The Chromium Mess Meets Android

Total Page:16

File Type:pdf, Size:1020Kb

The Chromium Mess Meets Android The Chromium mess meets Android David Ludovino, The Chromium mess meets Android Jeremy Rand Proposals on how to get a fully free WebView build or replace it with something What is completely new WebView? Which apps use it? What's underneath it? ∗ What's the David Ludovino Jeremy Rand matter with Chromium? WebView and Replicant Replicant Chromium forks Desktop Chromium Android Chromium Stepwise cleansing GeckoView shim Mapping WebView to GeckoView GeckoView on apps ∗with support from Andr´esD and Kurtis Hanna Feedback? The Chromium mess meets Android What is WebView? David Ludovino, Jeremy Rand Renders web content (HTML, CSS, JavaScript) What is WebView? inside apps. Which apps use it? What's underneath it? API has been around since Android 1. What's the matter with Chromium? public class MainActivity extends Activity { WebView and @Override Replicant protected void onCreate(Bundle state) { Chromium super.onCreate(state); forks WebView v = new WebView(this); Desktop Chromium setContentView(v); Android Chromium Stepwise cleansing v. loadUrl ("https://replicant.us"); } GeckoView shim } Mapping WebView to GeckoView GeckoView on apps Feedback? The Chromium mess meets Android Which apps use WebView? David Apps that render HTML: email clients, RSS readers, etc. Ludovino, Jeremy Rand Became pervasive with the advent of cross-platform mobile frameworks. What is WebView? Which apps use it? What's underneath Half of the apps listed at PRISM Break depend on WebView it? What's the uses WebView does not use WebView matter with Chromium? WebView and Replicant K-9 Mail OsmAnd Nextcloud Tiny Tiny I2P Orbot F-Droid andOTP Shaarlier Briar RSS Chromium forks Desktop Chromium Android Chromium Stepwise cleansing wallabag OpenKey- EteSync Syncthing Signal Conversa- Silence Tinc App KeePass Jami chain tions DX GeckoView shim Mapping WebView to GeckoView GeckoView on dande- Nomad Tusky Movim Bitmask Wire- Fennec Tor Thorium apps lion* guard F-Droid Browser Feedback? The Chromium mess meets Android What is underneath WebView? David Ludovino, Jeremy Rand What is WebView? Which apps use it? What's underneath it? WebKit until Android 4.3 Jelly Bean (API 18). What's the matter with Chromium? WebView and Replicant Chromium forks Desktop Chromium Android Chromium Chromium from Android 4.4 KitKat (API 19) onwards. Stepwise cleansing GeckoView shim Mapping WebView to GeckoView GeckoView on apps Feedback? Security issues: • Prevents users from escaping the certificate authority system for TLS. Freedom issues: • Pre-built binaries throughout the code base. • Missing license in some source files. Verdict: unfit for fully free-software distributions. The Chromium mess meets Android What's the matter with Chromium? David Ludovino, Privacy issues: Jeremy Rand • Background requests to Google during build and run. What is WebView? • Depends on Google services for several features (e.g. Safe Browsing). Which apps use it? What's underneath • it? Limited privacy controls. What's the • API prevents extensions from blocking ads. matter with Chromium? WebView and Replicant Chromium forks Desktop Chromium Android Chromium Stepwise cleansing GeckoView shim Mapping WebView to GeckoView GeckoView on apps Feedback? Freedom issues: • Pre-built binaries throughout the code base. • Missing license in some source files. Verdict: unfit for fully free-software distributions. The Chromium mess meets Android What's the matter with Chromium? David Ludovino, Privacy issues: Jeremy Rand • Background requests to Google during build and run. What is WebView? • Depends on Google services for several features (e.g. Safe Browsing). Which apps use it? What's underneath • it? Limited privacy controls. What's the • API prevents extensions from blocking ads. matter with Chromium? WebView and Security issues: Replicant • Prevents users from escaping the certificate authority system for TLS. Chromium forks Desktop Chromium Android Chromium Stepwise cleansing GeckoView shim Mapping WebView to GeckoView GeckoView on apps Feedback? Verdict: unfit for fully free-software distributions. The Chromium mess meets Android What's the matter with Chromium? David Ludovino, Privacy issues: Jeremy Rand • Background requests to Google during build and run. What is WebView? • Depends on Google services for several features (e.g. Safe Browsing). Which apps use it? What's