New permissions with privacy mode support
Any way there is a new build this one is based on the latest and greatest from CM 7.1. the download link is below.
Privacy mode permissions:
NEW! READ_LOGS - If enabled attempts to read logs will return nothing but will not crash the app.
NEW! READ_HISTORY_BOOKMARKS - If enabled it will return the default bookmarks as you have never changed them and empty history.
READ_PHONE_STATE - You can now make your device return anonymized data from the methods protected with READ_PHONE_STATE permission.
There is a demo app
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
you can use to see the effect of the privacy mode and revoking. Run the app revoke or make private run the app again.
Currently there is no READ_LOGS demo.
ROM info:
Some applications may not work properly with revoked permissions.
You CAN'T revoke permission of SYSTEM applications!
If an application is running changing some permissions like say INTERNET will not be fully applied until the application is restarted.
Google apps are not included. You need to download them separately and flash them right after the ROM.
You uses it at your own risk and I cannot be held responsible for the consequences.
Some technical stuff:
If an application checks for its permissions it will appear that all required permissions are granted. This is done to keep some ad networks code happy. As far as I've tested this is safe since the permission check is done at the remote end of the call when protected method is invoked. Please report your findings.
Download:
update-pffmod-7.1.0-DesireHD-20111013-signed.zip
Old builds:
update-pffmod-7.1.0-DesireHD-KANG-signed.zip
direct link: update-pffmod-0.9.1-DesireHD-DEV-20110418-signed.zip storage provided by: http://onlinestoragesolution.com
direct link: update-pffmod-0.9.0-DesireHD-DEV-20110328.2-signed.zip storage provided by: http://onlinestoragesolution.com
update-pffmod-0.9.0-DesireHD-DEV-20110327-signed.zip - broken don't use
update-pffmod-0.9.0-DesireHD-DEV-20110323-signed.zip
update-pffmod-0.9.0-DesireHD-DEV-20110321-signed.zip
update-pffmod-0.9.0-DesireHD-DEV-20110318-signed.zip
update-pffmod-0.9.0-DesireHD-DEV-signed.zip
I need you opinion.
Please comment if you are interested in continued development of this ROM.
Please report ANY success or failure!
This is ingenious, please submit it to the cyanogenmod gerrit if you can.
+1, Using it now, brilliant. It has made me aware of some dodgy permissions out there, although it may cause severe paranoia! Great idea, and think you should continue, a Pure Aosp build would be amazing.
Thanks , and keep going!
I've submitted it to the cyanogenmod gerrit. However this does not mean that it will be accepted.
So for the now I'll try to make daily builds.
lol! nice idea. it'd be great if they'd accept it into the cyanogen nighties. great feature.
Good luck. Cracking feature.
Fantastic, hope it gets approved. Good job!
I've uploaded new build. GPS seams more reliable now.
Is there any kind of delay with re-granting a permission once its been revoked? I've found that re-granting permission is buggy with certain apps.
I've also had some issues building this mod into roms for Inc and Evo, I get this error:
make: *** [out/target/product/inc/obj/SHARED_LIBRARIES/libaudio_intermediates/AudioHardware.o] Error 1
make: *** Waiting for unfinished jobs....
external/bluetooth/bluez/audio/liba2dp.c: In function 'a2dp_write':
external/bluetooth/bluez/audio/liba2dp.c:1204: warning: passing argument 6 of 'sbc_encode' from incompatible pointer type
external/bluetooth/bluez/audio/../sbc/sbc.h:94: note: expected 'ssize_t *' but argument is of type 'unsigned int *'
frameworks/base/services/audioflinger/AudioFlinger.cpp: In member function 'android::status_t android::AudioFlinger::moveEffectChain_l(int, android::AudioFlinger:laybackThread*, android::AudioFlinger:laybackThread*, bool)':
frameworks/base/services/audioflinger/AudioFlinger.cpp:4986: warning: 'strategy' may be used uninitialized in this function
frameworks/base/services/audioflinger/AudioFlinger.cpp: In member function 'virtual android::sp<android::IEffect> android::AudioFlinger::createEffect(pid_t, effect_descriptor_t*, const android::sp<android::IEffectClient>&, int32_t, int, int, android::status_t*, int*, int*)':
frameworks/base/services/audioflinger/AudioFlinger.cpp:4842: warning: 'd.effect_descriptor_s::flags' may be used uninitialized in this function
gandhisfist said:
Is there any kind of delay with re-granting a permission once its been revoked? I've found that re-granting permission is buggy with certain apps.
