Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Skip to content

Please give a warning to user that you spoof the device name when installing /e/

Please give a warning to user that you spoof the device name when installing /e/

Summary

Good work on the /e/ os. I installed it on a nexus 4 (agreed it is community supported). I signed into my that the email app. Though I realised it did not ask me for my APP PASSWORD like what a typical AOSP email app. It asked me to sign in using OAuth 2.0 protocol using a browser.

A few days later while seeing my "Google account security checkup" showed that last login from "Galaxy J7 Prime". I was shocked - wondering - if my account had been hacked. I never had such a device.

https://gitlab.e.foundation/e/wiki/en/wikis/device/mako/info

Steps to reproduce

Install on a device like nexus4

What is the current behavior?

A few days later while seeing my "Google account security checkup" showed that last login from "Galaxy J7 Prime". I was shocked - wondering - if my account had been hacked. I never had such a device.

What is the expected correct behavior?

Either device id is not spoofed or inform the customer.

Relevant logs and/or screenshots

I opened browser to check my user agent in "/e/ installed nexus4" it shows Samsung Galaxy J7 Prime SM-G610M.

Possible fixes

Either device id is not spoofed or inform the customer.

The customer may wonder if installing /e/ has leaked the credentials or /e/ has been hacked or has a backdoor