Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It seems most likely that there is some static analysis being done to the binary here, or maybe some instrumented JVM that "poisons" bytes that come from the contact list and traces them to see if they ever land on disk or sent on the network. Clearly Google doesn't ban every app with that combination of permissions.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: