • Several banking and corporate apps are cited as refusing to run on rooted phones or even phones with sideloaded apps; other commenters say those same apps run fine for them, suggesting OS/version differences or inconsistent checks.
  • Some defend these checks as risk management and tech-support reduction, but others see them mainly as liability-shifting and control.

Android/iOS sandboxing, filesystem, and backup

  • Discussion on Android’s changing storage model: older versions allowed broad filesystem access; newer ones sandbox more tightly, improving security but complicating backups.
  • Users lament the lack of a robust, system-level, app-data backup interface and see Google nudging people toward its cloud sync.
  • iOS is viewed as more locked down but also less leaky in terms of apps inspecting the device.

Developer incentives, outsourcing, and security culture

  • Several argue that outsourced/mobile “app mill” work optimizes for shipping quickly and passing checklists, not real security.
  • One contractor openly describes doing the bare minimum and waiting to bill fixes later, prompting pushback around ethics and client risk.
  • Some note that security “best practices” often function more as liability cover than true protection.

Unions, professionalization, and labor market

  • A thread explores unions or professional bodies for developers to refuse insecure or unethical work.
  • Others doubt this is realistic: accreditation brings questions about who is blamed in a team and whether members would actually be protected.
  • Mixed views on the job market: easy in some EU countries for mid+ roles; difficult for seniors and in the US since recent layoffs.

Other examples & user experiences

  • Examples include insecure ticketing/public transport apps, heavily obfuscated IoT apps (e.g., Tuya ecosystem) that fight local control, and anti-cheat in games installing kernel-level components.
  • Polish McDonald’s users complain about declining coupon value, clunky kiosks, and being forced into the app for decent prices.
  • Some refuse to install such apps at all or leave 1-star reviews when root checks block them.