Google is rectifying the Android ecosystem and will force mobile phone manufacturers to provide security patches

Google is rectifying the Android ecosystem and will force mobile phone manufacturers to provide security patches

In terms of system security, Android has always been far behind iOS. We can find a long list of "unqualified" Android manufacturers in any survey report, and even recently there was a scandal that many manufacturers cheated in pushing security patches. Seeing such a chaotic Android ecosystem, Google naturally cannot stand it. At this I/O conference, Dave Kleidermacher, head of Google's security department, said that OEM manufacturers will be forced to provide security patches.

Dave Kleidermacher said that Google has modified the agreement with its OEM partners (referring to third-party manufacturers such as Huawei, Samsung, Xiaomi, etc.), and providing regular security patches is an important item. In the future, these manufacturers will be obliged to release patches regularly, which will enable more users and devices to receive security patches regularly.

Previously, Google has been updating security patches at a frequency of about once a month, but many Android manufacturers have not followed up. According to SecurityLab's investigation, it takes months for most Android devices to receive updates after a vulnerability is exposed. Even brands such as HTC and OnePlus have to wait for several months for their flagship phones. The blood-red scores fully reflect the poor security of Android phones.

What's more, foreign media "Wired" said that many manufacturers will miss patches, Xiaomi, OnePlus and Nokia miss an average of 1 to 3 patches, Huawei, HTC, LG and Motorola miss an average of 3 to 4. Some even push a "security patch" to users, but in fact it is just a change of the update date of the last update package, which is obviously a fraud.

According to a survey by security company RSA, only 47% of companies or organizations will take patching measures immediately after learning of vulnerabilities, and as many as 26% of companies will ignore some major security vulnerabilities because they do not have time to fix them; 16% of companies said they do not have the ability to fix these problems. Therefore, in the past, many Android manufacturers would submit applications to Google, hoping that they would not fix certain vulnerabilities, but directly shut down the functions related to the vulnerabilities. This method obviously saves time and effort, but Google will not agree to such applications in the future.

Even this kind of application is usually submitted by large manufacturers. Many small manufacturers will not have any communication with Google at all because they are not included in the GMS (Google Mobile Services) agreement and the Android Partner Program. The open source nature of Android has become a double-edged sword here.

<<:  Android is not secure, Google is not clear

>>:  A programmer who has always worked from 9 to 5

Recommend

Is the iPad Pro 2020 good to use? Let's see what foreign media reviews say

The iPad Pro 2020 models have been delivered to u...

No traffic from bidding promotion? You can do this!

Written in front There are two proverbs in Chines...

Xu Juntai's "21 Excel Function Lessons, Complete a Day's Work in 5 Minutes"

The EXCEL workplace office series of courses star...

9 marketing strategies for 2021 and 5 exclusive ideas

The marketing circle in 2020 is full of gimmicks,...

9 tips for optimizing your information flow account

The running volume of information flow accounts i...

“Don’t stick your smartwatch on the high-speed train window”, why?

Review expert: Zhou Hongzhi, senior laboratory te...

Have you reached these four levels of coding?

[[234603]] As a software development engineer, co...

9 Ways to Attract New Customers on Freight Platforms

The freight industry is like a piece of cake. The...