77 points

Temu is absolute cancer in terms of business practices so no surprise here at all.

permalink
report
reply
46 points

Cancer in terms of, well, everything.

permalink
report
parent
reply
10 points

But it’s cheap.

permalink
report
parent
reply
11 points

Cheap cancer

permalink
report
parent
reply
11 points

If I wanted garbage I could get it for free from the roadside

permalink
report
parent
reply
3 points

Why is Temu so popular then?

permalink
report
parent
reply
10 points

Same like wish

permalink
report
reply
37 points

Shocked i tell you. I am shocked.

No way an app would collect data it doesnt need. Preposterous.

Next thing you’ll tell me is that tiktok is doing the same thing!

permalink
report
reply
29 points

What about Meta and Google?

permalink
report
parent
reply
-2 points

Them too, but lukewarm by comparison.

permalink
report
parent
reply
11 points

Why do you say that?

permalink
report
parent
reply
14 points

Erm, WhatsApp would suggest otherwise.

WhatsApp was the vector for zero click access to a target’s phone from Israel’s weapons grade hacking Pegasus toolkit. They would send a video call, typically in the middle of the night, and with no input from the used they’d get full access. My personal belief is that they used functionality WhatsApp itself uses to access user data.

There was also an encrypted phone called ANOM, which had this trick calculator app with a hidden encrypted messager. “Made for criminals, by criminals”. Except, when the guy started his business he got investment from the FBI and Australian Federal Police to pay for the servers and some of the phones themselves. Basically every time it sent an encrypted message it sent a separate encrypted message to the ANOM servers. It’s entirely possible (perhaps even likely) that WhatsApp would do this also.

As for Google, they’re truly insidious. Lots of banks now require you to connect to Google captcha servers - they don’t give you the pictures, it’s just the back end, basically the tracking parts. Then there’s the controversy about them collecting location data when users have said no. They absolutely do collect data they shouldn’t.

permalink
report
parent
reply
24 points

it doesn’t count when it’s an american company doing it

permalink
report
parent
reply
201 points

“Temu is designed to make this expansive access undetected, even by sophisticated users,” Griffin’s complaint said. “Once installed, Temu can recompile itself and change properties, including overriding the data privacy settings users believe they have in place.”

That’s just nuts

permalink
report
reply
53 points
*

This is why companies like Apple are at least a tiny bit correct when they go on about app security and limiting code execution. The fact it aligns with their creed of controlling all of the technology they sell makes the whole debate a mess, though. And it does not excuse shitty behavior on their part.

But damn

And if they got this past Apple in their platforms. That’s even wilder.

permalink
report
parent
reply
22 points

The article linked to the analysis and on a quick glance, it seems to be done entirely against the Android variant of the app. This makes sense because if the alleged actions are true, they’d never have gotten on to the App Store for iOS Apple users… or at least as of a couple months ago. Who knows what kind of vulnerability is exposed by Apple only doing limited cursory checks for 3rd party App Stores.

permalink
report
parent
reply
7 points

Shits getting scarier by the day.

permalink
report
parent
reply
108 points
*

Yeah, it is. It’s such an extraordinary claim.

One requiring extraordinary evidence that wasn’t provided.

“It’s doing amazing hacks to access everything and it’s so good at it it’s undetectable!” Right, how convenient.

permalink
report
parent
reply
3 points
Deleted by creator
permalink
report
parent
reply
13 points

I don’t believe his claims without evidence, but having a legit cover for nefarious acts is pretty standard, no?

permalink
report
parent
reply
8 points

Why steal their money when they can both get them to give their money as well data to also sell?

permalink
report
parent
reply
100 points
*

Libmanwe-lib.so is a library file in machine language (compiled). A Google search reveals that it is exclusively mentioned in the context of PDD software—all five search results refer to PDD’s apps. According to this discussion on GitHub, “the malicious code of PDD is protected by two sets of VMPs (manwe, nvwa)”. Libmanwe is the library to use manwe.

An anonymous user uploaded a decompiled version of libmanwe-lib to GitHub. It reads like it is a list of methods to encrypt, decrypt or shift integer signals, which fits the above description as a VMP for the sake of hiding a program’s purpose.

In plain words, TEMU’s app employed a PDD proprietary measure to hide malicious code in an opaque bubble within the application’s executables

permalink
report
parent
reply
5 points

So wait, bit-shifting some integers is now considered being malicious? Is that really the defense here? Using that definition just about all software in existence is malicious.

permalink
report
parent
reply
2 points
Deleted by creator
permalink
report
parent
reply
18 points
  1. Dynamic compilation using runtime.exec(). A cryptically named function in the source code calls for “package compile”, using runtime.exec(). This means a new program is created by the app itself.—Compiling is the process of creating a computer executable from a human-readable code. The executable created by this function is not visible to security scans before or during installation of the app, or even with elaborate penetration testing. Therefore, TEMU’s app could have passed all the tests for approval into Google’s Play Store, despite having an open door built in for an unbounded use of exploitative methods. The local compilation even allows the software to make use of other data on the device that itself could have been created dynamically and with information from TEMU’s servers.
permalink
report
parent
reply
11 points

Ah yes, delete your original incorrect comment instead of continuing the discussion about how wrong and lazy it was to make, nice.

permalink
report
parent
reply
-2 points

Have they ever heard of faceberg or sundar the creep?

permalink
report
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 10K

    Posts

  • 467K

    Comments