[xda-hardware.jpg noframe]
For a good first look, check out this excellent hardware overview made by Portelligent. Check out their Teardown website. "Technology intelligence for the electronics professional". Wow!
FCC Documentation
We got a whole load of documents off the FCC website, where they keep publicly accessible copies of all the FCC testing reports. Apart from the photos, which are in the 'photos' section of this site, there is not that much interesting stuff here. It's mostly just boring reports detailing precisely how much of the RF energy becomes heat inside your head. This is called Specific Absorption Rate (SAR) testing). And there's lots of other technical nitty-gritty. We mirrored these documents, because the FCC server was just way, way, way too slow, and we don't want to bring the poor thing down. Even with the faster download, some of these PDFs are structured in such a way that they take forever to load.
Probably the most useful thing here are two complete user manuals as PDF: the HTC English version of the user manual (32 pages), and the T-Mobile English version of the user manual, which comes in two parts: pages 1-53 and pages 54-106. Then there's a system block diagram, as well as a somewhat more detailed radio block diagram.
Boring stuff:
CE sticker
Letter that says they would like to keep the schematics confidential (bummer...
Letter that says they promise to sell devices with the same RF calibration as the one that was tested
Answer to a request for additional information
The German firm CETECOM did SAR tests (<a href="cetecom-sar-report.pdf]1[/url], 2, 3) as well as general RF compliance testing.
A firm called ITS also did SAR tests 1, 2)
Related
It is highly propable that you've already read about such, not so mystical, threats to your personal information security like those related to mobile applications asking for too much rights and those where certificates for websites have got compromised. I'm curious to get to know what you know about possibility of the flaws in the actual logistics and manufacturing related to the smart phone you bought yesterday (for example).
Let me put my question this way: If you ought to choose a standpoint, where you tell others why you think that smart phones can not contain any physical components that are actually intended to leak information (usage patterns, meta information of viewed photos, installed applications, etc.) to the certain spesific party, what would you say?
Try also thinking something "smaller" than a company as a whole (*). Think about small working groups and teams containing designers, coders etc. from different continents and cultures, people involved in the transportation of the devices, level of abilities of manufacturers of the pirated goods, personality of sailsmen in the stores, personality of repairmen, social networks, etc.
If you really need to use word "carrieriq" in your answers, may I kindly ask you to say something that you think haven't been said well enough. Also, try to think something more spectacular than a single virus that got accidently installed at the factory.
If you feel that I seem to be the one, who is lacking knowledge in some area, please tell me. I'm always open for re-organizing my views of the world, if enough effort is used in the form of a good explanation.
--
(*) Actually you might not be thinking a company "as a whole". You might just add the name of a company to some sentence without actually thinking what you just wrote. People tend to think that they are thinking.
I've the forum rules: this query does not neatly fit anywhere, so I'll apologise in advance, but it does affect millions of people in real life in a very real and practical way.
There is a function in Android called com.android.internal.telephony.Connection.DisconnectCause.
It's function is to tell who tore down the voice call connnection, and specifically if it was due to the carrier having network congestion caused by their rent seeking under spending of CAPEX and general ****ty service. This indirectly implements (via the radio interface layer) Qualcomm diagnostics and ITU standards.
As it turns out, some (if not most) manufacturers have deliberately commented it out so it does not work, almost certainly at the request of the carriers.
So I am seeking a low level engineer up for some deep hacking to come up with a solution, perhaps one of the following:-
1. Ultra low level boot program that creates a micro-RIL with a single function of talking to the Qualcomm chipset before the main OS ROm starts to run for call diagnostics
2. A variation on above, namely a patch
3. A man-in-the-middle RIL daemon inserter to interrogate
4. Hack VALIK
5. Somethng else I have not thought of (I do not know Android except it has a Linux kernel and is a collective noun for a random collection of ROMs fiddled with by manufacturers who fill them with advertising **** and crippleware)
I will pay a $5k reward to who ever can help devise a manufacturer independent means of achieving this that is not too brittle and can somehow get that data to an ordinary app. The Qualcomm manuals and calls and even sample code is available to serious developers. Please privately message me if you are interested. This is not an "all or nothing" offer: I will pay more than one person for more than one pathway.
This is a real offer with real bucks and an ongoing retainer payment.
So there it is, money, a chance to make carriers crap service measurable and accountable and fame. There is a funny clip on you tube on this exact point ("they **** you with cell phones") with Joe Pesci at:
PM me, I have extensive experience with Qualcomm chipset interfacing, AT commands, RIL Hacking, OTA Layer 3 protocol decoding & etc.
I'm looking for a way to digitize notes. Normally (at least at my last job) I would either take my laptop or my TF700 into a meeting and just dictate the notes straight to the device. However at my new job I have had a few stipulations put upon me. They are:
1.) Actions must be documented and filed.