Click to expand...
Click to collapse
Have you tried force stopping the application and starting it again?
Which are the applications that you have problems with?
gandhisfist said:
I've also had some issues building this mod into roms for Inc and Evo, I get this error:
make: *** [out/target/product/inc/obj/SHARED_LIBRARIES/libaudio_intermediates/AudioHardware.o] Error 1
make: *** Waiting for unfinished jobs....
external/bluetooth/bluez/audio/liba2dp.c: In function 'a2dp_write':
external/bluetooth/bluez/audio/liba2dp.c:1204: warning: passing argument 6 of 'sbc_encode' from incompatible pointer type
external/bluetooth/bluez/audio/../sbc/sbc.h:94: note: expected 'ssize_t *' but argument is of type 'unsigned int *'.....
Click to expand...
Click to collapse
Sorry but this errors are not related to the pffmod sources try to first sync then clean and rebuild.
Updated. The last one had its video playback broken... sorry for that.
Absolutely brilliant! I pray to god somebody incorporates this into a sense ROM.
I've been contacted by Google. The offered me a job if I stop developing the pffmod.
What should I do?
username666 said:
I've been contacted by Google. The offered me a job if I stop developing the pffmod.
What should I do?
Click to expand...
Click to collapse
haha noway! Noone is fooling me today!! Especially today!!
But anyway, if its true, im congratulating you, the idea is insanely great, and i only wish it was Sense compatible..
Halleluja to you
Now no one will fall for it
Dude, just want to express my gratitude again for this amazing feature, i refuse to install a rom that doesn't have it, its pretty much my favorite feature right now and i don't see anythign else topping it anytime soon. Well done sir, you are a gentleman and a scholar.
Great Idea.
Related
Hi folks,
i am proud to announce the Release of v0.5.11 of ttrss-reader, the android-client for Tiny Tiny RSS:
TTRSS-Reader for Android
Tiny Tiny RSS
TT-RSS is a php/javascript-based reader with a google-reader-like interface, running on your own server with mysql/postgresql and php. It supports multiple user-accounts, feed-categories, labels, sharing of articles and automatic updates every x minutes.
ttrss-reader for Android
Ttrss-reader for Android was started at code.google.com by J.Devauchelle but as i couldn't reach him for several weeks i forked the project: (see note above for URL)
I implemented some usability features and then started implementing local caching since before EVERY single piece of data was requested from the server, slowing down the browsing a lot.
Now i think the program is in a quite usable state, although the local-caching doesn't work so well. The server-side provides API-methods to retrieve data as JSON-Objects but they are focused on transferring a low amount of data in every request (eg. only one article with content is sent at a time, not all new articles which would be much easier).
So if anyone want to keep his feeds away from google and do stuff on his own, in my opinion this is the way to do it. And please excuse my english. ^^
I would appreciate any ideas what could be improved or bugreports and i'd feel honoured if some of you would like to try this app or even join developement.
Some Screenshots:
Greetings,
nils
Hi,
Just to say that I like this app but my ttrss instance seems too big for this app. Android ask me to kill the app everytimes it makes a refresh of the data.
for information : my ttrss run on a PC and is hosted at home. It has +12000 articles
Keep up
Definitely trying this soon
My carrier should have the new Android phone I want in this week. I will definitely try this and get back to you!
Getting error message? I installed this, and put in my tt-rss location, username, and password. It gives me this error message:
"error":"API_DISABLED"
@celticchrys: That means you have to login to the webinterface and enable the API in your user-preferences. Dont know why but the API-access is a per-user-setting in Tiny Tiny RSS so every user has to enable it for himself.
Greetings,
nils
@lordnils: Thanks, I'll give that a try.
***EDIT***
It force closed on me a couple of times, did fetch my articles once, and now says it cannot. I also got a very long error, many screens long, that begins with :
Oupd...
I was unable to conenct to your Tiny Tiny TSS instance, please check your connection and/or connection settings.
Error details:
A JSONObject text must begin with '{' at character 1 of <html>
The above is then followed by basically the entire code for my login page.
Any ideas?
Thanks.
Hm, something seems to be wrong with the URL for API-Access. You should make sure you entered the URL in the settings exactly like the URL you use to access the webinterface of Tiny Tiny RSS.
