• Q: What threats do we really face when our phones are not fully patched?

    From Maria Sophia@[email protected] to comp.mobile.android on Sun Apr 19 10:59:53 2026
    From Newsgroup: comp.mobile.android

    For an older Android phone, what "security" hazards do we REALLY face?

    In a recent thread, some of us were discussing our "security" situation.
    Newsgroups: comp.mobile.android
    Subject: Re: What is the history of Galaxy S-series & Pixel full support?
    Date: Sun, 19 Apr 2026 05:33:34 -0000 (UTC)
    Message-ID: <10s1pfd$3ot6t$[email protected]>

    I'm not an expert in security threats, but in general, I'm not worried
    about them, but maybe I should be worried about them. Dunno. Do you?

    I assume many CVEs are specialized situations.
    I assume some (probably few though) are zero-click situations.

    I assume many use web links.
    I assume some use downloaded files (zero click or otherwise).

    But I've never really worried about it (although my phone is set up for
    privacy so it also probably as a bit of extra security by accident).

    What do others feel about not having fully patched phones?

    Q: What threats do we really face when our phones are not fully patched?
    A: ?
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Andy Burns@[email protected] to comp.mobile.android on Sun Apr 19 18:06:44 2026
    From Newsgroup: comp.mobile.android

    Maria Sophia wrote:

    What do others feel about not having fully patched phones?

    Concerned enough that I've replaced my all my Nexus/Pixel phones within
    a couple of months of them reaching EOL, over the years that's been
    gradually increasing ...
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Sun Apr 19 22:31:54 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-19 18:59, Maria Sophia wrote:
    For an older Android phone, what "security" hazards do we REALLY face?

    In a recent thread, some of us were discussing our "security" situation.
    Newsgroups: comp.mobile.android
    Subject: Re: What is the history of Galaxy S-series & Pixel full support?
    Date: Sun, 19 Apr 2026 05:33:34 -0000 (UTC)
    Message-ID: <10s1pfd$3ot6t$[email protected]>

    I'm not an expert in security threats, but in general, I'm not worried
    about them, but maybe I should be worried about them. Dunno. Do you?

    I assume many CVEs are specialized situations.
    I assume some (probably few though) are zero-click situations.

    I assume many use web links.
    I assume some use downloaded files (zero click or otherwise).

    But I've never really worried about it (although my phone is set up for privacy so it also probably as a bit of extra security by accident).

    What do others feel about not having fully patched phones?

    Q: What threats do we really face when our phones are not fully patched?
    A: ?


    Impossible to know unless you read all the CVEs. You can not assume they
    are irrelevant.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Maria Sophia@[email protected] to comp.mobile.android on Tue Apr 21 15:06:12 2026
    From Newsgroup: comp.mobile.android

    Carlos E.R. wrote:
    Q: What threats do we really face when our phones are not fully patched?
    A: ?


    Impossible to know unless you read all the CVEs. You can not assume they
    are irrelevant.

    This is probably the most sensibly stated assessment of the threats we face when our phones aren't updated to the latest set of score 8 to 10 CVEs.

    What might be nice to keep track of are URLs of where we find CVE data.

    I don't know how to use this site, yet. Does anyone out there know?
    <https://www.cve.org>
    <https://nvd.nist.gov>

    I do know how to use the CISA CEV exploit data, but it's a small subset.
    <https://www.cisa.gov/known-exploited-vulnerabilities-catalog>

    I don't yet know how best to use Android Security Bulletins though:
    <https://source.android.com/docs/security/bulletin>

    And those of us on Samsung can add their device-specific security bulletin:
    <https://security.samsungmobile.com/securityUpdate.smsb>

    Similarly, those of us on both platforms can use Apple's security bulletin:
    <https://support.apple.com/en-us/100100>

    There may be useful information in a vulnerability search page:
    <https://nvd.nist.gov/vuln/search#/nvd/home?resultType=records>

    What we need, I guess, is a "process" to make what Carlos suggested,
    something that we can practically do when we find out about CVEs.

    We'd check the CVE against how we use our own unpatched devices, I guess.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Wed Apr 22 07:06:44 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-21 23:06, Maria Sophia wrote:
    Carlos E.R. wrote:
    Q: What threats do we really face when our phones are not fully patched? >>> A: ?


    Impossible to know unless you read all the CVEs. You can not assume they
    are irrelevant.

    This is probably the most sensibly stated assessment of the threats we face when our phones aren't updated to the latest set of score 8 to 10 CVEs.

    What might be nice to keep track of are URLs of where we find CVE data.

    I don't know how to use this site, yet. Does anyone out there know?
    <https://www.cve.org>
    <https://nvd.nist.gov>

    I do know how to use the CISA CEV exploit data, but it's a small subset.
    <https://www.cisa.gov/known-exploited-vulnerabilities-catalog>

    I don't yet know how best to use Android Security Bulletins though:
    <https://source.android.com/docs/security/bulletin>

    And those of us on Samsung can add their device-specific security bulletin:
    <https://security.samsungmobile.com/securityUpdate.smsb>

    Similarly, those of us on both platforms can use Apple's security bulletin:
    <https://support.apple.com/en-us/100100>

    There may be useful information in a vulnerability search page:
    <https://nvd.nist.gov/vuln/search#/nvd/home?resultType=records>

    What we need, I guess, is a "process" to make what Carlos suggested, something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.


