Running Android Apps On Linux Devices Using WayDroid

Recently Linux smartphones are available on the market but are not much admired compared to Android and iOS. The thing to take in to serious is Android app support in Linux Smartphones.

The innovators must need the support of Anbox in order to run Android apps on Linux. As per the statement of Tux Phones, the kernels which is used by WayDroid is exactly same as that of used by Anbox.

WayDroid supports devices running Droidian or Ubuntu Touch and works on PinePhone and now, the OnePlus 6.

WayDroid is an reassembled version of Anbox. WayDroid provides the graphical buffer in LXC with uninterrupted Wayland hold up which achieves smoother than the actual Anbox.

It is very simple and homogeneous to run Linux in a VM on Windows. Now it is very exhilarating to watch Android apps running on Linux devices. This amazing changes will be an advantage for Linux powered mobiles.

The main catch right now is that there’s no emulation layer in WayDroid, so x86 devices (like most PCs) can only run x86 binaries, and ARM64 devices (most phones and tablets) can only run ARM64 binaries. This is similar to how the Wine compatibility layer works — even though Wine is available for Android, it can’t run most Windows software on most Android devices, since phones are typically ARM and most Windows software is x86-only. The developer is hoping to implement emulation in the future by using components from the Android subsystem for Windows 11.

Google Detached 9 Android Apps That Purloin FB Users Testimonials

Not long ago Google abolished nine malignant apps from the Play Store subsequently they found sneaking Facebook users login credentials.

These malwares was observed by a special technique to ploy users into divulging their login credentials by providing some photo editing and other features. This was track down by security researchers at Dr. Web.

“Doctor Web’s malware analysts have discovered malicious apps on Google Play that steal Facebook users’ logins and passwords. These stealer trojans were spread as harmless software and were installed more than 5,856,010 times.”

The 9 malware  apps  were  Processing Photo, App Lock Keep, Rubbish Cleaner, Horoscope Daily, Horoscope Pi, App Lock Manager, Lockit Master, Inwell Fitness, and PIP Photo.

As per Dr. Web’s statement these apps were highly functioning and also to debilitate the surveillance of losers. The add performing in the middle of some apps are real and this intrigue was conscious to stimulate the device holder to execute the necessary actions.

A social network login page will appear on the screen when the users click the login icon. But it was a fake page in order to sneak the users  ID and Password.

“After receiving the necessary settings from one of the C&C servers upon launch, they loaded the legitimate Facebook web page https://www.facebook.com/login.php into WebView. Next, they loaded JavaScript received from the C&C server into the same WebView. This script was directly used to highjack the entered login credentials,” the security researchers wrote in the report.

By use of this Java script Interface annotation the sneaked credentials were given to the malignant applications and then to C&C server. When the victim log in to their account their cookies were sneaked by the Trojans and handover to cyberpunks.

After Dr. Web’s report went live, Google removed all the nine malicious apps from the Play Store. In addition, it has also banned developers of these apps from submitting any new apps, according to ArsTechnica.

They suggested to android users to install apps from known resources and also to check the other users reviews. They also mention that the users should be alert that which apps are asking them to login their accounts.