

This is why, as of late, there has been more concern to apps needing permissions to parts of your phone that have NOPTHING to do with the appliactions MAIN DESIGN PURPOSE. These articles DO NOT endorse the exploits but simply presents awareness for security professionals.īack to the topic most exploits depend on other applications access to phone monitoring, network monitoring, ect. OFF HAND - Here are two links discussing how easy Android is becoming to exploit to bypass a lock screen: Not to make this tech support for your application however if your phone is unloacked you may want to insure you are allowing the app to access all the features it needs to to DL from YT. Im just a Marine who had to work/script with security as a top priority every second of every day. To close, again, its about as safe as any app out right now, its mainly the permissions one should be paying attention to.īut what do I know about security. Iv used the YTD tool often as it is pretty reliable. Thank goodness I am not bound by those brnading requirements. They cant really even adivse on NON-STORE apps under those same agreements. So decide how you will, as no Avast! member here can speak ill of the Play Store being Avast is a DL on the store due to contracting/branding requirements. poor (or just plain lazy) development/programming OR striaght up fraud. In essence, today's applications suffer from one of two problems. And its not about a 'flashlight' app needs those permissions in case of an incoming phone call as the PHONE CALL portion of the phone is a completly7 ADMINSISTRATOR function and would superceed ANY USER based app commands/protocols. Why go to the trouble (and expense) of creating a new envirmental trojan/virus when the user will gladly hand ove their device through PERMISSIONS.

Many people are amazed at how few Android 'exploits' and 'backdoors' there are but when you lok at all the permissions an app wants access to change/modify/monitor it becomes clear. To be honest, your about as safe downloading apps from NON-PLAY sites as the Play Store itself. The YTD is the first tool I ever experienced *nux vunerabilities using.