    We'd check the CVE against how we use our own unpatched devices, I guess.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Maria Sophia@[email protected] to comp.mobile.android on Wed Apr 22 01:15:18 2026
    From Newsgroup: comp.mobile.android

    Carlos E.R. wrote:
    What we need, I guess, is a "process" to make what Carlos suggested,
    something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.

    I think differently, but I get where you're coming from.

    I'd like to have a chauffeur, but since I don't, I drive myself.
    That means I have to do all the thinking and navigation myself.

    Sure, it would be nice to have a chauffeur that does it for me.
    But I'm on my own.

    Same here with the CVE's.
    I can easily come up with a system to check things periodically.

    I haven't thought about it though, until today.
    It's not something I'm gonna do right away.

    But it seems easily enough a task to do monthly.
    But I could be wrong. As I haven't done it.

    But it is a good idea nonetheless, no matter who does it.
    So maybe we'll find something online that does it for us.

    We would input our phone specs.
    And it would output what CVEs we're vulnerable to.

    Does that exist?
    Dunno. Haven't looked yet.

    But it's an idea.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Wed Apr 22 11:45:31 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:
    What we need, I guess, is a "process" to make what Carlos suggested,
    something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.

    I think differently, but I get where you're coming from.

    I'd like to have a chauffeur, but since I don't, I drive myself.
    That means I have to do all the thinking and navigation myself.

    Sure, it would be nice to have a chauffeur that does it for me.
    But I'm on my own.

    Same here with the CVE's.
    I can easily come up with a system to check things periodically.

    I haven't thought about it though, until today.
    It's not something I'm gonna do right away.

    But it seems easily enough a task to do monthly.
    But I could be wrong. As I haven't done it.

    But it is a good idea nonetheless, no matter who does it.
    So maybe we'll find something online that does it for us.

    We would input our phone specs.
    And it would output what CVEs we're vulnerable to.

    Does that exist?
    Dunno. Haven't looked yet.

    But it's an idea.


    No, I do not want a chauffeur. I simply want somebody that has the
    expertise to analyze CVEs and translate them for common people, telling
    me the summary and what I should really care about.

    I can not learn everything, I don't have that kind of time nor inclination.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Wed Apr 22 15:55:44 2026
    From Newsgroup: comp.mobile.android

    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:
    What we need, I guess, is a "process" to make what Carlos suggested,
    something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.

    I think differently, but I get where you're coming from.

    I'd like to have a chauffeur, but since I don't, I drive myself.
    That means I have to do all the thinking and navigation myself.

    Sure, it would be nice to have a chauffeur that does it for me.
    But I'm on my own.

    Same here with the CVE's.
    I can easily come up with a system to check things periodically.

    I haven't thought about it though, until today.
    It's not something I'm gonna do right away.

    But it seems easily enough a task to do monthly.
    But I could be wrong. As I haven't done it.

    But it is a good idea nonetheless, no matter who does it.
    So maybe we'll find something online that does it for us.

    We would input our phone specs.
    And it would output what CVEs we're vulnerable to.

    Does that exist?
    Dunno. Haven't looked yet.

    But it's an idea.


    No, I do not want a chauffeur. I simply want somebody that has the
    expertise to analyze CVEs and translate them for common people, telling
    me the summary and what I should really care about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?) was
    already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability-attack-3494479/>

    And that was just the first try. Bet there's lots more. So confirmation that
    my old phone's definately not good for sensitive stuff. Give it a try
    Frank...


    I can not learn everything, I don't have that kind of time nor inclination.



    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Wed Apr 22 19:17:05 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-22 17:55, AJL wrote:
    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:


    No, I do not want a chauffeur. I simply want somebody that has
    the expertise to analyze CVEs and translate them for common
    people, telling me the summary and what I should really care
    about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?)
    was already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability- attack-3494479/>

    And that was just the first try. Bet there's lots more. So
    confirmation that my old phone's definately not good for sensitive
    stuff. Give it a try Frank...

    I know that there are flaws in Bluetooth that allow a passerby to get
    entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    But I don't know what the exact vulnerabilities and dangers are.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Jeff Layman@[email protected] to comp.mobile.android on Wed Apr 22 18:32:23 2026
    From Newsgroup: comp.mobile.android

    On 22/04/2026 08:15, Maria Sophia wrote:
    Carlos E.R. wrote:
    What we need, I guess, is a "process" to make what Carlos suggested,
    something that we can practically do when we find out about CVEs.

    Nope. We need a person, or a publication, that does that analysis job.

    I think differently, but I get where you're coming from.

    I'd like to have a chauffeur, but since I don't, I drive myself.
    That means I have to do all the thinking and navigation myself.

    Sure, it would be nice to have a chauffeur that does it for me.
    But I'm on my own.

    Same here with the CVE's.
    I can easily come up with a system to check things periodically.

    I haven't thought about it though, until today.
    It's not something I'm gonna do right away.

    But it seems easily enough a task to do monthly.
    But I could be wrong. As I haven't done it.

    But it is a good idea nonetheless, no matter who does it.
    So maybe we'll find something online that does it for us.

    We would input our phone specs.
    And it would output what CVEs we're vulnerable to.

    Does that exist?
    Dunno. Haven't looked yet.

    But it's an idea.