2.) Electronic devices such as laptops, tablets, smart phones, and recording devices (IE Camcorders, cameras) are prohibited.
I am allowed to bring a pad of paper and/or an audio recorder as long as it does not have an LCD or anything with a lens in it (Tape recorder / etc).
My current process is to take a legal pad in with a pencil, short hand everything and duplicate drawings /schematics, then go home and transcribe everything to my computer and sync it with my phone/tablet. To say the process is tedious is an understatement.
Is there a way to do this so that the process is faster and easier?
Any suggestions at all would be helpful.
Thank you.
Search for software that lets you scan a piece of paper and have it turned into digital text.
It shouldn't be that hard to find, I know something like that came with a cheap scanner we bought in the 90s - and the technology can only have improved.
Or if you don't care about file size and if it's in text or picture, you could just keep the scanned image as is, compress a little and use that.
Pennycake said:
Search for software that lets you scan a piece of paper and have it turned into digital text.
It shouldn't be that hard to find, I know something like that came with a cheap scanner we bought in the 90s - and the technology can only have improved.
Or if you don't care about file size and if it's in text or picture, you could just keep the scanned image as is, compress a little and use that.
Click to expand...
Click to collapse
Pennycake, I kind of need to have the OCR for key word searches the handheld scanner and software that I have does not recognize my handwriting, even in print.
I would wonder if there is better software / hardware out there.
You can record and there are speech-to-text programs, but I wonder if they would even be as successful as the attempts to digitize the handwriting.
Actually, in my opinion the suggestions made so far are looking at this problem the wrong way.
I think he correct solution is to talk to your manager about the situation and point out that:
i) Any security benefits they think they are getting by banning laptops etc from the meeting are delusional, as after the meeting you are transcribing your handwritten notes to electronic format anyway.
ii) That the current process of you working outside normal hours at home on your personal devices results in a very high risk of the meeting notes being exposed in an insecure environment - in fact, if laptops are banned from the meeting I'm surprised you're even allowed to remove the notes from the office to work on them at home on a personal device.
iii) That while they may have valid reasons to restrict electronic devices at meetings, common sense would suggest that now days the most secure and efficient method of recording meeting notes is to enter said notes directly into a secure enterprise computing environment using an enterprise approved secure device ie., if no-one else, the meeting secretary should be able to use an approved laptop (or similar device) during the meeting.
You need to initiate the discussion that results in a rule change that allows you to take the meeting notes in the most efficient and secure way, rather than search for a better method of circumventing the existing rules - both you and your employer will be better off - you won't have to transcribe the notes at home in your own time and they will have a much higher level of security surrounding those notes.
Pennycake said:
Search for software that lets you scan a piece of paper and have it turned into digital text.
It shouldn't be that hard to find, I know something like that came with a cheap scanner we bought in the 90s - and the technology can only have improved.
Or if you don't care about file size and if it's in text or picture, you could just keep the scanned image as is, compress a little and use that.
Click to expand...
Click to collapse
Mike_NZ said:
Actually, in my opinion the suggestions made so far are looking at this problem the wrong way.
I think he correct solution is to talk to your manager about the situation and point out that:
i) Any security benefits they think they are getting by banning laptops etc from the meeting are delusional, as after the meeting you are transcribing your handwritten notes to electronic format anyway.
ii) That the current process of you working outside normal hours at home on your personal devices results in a very high risk of the meeting notes being exposed in an insecure environment - in fact, if laptops are banned from the meeting I'm surprised you're even allowed to remove the notes from the office to work on them at home on a personal device.
iii) That while they may have valid reasons to restrict electronic devices at meetings, common sense would suggest that now days the most secure and efficient method of recording meeting notes is to enter said notes directly into a secure enterprise computing environment using an enterprise approved secure device ie., if no-one else, the meeting secretary should be able to use an approved laptop (or similar device) during the meeting.
You need to initiate the discussion that results in a rule change that allows you to take the meeting notes in the most efficient and secure way, rather than search for a better method of circumventing the existing rules - both you and your employer will be better off - you won't have to transcribe the notes at home in your own time and they will have a much higher level of security surrounding those notes.
Click to expand...
Click to collapse
I actually tried this, but the reason they don't want electronic media in these rooms are due to the rooms being marked a secure. Electronic media is not allowed to be brought into or out of the room. We have some rooms that have computers that are not allowed to connect to the network or internet in some rooms.
Me removing the notes from the building is not a problem because they are not proprietary or classified in any shape or form. As an engineer they want to make sure I document everything on the projects that I work on. They don't care if I did it via handwritten or pdf. In fact they only request that I make it readable. I transcribe it to electronic media because it makes it much easier for me to do a quick search for key words and find the notes or diagrams and for the teams that I work on to add or make changes.
