Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
Spoof the device ro.product.name ro.product.device #350
Comments
thestinger
added
the
Type: enhancement
label
Jul 23, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Jul 23, 2016
Contributor
The browser example is the browser's problem for leaking so much data in the user agent, not an OS issue. I don't think spoofing these would make much difference because an app can still determine the information via various other ways. I don't plan on making changes unless they accomplish a meaningful goal.
|
The browser example is the browser's problem for leaking so much data in the user agent, not an OS issue. I don't think spoofing these would make much difference because an app can still determine the information via various other ways. I don't plan on making changes unless they accomplish a meaningful goal. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
Rudd-O
Jul 24, 2016
It would indeed be nice if something like User Agent Changer was built into Chromium, but I understand that's a lot of work.
Rudd-O
commented
Jul 24, 2016
|
It would indeed be nice if something like User Agent Changer was built into Chromium, but I understand that's a lot of work. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
condor0765
Jul 25, 2016
browser example is the browser's problem for leaking so much data in the user agent, not an OS issue
Agreed. I assumed doing at OS level would mean the browser or other apps cannot get so much information by any means. But I am not an expert, you decide.
I don't think spoofing these would make much difference because an app can still determine the information via various other ways.
Sure. But a request: Could you point to me where in the source code tree it may be changed so that all apps may be somehow spoofed?
I don't plan on making changes unless they accomplish a meaningful goal.
It was only a suggestion. Thanks for response.
condor0765
commented
Jul 25, 2016
Agreed. I assumed doing at OS level would mean the browser or other apps cannot get so much information by any means. But I am not an expert, you decide.
Sure. But a request: Could you point to me where in the source code tree it may be changed so that all apps may be somehow spoofed?
It was only a suggestion. Thanks for response. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Jul 25, 2016
Contributor
It's not feasible to conceal the device that an app is running on. The OS is built for each device individually, and there are countless ways for an app to identify a build. If you want that information to be hidden, then you need a whole different app ecosystem built for a much different kind of app sandbox.
|
It's not feasible to conceal the device that an app is running on. The OS is built for each device individually, and there are countless ways for an app to identify a build. If you want that information to be hidden, then you need a whole different app ecosystem built for a much different kind of app sandbox. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Dec 20, 2016
Contributor
Replacing this with #543. There's no way to stop apps from determining which device they're on even with all of these properties removed. There's so much they can inspect to determine that so it's only worth worrying about cases where common / important apps are leaking this information externally without malicious intentions. For Chromium (including the WebView), that can be directly addressed.
|
Replacing this with #543. There's no way to stop apps from determining which device they're on even with all of these properties removed. There's so much they can inspect to determine that so it's only worth worrying about cases where common / important apps are leaking this information externally without malicious intentions. For Chromium (including the WebView), that can be directly addressed. |
condor0765 commentedJul 22, 2016
•
edited
Edited 1 time
-
condor0765
edited Jul 22, 2016
In the file
frameworks/base/core/java/android/os/Build.javainformation on the mobile device is described. Is it worth for security to spoof this to may be some other device.The reason is some malware sites can even detect the OS/device/name etc. Also relevant http://webkay.robinlinus.com/
Thanks for the great work.