    Well, I'm pleased I don't use my Xiaomi for anything requiring privacy
    or security.
    <https://app.opencve.io/cve/?vendor=mi&product=xiaomi>

    Rather a lot of critical vulnerabilities in the past couple of years,
    and a few other levels too. Not all for the same hardware, though. I
    didn't even know that Xiaomi did routers.
    --
    Jeff
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Wed Apr 22 17:40:52 2026
    From Newsgroup: comp.mobile.android

    On 4/22/26 10:17 AM, Carlos E.R. wrote:
    On 2026-04-22 17:55, AJL wrote:
    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:


    No, I do not want a chauffeur. I simply want somebody that has
    the expertise to analyze CVEs and translate them for common
    people, telling me the summary and what I should really care
    about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?)
    was already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability-
    attack-3494479/>

    And that was just the first try. Bet there's lots more. So
    confirmation that my old phone's definately not good for sensitive
    stuff. Give it a try Frank...


    I know that there are flaws in Bluetooth that allow a passerby to get >entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    I do have a Bluetooth on/off switch on my Galaxy S10+. I think it's been off
    since the beginning but not for security but more likely because I just
    didn't use it. Also perhaps to save some battery? I just don't remember.
    Gets worse with age...


    But I don't know what the exact vulnerabilities and dangers are.


    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Wed Apr 22 19:46:46 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-22 19:40, AJL wrote:
    On 4/22/26 10:17 AM, Carlos E.R. wrote:
    On 2026-04-22 17:55, AJL wrote:
    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    On 2026-04-22 09:15, Maria Sophia wrote:
    Carlos E.R. wrote:


    No, I do not want a chauffeur. I simply want somebody that has
    the expertise to analyze CVEs and translate them for common
    people, telling me the summary and what I should really care
    about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?)
    was already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability-
    attack-3494479/>

    And that was just the first try. Bet there's lots more. So
    confirmation that my old phone's definately not good for sensitive
    stuff. Give it a try Frank...


    I know that there are flaws in Bluetooth that allow a passerby to get
    entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    I do have a Bluetooth on/off switch on my Galaxy S10+. I think it's been
    off
    since the beginning but not for security but more likely because I just didn't use it. Also perhaps to save some battery? I just don't remember.
    Gets worse with age...

    But I do use it. My car connects to it automatically before displaying
    the map. My watch connects to it. I need it always on.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Wed Apr 22 18:32:34 2026
    From Newsgroup: comp.mobile.android

    Carlos E.R. wrote:
    AJL wrote:


    I know that there are flaws in Bluetooth that allow a passerby to get entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    I do have a Bluetooth on/off switch on my Galaxy S10+. I think it's been
    off
    since the beginning but not for security but more likely because I just
    didn't use it. Also perhaps to save some battery? I just don't remember.

    But I do use it. My car connects to it automatically before displaying
    the map. My watch connects to it. I need it always on.

    Ah. I misunderstood. I thought you couldn't turn off Bluetooth not that you
    didn't want to. Well let's just hope your car doesn't leave unexpectedly or
    your watch makes you late... 8-O

    BTW I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...

    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Wed Apr 22 21:18:23 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-22 20:32, AJL wrote:
    Carlos E.R. wrote:
    AJL wrote:


    I know that there are flaws in Bluetooth that allow a passerby to get
    entrance into a phone. They recommend people to disable BT, but that is
    not feasible.

    I do have a Bluetooth on/off switch on my Galaxy S10+. I think it's
    been off
    since the beginning but not for security but more likely because I just
    didn't use it. Also perhaps to save some battery? I just don't remember.

    But I do use it. My car connects to it automatically before displaying
    the map. My watch connects to it. I need it always on.

    Ah. I misunderstood. I thought you couldn't turn off Bluetooth not that you didn't want to. Well let's just hope your car doesn't leave unexpectedly or your watch makes you late...  8-O

    BTW I think I'm pretty safe because my trusty $6 (US) Amazon watch is guaranteed not to talk to bad guys...


    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.
    But that's impossible, many things require BT to be constantly on.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Maria Sophia@[email protected] to comp.mobile.android on Wed Apr 22 13:25:05 2026
    From Newsgroup: comp.mobile.android

    AJL wrote:
    But I do use it. My car connects to it automatically before displaying
    the map. My watch connects to it. I need it always on.

    Ah. I misunderstood. I thought you couldn't turn off Bluetooth not that you
    didn't want to. Well let's just hope your car doesn't leave unexpectedly or
    your watch makes you late... 8-O

    There are multiple aspects of this thread going on, all of which are good.

    For one, I think Carlos' point is he wants someone/something to tell him
    what he's vulnerable to, but to my point, it's on a case-by-case basis.

    Take this bluetooth subtopic:
    a. Carlos has bluetooth on constantly
    b. AJL and I never turn the thing on (unless we actually need it).

    Notice that's two very different situations in terms of vulnerability.
    A. If there is a serious BT CVE, it may affect Carlos a lot
    B. Yet, it likely won't affect AJL and me at all

    Since I practice good bluetooth hygiene, a bluetooth CVE might not be as dangerous to me as it is to Carlos.

    Note that I use bluetooth in the car also, and my hearing aid is bluetooth also, but I turn off bluetooth when I'm no longer in the car. Turning off Bluetooth (and GPS, if on) are the things I do the instant I park the car.

    The reason I do it, by the way, is because stores are known to use BT
    scanners to gather data about how long you loiter in each jobber's aisle.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Maria Sophia@[email protected] to comp.mobile.android on Wed Apr 22 13:33:24 2026
    From Newsgroup: comp.mobile.android

    Carlos E.R. wrote:
    BTW I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...