Tips on how to Create your Customized WordPress Page Design template
The right Word Press Theme Guideline
Primarily made a webpage web site, Blogger automagically displays just about all comments in any loop, advertising the latest posts first and then the sleep inside chronological sequence in the time frame about connection. My spouse and i really like the following about concept marketing to get posting the idea facilitates all of your site visitors to view your most popular observations together with suggestions, although allowing these people the actual possibility to help search up elderly posting by few weeks.
Making certain that the text touch blog site only has a particular landing web page, is just not of which will really put together although locating the best style and design is undoubtedly super crucial, in addition to often you'll intend as well as set up your special. By way of static, I really necessarily mean that in contrast to the standard Wp web site, this written content stays precisely the same. You will be prepared to design the ordered nav menus to create confident people enjoy the best methods concerning each individual website.
Unfortunately generating the attaining web page and even customizing it is going to take practical knowledge and also you may will want the idea throughout common the same words. In this particular simple report I am going to not be in the guidelines where you would like to build a new customized concept mass media web theme, because there is not really a sufficient amount of area, yet I can go above the equipments that you really should must guarantee you could have right before people start up.
As soon as producing almost any design associated with blog including your own personal made to order statement curr web template it is really very important that you really remember that you just need to always test drive it onto your local desktop computer in advance of putting the item on the net. Acquiring a good neighborhood device will probably empower you actually to continue all your records inside a destination while not needing him or her get lost in passage. You will furthermore need XAMP, should you operate Windows xp as well as MAMP at Macintosh personal computer and the premium Wordpress theme platform based added against your remote computer. Piece of paper ++ is known as a free of charge download and read for you to may get with regard to encoding your wp template plus a net technique enjoy opera.
You might want to even appear directly into taking some, typically absolutely free, videos for Html page, Cascading stylesheet along with Perl. Hypertext System Dialect, Cascading down Type Bed sheets and also Hypertext Preprocessor, actually termed Personalized House Webpage, will be employed for making ones made to order post. I will be not implying which you will have to remain an qualified on these kind of your planning to will need to realize individuals and also be prepared to examine segments ones, designed for host instruction manuals.
For most people designing some sort of unique personal wordpress theme is a fight mainly because they manage their very own online site in addition to renew information, to not refer to wishing to know new languages. If your not even prepared capital t discover the particular code and it simply sounds towards complicated in that case comsider typically the client theme generation devices who are avaiable on the internet, in conjunction with any free of charge design templates which will include text hit.
Those subject makers definitely will let you outline a lot of spaces of your respective blog page to suit styles and additionally varieties to all your choosing, particularly the most thing are generally fairly reasonably limited in the models with variations they could make available. Yet certainly clicking a number of conventional hardware after which the carried out, you've got some sort of tailor-made word press theme within the other part.
Dude this forum isn't about wordpress themes!! Mod delete this thread
This posts here to increase the effect of sending my phones and other devices targetedly hacked files and file contents to the correct places to help forward the progress of patching the in routes and exploits used to conmlrimise my devices. im not mass generically hacked like all content marketing oriented loa pricepoint device users are. im also targetedly hacked, being a poster of evidence of organized crime. how i know this is surveying the various search results of numerous parts of code grep'd through for everything from 'usually' to 'when the' and the like and finding undocumented code); analytics traces reports screenshots etc i need to send to the correct agencies labs and engineers to effetiely take an opportunity one rarely has, not a whole lot more luck needed just to expose what ive found to get help swnding it all to the right researchers.., here to also overstep and des mceibe a social engineerig aspect to this criminal co-perogative that seems to be boiled down to a method or science always changing specific tech understanding apartide line that one would say would be inperceptible if not being lóoked for. These effects are already known, ask any journalist or researcher whos benefitted from the use of tor. do u ever get o ly search results fro. 2013 2014? ueah thats not right its 2022 and those are whats been whiddled down as passable as results to you that will derail your presumptive expectation to find usefull relevant info. like free black market oligarchay totalitarianiasm censorship of good info by masses of evil black hearted tyranical rulers. What is or was being done was not unlike untargeted hacking, wasnt unlike stalking, wasnt unlike gaslighting, was engineered by heinous psychologists under a larger tech side of a harasment as a service outfit utilizing specific individually itemized psychological attacks managed and administered from a heirerarchal chain of command involong hassers unbeknownst (effectively anyone), and salaried operative sabetuer assailant rights violators harassers, being orchestrated by a few headpieces workong to effect intimidation, harm, debilitation, eventual ruin of targets. im a lucky one to have escaped their heretounforsceen murderous grasp... technical implementation and phychological advice, and the client criminal operations, all likley make io the types involved.. and some .MOs? . A score is kept of each targets perceptable work toward outing the criminal client(most dont continually announce display post what they know under threat to their familys, i fly in the face of these intimidations and threats as ofton as possible, or as necessary. they especoally anger me and i ofton
