1179
this post was submitted on 03 Oct 2025
1179 points (99.2% liked)
Not The Onion
18316 readers
1322 users here now
Welcome
We're not The Onion! Not affiliated with them in any way! Not operated by them in any way! All the news here is real!
The Rules
Posts must be:
- Links to news stories from...
- ...credible sources, with...
- ...their original headlines, that...
- ...would make people who see the headline think, “That has got to be a story from The Onion, America’s Finest News Source.”
Please also avoid duplicates.
Comments and post content must abide by the server rules for Lemmy.world and generally abstain from trollish, bigoted, or otherwise disruptive behavior that makes this community less fun for everyone.
And that’s basically it!
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Not the question.
Nothing you wrote supports that. In the i-drive case, it draws a distinction between a (1) direct transfer between remote systems (without intermediary) and (2) a transfer between a local & remote system.
Other OSs have this concept. My first exposure to the concept came from administering Windows systems. Their definition draws an unopinionated distinction between official & unofficial distribution channels
& their distinct installation methods with similar caveats
That's the entire point of the term there: to express that the installation method & checks differ.
Sign it yourself or bypass verification as stated before.
It was linked above: try reading.
which is reactive & doesn't deter the installation of malicious apps via sideload like the new feature will.
Hey man, just interested if you’d like to write more bootlicking prose about this: Google, with their Play Store, have previously let registered developers upload (and even lets end users download!) straight-up malware. Do any of these changes prevent registered developers from distributing malware on Google storefronts?