underneath • it? Limited privacy controls. What's the • API prevents extensions from blocking ads. matter with Chromium? WebView and Security issues: Replicant • Prevents users from escaping the certificate authority system for TLS. Chromium forks Desktop Chromium Freedom issues: Android Chromium Stepwise cleansing • Pre-built binaries throughout the code base. GeckoView shim • Missing license in some source files. Mapping WebView to GeckoView GeckoView on apps Feedback? The Chromium mess meets Android What's the matter with Chromium? David Ludovino, Privacy issues: Jeremy Rand • Background requests to Google during build and run. What is WebView? • Depends on Google services for several features (e.g. Safe Browsing). Which apps use it? What's underneath • it? Limited privacy controls. What's the • API prevents extensions from blocking ads. matter with Chromium? WebView and Security issues: Replicant • Prevents users from escaping the certificate authority system for TLS. Chromium forks Desktop Chromium Freedom issues: Android Chromium Stepwise cleansing • Pre-built binaries throughout the code base. GeckoView shim • Missing license in some source files. Mapping WebView to GeckoView GeckoView on Verdict: unfit for fully free-software distributions. apps Feedback? The Chromium mess meets Android WebView and Replicant David Ludovino, Jeremy Rand What is Replicant: WebView? Which apps use it? • Android distribution What's underneath it? • compliant with GNU Free System Distribution Guidelines (FSDG) What's the matter with Chromium? WebView and Replicant Using outdated WebView based on Chromium 43: lots of security concerns. Chromium forks Desktop Chromium Android Chromium Stepwise cleansing How to create a WebView build that respects user's privacy and freedom? GeckoView shim Mapping WebView to GeckoView GeckoView on apps Feedback? The Chromium mess meets Android Desktop Chromium forks David Ludovino, Jeremy Rand What is • ungoogled-chromium: aligned with privacy and freedom WebView? Which apps use it? What's underneath it? • Bromite: can build WebView; only focused on privacy and ad blocking What's the matter with Chromium? • Debian: replaces pre-builts with system libs; Google services not removed WebView and Replicant Chromium • Iridium: one step on every direction; not as thorough as others forks Desktop Chromium Android Chromium Stepwise cleansing GeckoView Guix, a FSDG compliant distro, uses: shim ungoogled-chromium + build recipe that removes some files. Mapping WebView to GeckoView GeckoView on apps Feedback? The Chromium mess meets Android Android Chromium forks David Ludovino, Jeremy Rand What is WebView? Android builds require many more pre-builts and proprietary dependencies. Which apps use it? E.g.: Google Mobile Services (GMS) What's underneath it? What's the matter with Chromium? • ungoogled-chromium-android: ungoogled-chromium + Android specific WebView and Replicant patches; has some remaining pre-builts Chromium forks Desktop Chromium • Unobtainium: aimed to be built within F-Droid (forbids pre-builts); Android Chromium Stepwise cleansing project is unmaintained GeckoView shim Mapping WebView to GeckoView GeckoView on apps Feedback? The Chromium mess meets Android Android Chromium forks David strings classes.dex | grep google Ludovino, Jeremy Rand Chromium 78 WebView - 227 lines . You must have the following declaration within the <application> element: What is <meta-data android:name="com.google .android.gms.version" android:value="@integer/google _play_services_version" /> WebView? Google Inc .1 Google Inc .1 Which apps use it? Google Inc .1 What's underneath A required meta-data tag in your app's AndroidManifest.xml does not exist. it? You must have the following declaration within the <application> element: <meta-data android:name="com.google .android.gms.version" android:value="@integer/google _play_services_version" /> RCompositeGoogle ApiClient should not be used without any APIs that require sign-in. What's the OConnection timed out while waiting for Google Play services update to complete. matter with +Failed to connect to Google Play Services: -Failed to get Google certificates from remote Chromium? Google Play Services "Google Play Services not available WebView and Google Play Store is missing. $Google Play Store signature invalid. Replicant 0Google Play services is invalid. Cannot recover. Google Play services is missing. Chromium ;Google Play services missing when