Is it safe???... - General Questions and Answers

Guys I'm going to Europe and I'm taking my Atrix with me to use at free or open wifi hotspots. Now I want to do some banking through my bank's web site but is it safe to do that wirelessly on open hotspots??
Thanks for your time.

Short answer......... probably not.
Ok theres probably not that much of a chance someone will be sitting there sniffing for your personal details but in this day and age, you never know.
Im sure plenty of people do what your asking about, but I wouldnt.

Never use open wifi tyyi login your backing stuff. That's only rule of using open wifi, basically.

I would say the same never use open wifi for banking.

I wouldn't use it either but really... are we being paranoid here? Banks always have securely encrypted interfaces. Thats basically the same security level as using "secure" wifi. So if you're not willing to do this in open wifi, you're not willing to do it in wifi at all because the same risks apply. In fact, the "secure" wifi encryption will likely be broken before the bank's ever is.
You'd have to worry about man in the middle attacks but really, they'd have to know which bank you're using and clone the interface before hand. You'll be abroad and mobile so that will be pretty ****ing hard to do.
Not trying to sway you either way. But I figured the flipside of the argument needed a voice here =P

Many post have said about the dangerous of using open wifi hotspots......
I even suggest that you shouldn't use your phone to do something is important.........

not a chance
i used my remote gear for everything, EXCEPT banking, you mess up and lose phone or its stolen etc...man your life can suck quick...even on secure desktops my stuff is remote encrypted...good rule of thub never keep anything u cant afford to have world see on a portable device

Related

[Q] Xoom Security - Preventing Factory reset

I'm installing tracking tools on my Xoom but someone could easily do a factory reset to get rid of them.
Is there a way to prevent a factory reset or make it realy hard to do? or is there a way to modify the rom image so that these apps are installed by default?
Essentially i want to make sure that the only way to get rid of the tracking tool is to flash the roms...
note: I have a rooted Xoom with Android 3.2
If you want to prevent people from clearing the device memory from the Settings UI, you can simply password protect your entire tablet (or portions of the software using App Protector or similar software). You may also want to lock down ADB and Android Market app installs
I don't think that most people would be smart enough to know how to get to the recovery screen from a fully powered down device, since it's model specific.
willverduzco said:
If you want to prevent people from clearing the device memory from the Settings UI, you can simply password protect your entire tablet (or portions of the software using App Protector or similar software). You may also want to lock down ADB and Android Market app installs
I don't think that most people would be smart enough to know how to get to the recovery screen from a fully powered down device, since it's model specific.
Click to expand...
Click to collapse
While this is a good suggestion, I could quite easily figure out how to get to recovery from any given device. It's really as simple as Googling it. Granted though, most people won't even know what recovery is!
OP, I'm not sure that what you want is available but I'd be very interested in finding this out also!
The thing is that i want people to be able to use it or more specifically connect to a wifi allowing me to...
- Remotely take picture of them...
- keyloging all their facebook/twitter/paypal passwords
- get the location of the device with the gps
And use the information to destroy their life before sending the cops in for the picking...
If the device locks completly they would more then likely trow it in a garbage or have somme tech wiz manualy reset/flash it. My main goal is to bait an idiot into using it and raising the difficulty of resetting the device.
Vellius said:
The thing is that i want people to be able to use it or more specifically connect to a wifi allowing me to...
- Remotely take picture of them...
- keyloging all their facebook/twitter/paypal passwords
- get the location of the device with the gps
And use the information to destroy their life before sending the cops in for the picking...
If the device locks completly they would more then likely trow it in a garbage or have somme tech wiz manualy reset/flash it. My main goal is to bait an idiot into using it and raising the difficulty of resetting the device.
Click to expand...
Click to collapse
This strikes me as you wanting to leave a trap allowing you to phish someone's details, more then you wanting to protect your device from theft. Perhaps you are planning to leave the Xoom out for the use of coworkers or fellow students, and harvest their data?
Up until the "keyloging all their facebook/twitter/paypal passwords" you seemed a bit paranoid and draconian, but reasonable...after that, I got a bad feeling about this. Even if you do want it to deal with a possible thief, keylogging their Paypal passwords would make you just as guilty of a crime as the tablet thief...and likely just as open to prosecution.
...leave a trap allowing you to phish someone's details...
Click to expand...
Click to collapse
LOL! i admit it may sound like it at first glance. I dont plan leaving it or go "phishing" like you said. I'm not the kind of having the money to trow 500$ and crossing fingers.
All i want is raise my chances of recovering the device should it get stolen. If it's locked then they will just trow it in a garbage or have someone flash it. If it's unlocked then they can use it allowing me to trace it.
would make you just as guilty of a crime as the tablet thief
Click to expand...
Click to collapse
I dont plan using the data my self... I was thinking more like posting the thief details on 4chan or other sites like these and post banking info free on underground sites. I dont want their money.
You cant blame me wanting to turn the life of a thief into a living hell for stealing from me
actually we can, you're allowing him to be stolen from all because he stole your tablet? Anyway, just flash tiamat rom 2.0 and add all of those apps to the "first install" or something folder and be done with it.
Just because he stole something of yours doesn't mean you should be alright with him being stolen from. An eye for an eye makes the whole world blind dude.
Vellius said:
I dont plan using the data my self... I was thinking more like posting the thief details on 4chan or other sites like these and post banking info free on underground sites. I dont want their money.
You cant blame me wanting to turn the life of a thief into a living hell for stealing from me
Click to expand...
Click to collapse
Actually, we can. That's still considered identity theft to a certain extent thus him stealing a 500$ tablet (which may be illegal but no where near identity theft) and then you posting about it in a public forum, thus incriminating yourself. You're pretty open to prosecution now.
Guide: How to haxor anyone that takes your tablet!
Alright, how you want to do this is by taking your left shoulder and putting it infront of you, running at maximum speed, then colliding with a wall. This guide was made to show you, GROW UP AND DEAL WITH YOUR TABLET BEING TAKEN! There are methods for you to be able to get it back if someone does a factory wipe (Tiamats install on first boot folder comes to mind) but aside from that, you shouldn't really have to worry about this, I mean grow up, people have -cars- stolen every day and not all of them have onstar. Deal with the fact your tablet got stolen, file a police report, and cry yourself to sleep. That is all.
OK, this is getting a bit sketchy here. We're not going to discuss how to commit identity theft on XDA, even if the person who steals the tablet is a criminal.

