Google confirms Android attacks; no fix for most Samsung users
GrapheneOS and Patch Timing
- Commenters note GrapheneOS had already patched the relevant CVEs months earlier on its security preview channel (September/October), ahead of Google’s public Pixel rollout.
- This is used to argue that even a small team can ship Android security fixes quickly if they prioritize it.
Pixel and Samsung Update Delays
- Several Pixel owners report not seeing the “rushed” December update, needing tricks like double-tapping “Check for update” or manually sideloading OTA images. Carriers (e.g., T‑Mobile) are blamed for lag in approvals.
- Samsung is criticized for not even having November patches on many devices, with only major flagships current. Some see this as effectively reserving security for higher-end buyers.
OEM Fragmentation vs. Responsibility
- One side argues Samsung’s many models and heavy Android customization make fast patching difficult; each variant is almost its own OS.
- Others counter this is self‑inflicted: if you ship 50 models, you must budget to maintain 50; PC and Linux ecosystems manage far more hardware.
- Closed, non-upstreamed drivers are identified as a core cause of slow updates and poor long-term support.
Threat Model and Exploit Details
- Linked CVEs describe local privilege escalation (e.g., adding a device owner post‑provisioning, launching activities from the background) and at least one critical Dolby audio RCE.
- Many say risk is mainly from malicious or compromised apps rather than web content; if you don’t install “crap,” risk is lower but not zero, because trusted apps can be updated with payloads or embed shady ad SDKs.
- Some think the focus on this bug is overblown relative to more common phishing/scam attacks; others stress that modern RCE often leads to quiet botnet/“residential VPN” enrollment, not obvious malware.
Sideloading, Play Store, and Play Integrity
- Debate over whether this specific attack realistically requires sideloaded APKs; unclear from public info.
- Google’s app scanning and store review are called “security theater” compared to curated repos (e.g., F‑Droid, Linux distros).
- Play Integrity is widely criticized as serving Google’s business interests rather than user security, since very old unpatched devices can still pass.
Custom ROMs, Unlocking, and Device Longevity
- Strong sentiment that users should have a legal right to unlock bootloaders and install alternate OSes (GrapheneOS, LineageOS), especially once vendor support ends.
- LineageOS’s support for hundreds of devices is cited to show that multi‑device security maintenance is feasible.
- Banking apps and contactless payments on custom ROMs are described as a cat‑and‑mouse game, though some report success with specific banks and wearable‑based payments.
Samsung and UX / Ecosystem Critique
- Samsung is characterized by several as “user hostile”: aggressive bloatware, nagging, fragmented companion apps, and artificially limited features (e.g., watch features tied to Samsung phones).
- Others still choose Samsung for unique hardware (stylus devices) or price, despite poor update discipline.
Meta: OS Monoculture and Fuchsia Tangent
- Frustration that mainstream users effectively have only two mobile OS choices; some lament limited flagship options in the US versus Asia.
- A substantial side thread digresses into the spelling, pronunciation, and etymology of “Fuchsia,” lightly mocking Google’s naming and English orthography.