    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.
    But that's impossible, many things require BT to be constantly on.

    Hi Carlos,

    We posted at the same time, where my hearing aids are bluetooth, and, of course, in a car, bluetooth is fantastic, but I turn off BT all the time.

    My point though, is that each of our susceptibility to CVE's is different.

    If there is a BT CVE, it won't affect me in the least, most likely.
    And yet, it may affect you a lot.

    What I'm bringing up that is on topic is that the threats are dependent
    on our phone, it's patch level, and more than anything, on what we do.

    Another example is someone clicking on a link inside of an SMS message.
    I don't think I've ever done that (unless it's from my wife or kids).
    So a serious CVE based on someone clicking a link isn't my concern.

    Yet another example, which is perhaps the most common, are malware apps.
    I don't download them (as far as I can tell).

    But every time there is a list of malware apps, I check, and I NEVER
    have them (which is to be expected since I download vetted apps mostly).

    But wait, there's more.

    Another example is editing malware, e.g., MSWord on the phone or something
    like that, where I don't edit MSWord on the phone, so it doesn't affect me.

    Given all the constraints, I'd wager a looooooooong list of CVEs for any
    given Android version is almost useless given how long it will be.

    Out of a thousand CVEs, how many are likely to actually affect me?
    That's what I think is important.

    And I think it's doable, but I haven't thought about the process yet.
    It may even exist.

    a. We input a bunch of data about us and our phone
    b. And it outputs which CVE's we're most susceptible to

    Of course, that site has to be a trusted site.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Wed Apr 22 21:41:24 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-22 21:33, Maria Sophia wrote:
    Carlos E.R. wrote:
    BTW I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...


    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.
    But that's impossible, many things require BT to be constantly on.

    Hi Carlos,

    We posted at the same time, where my hearing aids are bluetooth, and, of course, in a car, bluetooth is fantastic, but I turn off BT all the time.

    My point though, is that each of our susceptibility to CVE's is different.

    If there is a BT CVE, it won't affect me in the least, most likely.
    And yet, it may affect you a lot.

    What I'm bringing up that is on topic is that the threats are dependent
    on our phone, it's patch level, and more than anything, on what we do.

    Another example is someone clicking on a link inside of an SMS message.
    I don't think I've ever done that (unless it's from my wife or kids).
    So a serious CVE based on someone clicking a link isn't my concern.

    I do it often. It is required to sign contracts, for example.

    ...
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Maria Sophia@[email protected] to comp.mobile.android on Wed Apr 22 14:31:49 2026
    From Newsgroup: comp.mobile.android

    Carlos E.R. wrote:
    Another example is someone clicking on a link inside of an SMS message.
    I don't think I've ever done that (unless it's from my wife or kids).
    So a serious CVE based on someone clicking a link isn't my concern.

    I do it often. It is required to sign contracts, for example.

    I've had to sign paperwork with secure esign where I would never think of
    doing that on a phone, for a huge variety of reasons (not the least of
    which is how puny a phone is for reading fine print).

    I do that on the PC and even then, since my PC is hardened, it's a bitch.

    But this fact that each of us is different underlays my rationale that a
    simple looooooooooooooong list of CVEs isn't all that useful for any of us.

    What we need is a list of CVEs that
    a. Affect only our devices
    b. And are based on actions that we do

    Of course, zero-click CVEs are the exception.

    I think it's possible, and, in fact, since I have solved some of the most difficult problems on earth when I was working in Silicon Valley, I could certainly solve it, but it's not something I will be spending energy on.

    Since I'm not likely going to invest energy solving it, I'm assuming
    someone else already did, but we have to find that particular site.

    Too-simply stated, it would, IMHO, ask for how we use the phone.
    And then it would show us the CVE's that are unpatched that affect us.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Wed Apr 22 22:50:33 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-22 22:31, Maria Sophia wrote:
    Carlos E.R. wrote:
    Another example is someone clicking on a link inside of an SMS message.
    I don't think I've ever done that (unless it's from my wife or kids).
    So a serious CVE based on someone clicking a link isn't my concern.

    I do it often. It is required to sign contracts, for example.

    I've had to sign paperwork with secure esign where I would never think of doing that on a phone, for a huge variety of reasons (not the least of
    which is how puny a phone is for reading fine print).

    I do that on the PC and even then, since my PC is hardened, it's a bitch.

    Often I am not given any option. It is phone, or phone. And I was at the physical shop, the last two contracts. Paper not accepted.


    But this fact that each of us is different underlays my rationale that a simple looooooooooooooong list of CVEs isn't all that useful for any of us.

    What we need is a list of CVEs that
    a. Affect only our devices
    b. And are based on actions that we do

    Of course, zero-click CVEs are the exception.

    I think it's possible, and, in fact, since I have solved some of the most difficult problems on earth when I was working in Silicon Valley, I could certainly solve it, but it's not something I will be spending energy on.

    Since I'm not likely going to invest energy solving it, I'm assuming
    someone else already did, but we have to find that particular site.

    Too-simply stated, it would, IMHO, ask for how we use the phone.
    And then it would show us the CVE's that are unpatched that affect us.

    Of course I can read the CVES, but it is a full time job.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Wed Apr 22 22:01:35 2026
    From Newsgroup: comp.mobile.android

    On 4/22/26 12:18 PM, Carlos E.R. wrote:
    On 2026-04-22 20:32, AJL wrote:

    I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...

    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.

    But maybe they're not crying wolf. Maybe you've been lucky?

    But that's impossible, many things require BT to be constantly on.

    My cars came with built in maps and direction capabilities. So no BT needed.
    As always YMMV...




    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Andy Burns@[email protected] to comp.mobile.android on Thu Apr 23 10:37:28 2026
    From Newsgroup: comp.mobile.android

    AJL wrote:

    My cars came with built in maps and direction capabilities. So no BT
    needed.
    As always YMMV...

    I find most built-in satnavs are poor compared to Waze/Google.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Thu Apr 23 13:14:36 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-23 00:01, AJL wrote:
    On 4/22/26 12:18 PM, Carlos E.R. wrote:
    On 2026-04-22 20:32, AJL wrote:

    I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...

    My point is that security guys are crying wolf every day saying that
    BT is dangerous, and that we must turn it off till the moment we need it.

    But maybe they're not crying wolf. Maybe you've been lucky?

    But that's impossible, many things require BT to be constantly on.

    My cars came with built in maps and direction capabilities. So no BT
    needed.
    As always YMMV...

    There is also the smart watch. It needs BT.

    Yes, I also have a TomTom which is independent from my phone (actually,
    when I bought it, it needed my BT for internet, but I managed to change
    that). But basically all cars today come with a smart display that
    connect to smartphones, be them iphones or androids, with a cable or
    radio. And that display does way more than maps. Phone calls, messages,
    play podcasts, radio on internet, weather forecasts, etc.


    So, I should, in theory, make sure that my phone is security up to date.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Frank Slootweg@[email protected] to comp.mobile.android on Thu Apr 23 14:49:04 2026
    From Newsgroup: comp.mobile.android

    AJL <[email protected]> wrote:
    On 4/22/26 2:45 AM, Carlos E.R. wrote:
    [...]
    No, I do not want a chauffeur. I simply want somebody that has the >expertise to analyze CVEs and translate them for common people, telling
    me the summary and what I should really care about.

    Yup. I Googled Galaxy S10+ CVE and found what I (a common people?) was
    already pretty sure of:

    <https://www.androidauthority.com/samsung-exynos-vulnerability-attack-3494479/>
    And that was just the first try. Bet there's lots more. So confirmation that
    my old phone's definately not good for sensitive stuff. Give it a try
    Frank...

    I did a similar search for our A51 phones (one still in use). The "AI Overview' lists 'Key Vulnerabilities and Patches' including the
    Exynos modem, but these were all patched in (dated) updates.

    The search did not specifically list any vulnerabilities which were
    *not* patched for this out-of-support device.

    So the kind of information Carlos is looking for, is not readily
    available, hence his wish.

    Anyway, as I (think I) mentioned before, that the *device*/*OS* has outstanding non-fixed vulnerabilities, does not mean that an *app* on
    such a device can not be secure (provided the device's biomaterics, etc.
    are not compromised).

    That said, most 'banking' I do on my phone [1] is *reading* (past transactions, etc.), not performing transactions. Most, if not all, transactions are done on my (probably totally insecure :-)) laptop, in
    the privacy of my (probably totally insecure :-)) home.

    [1] which still is in support

    [...]
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Frank Slootweg@[email protected] to comp.mobile.android on Thu Apr 23 15:08:26 2026
    From Newsgroup: comp.mobile.android

    AJL <[email protected]> wrote:
    On 4/22/26 12:18 PM, Carlos E.R. wrote:
    On 2026-04-22 20:32, AJL wrote:

    I think I'm pretty safe because my trusty $6 (US) Amazon watch is
    guaranteed not to talk to bad guys...

    My point is that security guys are crying wolf every day saying that BT
    is dangerous, and that we must turn it off till the moment we need it.

    But maybe they're not crying wolf. Maybe you've been lucky?

    But that's impossible, many things require BT to be constantly on.

    My cars came with built in maps and direction capabilities. So no BT needed.
    As always YMMV...

    I use Bluetooth for Android Auto in rental cars, much easier to use a navigation app which I know, than to try to figure out how the heck the built-in (if any) navigation system works.

    Like Carlos, I also need Bluetooth for my watch/activity-tracker.

    And I need Bluetooth for the Quick Share file transfers from my laptop
    to my phone and vice versa. Of course I could switch on/off Bluetooth on
    both devices before/after use, but that is way too cumbersome.

    And last but not least, as Bluetooth is a Dutch invention, I must have
    it on all the time! :-)
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Thu Apr 23 16:28:18 2026
    From Newsgroup: comp.mobile.android

    On 4/23/26 2:37 AM, Andy Burns wrote:
    AJL wrote:

    My cars came with built in maps and direction capabilities. So no BT
    needed.
    As always YMMV...

    I find most built-in satnavs are poor compared to Waze/Google.

    I was just pointing out that the BT paranoid can live without it if wanted.
    I can use my phone's navigation (Google) in its holder since it has loud
    audio no BT to the car needed. But in some past trips and locally Google
    suggested poor routing IMO. These days I use the wife. She uses her iPhone
    and tells me where to go. It seem to do well and of course I'm used to her
    telling me where to go...


    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Thu Apr 23 17:30:09 2026
    From Newsgroup: comp.mobile.android

    On 4/23/26 4:14 AM, Carlos E.R. wrote:

    There is also the smart watch. It needs BT.

    Lots of toys need BT. Depends on personal wants and needs. My first watch in
    the 1940s and my current $6 Amazon watch do about the same thing: Tell
    time. I'm satisfied. YMMV...

