"Specifically, the fraudsters used software called packers—which save space and obfuscate the final payload, then “unpack” their malicious code when the time comes— to bypass the Google Play Store’s security controls.

Creepily, RAINBOWMIX tracked when users turned their screen on and off to better determine a good time to pop-up an ad, to help ensure that the ad impression counted, and also that an ad wasn’t rendered when the screen was off."

New Episode! Who controls your phone? Doc Searls, @katherined
@kyle and
Petros Koutoupis talk TikTok, censorship, user sovereignty and more. Episode link:

In the latest episode,
Doc, Katherine, and Petros talk about normalizing surveillance and Amazon's landlord program.


Linux Geeks doing what Linux Geeks do..