getting application info. ,Google Play services out of date. Requires forks 'Google Play services signature invalid. Desktop Chromium Google ApiActivity Google ApiAvailability Android Chromium &Google ApiClient connecting is in step Stepwise cleansing )Google ApiClient is not configured to use HGoogle ApiClient is not configured to use the API required for this call. GeckoView Google ApiClient is not configured to use the LocationServices.API Api. Pass thisinto Google ApiClient.Builder#addApi() to use this feature. %Google ApiClient is not connected yet. shim Google ApiClient must not be null Mapping WebView &Google ApiClient parameter is required. to GeckoView Google ApiClient received too many callbacks for the given step. Clients may be in an unexpected state; Google
Recommended publications
  • Puddletag 1.0.5
    FOSSPICKS Sparkling gems and new releases from the world of FOSSpicks Free and Open Source Software Mike Saunders has spent a decade mining the internet for free software treasures. Here’s the result of his latest haul… Sound file tag editor Puddletag 1.0.5 e love discovering need Mutagen – this is the library programs that that handles the low-level Wostensibly perform operations of adding tags to music mundane tasks, but have so many files. On Ubuntu and Debian-based features and options that they distros, you can get all of the actually become rather cool. dependencies via the python-qt4, Puddletag is one such example: it’s python-pyparsing, python- a music file tag editor. Riveting, mutagen and python-configobj right? But when you start exploring packages. Then extract the the interface and discover some of puddletag-1.0.5.tar.gz file, go into the complexity behind it, you the resulting directory, and run actually start to admire it. And if you ./puddletag. manage a large music collection, you might find that you can’t live I, spreadsheet without it. Sure, most graphical The first thing you’ll notice is the music players on Linux include unusual interface: Puddletag looks Puddletag can work with ID3v1, ID3v2 (MP3), MP4, some kind of tag editing facility, but somewhat like a spreadsheet. This VorbisComments (Ogg and FLAC) and Musepack (mpc) tags. Puddletag is industrial strength. actually turns out to be a very good It’s written in Python (2) and uses design when you’re working on lots click on the F button in the toolbar, Qt 4 for the interface, so its main of files.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • An Architecture for Cryptography with Smart Cards and NFC Rings on Android
    OpenKeychain: An Architecture for Cryptography with Smart Cards and NFC Rings on Android DOMINIK SCHÜRMANN, TU Braunschweig, Germany SERGEJ DECHAND, University of Bonn, Germany LARS WOLF, TU Braunschweig, Germany While many Android apps provide end-to-end encryption, the cryptographic keys are still stored on the device itself and can thus be stolen by exploiting vulnerabilities. External cryptographic hardware solves this issue, but is currently only used for two-factor authentication and not for communication encryption. In this paper, we design, implement, and evaluate an architecture for NFC-based cryptography on Android. Our high-level API provides cryptographic operations without requiring knowledge of public-key cryptography. By developing OpenKeychain, we were able to roll out this architecture for more than 100,000 users. It provides encryption for emails, messaging, and a password manager. We provide a threat model, NFC performance measurements, and discuss their impact on our architecture design. As an alternative form factor to smart cards, we created the prototype of an NFC signet ring. To evaluate the UI components and form factors, a lab study with 40 participants at a large company has been conducted. We measured the time required by the participants to set up the system and reply to encrypted emails. These measurements and a subsequent interview indicate that our NFC-based solutions are more user friendly in comparison to traditional password-protected keys. CCS Concepts: • Security and privacy → Usability in security and privacy; Key management; Hardware-based security protocols; • Human-centered computing → Mobile devices; Additional Key Words and Phrases: NFC, near-field communication, smart card, ring ACM Reference Format: Dominik Schürmann, Sergej Dechand, and Lars Wolf.
    [Show full text]
  • Peertube Has Worked Twice As Hard to Free Your Videos from Youtube !
