Replies: 5 comments 4 replies
-
I support this issue |
Beta Was this translation helpful? Give feedback.
-
I support this issue too! |
Beta Was this translation helpful? Give feedback.
-
Adding to what ell1e said, emulators are also necessary to run common apps for those people who dont own an android or apple device by their determined choice, so that they can run those apps on their linux phones, or god forbid, their personal computers. In both cases on a device, where the user is the administrator, and not an untouchable tech company. I also want to highlight what was said about emulators: they also provide a security measure to the user against hostile apps that conduct disgusting, and deep, data collection practices, of which there are thousands, first and foremost including almost all apps of the most popular brands. Application security should never start at locking away device ownership, and then be done with it. It should always start at the backend servers, and leave your users alone with your arbitrary restrictions as much as possible. |
Beta Was this translation helpful? Give feedback.
-
Thanks for raising these points. We understand that this touches on sensitive topics around user freedoms, device ownership, and privacy. Our goal here is to clarify the scope and mission of the OWASP MAS project and explain how the controls should be interpreted. The mission of OWASP MAS is to define an industry standard for mobile application security and privacy. We do this by providing:
The focus is on helping developers build secure mobile applications, and enabling testers to evaluate them consistently. OWASP MAS is not a project to enforce vendor lock-in, restrict user freedoms, or regulate how operating systems should be designed. To clarify some of the main points being raised: Resilience and Tampering: From the perspective of an application, tampering is tampering. An app cannot tell whether a modification was made for personal reasons (e.g. removing ads) or malicious reasons (e.g. inserting spyware; see backdoored Telegram apps as an example). The techniques can be the same. MASVS-RESILIENCE defines controls that help developers protect their apps from such modifications. Importantly, resilience controls are never absolute and MASVS-RESILIENCE makes this very clear. Any client-side protection can be bypassed, so these must be treated as defense-in-depth rather than a complete mitigation. Developers should assume that motivated users will eventually find ways around them. On Rooting and Emulators: There are two perspectives:
At the same time, we recognize that emulators and custom OS builds are valuable tools for users who want stronger isolation from apps or who want to avoid mainstream services. That purpose, however, falls outside the scope of OWASP MAS. Projects like GrapheneOS or /e/OS focus specifically on building secure environments for users. MAS focuses on app security from the developer and tester perspective. Illustrative Examples
Neutrality and Responsibility
We appreciate the feedback and agree that questions of device ownership, interoperability, and user freedom are important. Those questions, however, are broader than the scope of OWASP MAS. Our role is to provide a neutral security baseline for mobile apps, so that developers, testers, and regulators can make informed and consistent decisions. The OWASP MAS Team - @cpholguera @sushi2k @TheDauntless |
Beta Was this translation helpful? Give feedback.
-
Thanks to everyone who contributed and shared their feedback in this discussion. We carefully reviewed all points raised and incorporated the ones that were within the scope of the OWASP MASVS: https://mas.owasp.org/MASVS/11-MASVS-RESILIENCE/ If additional changes to the OWASP MASVS or related resources (e.g., OWASP MASTG or MASWE) are desired, we encourage contributors to open PRs with concrete proposals in the respective GitHub repositories. For topics that fall outside the scope of OWASP MASVS, such as ecosystems or regulatory matters, we recommend engaging with the appropriate entities like governments or other standards bodies. The OWASP MAS Team - @cpholguera @sushi2k @TheDauntless |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
My apologies if I'm just misunderstanding. But I'm getting the impression that many of the resilience guidelines seem user hostile and like they're undermining data security, specifically those listed here https://mas.owasp.org/MASVS/controls/MASVS-RESILIENCE-1/ and https://mas.owasp.org/checklists/MASVS-RESILIENCE/ here at the top.
Regarding https://mas.owasp.org/MASVS/controls/MASVS-RESILIENCE-1/ this guideline should be rewritten to mean tampering by an advisery. Instead, it seems to imply that any changes by the user, for example having root access for the user, is also harmful tampering.
This seems in violation of fundamental democratic principles like data ownership and device ownership and user freedom. All anti tampering mechanisms against rooting have fundamental shortcomings that 1. prevent certain custom ROMs, 2. prevent the user from installing free software on a system level that protects them like certain system-wide adblockers, 3. generally prevents a technically advanced user from owning their system as they see fit. Not everybody is clueless when it comes to more advanced usage of their device.
In summary, preventing root access and locking the device down against the user's intended changes encourages having big data and big Google own your devices instead. This can be, especially for technical users, less secure than allowing the user to take care of their device. It seems to me like that's also anti-competitive.
Regarding https://mas.owasp.org/checklists/MASVS-RESILIENCE/ this seems to imply root use and emulator use are insecure or unwanted. For root users, see the previous section I wrote above.
The opposite seems true for emulator use as well. At least in my experience, Emulators are a great defense for the "appification" where apps often grab way more data than a web page from the device, from motion sensors, device id, other running devices via local port scans, and so on, and apps are often made purely to track the user better. Emulators are also a great defense against Google Play Services and other centralization and monopolization mechanisms having access to your personal data. Putting a single app into a single dedicated emulator is one of the best ways to restrict what data it could possibly access about you. It also reduces what other apps it can attack if it breaks out of the app sandbox.
In conclusion, this emulator ban seems to significantly reduce user privacy and user safety.
These guides sound mostly written to be targeting users that want to not think for themselves and have all their data and security and privacy (and resulting lack thereof) managed by Google and others. While I agree these users exist, this doesn't justify taking away those freedoms away from the user crowd that cares about not doing that. It also seems to go against the Digital Service Act's requirement of interoperability, especially the blocking of emulators.
I would therefore suggest the guides are updated to address these issues. If I simply misunderstood some sections, I'd be happy to learn why.
Beta Was this translation helpful? Give feedback.
All reactions