logo
The reason you don't have to worry about Android security almost went dark

The reason you don't have to worry about Android security almost went dark

Yahoo17-04-2025
When you buy through links on our articles, Future and its syndication partners may earn a commission.
Most users of technology don't have to consciously think about security vulnerabilities on their most-used devices, including Android-based products, very often. As long as you update your phone as soon as new security patches are available, you're usually covered. However, there's an intricate government-supported program operating to make that all possible, and it almost went dark today.
After roughly 24 hours of uncertainty, the U.S. Cybersecurity and Infrastructure Agency (CISA) announced that it would continue funding the Common Vulnerabilities and Exposures (CVE) on the day its previous contract was set to expire. Today, April 16, a spokesperson for the CISA told The Verge that the agency "executed the option period on the contract to ensure there will be no lapse in critical CVE services."
But it went down to the wire in a move that could've sent the entire globe into a tech security nightmare.
It all has to do with the CVE program, which identifies and tracks security issues in public view, from the point a potential problem is identified to the time when a proper fix is issued. It has nearly 500 partners that include security researchers, open-source developers, and major companies — including big ones like Google, Microsoft, and Apple.
If the CVE program sounds familiar, that's probably because you've seen a CVE code mentioned in an article (like one of the many CVE-related ones on Android Central) or the release notes of an update. They're also a major part of monthly releases on the Android Security Bulletin. These codes, like CVE-2024-53104, start with CVE followed by the year and a number, and create a universal database to track security flaws across devices, platforms, and companies.
The CVE program has been active for 25 years, beginning in 1999. It has become invaluable to the security community, serving as a universal way for researchers, developers, companies, and the public to work together to discover and patch crucial vulnerabilities. More importantly, it publicly states whether a vulnerability is believed to have been actively exploited by bad actors.
Leading security researchers have pointed out the consequences of the CVE program shutting down, like Lukasz Olejnik on X (formerly Twitter).
"The consequence will be a breakdown in coordination between vendors, analysts, and defense systems — no one will be certain they are referring to the same vulnerability," wrote Olejnik, a scholar with advanced degrees in computer science and information technology law with specializations in privacy. "Total chaos, and a sudden weakening of cybersecurity across the board."
Luckily, it appears that the crisis has been avoided, as the federal government will continue to fund the CVE program for at least the near future. However, the decision coming down to the wire as the Trump administration slashes federal funding across the board puts the CVE program in a more uncertain position now than at any point in its 25-year history.
"The CVE Program is invaluable to the cyber community and a priority of CISA," the spokesperson said in a statement to The Verge. "We appreciate our partners' and stakeholders' patience."
But that final green light didn't come quick enough, as the security world already started making plans to keep the CVE program up and running — even without federal funding. CVE board members created the CVE Foundation, a nonprofit planned for in secret for the past year that would ensure the CVE mission continues.
"CVE, as a cornerstone of the global cybersecurity ecosystem, is too important to be vulnerable itself," said Kent Landfield, an officer of the CVE Foundation, in a press release. "Cybersecurity professionals around the globe rely on CVE identifiers and data as part of their daily work, from security tools and advisories to threat intelligence and response. Without CVE, defenders are at a massive disadvantage against global cyber threats."
The foundation explains that it is concerned that having a single government sponsor could create "a single point of failure in the vulnerability management ecosystem."
The CVE program is a critical part of Android security, and it should be relevant to every single person who touches an Android-based device. Although government funding has been acquired for now, the moves that have been set in motion by the last-minute decision may not be reversed. The CVE Foundation is here, and it might be here to stay.
There's no word on whether the CVE Foundation will continue to operate now that the CVE program has retained U.S. government funding, but the foundation said more information will be released "over the coming days." The immediate U.S. government funding doesn't solve the long-term problem the CVE Foundation has identified — the possibility of having a single point of failure — so there still may be a reason for it to exist.
Regardless of how this all plays out, the decision to fund the CVE program should've never come this close to ending a crucial global security program. Most of us have the luxury to not think about device security that often, and it's programs like the CVE that allow us that privilege.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Facing opposition, developer pulls planned $30B data center in Mooresville, NC
Facing opposition, developer pulls planned $30B data center in Mooresville, NC

