john on Nostr: Coder friends. I have a question. How could a malicious actor compromise a google ...
Coder friends. I have a question. How could a malicious actor compromise a google play store app on someone's phone without them knowingly downloading another file or clicking another link, e.g., the app was compromised such that within the app a webbrowser overlay is injected essentially intercepting interaction with the device so they aren't really using the app but interacting with a webpage.
#asknostr
Jay [MOVED HERE] (nprofile…nr9g) #code #blackhat
Published at
2025-03-20 12:38:23Event JSON
{
"id": "731c390dbfe73604481c1e16cc0f6e9733baa962c4bf4b22ff4c9fbe858fb211",
"pubkey": "67ada8e344532cbf82f0e702472e24c7896e0e1c96235eacbaaa4b8616052171",
"created_at": 1742474303,
"kind": 1,
"tags": [
[
"t",
"asknostr"
],
[
"t",
"code"
],
[
"t",
"blackhat"
],
[
"p",
"7ed7d5c3abf06fa1c00f71f879856769f46ac92354c129b3ed5562506927e200",
"wss://eden.nostr.land/",
"mention"
]
],
"content": "Coder friends. I have a question. How could a malicious actor compromise a google play store app on someone's phone without them knowingly downloading another file or clicking another link, e.g., the app was compromised such that within the app a webbrowser overlay is injected essentially intercepting interaction with the device so they aren't really using the app but interacting with a webpage. \n\n#asknostr nostr:nprofile1qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcppemhxue69uhkummn9ekx7mp0qqs8a474cw4lqmapcq8hr7res4nknar2ey34fsffk0k42cjsdyn7yqqhdnr9g #code #blackhat",
"sig": "5296935a741ede2b4201977eebd959f6f0faf220392939a3a9be6aa1d5901f50ecf1da404f5662fa6e18f126e1b9ea3edc89bf9c766b4da783c90dea2c64932e"
}