x PhoneArena is hiring! Reviewer in the USA
  • Options

Apps from Google Play drain devices with covert crypto-coin mining

0. phoneArena 27 Mar 2014, 03:55 posted on

Foster a mining pool of millions of phones and tablets that work to put crypto-coins into your wallet, and one day you'll wake up criminally rich... in weird Internet money...

This is a discussion for a news. To read the whole news, click here

posted on 27 Mar 2014, 04:08 1

1. Doakie (Posts: 1843; Member since: 06 May 2009)

Boy these crypto currencies really just keep getting better and better in the news.

posted on 27 Mar 2014, 05:02

2. Ronoc039 (Posts: 27; Member since: 18 Jul 2012)

That is truly impressive

posted on 27 Mar 2014, 05:40

3. itsdeepak4u2000 (Posts: 3696; Member since: 03 Nov 2012)

Yeah, this is open source...

posted on 27 Mar 2014, 12:45 1

5. boosook (Posts: 1406; Member since: 19 Nov 2012)

No, this isn't. The OS is open source. The apps were NOT open source, otherwise it would have been easy to spot what they actually did.
These applications are called "Trojan horses" and have always been around, on every OS, being it windows, mac OS or whatever.
If an application is closed source, it can do whatever it wants, and you have to trust the developer. On Linux, the risk is lower, because applications are usually open source as well as the OS, so there are no trojans unless users install closed source apps from external repositories.
Did you ever stop to think that, every time you install an application on Windows or any other OS, that application can do whatever it wants? And this is what happened. It's not Android's fault.
On Android, at least you can see which permissions an app requires. So, in theory, it's safer than, say, Windows. But in this case the app probably did not require any strange permission beyond internet access.
So, as long as people install on their phones or PCs applications from unknown developers and with closed source code, trojan horses will always exist.
Your comment is plain wrong. Open source is exactly what we need to stop trojan horses.

posted on 27 Mar 2014, 18:58

8. jroc74 (Posts: 5967; Member since: 30 Dec 2010)


posted on 28 Mar 2014, 18:26

10. boosook (Posts: 1406; Member since: 19 Nov 2012)

Just the truth.

posted on 27 Mar 2014, 18:58

7. jroc74 (Posts: 5967; Member since: 30 Dec 2010)

Yea...because this never happens on Windows desktop OS's....and happens all the time on desktop Linux...


posted on 27 Mar 2014, 05:52 1

4. vincelongman (Posts: 3892; Member since: 10 Feb 2013)

I wonder how much money they made out of it
ARM SoCs are really terrible at mining,
But then again, since those apps were installed on millions of phones, they maybe could have made a decent amount

posted on 27 Mar 2014, 18:10

6. ScruffyNerfHerder (Posts: 5; Member since: 21 Sep 2012)

I think you mean that ARM CPUs are not good at mining. Some ARM SoCs have integrated encryption hardware that can generate SHA2s very fast and efficiently (relative to the CPU).

posted on 27 Mar 2014, 22:32

9. vincelongman (Posts: 3892; Member since: 10 Feb 2013)

I got a good gaming PC, but I haven't mined before, so I'm actually not too familiar with mining
From what I've read phones/tablets are terrible at mining, though I haven't personally tried it so I might be wrong

Want to comment? Please login or register.

Latest stories