    PeerTube has worked twice as hard to free your videos from YouTube ! Thanks to your donations, we have been developing a software to free us all from YouTube & Co for a year. Why have we gone much further than the first release, (crowdfunded in the spring of 2018), you might ask? Well, that’s because we sincerely believe in the emancipatory power of PeerTube. This article is a part of « Contributopia’s travel journals ». From October to December of 2019, we will assess our many (donations-founded) actions, which are tax-deductible for French taxpayers. Donate here if you can. La version originale (en Français) de cet article est à lire ici. Federation and instances to avoid creating a new tech giant PeerTube’s aim is to create an emancipatory alternative to centralized platforms a la YouTube. In a centralized service, you sign-up with a single address, and each and every of your actions, videos and data are gathered on a single huge computer. For example, Google’s, that hosts YouTube (to be precise, they are server farms rather than huge computers, but on a symbolic level it is the same thing!). Centralisation, CC-By SA Fédération, CC-By SA LILA LILA PeerTube is a software. It can be installed on a server by anyone possessing the appropriate skills; say, for the sake of argument, Bernadette, College X and karate club Y. This is called an instance, i.e. a PeerTube host. In concrete terms, hosting an instance creates a website (let’s say, BernadetTube.fr, CollegeTube.org or KarateTube.net) on which you can watch videos and sign-up, so you can interact or upload your own content.
    [Show full text]
  • Latest Release file from the Application Is Conveniently Packaged As an Executable Self-Contained JAR file
    JAMI Supplemental Material Release 1.0 Andrea Hornakova, Markus List, Jilles Vreeken, Marcel Schulz Jul 01, 2020 Contents 1 General Description 1 1.1 Conditional Mutual Information.....................................1 2 Installation 3 3 Usage 4 4 Input 6 4.1 Expression data..............................................6 5 Output 8 6 Usage Examples 9 6.1 Downloading example data.......................................9 6.2 Using JAMI with the triplet format...................................9 6.3 Using JAMI with the set format.....................................9 6.4 Using JAMI for a subset of genes or a single gene........................... 10 7 Use case: A ceRNA network constructed from TCGA breast cancer data 11 8 Using JAMI in R 15 9 Performance and Advantages over CUPID 16 10 Dealing with zero expression values 19 11 References 24 Bibliography 25 i CHAPTER 1 General Description This document describes the usage of the JAMI software. Source code and executables are available on github. The goal of JAMI is to infer ceRNA networks from paired gene and miRNA expression data. The ceRNA hypothesis proposed by Salmena et al. [Salmena2011] suggests that mRNA transcript are in competition over a limited pool of miRNAs they share binding sites for. A competing endogenous RNA is thus a mRNA that excerts regulatory control over the expression of other mRNAs (coding or non-coding genes) via draining them of repressive miRNAs. To quantify the regulatory effect of one gene (the modulator) over another gene (the target) via a specific miRNA, Sumazin et al. [Sumazin2011] proposed the use of conditional mutual information, which was implemented as part of the CUPID software [Chiu2015] implemented in Matlab.
    [Show full text]
  • Traffic Safety Resource Prosecutors Miriam Norman- TSRP
    Traffic Safety Resource Prosecutors Miriam Norman- TSRP Re: Potential Impeachment Disclosure (PID) of WSP Toxicology Laboratory Date: August 7, 2020 We have received information from the WSP Toxicology Laboratory that is potential impeachment information (“PII”). This PID (potential impeachment disclosure) relates environmental contamination of portions of the WSP Toxicology Laboratory of methamphetamine. By environmental contamination, we mean that the methamphetamine level found in various areas exceeded the levels specified in WAC 246-205-541. The environmental contamination possibly contaminated some blood samples during the extraction process. In March of 2018, the toxicology laboratory took over laboratory and office space from the crime lab. The toxicology laboratory moved one ethanol instrument into that space. In addition, extractions of evidence were to be conducted in that space. Prior to becoming toxicology laboratory space, the crime lab used one of the lab areas to house a methamphetamine production laboratory for training purposes; this information was not known to the Toxicology laboratory at the time. It is hypothesized that this use resulted in environmental contamination of the area. During the extraction process performed in the contaminated area, analysts observed that some preliminary tests were positive for methamphetamine, while confirmation tests were negative for methamphetamine. There is a possibility that these “false presumptive positives” were due to the environmental contamination. The environmental methamphetamine contamination did not affect any results reported by the toxicology laboratory for two reasons: First, the one ethanol instrument in the room cannot read/detect methamphetamine. The ethanol instruments can only detect volatiles not drugs. Second, as to the drug cases, the toxicology laboratory discovered this environmental contamination due to the drug testing process.