    So, I should, in theory, make sure that my phone is security up to date.

    Me too. Wait, I can't... 8-O


    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Thu Apr 23 17:57:17 2026
    From Newsgroup: comp.mobile.android

    On 4/23/26 7:49 AM, Frank Slootweg wrote:

    as I (think I) mentioned before, that the *device*/*OS* has
    outstanding non-fixed vulnerabilities, does not mean that an *app* on
    such a device can not be secure (provided the device's biomaterics, etc.
    are not compromised).

    Agreed. The problem is how to KNOW FOR SURE that the app is safe. I use many
    apps on my phone (like this PhoNews newsreader), but not sensitive apps
    (like my banking apps). I think that is just common sense on an old no
    longer security updated phone like mine.

    That said, most 'banking' I do on my phone [1] is *reading* (past >transactions, etc.), not performing transactions. Most, if not all, >transactions are done on my (probably totally insecure :-)) laptop, in
    the privacy of my (probably totally insecure :-)) home.

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions
    such as transferring out money to a perps account. Since I have no NEED of
    those apps on my security challenged phone, why take a chance...




    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Thu Apr 23 18:10:35 2026
    From Newsgroup: comp.mobile.android

    On 4/23/26 8:08 AM, Frank Slootweg wrote:

    I use Bluetooth for Android Auto in rental cars, much easier to use a >navigation app which I know, than to try to figure out how the heck the >built-in (if any) navigation system works.

    Like Carlos, I also need Bluetooth for my watch/activity-tracker.

    And I need Bluetooth for the Quick Share file transfers from my laptop
    to my phone and vice versa. Of course I could switch on/off Bluetooth on
    both devices before/after use, but that is way too cumbersome.

    And last but not least, as Bluetooth is a Dutch invention, I must have
    it on all the time! :-)

    I suspect that you and Carlos are like 99% of the population. An Apple Watch
    (gasp) even lives in my house. Dunno if it uses BT or not. Probably does.
    Heck when the wife has a problem with her iPad/iWatch she's on her own. I
    don't have a clue. Fortunately grandkids come in handy for fixing
    electronic toys like that...


    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Thu Apr 23 21:05:05 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-23 19:57, AJL wrote:
    On 4/23/26 7:49 AM, Frank Slootweg wrote:

    as I (think I) mentioned before, that the *device*/*OS* has
    outstanding non-fixed vulnerabilities, does not mean that an *app* on
    such a device can not be secure (provided the device's biomaterics, etc.
    are not compromised).

    Agreed. The problem is how to KNOW FOR SURE that the app is safe. I use
    many
    apps on my phone (like this PhoNews newsreader), but not sensitive apps
    (like my banking apps). I think that is just common sense on an old no
    longer security updated phone like mine.

    That said, most 'banking' I do on my phone [1] is *reading* (past
    transactions, etc.), not performing transactions. Most, if not all,
    transactions are done on my (probably totally insecure :-)) laptop, in
    the privacy of my (probably totally insecure :-)) home.

    My banking, investment, etc, apps all require a password to read past transactions. And once in they require nothing further for new transactions such as transferring out money to a perps account. Since I have no NEED of those apps on my security challenged phone, why take a chance...

    Banks here demand you confirm the password using the phone, the computer
    is not enough anymore.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Maria Sophia@[email protected] to comp.mobile.android on Thu Apr 23 13:24:42 2026
    From Newsgroup: comp.mobile.android

    Carlos E.R. wrote:
    I do that on the PC and even then, since my PC is hardened, it's a bitch.

    Often I am not given any option. It is phone, or phone. And I was at the physical shop, the last two contracts. Paper not accepted.

    I agree with you that paper often is no longer accepted, where in my case,
    the government forces me to take money out of my retirement account (it's
    the law!) so I have to jump through hoops even on a PC to do esign stuff.

    Luckily, my financial advisors who take care of that, drive to me so I can
    sign the paperwork (but they'd likely be happy if I would just esign it).

    Too-simply stated, it would, IMHO, ask for how we use the phone.
    And then it would show us the CVE's that are unpatched that affect us.

    Of course I can read the CVES, but it is a full time job.

    Exactly.
    I think finding the CVE is the easy part.

    The problem is figuring out quickly whether the CVE impacts us.
    Where each of us has a different phone setup and use model.

    For example, my contacts sqlite database, as you know, is empty, so any CVE which attacks the contacts, isn't something that I would be worried about.

    This apparently lists, for example, Android/Samsung CVEs, which only people
    on Samsungs would care about (I'm not sure what brand you're on):
    https://security.samsungmobile.com/workScope.smsb
    Note that is the Android CVEs plus the Samsung-specific CVEs, apparently.

    In addition, each of us has a Project Mainline Google Play system update
    level, where we might need to go here to find CVEs after that date.
    https://source.android.com/docs/security/bulletin
    But roughly only about a third of the CVEs in a typical monthly ASB are
    fixable via Mainline, where I'd like to find two separated lists.
    1. One for project mainline CVE fixes
    2. The other for all Android CVE fixes (preferably w/o mainline CVEs)

    As you're aware, there's also the most important exploits known in the wild which the CISA KEV database has, but it's really hard to parse.
    https://www.cisa.gov/known-exploited-vulnerabilities-catalog

    Again, I could write the code to parse this data, but I'm not going to.
    So it's best if we can find a site that can do it already for us.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Maria Sophia@[email protected] to comp.mobile.android on Thu Apr 23 13:30:19 2026
    From Newsgroup: comp.mobile.android

    AJL wrote:
    And last but not least, as Bluetooth is a Dutch invention, I must have
    it on all the time! :-)

    I suspect that you and Carlos are like 99% of the population. An Apple Watch
    (gasp) even lives in my house. Dunno if it uses BT or not. Probably does.
    Heck when the wife has a problem with her iPad/iWatch she's on her own. I
    don't have a clue. Fortunately grandkids come in handy for fixing
    electronic toys like that...

