Author Topic: Google Accidentally Pushed Internal November 2018 Security Update to Pixel User  (Read 149 times)

Offline javajolt

  • Administrator
  • Hero Member
  • *****
  • Posts: 35171
  • Gender: Male
  • I Do Windows
    • windows10newsinfo.com
Google has accidentally sent out a dogfood build for the November 2018 security patches to a Google Pixel owner. This update was pushed via OTA (over-the-air) and was discovered when the user woke up the next morning.



A dogfood build is a prerelease version of a software that developers use internally in a real life environment in order to perform quality assurance before it is released. As you can see from the notice below that was displayed to the user, these are confidential builds that are meant to be used internally by Google employees before they are released to the public.



According to a Reddit user, when they woke up, they discovered that the November 2018 security update was installed on their device and was waiting for a reboot to finalize the installation.



The user told BleepingComputer that they have no idea why they received the build and that they are not affiliated with Google.

"No I don't develop software or have any affiliation with Google whatsoever, the update just came through as any OTA would," the Reddit user MikiHaikonen told BleepingComputer. "The phone is completely stock (locked bootloader, no root/twrp, never used betas)."

BleepingComputer has contacted Google for comment but had not heard back by the time of this publication.

source