zlacker

[parent] [thread] 4 comments
1. SilasX+(OP)[view] [source] 2016-01-10 19:53:19
But that doesn't refute the parent's point: since the content at a URL is inherently mutable, they could judge that (at time of submission) some app is the type of content they want in their ecosystem, and then seconds after approval, it no longer is.
replies(3): >>erikpu+K6 >>DDub+A9 >>eli+wy1
2. erikpu+K6[view] [source] 2016-01-10 21:23:58
>>SilasX+(OP)
I would assume the terms of service prohibit that, which probably puts some liability on the developer.
3. DDub+A9[view] [source] 2016-01-10 22:07:53
>>SilasX+(OP)
It could be that the client device validates a checksum against the approved list at the store before installing? Haven't tested if this is the case, just spitballing a mechanism that would allow for the control without the hosting.
replies(1): >>woah+ze
◧◩
4. woah+ze[view] [source] [discussion] 2016-01-10 23:30:48
>>DDub+A9
https://github.com/substack/hyperboot
5. eli+wy1[view] [source] 2016-01-11 19:48:25
>>SilasX+(OP)
Right. Like I said, it doesn't do much for a malicious developer actively trying to subvert the process. That doesn't mean it's useless. I would guess most problematic apps are not malicious, but are an honest misunderstanding or disagreement about what level of quality is acceptable or what types of services are allowed.

A moderately clever developer could sneak something past the Apple app store review too. Wasn't there a flashlight app that included a secret wifi tethering tool?

[go to top]