    I agree with you on the grandkids helping we elders out, but in my case, I taught their parents all I know about privacy and the girls still went for
    the iPhone, so, there's a finite limit to how much progeny can absorb. :)

    For me, turning the phone on airplane mode when I exit the car in the
    parking lot is as natural at this point as it is to mark the GPS spot.

    I think you were in law enforcement, where when I drove an ambulance in my college days, I was taught "memory items" (much like pilots are taught).

    Those memory items included "grab your hat" off the passenger seat! :)

    My point?
    Turning off bluetooth at well-designed times, is a habit we learn.
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Frank Slootweg@[email protected] to comp.mobile.android on Thu Apr 23 19:54:41 2026
    From Newsgroup: comp.mobile.android

    AJL <[email protected]> wrote:
    On 4/23/26 7:49 AM, Frank Slootweg wrote:

    as I (think I) mentioned before, that the *device*/*OS* has
    outstanding non-fixed vulnerabilities, does not mean that an *app* on
    such a device can not be secure (provided the device's biomaterics, etc. >are not compromised).

    Agreed. The problem is how to KNOW FOR SURE that the app is safe. I use many
    apps on my phone (like this PhoNews newsreader), but not sensitive apps
    (like my banking apps). I think that is just common sense on an old no
    longer security updated phone like mine.

    As (I think) I mentioned, I consider the banking app(s) safe if the
    bank(s) still support the 'old' Android version (in our case Android
    13). If they do and anything goes wrong which is not user-caused,
    they'll have a hard time not reimbursing the (financial) damages. While
    this is nost cast-in-stone in law, it is common practice in our country
    and probably is most of the EU/Europe.

    Another safety example: Our governmental/official-institutions ID
    system (DigiD [1]), still supports Android 13 (and possibly earlier).

    That said, most 'banking' I do on my phone [1] is *reading* (past >transactions, etc.), not performing transactions. Most, if not all, >transactions are done on my (probably totally insecure :-)) laptop, in
    the privacy of my (probably totally insecure :-)) home.

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions
    such as transferring out money to a perps account. Since I have no NEED of
    those apps on my security challenged phone, why take a chance...

    That is indeed not very secure. Ours (can) use biometrics like
    fingerprint (which is what we use) and face recognition to get in *and*
    to approve transactions. They can use PIN instead of biometrics, but I
    don't consider that secure enough.

    [1] <https://en.wikipedia.org/wiki/DigiD>
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Frank Slootweg@[email protected] to comp.mobile.android on Thu Apr 23 19:54:41 2026
    From Newsgroup: comp.mobile.android

    AJL <[email protected]> wrote:
    On 4/23/26 8:08 AM, Frank Slootweg wrote:

    I use Bluetooth for Android Auto in rental cars, much easier to use a >navigation app which I know, than to try to figure out how the heck the >built-in (if any) navigation system works.

    Like Carlos, I also need Bluetooth for my watch/activity-tracker.

    And I need Bluetooth for the Quick Share file transfers from my laptop
    to my phone and vice versa. Of course I could switch on/off Bluetooth on >both devices before/after use, but that is way too cumbersome.

    And last but not least, as Bluetooth is a Dutch invention, I must have
    it on all the time! :-)

    I suspect that you and Carlos are like 99% of the population. An Apple Watch
    (gasp) even lives in my house. Dunno if it uses BT or not. Probably does.
    Heck when the wife has a problem with her iPad/iWatch she's on her own. I
    don't have a clue. Fortunately grandkids come in handy for fixing
    electronic toys like that...

    Look at these 'watches', like you look at our 'phones'. With our
    'phones', we do many, many things, but using them as a *phone* is only a
    small - if any - part of what we do with them. Same story with these
    'watches'.

    Phone, smartphone. Watch, smartwatch. You get the picture.

    BTW, my watch isn't a 'smartwatch' by the most common definitions.
    That's why I normally use the term 'activity-tracker', you know, for
    when I run the Boston marathon! :-)
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Frank Slootweg@[email protected] to comp.mobile.android on Thu Apr 23 20:00:03 2026
    From Newsgroup: comp.mobile.android

    Carlos E.R. <[email protected]d> wrote:
    On 2026-04-23 19:57, AJL wrote:
    [...]
    My banking, investment, etc, apps all require a password to read past transactions. And once in they require nothing further for new transactions such as transferring out money to a perps account. Since I have no NEED of those apps on my security challenged phone, why take a chance...

    Banks here demand you confirm the password using the phone, the computer
    is not enough anymore.

    For our banks we can still use a bank-supplied hardware device which
    reads your card, needs your card PIN and then generates a TOTP code. We
    have had those devices for eons, before smartphones even existed and
    they will probably be around for a long time for elderly people (like
    me! :-)).
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Thu Apr 23 20:10:01 2026
    From Newsgroup: comp.mobile.android

    On 4/23/26 12:05 PM, Carlos E.R. wrote:
    On 2026-04-23 19:57, AJL wrote:

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions >> such as transferring out money to a perps account. Since I have no NEED of >> those apps on my security challenged phone, why take a chance...

