I recently asked the /c/Android community what information Google has access to on stock Android, assuming the user is not using any Google apps, and was told Google has full “unstoppable” access to the entire device, including Signal messages, the microphone, duckduckgo search history and anything displayed on the screen at all times.

Does this mean that encrypted messaging is essentially pointless to use on Android? I’m a newb here so go easy on me.

  • Autonomous User@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    3 minutes ago

    The system controls its apps. When the system’s not libre software, they control it, not you!

    Keep Signal. You’re helping others escape WhatsApp.

  • who@feddit.org
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    1 hour ago

    Google has the capability to read everything that you can read on an Android phone, unless you have taken steps to remove all Google-controlled components that have system-level privileges. Last time I checked, this included Google Play Services, which are installed by default on most Android phones.

    Note that messengers with end-to-end encryption, like Signal, cannot protect against an adversary with full access to your device.

    This is part of why people de-Google their phones, which usually means replacing the entire OS with something like LineageOS or GrapheneOS.

  • cygnus@lemmy.ca
    link
    fedilink
    arrow-up
    34
    arrow-down
    2
    ·
    edit-2
    5 hours ago

    Currently, no (other than the microphone). Android apps are sandboxed and the Signal app encrypts its data so it isn’t readable from the outside. There is however a real concern if using keyboards with predictive text, because the keyboard knows what you’re typing into Signal.

    • anon5621@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      20 minutes ago

      I will leave just this info here

      Technical Data

      Subject of Investigation: Google Play Services
      Number of Permissions: 277
      Operating System: Android 4.4.2 and above

      List of Permissions

      3.1. Automotive Systems Control

      Access to data and control of vehicle components via Android Auto/CarPlay:

      • Power windows
      • Tire pressure monitoring system
      • Rearview mirrors
      • Power system
      • Mileage data
      • Central door locking
      • Driving mode management
      • Seat adjustment
      • Vehicle speed data
      • Lighting system (headlights)
      • Battery
      • Climate control

      3.2. User Interface Manipulation

      • Embedding into application activities
      • Application substitution
      • Application icon modification

      3.3. “Chimera” Component

      System component of undetermined purpose.

      3.4. SMS Management

      Complete control of text messaging functions:

      • Sending messages
      • Receiving messages
      • Reading messages
      • Creating messages

      3.5. Root-Level System Privileges

      Complete device control at root-access level.

      3.6. Application Data Access

      • Access to all activities
      • Ability to embed into activities
      • Access to contacts

      3.7. USB Management

      Control of USB connections and data transfer.

      3.8. Identifier Access

      Access to all system and user device identifiers.

      3.9. Screen Lock Management

      Disabling keyguard (screen lock system).

      3.10. Mail Services Access

      • Access to email
      • Access to voicemail

      3.11. Network Function Management

      • Enabling/disabling network interfaces
      • Background data download
      • Modification of network settings

      3.12. Wi-Fi Management

      • Access to saved Wi-Fi passwords
      • Wi-Fi password transmission

      3.13. Audio Recording

      • Microphone audio recording
      • “Capture audio hotword” function (keyword capture)
      • Continuous audio stream monitoring for hotword detection

      3.14. Geolocation

      Complete control of location functions:

      • Location determination by all available methods
      • Independent enabling/disabling of geolocation services
      • “Allocate aggressive” mode (aggressive resource allocation for location determination)

      3.15. Payment Information Transmission

      Sending payment data without specified recipient restrictions.

      3.16. Camera Control

      Access to device camera.

      3.17. Telephony Function Management

      • Making calls
      • Access to call history
      • Control of telephone connections

      3.18. Permission Management

      Manipulation of other applications’ permissions:

      • Permission backup
      • Permission sharing
      • Permission revocation
      • Permission restoration

      3.19. Device Lock Management

      • Device locking
      • Device unlocking
      • Password protection bypass

      3.20. Biometric Authentication

      Complete control of biometric identification systems:

      • Fingerprint scanner
      • Facial recognition (Face ID)

      3.21. Notification Management

      Manipulation of system notifications:

      • SMS notification substitution
      • Call notification modification
      • Messenger notification modification

      3.22. Telephony Function Access

      • Access to telephony module
      • Call management

      3.23. Bluetooth Management

      Control of Bluetooth connections.