If the problem still exists it would be helpful if you provided me with the output of ADB (or aLogcat from the market if you dont want to mess with the USB-connection and the Android-SDK). It would be the easiest way to resolve the problem if you opened an issue on <url for the google-code page of our project where you can start an issue> so other people involved could try to fix the problem, too.
Greetings,
nils
ps: sry for not posting urls, i dont think it is a good practice to encourage people to spam somewhere so they can post links. so i just dont do it and wait for the protection to dissappear. :/
sent pm
lordnils, I've sent you a PM with the requested log.
Thanks!
I just released the TTRSS-Reader on the market:
Download: http://www.appbrain.com/app/org.ttrssreader?install
QR-Code:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Greetings,
nils
Hey lordnils,
I'm having the same problem as celticchrys. I am using the exact url that I login to via a browser, API is enabled, but still get the documented error within the program.
Any ideas what I might look at?
First of all, which versions are you using (Tiny Tiny RSS and TTRSS-Reader)?
Then: Can you acquire the output of logcat (aLogcat from the market or "adb logcat" if you got the SDK installed)?
If you are using old versions (older then Tiny Tiny RSS v.1.4.3.1 and TTRSS-Reader v0.7.3) please update first and try again. There are some issues with older Versions of the API which could cause this problem.
Greetings,
nils
I've just checked, and I'm running TTRSS 1.4.2 on my server, and I have the latest Market version on my phone.
Perhaps this is the problem! I'll look into updating my TTRSS server install, and get back to you.
Thank you! This is great! I didn't want to move all my feeds to google so this is perfect!
Long time no see.
Any way there is a new build this one is based on the latest and greatest from CM 7.1. the download link is below.
Spoofed permissions:
READ_PHONE_STATE - You can now make your device return spoofed data from the methods protected with READ_PHONE_STATE permission. There is a demo app
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
you can use to see the effect of spoofing and revoking READ_PHONE_STATE permission. Run the app revoke or spoof run the app again.
Since majority of time spend on READ_PHONE_STATE spoofing was about laying the needed infrastructure for spoofing in general, expect new spoofed permissions shortly.
ROM info:
This is a preview build bases on CM7 nightly builds. Some things may not work some features may be missing.
Some applications may not work properly with revoked permissions.
You can revoke permission of SYSTEM applications!!! DON'T DO IT UNLESS YOU KNOW WHAT YOU ARE DOING.. However reboot resets the permissions of the system applications so you probably can recover.
If an application is running changing some permissions like say INTERNET will not be fully applied until the application is restarted.
If you come from CM7 nightly or CM7 RCx you probably don't need to wipe. I something is not working do a wipe.
Google apps are not included. You need to download them separately and flash them right after the ROM.
It will probably require ClockworkMod 3.x to flash properly.
You uses it at your own risk and I cannot be held responsible for the consequences.
Some technical stuff:
If an application checks for its permissions it will appear that all required permissions are granted. This is done to keep some ad networks code happy. As far as I've tested this is safe since the permission check is done at the remote end of the call when protected method is invoked. Please report your findings.
Screen shot:
This is the extended Manage application screen.
Download:
update-pffmod-7.1.0-Desire-KANG-signed.zip
old builds:
direct link: update-pffmod-0.9.1-Desire-DEV-20110418-signed.zip storage provided by: http://onlinestoragesolution.com
direct link: update-pffmod-0.9.0-DESIRE-DEV-20110328-signed.zip storage provided by: http://onlinestoragesolution.com
Wow, This is so quick, I read about it in Reddit day back. Thanks! Still there are lot of discussion about this between developers.
Details here
http://www.androidpolice.com/2011/0...rmissions-cue-mass-force-closing-as-a-result/
ukanth said:
Wow, This is so quick, I read about it in Reddit day back. Thanks! Still there are lot of discussion about this between developers.
Details here
http://www.androidpolice.com/2011/0...rmissions-cue-mass-force-closing-as-a-result/
Click to expand...
Click to collapse
Actually I've submitted this to CM
here is the original thread for Desire HD http://forum.xda-developers.com/showthread.php?p=12161601#post12161601
Great patch though Personally I feel this is great addition.Thanks for this! I'll try this and let you know.
new build with data spoofing see the first post.
Neat!
Is this based on something close to nightly 41? There's been a major bug recently, which caused many issues, it's fixen in #41.
http://cm-nightlies.appspot.com/?device=bravo
p.s.
