Could someone explain to me how (any) general app's processes are authenticated against original code to insure malicious actors don't wreck havoc?
i.e. everyone is using approved or same version of a particular app and someone hasn't written something similar to interact with original.