this post was submitted on 25 Sep 2021
37 points (97.4% liked)

Privacy

31958 readers
878 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

As the title say, a bug which has been confirmed to be around for 7 years leaks the google account password as well as the 2FA code -if enabled-.

Steps to reproduce the behavior:

  • Open MicroG Settings
  • Add a Google account
  • Login with your Google account
  • Check logcat with adb logcat | grep GmsAuthLoginBrowser

Therefore, through logcat is possible to see the password, which is a gigantic security hole. This happens even without root.

Is also important to underline that microG per se has security problems.

For more information about the bug, see here.

top 4 comments
sorted by: hot top controversial new old
[–] newhoa@lemmy.ml 4 points 3 years ago

I haven't used logcat so excuse my ignorance, but from what I read it's a log dumper.

What log file is the login info originally stored in?

Is it plaintext in the log file itself, or is it only plaintext after bring filtered through logcat?

[–] Helix@feddit.de 3 points 3 years ago (1 children)

Is it really a bug or a feature? I can imagine a three letter agency providing services and tools to privacy minded people to get their data.

[–] SeerLite@lemmy.ml 6 points 3 years ago

Don't you need access via adb and have debugging options enabled to even see the logcat?

[–] ree@lemmy.ml 2 points 3 years ago

Thanks for sharing