make sure to give a speech about it if needed bwcause id say thaTs the proverbial time and place for that
the stalker or stalkers will note it all and interfere suggesting or positing jackassedly outloud (the two harasser grouping lends to this) which is being pumped as audio to the tatget , only filtered down to narrow effective frequency bands of audible sound. a effort to disturb distract frustrate is debilitating especially at length. i have audio recorsdngs of this subliminal harassment,¹¹¹i will post and have posted online. Undocmentble and likely undocumented (ie unprovable) aspects of reality, of which there are many, are derived contrieved etc by the stalkers one after the next and projected subliminally to the target as heassments, threats, psychosis induction, all to kéep reports from going to police, knowlede of anythining relevant or related from being learned basically preventing anything the target might do in the course of a day,, randomly or specifically or especially if ostensibly they were heading to the police station printing store etc. a target has to endure : Internet is filtered
friends are threatened and harssed the programs on anyones phone in the vicinity re beiing montoped to know if recording or video apps start running. Im not the only person who knows bout what i videod and posted, many involved are plausibly victims, many benefiting, profiting, buying àre monstors heartless soulless murderous enemys to mankind. How i got targeted? i was attacked by two guards at a high rise, recorded it incidentally, posted it online, in the bckground is evidence of the activities of aug fifteenth sixteenth twentyeighteen, some largescale illegal sex crime party for high rolling invertebrate clients, and not just in the background, but my interactions with the guards upclose are all evidence and the 15 mins of video as i exited the vicinity all contain evidence. They usually keep anything like video taken on a cell phone contained and from ever reaching the net, but i was recording to disk and feeling extra like it was a miracle i survived the attack gonna take the disk out for safe keeping minded also, gonna post immediately minded after evading immedite stalker harassers traveled on foot strategizing for 12 hours, went forward in visiting an art school campus, visiting the library and uploading over a simple Vpn to youtube (browser built in one if i remember correctly). My civil rights activism prior to this gave me some ability to evade gang stalker harassments, and all in all i had been being targeted digitally and had some upload strategy to use because of the same, the civil rights and land use activism i was doing videoing and posting. So the stops were pulled and full scale cmpaigns were deployed to psychologically or otherwise send me into ruin in a way that would be indetectible in any way as being foul play or at least un reportably or documentably, because tens if not hindreds had to have noticed the oddities of patterns and diversions from the norms of everything everywhere variousley i frequented. stalkers effirts were all made with intention to have effect but also to effectively obscure what was being done, why, what crime there was to reported if any, and any routes or reasons provable that i might have to seek relief from foundations for the crimes against me, so as to be able to persist and continually attack playing any and all angles of various of psychological and physiological attacks through incetivatized or otherwise achieved malfunction or alternate to normal operation of things ... this is where conputers come in, my devices were and still are if im being realistic used for and integral in facilitating this, but not without a lot of code paper trail i was expected not ever to be able to ascertain knowledge of or obtain. Largescale distributed obscured attack on individual targets isnt always viable, but ofton is it would seem... In the curse of weathering this attack i achieved slowely progress in my life , trancendance above and beyond the thercheous pitfalls and all that laid out figuritvely to ensnare me, and have atained for myself many if not a few more of my life goals as well. I have explained and exposed the immediate harassments and stalking to those being subjected to its immediate and side effects, and a page long list of other focused intentional sometimes subtle corrective or stimulating vitalization of some sort to the social and interpersonal climate within which i live life ive been, seeing as how it was being accurely poluted. it wasnt always easy or obvious but certainly something of the needed necessary and natural reaction type of measure i believe either way i know i have succeeded in the various ways i went about keeping my life from falling apart. Somewhere in these outcomes, milemarkers, graduations and self afirmations i categorically became, non susceptible to a certain category of sheer wall affront to a person who is targeted. socially, technically, socially correctovely, verbally, orationally, (speech giving?), attritionally effectively strategically, in one too many ways they cant effect their zero click exploit on one Kyle Varela, as it were, and now im here, right pretty much where id be, only here in my hand is alot of the info needed to disenfranchise those who this computer based evasion of my privacy and much worse was undertaken by, to help potentionally a lot of people, to help the world operate one incriment less innificiently... But i have to delve into realms unknown to turn in the files and doing so will continue to make it self aparent in its non accomplishability approached alone by just me. ...Leading to my posts reason.
Stated: source help, advice, and leads into and about the most suspicious of the many entrys and code snippets within the uploaded files all taken from systems i was using, and i believe is likley to contain evidence provingthY the disfunctionalityt of my devices software and hardware was intentional identifiable and ultimately hopefully reportable and patchable.
This post will be finished with attachments after getting initial post up. Just a moment