Frühlings-Meetup
Details
Hello Android enthusiasts! Spring is just around the corner and hopefully here soon, so join us for our Frühlings Android GDG Meetup at Google. Warm up with great talks, tasty snacks, and cozy drinks while connecting with the community!
INFO: As usual Google requires registration with first and last name. Please send them to us until one day before the event as Google requests the list in advance.
Agenda:
18:00: Doors open, Mingling and Food
18:30: Intro & Welcome note
18:45: Juhani Lehtimäki - Beyond “Get Good”: Engineering Usability in Open Source
19:15: Julius Fischer & Benedikt Löbbeke - How to hack your app: basics of penetration testing
20:00: Engin Deniz Usta - 8 Players, 0 Hardware Decoders: Rendering a Video Grid in Compose
-------------------------------------------------------
🗣️ Beyond “Get Good”: Engineering Usability in Open Source by Juhani Lehtimäki
Open Source Software (OSS) has won the technical battle. From the Linux kernel to the Android Open Source Project (AOSP), OSS forms the backbone of our digital infrastructure and is a critical pillar of European digital sovereignty. However, while OSS excels at solving complex engineering problems, it often fails at the human interface. Many popular OSS projects suffer from "Accidental Design", a situation where the UI and information architecture organically emerge as side effects of technical implementation rather than purposeful intent. Too often, developers fall into the trap of believing "usability is just an opinion" or treating user frustration like a boss in Dark Souls that simply requires the user to "get good". In this session, we will dismantle the myths that hold OSS usability back. We’ll explore why our current tools (like Codeberg and GitLab) are fine-tuned for code but fail for design, and why shifting design responsibility to the user through "settings bloat" is a cop-out, not a solution.
🗣️ How to hack your app: basics of penetration testing by Julius Fischer & Benedikt Löbbeke
In this talk we introduce three widely used mobile security tools, MobSF, Burp Suite, and objection, that help you quickly assess your app for vulnerabilities. Through one static analysis demo with MobSF and two short penetration testing demos, we show how these tools complement each other and how you can combine them effectively in penetration testing workflows. We also highlight how much security value you can already gain with relatively little effort or specialized knowledge. Because these tools are purpose-built for mobile analysis, they allow you to uncover weaknesses in your app without needing to be a full-time security expert.
🗣️ 8 Players, 0 Hardware Decoders: Rendering a Video Grid in Compose by Engin Deniz Usta
Your video grid runs like butter on a Pixel. Ship it. Then a Samsung A14 gives you nothing but black frames and sadness - welcome to hardware codec limits. This talk is about running a pool of concurrent Media3 ExoPlayer instances on zero hardware decoders in a Compose LazyVerticalStaggeredGrid, and somehow making it work. We'll cover software-only MediaCodecSelector, player pool recycling, scroll-driven pause/resume, the TextureView vs SurfaceView trap, and a two-phase prefetch pipeline - all from production code and real device pain.
