I heard this on the radio yesterday. Secretly ruthless is a good way to describe Google.
SHAPIRO: OK. So big picture on this anniversary, 25 years in, if you could describe Google's legacy in a sentence, what would that be?
PATEL: Secretly ruthless.
SHAPIRO: Oh, that's rough. Wow. Secretly ruthless - that's even less than a sentence. Give me a little bit more. Why do you say secretly ruthless?
PATEL: Google has convinced everyone that it is this incredibly sincere and earnest company - that it's just a bunch of goofballs making cool things. That is true. But I think if we just paid a little more attention to where Google's money comes from - and it is almost entirely advertising - I think we would be able to see the company and its influence a little bit more clearly. But the truth is, it is an utterly ruthless advertising company that is very, very, very successful at delivering results to its clients.
SHAPIRO: But Nilay, you didn't mention how cute the Google doodles are.
PATEL: Yeah, the - I understand. They're very cute.
I learned that Android was not open under my personal definition of "open" right from the outset, because there was no programmatic access to telephony. My first project was to build an on-board answering machine with call screening capabilities.
I used an answering machine on my landline to avoid paying for caller id and voicemail and wanted to do the same with my cellphone. I was very disappointed to learn that this was not possible, at least with my skillset.
I knew that things were going the wrong way when my Tasker script to manage airplane mode stopped working when Android required locked it away. My use case there was that lack of connectivity at the gym and at home meant that connection attempts were draining my battery and heating up the phone. Now, of course, Android does a much better job of that particular task on its own, but it still makes me cranky. :)
Everything that has happened since has only cemented my opinion that Android is not actually an open platform. I do see many of the changes as potentially valuable security measures for the masses, but I wish that it wasn't quite so difficult for a power user to use the power of the little computer we carry in our pockets.
On my last android device I didn't need root at all, but on my current one Google has gimped the OS so much that root access is the only way to have any kind of ownership of the device.
Even just the fact that Google's "backup" system (which does not handle app data the last time I checked) depends on the cloud, instead of iTunes that has been able to do a full system backup to your own computer for YEARS (in addition to icloud), is honestly a big joke in my eyes.
Everything that has happened since has only cemented my opinion that Android is not actually an open platform. I do see many of the changes as potentially valuable security measures for the masses, but I wish that it wasn't quite so difficult for a power user to use the power of the little computer we carry in our pockets.
Their backup system does handle app data, but only if the app does not opt out of it. Which is an incredibly stupid system. It's my phone, if I tell it to backup up my data it better back up everything. I don't care if some banking app thinks it's too good to be backed up.
However, as a long time rooted phone user I know that the rooting community is always 2 steps ahead of Google so most likely nothing will change.
I ran Copperhead OS (the predecessor to Graphene) and really liked it. Sadly, the phone went into the lake and I've not been able to afford to replace it with one capable of Graphene.
I already hated Android 12 for overhauling the aesthetic for the worse: making volume sliders obscenely wide, making the notification shade just an over-enlarged mess, and the half-assed implementation of Material You. On my Pixel 3 that I used at the time, this change alone made me root a phone for the first time just to fix all of it.
Two updates later and once again Google fucks up something that was perfectly fine before and turns me off from their operating system yet again. While I'm nowhere close to using an iPhone, I may just use GrapheneOS if I have to switch to a phone that comes with Android 14+ out of the box.
An update in the last year added a "feature" where, when I search something, if my query is even vaguely close to the name of an app on my phone, Android will open that app instead of doing my search. I, for the life of me, haven't been able to figure out how to disable it. That alone made me hate Android.
Absolutely agree, I use to get excited for new updates to anything, cuz like "yay new things" or "old things but less buggy"
But recently I've been absolutely sulking over the modern software updating paradigm of shipping perfectly fine updates with completely useless UI changes that absolutely nobody wanted so tech companies can justify having an in-house UI team
Like my phone, on Android 11 I set the custom color to a really nice red color, i matched it to my wallpaper and everything, I loved it
And then Android 12 hits, and that lovely red gets replaced with some bologna enthusiast's spamcore aesthetic
I'm sorry, Material "You"?. Nah this is Material Somebody Else fr
And I can't do anything to change the colors of my own phone
I hate being a slave to UI teams, let me change the colors atleast, damnit
From an IT perspective with little context on this change other than what's in the article, if there's no way to import your own certs using an MDM, this change is terrible for businesses.
You need custom certs for all kinds of things. A company's test servers often don't use public CA certs because it's expensive (or the devs are too lazy to set up Let's Encrypt). So you import a central private CA cert to IT-managed devices so browsers and endpoints don't have a fit.
For increased network security, private CAs are used for SSL decryption to determine what sites devices are going to and to check for malware embedded in pages. In order to conduct SSL decryption, you need your own private CA cert for decrypting and re-encrypting web content. While this is on the decline because of pinned certs being adopted by big websites, it's still in use for any sites you can get away with. You basically kill any network-level security tools that are almost certainly enabled on the VPN/SASE used to access private test sites.
Re: too lazy for Let's Encrypt, a) last I used LE (for my personal site), your site had to be publicly available on the Internet so that you could prove you controlled the site. Most test servers are not public. and b) many (most?) companies would throw a fit if you started generating your own certificates for their domains.
But there are always solutions. I was able to talk my company into getting properly signed certs for our test servers.
This article isn't clear on one question: Are users still able to add new trusted authorities? I have a custom CA installed so as to be able to access self-hosted https services inside my home network. Given that Android now prevents you from accessing sites with an untrusted/self-signed cert, I need this feature.
Maybe read the article and not look like an idiot. All they did was move the certificates into a signed package that is updated through Google Play. They can revoke certs even faster now because it doesn't require a system update.
IMO this isn't a real "solution" to the problem here, but this article states Android 14 also allows Google to manage device CAs remotely and push updates via Google Play, and goes into detail about how that mechanism is poorly documented publicly and is basically only an option for Google themselves, not any third party device administrators.
Google can easily claim that all security concerns are handled by their own management while continuing to deny access to all third parties to actually handle that responsibility themselves if desired.
By all means correct me if I'm wrong, but looking at the PR this article links to. It looks like all that's happening is that Google's trusted certs are being added to an android security API and are now immutable. Any non Google certs are still going to be saved to ANDROID_ROOT/etc/security/cacerts the same as they currently are.