    [Show full text]
  • Paper #5: Google Mobile
    Yale University Thurmantap Arnold Project Digital Platform Theories of Harm Paper Series: 5 Google’s Anticompetitive Practices in Mobile: Creating Monopolies to Sustain a Monopoly May 2020 David Bassali Adam Kinkley Katie Ning Jackson Skeen Table of Contents I. Introduction 3 II. The Vicious Circle: Google’s Creation and Maintenance of its Android Monopoly 5 A. The Relationship Between Android and Google Search 7 B. Contractual Restrictions to Android Usage 8 1. Anti-Fragmentation Agreements 8 2. Mobile Application Distribution Agreements 9 C. Google’s AFAs and MADAs Stifle Competition by Foreclosing Rivals 12 1. Tying Google Apps to GMS Android 14 2. Tying GMS Android and Google Apps to Google Search 18 3. Tying GMS Apps Together 20 III. Google Further Entrenches its Mobile Search Monopoly Through Exclusive Dealing22 A. Google’s Exclusive Dealing is Anticompetitive 25 IV. Google’s Acquisition of Waze Further Forecloses Competition 26 A. Google’s Acquisition of Waze is Anticompetitive 29 V. Google’s Anticompetitive Actions Harm Consumers 31 VI. Google’s Counterarguments are Inadequate 37 A. Google Android 37 B. Google’s Exclusive Contracts 39 C. Google’s Acquisition of Waze 40 VII. Legal Analysis 41 A. Google Android 41 1. Possession of Monopoly Power in a Relevant Market 42 2. Willful Acquisition or Maintenance of Monopoly Power 43 a) Tying 44 b) Bundling 46 B. Google’s Exclusive Dealing 46 1. Market Definition 47 2. Foreclosure of Competition 48 3. Duration and Terminability of the Agreement 49 4. Evidence of Anticompetitive Intent 50 5. Offsetting Procompetitive Justifications 51 C. Google’s Acquisition of Waze 52 1.
    [Show full text]
  • Bulloch Times (Statesboro News-Statesboro Eagle)
    Georgia Southern University Digital Commons@Georgia Southern Bulloch County Newspapers (Single Issues) Bulloch County Historical Newspapers 12-22-1949 Bulloch Times (Statesboro News-Statesboro Eagle) Notes Condition varies. Some pages missing or in poor condition. Originals provided for filming by the publisher. Gift of tS atesboro Herald and the Bulloch County Historical Society. Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/bulloch-news- issues Recommended Citation "Bulloch Times (Statesboro News-Statesboro Eagle)" (1949). Bulloch County Newspapers (Single Issues). 2511. https://digitalcommons.georgiasouthern.edu/bulloch-news-issues/2511 This newspaper is brought to you for free and open access by the Bulloch County Historical Newspapers at Digital Commons@Georgia Southern. It has been accepted for inclusion in Bulloch County Newspapers (Single Issues) by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. EIGHT DULUX:B TIMBS AND STATESBoRO Nh.vs �,1 ." , ·Z��\�) -.'. « • The True Memon.1 Social • Clubs • 18 AN UNWRI1TEN BU1'. RIAl­ QURNT STORY THAT OF ALL TEN YEARS AGO 18 .BEST IN LIFE. From Bulloeh Tim.... , Dec. .1989. 21, flF.RVICE MIS Flmmett Scott has ned In retui Our work to relied � preparation for census of Bal- helps loch Irom a VISit In county, George HIli, of Savannah spmt which to Sylvama, WHERE NEEDED 'Personal prompts you erect and Tm ner have Purely Wade Brewton, Claxton, (STATESBORO C Hodges and LUCIUS An­ tbe stone as an act of NBWS-STATBBBORO , reverenee opened offices In Statesboro. '\ EAGLE) •. (}HE£nNC' derson Wei e business VISitors In Ata •• I and devotion • • • Our kid sale advertised to 8etweenUs experieoc.
