QUOTE(MrBaba @ Mar 3 2025, 04:29 AM)
Yr like putting yr wallet at places where every one can see and access , when yr wallet kena stolen shock Pikachu pulak
QUOTE(WhatMan @ Mar 3 2025, 08:34 AM)
Actually disagree with this example, even usb debugging is enabled, you still need to trust the device first to access, so there is still one more security layer to go through.QUOTE(Paradigmata @ Mar 3 2025, 04:26 AM)
Now my Pb bank and mae app I see gave such warning.
How can developer mode and USB debugging mode breach bank app security?
developer mode usually not the issue but the usb debugging/wireless debugging, but some developers just simply choose to checking for developer mode instead of specific feature block.How can developer mode and USB debugging mode breach bank app security?
I would say it's for prevention and to cater for "don't know what they are doing" person and this affect legit users. Banks probably use owasp-mastg as guideline.
- to reduce attack vector (to the bank app or the user).
- harmful / unknown sources app can still trick user to make it as trusted device.
- someone has your unlocked device access and install harmful apps.
- if there is a new exploit to bypass trusted access.
- unknown charging/usb port that try to gain trusted access and some people will just simply click trust it because it disturb what they are doing and don't know what is it.
- unauthorized screen mirroring/remote/key-logging (after gained trusted access).
- and probably more
Mar 3 2025, 09:50 AM

Quote
0.0193sec
0.31
6 queries
GZIP Disabled