      3.24. Security Key Management

      • Encryption key substitution
      • Password reset

      Google Play Services is one of many pre-installed Google system components. A standard Android installation contains 30-50 additional Google applications with similar or complementary permission sets.

      IMG_20251111_032718_114 IMG_20251111_032717_685 IMG_20251111_032718_240 IMG_20251111_032717_935 IMG_20251111_032717_569 IMG_20251111_032717_629

    • N0t_5ure@lemmy.world
      link
      fedilink
      arrow-up
      20
      ·
      4 hours ago

      Android apps are sandboxed

      FWIW, they’re not sandboxed from google play services:

      The Play Store Services process has access to your precise location at all times, the motion sensors, networks, hardware identifiers (including IMEI), contacts, passwords, the entire storage space, call logs, access to other apps’ data, and more.

      Accordingly, google would have access to the Signal data on your phone. However, I don’t know whether the encryption would provide a measure of protection against google. GrapheneOS by default does not use google play services, and provides a sandboxed version for people who need the functionality.

      • Natanael@slrpnk.net
        link
        fedilink
        arrow-up
        4
        ·
        3 hours ago

        It’s possible but complicated.

        Since apps have access to the TPM API they can encrypt their own data in such a way that only the app’s own authorized processes can retrieve the decryption key from the TPM chip

    • Jediwan@lemy.lolOP
      link
      fedilink
      arrow-up
      12
      ·
      5 hours ago

      Someone at Google could hear what a device’s microphone is picking up at all times?

    • Shadow@lemmy.ca
      link
      fedilink
      arrow-up
      11
      arrow-down
      1
      ·
      5 hours ago

      I believe notifications would be accessible. Note that i don’t mean the push notification backend mentioned by Doomerang, but the actual notification that goes into your status bar (which is all processed on device). That would be readable by the OS in theory.

    • Jediwan@lemy.lolOP
      link
      fedilink
      arrow-up
      6
      arrow-down
      1
      ·
      5 hours ago

      Odd. Signal notifications absolutely include the content of the messages received.

      • passepartout@feddit.org
        link
        fedilink
        arrow-up
        12
        ·
        edit-2
        4 hours ago

        In Signal, push notifications simply act as a ping that tells the app to wake up.

        Google only pings your phone via FCM, the Signal App then polls the message itself.

        Edit: oops, you meant the pop-up. You can disable them from showing the message.

      • sik0fewl@lemmy.ca
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        5 hours ago

        Pretty sure it doesn’t by default? You can definitely change it, but I thought it was just name by default.

  • Natanael@slrpnk.net
    link
    fedilink
    arrow-up
    4
    arrow-down
    2
    ·
    3 hours ago

    There’s measures they could use in theory, but if you switch keyboard app away from Google’s and set private text mode, enable screenshot protection, etc, then you should be good.

    • Jediwan@lemy.lolOP
      link
      fedilink
      arrow-up
      1
      ·
      19 minutes ago

      But other comments are saying the exact opposite, that Google has full and compete access to the device and its hardware at all times.

      • FauxLiving@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        7 minutes ago

        Screenshot protection doesn’t protect you from the system seeing your screen. They’re running software with kernel-level access to your system, anything that they want is available to them.

        As to what they do with this level of access, I could only speculate.

    • Jediwan@lemy.lolOP
      link
      fedilink
      arrow-up
      4
      ·
      5 hours ago

      Neither, some manufacturers modify Android considerably. By “stock” I mean essentially what is on Pixels and many other devices, but not for example, Samsung.

      • Ŝan@piefed.zip
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        4 hours ago

        I would not expect any privacy from any Android, alþough if þere is any to be had, it’ll be from a deGoogled image.

        I have not heard anyone claim to have done a complete audit of Android, but even if it has been done on e.g. Graphene, what Google installs on Google phones is anyone’s guess, and it’s not paranoia to assume Google has backdoors.