Originally I’ve download the signal app through playstore, but often it also get updates from Droid-ify(Fdroid client). Today its weird and I got this . Explain to me this.
On the Droid-ify the signal app is provided by: org.thoughtcrimes.securesms
Originally I’ve download the signal app through playstore, but often it also get updates from Droid-ify(Fdroid client). Today its weird and I got this . Explain to me this.
On the Droid-ify the signal app is provided by: org.thoughtcrimes.securesms
The package name is correct, but signal was never on F-droid.Do you have a third party repo that might be compromised?
Edit: Package name isn’t correct, so that’s almost definitely a compromised version. Get rid of it ASAP.
To add to that:
Always check the projects’ website to see the official ways it’s distributed, before you just download it from anywhere.
Not applying for signal though, as their apk site is hidden away
Not a fan of that either, that really is unfortunate. But with a bit of common sense, a person should then ask about that, if the Play Store is not an option. It’s still not a reason to download it from a source you haven’t verified to be official
No thats absolutely a reason. Signal is 100% to blame that they have no fully FOSS code repository that could then simply be compiled by FDroid and shipped there.
Instead I have to rely on some Dude I know nothing about, Twinhelix could just as well spread Malware. But I like my updates through FDroid, I like a blob Free Signal
Call it blame, but that decision is fully within their right, and what Twinhelix does technically violates F-Droids’ guidelines. If a creator doesn’t want their app on there, F-Droid calls to respect that.
The official Signal apk updates itself, so that’s not even an issue.
If your unoffical build from a third-party gives you issues one day, you are fully responsible for that.
Huh? They could just as well provide a blobfree APK themselves. They have their Google Play crap already, everyone not using that will probably also have a googlefree OS.
They have a FOSS client and provide no FOSS binaries, which is totally their right. I heard their Desktop clients are not reproducible though, maybe because of Electron?
Or just use Molly
It actually might not be, googling
"org.thoughtcrimes.securesms"
doesn’t get results.thoughtcrimes
vs.thoughtcrime
My question though is how this popped up in droidify, would someone need to manually add some special repo?
I missed that, thanks for pointing it out. The one without S is the correct one.
But that makes me wonder, how did OP not end up with two signal apps then?
by that popup blocking him from installing the wrong one?
Oh, that’s from the installer and not one of those warnings you get after opening apps. Makes sense.
Technically it’s from “Google Play Protect” that got triggered during the install but yeah.
Yes, where is that from? Its not in the repos I use.
Twinhelix is the only one compiling the app from source without proprietary blobs
And molly.im
Try using a security app like Sophos Intercept X; it’ll quickly scan the installed apps with both an machine learning / AI model and send hashes to Sophos to check against their database to see if any malware is present. It’s free, they don’t harvest data for selling to third parties etc, and you can remove it once you’ve finished checking for malware if you want.
Of course there are plenty of other security apps, this is just one I know of and use.