Android has had it’s fair share of scrutiny as well. Research Firm LookOut first mentioned findings at the blackhat security conference that a wallpaper app from Jackeey collected personal information and transmitted the data back to a website. The allegations have since been debunked and no such activity was in fact happening. The issue begged the question, how easy could this have been true?
If we compare the way Google and Apple approve or allow apps to their respective App Stores, we see two very different approaches. Apple boasts that their methodology of inspecting each and every app that developers submit is the most secure way to prevent malicious content. But really, unless they go through the source code one line at a time, there is no way that they can guarantee zero vulnerabilities. Android takes a more open approach by making it a requirement for the developer to list all of the service that the app will interact with to the user before he or she installs. The approval process then falls on the shoulders of the user. Rather, a worldwide community of users. It wouldn’t take long for Google to be notified of a malicious app and Google doesn’t fool around with this stuff, they are very quick to remove any questionable apps from the Market Place. An Android user must use some common sense as well. If they’re installing a Wallpaper app that requests access to your contact list or any other personal information, this should set off a red flag.
Black Friday 2017 Deals: Find Great Deals on Android Smartphones, TV’s, Smart Speakers, Chromebooks and More.
Regardless of how many people you have at Apple checking each app, there is no way that they can reach the same level of scrutiny as the worldwide user base Android has. And given that the responsibility of text message transparency falls in the hands of local carriers and not on the manufacturer, as in blackberry’s case, both Google and Android are safe from government intervention in that respect. When competing smartphones all offer similar features and functionality, users will inevitably gravitate toward a very important differentiating factor, security.