    [Show full text]
  • Challenges in the Decentralised Web: the Mastodon Case∗
    Challenges in the Decentralised Web: The Mastodon Case∗ Aravindh Raman1, Sagar Joglekar1, Emiliano De Cristofaro2;3, Nishanth Sastry1, and Gareth Tyson3;4 1King’s College London, 2University College London, 3Alan Turing Institute, 4Queen Mary University of London faravindh.raman,sagar.joglekar,[email protected], [email protected], [email protected] Abstract cols to let instances interact and aggregate their users to offer a globally integrated service. The Decentralised Web (DW) has recently seen a renewed mo- DW platforms intend to offer a number of benefits. For ex- mentum, with a number of DW platforms like Mastodon, Peer- ample, data is spread among many independent instances, thus Tube, and Hubzilla gaining increasing traction. These offer al- possibly making privacy-intrusive data mining more difficult. ternatives to traditional social networks like Twitter, YouTube, Data ownership is more transparent, and the lack of centralisa- and Facebook, by enabling the operation of web infrastruc- tion could make the overall system more robust against techni- ture and services without centralised ownership or control. cal, legal or regulatory attacks. Although their services differ greatly, modern DW platforms mostly rely on two key innovations: first, their open source However, these properties may also bring inherent chal- software allows anybody to setup independent servers (“in- lenges that are difficult to avoid, particularly when consid- stances”) that people can sign-up to and use within a local ering the natural pressures towards centralisation in both so- community; and second, they build on top of federation pro- cial [12, 49] and economic [42] systems.
    [Show full text]
  • Google EC Antitrust Enforcement: Expected Android EC Remedies Likely to Make Google Vulnerable to Competitive Threats in Mobile Advertising
    September 30, 2016 Google EC Antitrust Enforcement: Expected Android EC Remedies Likely to Make Google Vulnerable to Competitive Threats in Mobile Advertising Outlook and Timing Update The European Commission (EC) is widely expected to void the terms in Google’s contracts with mobile device manufacturers, or Mobile Application Distribution Agreements (MADAs), that contractually tie a suite of Google apps to the must-have Google Play app on phones using the Android operating system. Given that recent reports put Android’s worldwide market share at 86%, the opportunities for other tech giants as well as new market entrants to take a slice of the mobile app market are likely to grow significantly as a result. Google has already begun to face this outcome in Russia, where Yandex has reported gaining search market share soon after winning a parallel antitrust case in that country, which opened the door for Yandex to get pre-installed on Android devices. Europe is next, with the potential for antitrust authorities around the world to bring copycat cases. Google is therefore likely to face unprecedented competitive threats in mobile search and mobile app data collection, and hence mobile advertising. Google’s response to the Android charges is due on October 7; a decision in the case is expected by Spring 2017. In April 2016, the Commission formally charged Google, issuing a Statement of Objections (“SO”). The Commission allowed Google an extra six weeks to respond, making the response due on September 7. It since gave Google two additional extensions, and a response is now due on October 7.
    [Show full text]
  • Tivoli 329 2, 7, 2020 Call to Order (9:49)
    CCD Student Government Association Agenda; Tivoli 329 2, 7, 2020 I. Call to Order (9:49) II. Roll Call President – Teagan Divel Student Rep. – Hugo Zuniga-Sierra Vice President – Lorraine Seals-Williams Student Rep. – Lena Lund Treasurer – VACANT SACAB Rep. – Jami Helmig SSAC Rep. – Emanuel Walker SACAB Rep. – Vacant SSAC Rep. – Sergio Cisneros-Arteaga Lowry Rep. – Vacant AMC Rep. – Caleb Boyd Secretary – Don Dang Student Rep. – Melissa De La O Advisor – Kathryn Mahoney Student Rep. – Kelly Shanley Advisor – Ashley Jaramillo Student Rep. – Amber Maler Parliamentarian – Vacant III. Approval of Agenda and Minutes: Approved agenda 2/7 IV. Guests: Jennifer Arreola - Student V. Reports A. President’s Report: B. Vice-President’s Report: C. Treasurer’s Report: D. Secretary’s Report: E. Advisor’s Report: F. SACAB Report: G. SSAC Report: H. Student Rep. Reports: I. Committee Report (Budget, Events, Engagement): J. Special Committee Report (Elections) VI. Unfinished Business/General Orders VII. New Business 1. Retreat Recap – What did we each learn about our leadership/communication skills? Discussed our feelings on retreat. 2. Meeting Norms – The process of how each meeting will be ran. Expectations. Meetings at 9:00 in the Senate room. Finish at 10:30 because there will be another meeting. Sending reports and new business items two days before. Meetings start on the dot! Don’t interrupted and save questions for the end. Two minutes report. Just an update. New business will be voting and questions, or feedback. New business will be rebuttal. Reports is a QUICK update. Follows up will be in new business. Fill out report form beforehand to help.
    [Show full text]