Skip to main content

Google Just Added A New Security Feature To Android Apps In The Play Store

We all know very well that the security of the Android Google Play Store is something that has been questioned several times in recent times, so the tech giant Google works to improve this section increasingly and rapidly simply to keep its store safe from malware and vulnerabilities. However, now according to the latest reports, the tech giant Google just added a new extraordinary security feature to Android applications in the Play Store.

Google Just Added A New Security Feature To Android Apps In The Play Store

The security of the Android Google Play Store is something that has been questioned several times in recent times, so the tech giant Google works to improve this section increasingly and rapidly simply to keep its store safe from malware and vulnerabilities.

Thus, when we talk about DRM, it is something that we normally associate with streaming music and video, although we must be clear that there is no reason why it can not be used for other purposes. As proof of this, the tech giant Google has begun to use a form of DRM to improve the security of applications, verifying that APKs originate in the official store of the system, the aforementioned Play Store.

This protection works in a very similar way to the Windows signed drivers, so its objective is simple, it is intended to improve the security of Android users, ensuring that they are using original applications that have not been manipulated in any way.

At first, the tech giant Google does not refer to the new system as DRM but says it adds a small amount of security metadata in the APK to verify that these were distributed by Google Play.

From the point of view of the tech giant Google, one of the reasons why this system has been introduced is to help developers reach a wider audience, especially in countries where application sharing is common because of costly data plans and limited connectivity.

This means that it will be possible to determine the authenticity of the applications, regardless of whether a device is connected, or not, as it will be used, not only for applications obtained through the official store but also through approved distribution channels by the signature.

Google wants to increase the security of the Play Store

In this way, we can determine the authenticity of an application while the device is offline, in addition to adding those shared apps to a user’s library or managing the updates of the tool when the device is reconnected, which will offer greater confidence when using applications to share.

At the same time, all this also benefits the software developers, since it provides an authorized off-line distribution channel for the Play Store and, since the shared application is added to the user’s library, the app is in question will now be able to Receive updates from the Android store.

At the moment it seems that the tech giant Google is only “exchanging” this idea to developers, not to the end users of Android, although it is something that will be very beneficial for both parties.

So, what do you think about this? Simply share all your views and thoughts in the comment section below.

Comments

Popular posts from this blog

What is the difference between a direct and an indirect address instruction ?

Direct addressing means the instruction refers directly to the address being accessed. That is, the instruction encoding itself contains the address of the location. Depending on the instruction set, it may also allow computing a small index relative to the address. When used that way, you can think of that as a direct-indexed mode. (Note: Some processors call ‘direct’ mode ‘absolute’, such as the 6502.)

Indirect addressing uses an address held in a register or other location to determine what memory location to read or write. The idea here is that the instruction itself isn’t directly telling you the address to access, but rather indirectly telling the CPU where to find that address. The processor may also allow you to add a small offset to the indirect address, giving an indirect-indexed addressing mode.
Also Read : 5 Best Terminal Emulators for Linux The 6502 one is a little quirky: The 6502 doesn’t have general-purpose registers large enough to store addresses, so i…

What is ASP.NET? and it's ARCHITECTURE

What is ASP.Net?ASP.Net is a web development platform provided by Microsoft. It is used for creating web-based applications. ASP.Net was first released in the year 2002.
The first version of ASP.Net deployed was 1.0. The most recent version of ASP.Net is version 4.6. ASP.Net is designed to work with the HTTP protocol. This is the standard protocol used across all web applications.

ASP.Net applications can also be written in a variety of .Net languages. These include C#, VB.Net, and J#. In this chapter, you will see some basic fundamental of the .Net framework.

The full form of ASP is Active Server Pages, and .NET is Network Enabled Technologies.
ASP.NET Architecture and its Components ASP.Net is a framework which is used to develop a Web-based application. The basic architecture of the ASP.Net framework is as shown below.
 he architecture of the.Net framework is based on the following key components

Language – A variety of languages exists for .net framework. They are VB.n…

What Is Defensive Programming ?

Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed. – WikiPedia


Introduction Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed.
Advantages Defensive programming is an approach to improve software and source code, in terms of:
General qualityMaking the source code comprehensibleMaking the software behave in a predictable mannerDrawback Overly defensive programming, however, may safeguard against errors that will never be encountered, thus incurring run-time and maintenance costs. There is also the risk that the code traps or prevents too many exceptions, potentially resulting i…