Yahoo

timean hour ago

  • Yahoo

Facing opposition, developer pulls planned $30B data center in Mooresville, NC

A Colorado developer withdrew its request for a $30 billion data center on east Mooresville land owned by Teresa Earnhardt, widow of the late NASCAR driver Dale Earnhardt, Mayor Chris Carney said Wednesday. 'This means the item will be removed from the Sept. 15 agenda and will not move forward,' Carney said on social media. 'There is no request to postpone — this is a full withdrawal. At this time, there is no active request for a data center in Mooresville.' In an exclusive interview with The Charlotte Observer on Friday, Carney said he and the six town commissioners couldn't support the Mooresville Technology Park rezoning without knowing which tech giant would buy, own and operate the center on Earnhardt's 400 acres, and their tax-incentive and other demands. Carney votes in case of a 3-3 deadlock by the commissioners. Carney said he informed Denver-based developer Tract of the board's likely rejection of the request. Tract could choose to request that its request be pulled from consideration, he said. 'We are both disappointed and surprised to learn of the Board's position in this manner,' Tract said Friday in an emailed statement to the Observer through a spokesperson. 'In light of this development, we are carefully evaluating our next steps.' At least 200 neighbors opposed the rezoning at public meetings, citing noise, light pollution, truck traffic and other concerns. 'Yes, this is a lesson for every taxpayer to get involved when the issue is tremendously bigger than you are,' opponent Lynne Taylor told the Observer on Wednesday after Tract withdrew its plans. 'Mooresville has gained national attention for the pushback and rightly so,' Taylor said. 'A huge congratulations to the grassroots group which spearheaded the direction of opposition.' Neighbors established a No Data Center Mooresville website and a No to Rezoning! No to Mooresville NC Tech Park Facebook group. Kerry Earnhardt, Dale Earnhardt's oldest son, recently criticized the project on the 'No to Rezoning!' site. 'Frankly, I'm ashamed our family name is involved in the request to rezone a community that is thriving as a Rural Residential/Agriculture zone to be changed to Industrial,' Earnhardt said. Carney said he and the Town Board appreciated 'the public's input and the collaborative discussions that helped determine whether this project was the right fit for our community. As always, we want to keep residents informed, and we felt it was important to share this update as soon as possible.' Solve the daily Crossword

Google Messages is now blurring nude images
Google Messages is now blurring nude images

The Verge

timean hour ago

  • The Verge

Google Messages is now blurring nude images

Sensitive Content Warnings that detect and blur images containing nudity are now rolling out to all Google Messages users on Android, according to 9to5Google. The feature gives users the option to delete blurred images without having to view them and block whoever sent the message. Users who attempt to send or forward nude images will also be shown a message that warns them of the risks, and requires them to swipe right to continue sending the image. The Sensitive Content Warnings for Google Messages was announced in October, but this is the first time it's been available to users outside of limited beta testing. The privacy feature requires users to be signed in to a Google Account to work, and is enabled by default on teen accounts. The feature is optional for Adult users and is switched off by default. You can enable it by tapping the profile photo in the top-right corner, selecting Messages settings, and then tapping on the Protection and safety option. From there, select Manage sensitive content warnings and tap on Warnings in Google Messages to toggle the feature on. Posts from this author will be added to your daily email digest and your homepage feed. See All by Jess Weatherbed Posts from this topic will be added to your daily email digest and your homepage feed. See All Android Posts from this topic will be added to your daily email digest and your homepage feed. See All Google Posts from this topic will be added to your daily email digest and your homepage feed. See All News Posts from this topic will be added to your daily email digest and your homepage feed. See All Privacy Posts from this topic will be added to your daily email digest and your homepage feed. See All Tech

Google Find Hub's automatic enrollments will only give you two days to opt out (APK teardown)
Google Find Hub's automatic enrollments will only give you two days to opt out (APK teardown)

Android Authority

time2 hours ago

  • Android Authority

Google Find Hub's automatic enrollments will only give you two days to opt out (APK teardown)

Andy Walker / Android Authority TL;DR Google plans to expand Find Hub's automatic enrollment with more triggers. We've now spotted clues suggesting that once users hit these triggers, they would have two days to opt out of participating in the Find Hub network. Additional triggers expected in the future include enabling Location access on the device, syncing with Fast Pair accessories, and more. Google recently rebranded Android's Find My Device tool into Find Hub when it added the ability to locate people in addition to devices. Separately, we had spotted that Google could introduce more automatic enrollment triggers to strengthen the Find Hub network. As it turns out, this automatic enrollment could start as early as two days after you chance upon a trigger. We managed to activate new text for the Find Hub that suggests devices could be auto-enrolled in locating other devices in high-traffic areas within two days of a trigger. Users can either opt out of the change or join the network with other existing settings, namely 'without network' or 'with network in all areas.' AssembleDebug / Android Authority As the text in the alert box states, 'this device will join the network in high-traffic areas within 2 days. You can opt out or join the network now by selecting a setting.' Don't want to miss the best from Android Authority? Set us as a preferred source in Google Search to support us and make sure you never miss our latest exclusive reports, expert analysis, and much more. Currently, the Find Hub network is automatically turned on if and when you add a Google Account to your device. By default, your device is set to the 'With network in high-traffic areas only' setting. We've previously spotted strings for automatic enrollment based on triggers such as not opting out on the web, when users turn on Location access, if you sync recent location of another device or to Fast Pair accessories, or if you stop using your other devices. In the future, when you hit one of these triggers, you will have about two days to make a different choice before Google automatically enrolls your device into the Find Hub network in high-traffic areas. Previous versions of the string suggested users would have 24 hours, but two days is a slightly more generous timeline. These automatic enrollments still do not appear to be live. We look forward to Google sharing more information about them when available, as we still need more clarity on how these automatic enrollments would work, especially in cases of significant overlap. ⚠️ An APK teardown helps predict features that may arrive on a service in the future based on work-in-progress code. However, it is possible that such predicted features may not make it to a public release. Follow

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store