Google clamps down on Android developers with mandatory verification

https://fed.brid.gy/r/https://nerds.xyz/2026/03/android-developer-verification/

Day 10 of #100VibeProjects ๐Ÿ”

Built a local web tool that does static security analysis of Android APKs โ€” upload an APK and get a report covering permissions, hardcoded secrets, SDK fingerprinting, cert pinning, and crypto posture.

The interesting part: the methodology came from reverse-engineering the WhiteHouse app teardown that went viral last week. Applied the same five-gate analysis framework to a real banking app.

Found an expired certificate pin (silently disables TLS pinning for all users), a session replay SDK with no confirmed masking rules, and four Adobe tracking SDKs doing cross-device user stitching.

The tool runs entirely locally. No data leaves your machine. APK deleted after analysis.

Stack: Python ยท Flask ยท androguard ยท 380 lines

๐Ÿ“ Blog: mrdee.in
https://mrdee.in/writing/vibecoding-day010-offline-apk-security-analyzer/

๐Ÿ’ป GitHub Repo: https://github.com/mr-dinesh/Offline-APK-Analyzer

#VibeCoding #AppSec #AndroidSecurity #MobileSecurity #Python #Flask #DFIR #InfoSec #ReverseEngineering #CyberSecurity

Vibecoding-Day010-Create offline web tool for static security analysis of Android APK files

Building an Offline APK Security Analyzer in Flask Project #10 of the 100 Vibe Coding Projects challenge Iโ€™ve been doing APK security analysis manually for years โ€” pulling the file, running jadx, grepping through decompiled source, eyeballing the manifest. It works, but itโ€™s slow and the output lives in a terminal window that disappears the moment you close it. This weekโ€™s project: wrap that entire methodology into a local web tool. Upload an APK, get a structured risk report in your browser. No internet required, nothing stored, APK deleted the moment analysis completes.

Dee's Digest

Sam Bent reports the White House app v47.0.1 requests 26 Android permissions, including precise location, biometric authentication, storage changes, startup, overlay, and Wi-Fi access, and embeds 3 trackers including Huawei Mobile Services Core. The piece also says the app includes an ICE tip line link and a "Text the President" feature that prefills "Greatest President Ever!" while collecting contact details. More broadly, the article compares permissions and trackers across U.S. government apps including FEMA, myFBI Dashboard, IRS2Go, and CBP Mobile Passport Control and argues many functions could be delivered via the web instead of mobile apps.

https://www.sambent.com/the-white-house-app-has-huawei-spyware-and-an-ice-tip-line/

#InfoSec #Privacy #MobileSecurity

Fedware: 13 Government Apps That Spy Harder Than the Apps They Ban

The White House app ships with a sanctioned Chinese tracking SDK, the FBI app serves ads, and FEMA wants 28 permissions to show you weather alerts.

Sam Bent

๐Ÿ“ถ Cyber Tip: Turn off Bluetooth when not in use.

Disabling it reduces the risk of unauthorized connections and device based attacks.

https://zurl.co/GFrTK

#Zevonix #CyberSecurity #MobileSecurity #Jacksonville

Just Announced for BSides Luxembourg 2026!

Lightning Talk โšก ๐—จ๐—ก๐——๐—˜๐—ฅ๐—ฆ๐—ง๐—”๐—ก๐——๐—œ๐—ก๐—š ๐— ๐—ข๐—•๐—œ๐—Ÿ๐—˜ ๐—ฆ๐—ง๐—”๐—Ÿ๐—ž๐—˜๐—ฅ๐—ช๐—”๐—ฅ๐—˜ - ๐—˜๐—Ÿ๐—ข๐—จ๐—”๐—ก ๐—ฅ๐—œ๐—š๐—”๐—จ๐—ง

Elouan Rigaut https://linkedin.com/in/elouan-rigaut is a security researcher focused on mobile threats and surveillance technologies. His work examines stalkerware, attacker behavior, and detection challenges, with an emphasis on real-world impact and emerging research gaps.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https:// 2026.bsides.lu/tickets/
๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BsidesLuxembourg #CyberSecurity #MobileSecurity #Privacy #Stalkerware #InfoSec

๐Ÿ” Cyber Tip: Enable biometric logins on mobile devices.

Fingerprint or facial recognition adds an extra layer of protection if your device is lost or stolen.

https://zurl.co/FwMj6

#Zevonix #CyberSecurity #MobileSecurity #StAugustine

For the first time ever, OWASP MAScon hits OWASP Global AppSec EU 2026 in Vienna! Join top experts for cutting-edge mobile security talks, live demos & real-world insights.

๐ŸŽŸ Tickets: https://owasp.glueup.com/event/owasp-global-appsec-eu-2026-vienna-austria-162243/tickets.html
๐Ÿ“– Details: https://owaspglobalappseceuvienna20.sched.com/overview/type/MobileAppSecCon

#OWASP #MobileSecurity #AppSec #MAScon #CyberSecurity

The DarkSword iOS exploit, targeting Safari and WebKit, has leaked publicly on GitHub. โš ๏ธ
Apple patched affected devices with iOS 26.3, 18.7.3, 16.7.15, and 15.8.7, but unpatched devices remain at risk. ๐Ÿ”’

๐Ÿ”— https://appleinsider.com/articles/26/03/23/you-are-out-of-time-to-update-severe-ios-hack-code-leaks-to-everyone

#TechNews #iOS #MobileSecurity #Privacy #FOSS #OpenSource #UserControl #SoftwareUpdate #CyberSecurity #Exploit #Patch #UpdateNow #iPhone #iPad #SecurityAlert #DarkSword #Hacking #Safari #WebKit #GitHub

You are out of time to update: Severe iOS hack code leaks to everyone

The DarkSword exploit, which primarily targets devices running older iOS versions, has unfortunately made its way to GitHub. It has been patched, so update now.

AppleInsider

Surfshark launches HeyPolo ๐Ÿ“
โ€ข No always-on tracking
โ€ข Share exact / approx / none
โ€ข Granular visibility controls
Privacy-first location sharing.

https://www.technadu.com/surfshark-introduces-privacy-focused-location-app-heypolo/624213/

#Privacy #InfoSec #MobileSecurity

FriendlyDealer scam abusing PWAs:
โ€ข 1,500+ fake app store domains
โ€ข Browser-based installs bypass OS checks
โ€ข Apps appear legit
โ€ข Fake MrBeast affiliations used
Shift to stealth mobile delivery.

https://www.technadu.com/friendlydealer-scam-mimics-app-stores-to-push-gambling-platforms-some-impersonate-mr-beast-affiliations/624237/

#InfoSec #MobileSecurity #ScamAlert