Skip to content

Many of the resilience guidelines seem user hostile and like they undermine data security #3421

@ell1e

Description

@ell1e

My apologies if I'm just misunderstanding. But I'm getting the impression that many of the resilience guidelines seem user hostile and like they're undermining data security, specifically those listed here https://mas.owasp.org/MASVS/controls/MASVS-RESILIENCE-1/ and https://mas.owasp.org/checklists/MASVS-RESILIENCE/ here at the top.

  • Regarding https://mas.owasp.org/MASVS/controls/MASVS-RESILIENCE-1/ this guideline should be rewritten to mean tampering by an advisery. Instead, it seems to imply that any changes by the user, for example having root access for the user, is also harmful tampering.

    This seems in violation of fundamental democratic principles like data ownership and device ownership and user freedom. All anti tampering mechanisms against rooting have fundamental shortcomings that 1. prevent certain custom ROMs, 2. prevent the user from installing free software on a system level that protects them like certain system-wide adblockers, 3. generally prevents a technically advanced user from owning their system as they see fit. Not everybody is clueless when it comes to more advanced usage of their device.

    In summary, preventing root access and locking the device down against the user's intended changes encourages having big data and big Google own your devices instead. This can be, especially for technical users, less secure than allowing the user to take care of their device. It seems to me like that's also anti-competitive.

  • Regarding https://mas.owasp.org/checklists/MASVS-RESILIENCE/ this seems to imply root use and emulator use are insecure or unwanted. For root users, see the previous section I wrote above.

    The opposite seems true for emulator use as well. At least in my experience, Emulators are a great defense for the "appification" where apps often grab way more data than a web page from the device, from motion sensors, device id, other running devices via local port scans, and so on, and apps are often made purely to track the user better. Emulators are also a great defense against Google Play Services and other centralization and monopolization mechanisms having access to your personal data. Putting a single app into a single dedicated emulator is one of the best ways to restrict what data it could possibly access about you. It also reduces what other apps it can attack if it breaks out of the app sandbox.

    In conclusion, this emulator ban seems to significantly reduce user privacy and user safety.

These guides sound mostly written to be targeting users that want to not think for themselves and have all their data and security and privacy (and resulting lack thereof) managed by Google and others. While I agree these users exist, this doesn't justify taking away those freedoms away from the user crowd that cares about not doing that. It also seems to go against the Digital Service Act's requirement of interoperability, especially the blocking of emulators.

I would therefore suggest the guides are updated to address these issues. If I simply misunderstood some sections, I'd be happy to learn why.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions