mirror of
https://github.com/PrivSec-dev/privsec.dev
synced 2024-12-24 22:01:34 -05:00
21 lines
1.3 KiB
XML
21 lines
1.3 KiB
XML
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
|
|
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
|
|
<channel>
|
|
<title>Applications on PrivSec.dev</title>
|
|
<link>https://privsec.dev/apps/</link>
|
|
<description>Recent content in Applications on PrivSec.dev</description>
|
|
<generator>Hugo -- gohugo.io</generator><atom:link href="https://privsec.dev/apps/index.xml" rel="self" type="application/rss+xml" />
|
|
<item>
|
|
<title>F-Droid Security Analysis</title>
|
|
<link>https://privsec.dev/apps/f-droid-security-analysis/</link>
|
|
<pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
|
|
|
|
<guid>https://privsec.dev/apps/f-droid-security-analysis/</guid>
|
|
<description>F-Droid is a popular alternative app repository for Android, especially known for its main repository dedicated to free and open-source software. F-Droid is often recommended among security and privacy enthusiasts, but how does it stack up against Play Store in practice? This write-up will attempt to emphasize major security issues with F-Droid that you should consider.
|
|
Before we start, a few things to keep in mind:
|
|
The main goal of this write-up was to inform users so they can make responsible choices, not to trash someone else&rsquo;s work.</description>
|
|
</item>
|
|
|
|
</channel>
|
|
</rss>
|