    Banks here demand you confirm the password using the phone, the computer
    is not enough anymore.

    Here it's by text or email depending on the organization. 2 factor
    authorization (2FA). On most of my accounts when I do the first log in and
    get the 2FA security code, I can authorize the device and from then on only
    the PW is needed on that device...


    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Thu Apr 23 22:41:09 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-23 22:00, Frank Slootweg wrote:
    Carlos E.R. <[email protected]d> wrote:
    On 2026-04-23 19:57, AJL wrote:
    [...]
    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions >>> such as transferring out money to a perps account. Since I have no NEED of >>> those apps on my security challenged phone, why take a chance...

    Banks here demand you confirm the password using the phone, the computer
    is not enough anymore.

    For our banks we can still use a bank-supplied hardware device which
    reads your card, needs your card PIN and then generates a TOTP code. We
    have had those devices for eons, before smartphones even existed and
    they will probably be around for a long time for elderly people (like
    me! :-)).

    My bank did not provide them, and does not, as far as I know. Maybe
    special clients.

    What it did was give us a card with 50 pin codes, and each time it would
    ask for a random pin of the lot.

    I have an old neighbour who I know doesn't have a smartphone, not even a simple mobile phone. I don't know how he handles the bank.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From AJL@[email protected] to comp.mobile.android on Thu Apr 23 22:16:51 2026
    From Newsgroup: comp.mobile.android

    On 4/23/26 12:54 PM, Frank Slootweg wrote:
    AJL <[email protected]> wrote:

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions >> such as transferring out money to a perps account. Since I have no NEED of >> those apps on my security challenged phone, why take a chance...

    That is indeed not very secure.

    With 2FA it is reasonably secure. And security is in entering the app/site
    securely on a secure device, not the capabilities offered once inside.

    Ours (can) use biometrics like
    fingerprint (which is what we use) and face recognition to get in *and*
    to approve transactions

    Yup. My old phone can do that with financial apps too. However I think that
    most would agree that using sensitive apps on an almost 7 old non-updated
    phone is still unwise.

    to get in *and*
    to approve transactions. They can use PIN instead of biometrics, but I
    don't consider that secure enough.

    So you consider your not up to date phone safe for some apps but worry about
    a pin? Perhaps you should use more than a one digit pin... ;)



    [1] <https://en.wikipedia.org/wiki/DigiD>


    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Frank Slootweg@[email protected] to comp.mobile.android on Fri Apr 24 14:09:20 2026
    From Newsgroup: comp.mobile.android

    AJL <[email protected]> wrote:
    On 4/23/26 12:54 PM, Frank Slootweg wrote:
    AJL <[email protected]> wrote:

    My banking, investment, etc, apps all require a password to read past
    transactions. And once in they require nothing further for new transactions
    such as transferring out money to a perps account. Since I have no NEED of >> those apps on my security challenged phone, why take a chance...

    That is indeed not very secure.

    With 2FA it is reasonably secure. And security is in entering the app/site
    securely on a secure device, not the capabilities offered once inside.

    Yes, I saw that in another response (to Carlos) you mentioned that
    the app/site has a 'trust this device' facility, which indeed provides
    the needed security.

    Several people often whine about 2SV via SMS/e-mail not being secure,
    but if that's only what's offered, one has to deal with that.

    Ours (can) use biometrics like
    fingerprint (which is what we use) and face recognition to get in *and*
    to approve transactions
    [...]
    to get in *and*
    to approve transactions. They can use PIN instead of biometrics, but I >don't consider that secure enough.

    So you consider your not up to date phone safe for some apps but worry about
    a pin?

    We can get into the *phone* with a fingerprint or a PIN (can choose
    which one when you want to unlock the phone), but for the *banking
    apps*, it's (configurable) fingerprint *or* PIN. I.e. if you have
    configured for fingerprint, you can't get in with a PIN and vice versa.

    Perhaps you should use more than a one digit pin... ;)

    That's a splendid idea! Thanks much!
    --- Synchronet 3.21f-Linux NewsLink 1.2
  • From Carlos E.R.@[email protected] to comp.mobile.android on Sat Apr 25 14:13:04 2026
    From Newsgroup: comp.mobile.android

    On 2026-04-24 16:09, Frank Slootweg wrote:
    AJL <[email protected]> wrote:
    On 4/23/26 12:54 PM, Frank Slootweg wrote:
    AJL <[email protected]> wrote:

    ...

    So you consider your not up to date phone safe for some apps but worry about >> a pin?

    We can get into the *phone* with a fingerprint or a PIN (can choose
    which one when you want to unlock the phone), but for the *banking
    apps*, it's (configurable) fingerprint *or* PIN. I.e. if you have
    configured for fingerprint, you can't get in with a PIN and vice versa.

    My bank app asks for a pin, but a button makes it ask for the
    fingerprint instead.

    Notice that the app uses the OS for the actual fingerprint code. The app
    did not ask me to "calibrate" with my finger, it just accepts that OS
    says "yes, this is the proper finger". Maybe it would accept my face as
    well, I have not tried. Generically, biometrics.
    --
    Cheers, Carlos.
    ES🇪🇸, EU🇪🇺;
    --- Synchronet 3.21f-Linux NewsLink 1.2