Yes Apple's approval process makes the app store more secure.
You saying it doesn't make it true. Can you be specific? What are they doing that makes it secure?
Loading it up on a phone and trying it out doesn't improve the security greatly, it just ensures that the app doesn't crash and mostly does what it claims to do. (This seems to be the declared objective of the process, as evidence by Jobs comments during the WWDC keynote.)
didn't you read the article or my posts?
Yeah, I read the article, and I read some of your posts. None of them had anything to do with the security of the iOS store, however. They were mostly about Android market not doing enough. My question is: what does Apple do [specifically] that Google, HP/Palm, or Microsoft does not to improve security?
Ask yourself why this hasn't happened on iPhones (yet), but it already happened on Android phones?
I can't really speculate why. It could be any of the following reasons -- or some mix of them.
1. Apple review process blocks malware that Android market lets through.
2. The researcher in question had some particular reason to target Android market, not iOS market. (Maybe he doesn't own a Mac so he can't run XCode.)
3. It has happened on iOS already, and either has not been noticed or has not been widely reported.
My point is that this is all speculative. Neither you nor I really know which of these possibilities are real and which are not.
Security researcher creates botnet for Android, tricks 300 users to download the app
http://blogs.forbes.com/firewall/20...letes-and-downplays-botnet-demo-android-apps/
I suggest everybody read the article by the same author which preceded that article: http://blogs.forbes.com/firewall/20...mock-botnet-of-twilight-loving-android-users/
Relevant quote:
Forbes said:Oberheide focused on what may be a serious security weakness in Android's App Market: that apps don't have to ask permission from a user to fetch new executable code. Even after an app has been approved for downloads in Google's market, Oberheide says, it can still metamorphose at will into a much less friendly program.
Oberheide, who works for security startup Scio Security, developed an application called "RootStrap" to demonstrate that trust problem for Android apps. After it's installed, Rootstrap periodically "phones home" to check for any new code that Oberheide wants to add to the program, including any hidden control program or "rootkit" that he wished to install--hence the program's name. "This is probably the most effective way to build a mobile botnet," Oberheide told SummerCon's audience of hackers and security researchers.
This is the real point the original researcher was making. So if you write a legitimate contact list manager app and people start downloading it and using it, it can download a new module at some point in the future and start doing bad stuff.
This sounds like a big problem to me. Android phones shouldn't be running unsigned code in the same sandbox as the user's authorized, signed code. Even if Google was reviewing source code or performing static analysis, they would not be able to catch malware if the software downloads it malware components after being installed and blessed by the user.