Please add this to the CM branch...
JDima said:
Neat!
Is this based on something close to nightly 41? There's been a major bug recently, which caused many issues, it's fixen in #41.
http://cm-nightlies.appspot.com/?device=bravo
p.s.
Please add this to the CM branch...
Click to expand...
Click to collapse
This is like current git
Swapping real IDs for the word "spoofed" is quite obvious, and, IMHO, might cause problems if an application stores it as an integer value. Why don't you just return random numbers?
I'm working on something that will generate plausible data from the calling app package name. I'm just too impatient and decided to release it early.
The other thing is that it's bean too long since the last release
And a final request. Please do something with the usability Maybe a dropbox underneath each of the permissions. Best if colored - red for "revoked", yellow for "spoofed" and "granted" without highlighting. Currently, a brief view at the list of permissions totally misses their states.
Yes, I do understand the engine is far more important than bells&whistles, but as for me, the mod is quite ready for everyday use, and I'd be happy to see it more user-faced.
JDima said:
And a final request. Please do something with the usability Maybe a dropbox underneath each of the permissions. Best if colored - red for "revoked", yellow for "spoofed" and "granted" without highlighting. Currently, a brief view at the list of permissions totally misses their states.
Yes, I do understand the engine is far more important than bells&whistles, but as for me, the mod is quite ready for everyday use, and I'd be happy to see it more user-faced.
Click to expand...
Click to collapse
Interested in helping with that?
Just grab AppSecurityEditablePermissions.java, app_editable_permission.xml and app_editable_permission_item.xml from http://review.cyanogenmod.com/4055 and start hacking
New build... Link in the first post.
Hi!
I have created a new application, Network Tools.
Basic idea of this app is periodic monitoring of websites, servers, routers, surveillance systems, etc. After a specified period of time the resource is checked, in case of failure user will get a warning. Such control will allow you to respond quickly to encountered problems.
You can add new resource to monitoring list, select the type and time interval between checks. At any time you can change the settings or manually check for a specific host. The corresponding commands are available on the context menu.
App contains additional tools: whois, ping and traceroute, for diagnosing network problems. For these commands there are implemented lists of previously entered addresses, so user does not need to retype them again.
Free, no ads.
Android Market link
You are welcome for feedback and comments.
WBR
Screenshots:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Network Tools 1.1.4 in Android Market
Network Tools 1.1.4 in Android Market.
What's new:
Version 1.1.4
* HISTORY;
* History auto delete;
* History auto update;
* Option: number of attempts to check;
* Option: timeout value;
* Host check algorithm improvements.
Version 1.1.3
* WHOIS;
* Separate ringtone option if host is working again;
* Copy to/Send to commands for traceroute;
* New status bar icons;
* Minor changes in the host verification algorithm.
Reserved for future use
Awesome, thank you!
this is a great tool! im looking for this one in Android for long time. Ive been using this app in windows mobile DNetworkTools.
i hope you could put some stuff like in DNetworkTools.
Thanks for the great app!
Ill support this one.
You just made my monitoring servers over the weekend a lot easier ^_^
Great app.
randolph2000 said:
i hope you could put some stuff like in DNetworkTools.
Click to expand...
Click to collapse
Thank you and everyone at this thread for feedback!
Be sure to look to the application's page that you specify. Thanks again.
WBR
Great Work!!!
Please don't take this as anything against the app, but if any admin actually relies on an app like this as the only monitoring solution for critical 24/7 servers, they should be dragged behind the woodshed and paddled. It has NOTHING to do with the app, rather the fact that mobile networks are simply not 100% viable.
That said, when there are issues (power, network etc..) with other monitoring systems, this is a FANTASTIC option. This will be part of my Android install kit forever.
I have a couple of requests:
1. A scrollable widget that shows the last result for each server/test would be cool. I will give you a full screen on my phone! ;-)
2. I need to test specific services: HTTP, HTTPS, FTP, SSH. Additional service options and maybe an option to manually define ports/services would be really nice. Customers of mine that have security camera systems using a DVR often forward random ports for external access to the DVR and it would add "peace of mind" for them to be able to see that their security system is up and running.
Dissenter said:
if any admin actually relies on an app like this as the only monitoring solution for critical 24/7 servers
2. I need to test specific services: HTTP, HTTPS, FTP, SSH. Additional service options and maybe an option to manually define ports/services would be really nice.
Click to expand...
Click to collapse
Sure, nobody says about critical servers monitoring.
In actual app version you can use Generic TCP option with URL like http://site.com:3128, or HTTP Get option with fully qualified URL to make some tests. I understand, this is not complete test of concrete service, and have plans to add more to my app.
Now I'm busy with another private application, but, I hope, this is not forever.
By the way, you say about test services like HTTP, FTP or SSH. What exactly do you think should make the application? Any ideas are welcome.
very cool app thanks mate.
Empty message, sorry
Excellent app.. just what I was after. Thank you!
DroidSheep is an Android app for Security analysis in wireless networks and capturing facebook, twitter, linkedin and other accounts.
DroidSheep requires ROOT!
Please note:
DroidSheep was developed as a tool for testing the security of your accounts.
This software is neither made for using it in public networks, nor for hijacking any other persons account.
It should only demonstrate the poor security properties network connections without encryption have.
So do not get DroidSheep to harm anybody or use it in order to gain unauthorized access to any account you do not own! Use this software only for analyzing your own security!
Here are videos of what it does:
www.youtube.com/watch?v=B4ROlCgTr80
www.youtube.com/watch?v=mIWkee7RjbU
www.youtube.com/watch?v=z7NUluxUORs
Here is a video Tutorial on how to use it:
http://www.youtube.com/watch?v=4N-SBx5EF3g
How does this work?
As already announced DroidsSheep supports almost every website – also “big” webservices like facebook and Yahoo.
How does that work this simple?
There are many users that do not known that air is the transmission medium when using WiFi.
Therefore information is not only transfered to its receiver but also to any other party in the network within the range of the radio waves.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Usually nothing special happens because the WiFi users discard packets that are not destined to themselves.
DroidSheep does not do this. It reads all the packets looking at their contents.
Is a website sending a clear recognition feature within a message’s content, which can identify a user (“SessionID”), then DroidSheep is able to read it although it is not intended to external users.
Moreover DroidSheep can use this token to use it as its own.
The server can’t decide whether the authorized user or DroidSheep has sent the request.
How can I protect myself?
The only satisfying answer is: SSL respectively HTTPS.
Many providers already offer HTTPS, even facebook, however it must often be enabled in the settings first.
When using HTTPS the data are still sent to alle participants in the WiFi-network, too, but because the data has been encrypted it is impossible for DroidSheep to decrypt the contect of a message - remaining only a complete mess of letters, with which an attacker can’t do anything.
The real problem is that not every website provides SSL. What to do when you are in a public network (hotel, airport, etc.), you also want to use this and the site does not offer HTTPS though?
You can use a VPN-connection
For this the computer sets up an encrypted channel to a confidential computer which again transfers the data to the website.
Please note this is NOT my work I am simply sharing this and giving a direct link to the APK (it was removed from droidsheep.de because of German rules).
Source: http://droidsheep.de
Build 14: http://www.iuptech.com/public/SD/download/droidsheep-current.apk <-- Thanks mbirth for build 14 link.
Build 15: Attached to this post - compiled by mbirth <-- Thanks
All credit goes to Andreas Koch for this amazing app! - Thanks a million!
build 13 is the latest? not 15
If there is a newer version, please post a link of the apk here and I will add it to the OP.
There's build 14: http://www.iuptech.com/public/SD/download/droidsheep-current.apk
Build 15 is nowhere to be found for now…
OP updated with build 14
Im having no luck with this app on my nexus s 4g. Which is a shame. I can post debugging info if somebody could help me out.
The v15 is in the official SVN: https://code.google.com/p/droidshee...idsheep/DroidSheep_public/AndroidManifest.xml
And since there's no official APK, you have to compile it yourself. Thus the different signature.
Attached is v15 compiled by myself.
Does it work on ICS?
I want to be sure if it works befor im rooting my Note
Yes
not working xperia neo cant search for anything i leave it for about 10min still nothing i also done what youtube tells me to do still nothing im using my home router with password....
mbirth said:
The v15 is in the official SVN: https://code.google.com/p/droidshee...idsheep/DroidSheep_public/AndroidManifest.xml
And since there's no official APK, you have to compile it yourself. Thus the different signature.
Attached is v15 compiled by myself.
Click to expand...
Click to collapse
Is that working on ics?
Updated OP with v15 apk, thank mbirth.
Also I don't know of ICS support as I am still running Good'ol Gingerbread.
Ive just come accross this app and have downloaded, but Nobody tested this with ICS? thats surprising! lol
Will test it this eve and report tomorrow.
safeelhd2 said:
Ive just come accross this app and have downloaded, but Nobody tested this with ICS? thats surprising! lol
Will test it this eve and report tomorrow.
Click to expand...
Click to collapse
It doesnt work.lol
I connected to wifi and did some browsing on other devices. I.e tablets.
didnt find anything.
It works for me, but there's a mess with sessions. Probably you should consider mapping each session to each Wifi network and not showing old ones with new networks... Just a suggestion
It is working on ICS, perhaps you have IP client isolation on WiFi router...
Not working for me on Galaxy Note ICS... Do you think it's related to my conection? How should I change it?
EDIT i installed the v15 version and know it's perfect!
It shows up under my kapersky as potential virus, any reason for this??
nm
crxforya said:
It shows up under my kapersky as potential virus, any reason for this??
Click to expand...
Click to collapse
Thats normal for Droidsheep.
+ working on my SGS2 (ICS)
Dear all: This is my first post. I spent two days reading posts concerning the highly anticipated unlocking of the S7 G930T bootloader. It sounds as though the developers at XDA and anot entity known as Chainfire are chomping at the bit in expectation -- TWRP is written and waiting at the border. That is awesome and I wish you all the best of luck. There are several apps that I wish to install on my phone. Most of them address device security (firewalls, etc...) and secure communications. Thank you in advance for your many hours of work.
My question is one of methodology and the ultimate goals of device rooting using the Android 6+ OS. Why not use a virtual root as a cheap and tawdry temporary work around? A similar method appears to have worked well for a Corbin Champion who create Gnuroot. His app creates rooted Linux environments on Android devices and requires no Android root.
Will this work for applications that require a rooted Android? Is my question rooted in reality? What are the limitations of a rooted app or virtual root system?
Why would anyone want to use a cheap trick? Is it possible that using an app or a virtual root may avoid potential crashes and instabilities? Samsung may have locked the bootloader to prevent or slow the use of the S7 G930T in illegal activity. Wouldn't the development of an app for non-developers all us to benefit from many wonderful apps while preventing non-developers from engaging in less than ethical hacking with root as a lockpick?
I also read an XDA post concerning chain-loading an OS from a USB device. This also seems like a clever work around. It may also be an effective security tool that may allow a cellular device to be driven by a portable OS. It may allow one to protect device data and USB-OS data while enjoying network communications. What are your thoughts?
If I could pull this off on my own, I would do it and release it for free since that seems to be the thing to do -- to contribute in an academic manner to the karma/knowledge pool. I hope that capable hands consider a project like this to be worth while. If is already done, please point me in the right direction.
Thanks.
Cheers!
Dear all:
After I posted and asked questions that I though were interesting, I continued to read and look for helpful apps.
I lot of new apps appeared in the Google play store. Or maybe I just had not paid attention well enough before.
However the coincidence occurred, the most useful apps were the IP tools such as trace and location search.
Before that day I never once obtained an IP trace result and location that was at all useful or even remotely interesting. This time I was able to summon the leviathan.
The corresponding IP address to a machine that was and may still be in constant communication with my Samsung Galaxy S7:
172.217.3.238
The corresponding GPS coordinates:
37.4192000, -122.0574000
In the links below you will see that this corresponds to an office building on the property of the Moffett Federal Air Field near Mountain View and Stevens Creek California. How did that happen. My attorney doesn't know either. He says that no one is looking for me or is in great want of a chat with me. I am a medical student. ????
Ok. So I sent a complaint to the California State Attorney General Kamala Harris... several time by fax, online portal, and email. I called her office to confirm. Her staff confirm, don't confirm, and say that they have no way of tracing documents received by their server. So my attorney called and emailed.
Anyway... this smells of phone spoofing and phone trapping again so I will have to fight just to submit a complaint.
Links to the IPtrce and IP location searches.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
The link to my complaint to California Attorney General Kamal Harris.
Why wond the images post?
I am not sure what went wrong, But the image files are not visible.. How do I correct this?
Ahzreal2 said:
I am not sure what went wrong, But the image files are not visible.. How do I correct this?
Click to expand...
Click to collapse
I'm not sure about this whole thread... That IP is Google, which has nothing to do with your post about a 'virtual root', OS on USB, or whatever.
See this: http://172.217.3.238.ipaddress.com/