[Q] Nexus S - Finally got a Tethering letter from AT&T

Before people jump all over this -- I know there are hundreds of threads about how at&t detects tethering and then all the moral-rich folks will get up in arms about paying for a service and to stop stealing... well I dont care. My question is simple:
If AT&T cant detect what APN an android device uses since it all transfers through the primary wireless APN... and the best they can do is say what type of site a mobile device is requesting... how can they say you are tethering?
With apps that mimic other browsers for full site browsing I feel like they really cant prove definitively what I am using. Please correct me if I am wrong.
HoneyNutz said:
Before people jump all over this -- I know there are hundreds of threads about how at&t detects tethering and then all the moral-rich folks will get up in arms about paying for a service and to stop stealing... well I dont care. My question is simple:
If AT&T cant detect what APN an android device uses since it all transfers through the primary wireless APN... and the best they can do is say what type of site a mobile device is requesting... how can they say you are tethering?
With apps that mimic other browsers for full site browsing I feel like they really cant prove definitively what I am using. Please correct me if I am wrong.
Click to expand...
Click to collapse
If they really want to do some packet inspection they could look at something as simple as the UA string or TTL. They could watch for known background services such as AV programs calling home to check for updates or Windows update doing the same.
Well played. I thought that was considered deep packet inspection to know what is requesting what (which I thought they were banned from doing unless authorized by a gov entity)
But I will keep that in mind. I am surprised they pinged me for my 4gb use though -- seriously at&t...seriously... Makes me want to stream hulu 24/7 to truely show a data hog.
HoneyNutz said:
Well played. I thought that was considered deep packet inspection to know what is requesting what (which I thought they were banned from doing unless authorized by a gov entity)
But I will keep that in mind. I am surprised they pinged me for my 4gb use though -- seriously at&t...seriously... Makes me want to stream hulu 24/7 to truely show a data hog.
Click to expand...
Click to collapse
Seems like it's probably being done in some capacity - an interesting read: http://news.cnet.com/8301-30686_3-20107040-266/carriers-may-be-handicapping-cell-phone-networks/
HoneyNutz said:
Well played. I thought that was considered deep packet inspection to know what is requesting what (which I thought they were banned from doing unless authorized by a gov entity)
Click to expand...
Click to collapse
does it really surprise you that at&t would be the company to break a federal law, then play dumb and claim ignorance?? Really?? lol
Entertaining conversation with ATT last night. Basically they stated that I have been using data for consistent periods of time... to which i responded I stream all day long which isn't against the terms. They then said their were pointers that stated I could be tethering. I said please provide me with a time period when one of these pointers occurred so I can check my usage against it. They said they don't have the ability (or willingness?) to do that.
The rep then went on to explain that using bluetooth in my car is also considering tethering
<insert WTF face here>
So apparently if you use one of those radio connectors that lets you play your music in the car..THATS TETHERING. These people are all morons. I was hoping for a legitimate explanation but got none. Basically they said well if nothing changes then i will lose my unlimited plan. I told them if they can tell me what they are seeing beyond consistent data use then I will hunt down what they are seeing and correct it. Its like saying stop walking past that street...but not giving them context to what street.
Sure I am tethering but I want them to tell me WHEN I am tethering. If they cant prove that beyond a reasonable doubt then they seriously need to reevaluate their priorities. Especially considering I max out around 4gb a month. Next month I am streaming netflix 24/7 and not tethering just to mess with them just a little more
i tether my sons ipod all the time, they don't catch that!

[Q] Unusual Camera questions

Hey people reading this! So this is the deal I live in spain and my school is discussing make mobile phones such as android and blackberry allowed in teh school. But there´s a problem in Spain there´s a law that says you aren´t allowed to take a picture of somebody and upload it to internet without there permission. yes dumb I know but that´s the law and the school doesn´t want the students to get int trouble nor do they want to get into legal twists and so on. So my question is there a possibility to develop an app that uses the camera minimal usage like using no intake of light = black. So other apps can´t access the sue of the camera. And have it sync with the schools servers with the latest calender and so on. But the twist is is it possible without root access. I´m not very experienced in the android field but I would appreciate some heads up on this. My head tells me it would be possible on black berry android but not ios.
Thankyou for all your answers in advance, and also thankyou for you taking your time to read this.:good:
Simple no tech answer. Tape a small piece of paper over the lense ,
-------------
I am a dishonest man, and you can always honestly trust a dishonest man to be dishonest. Honestly it's the honest ones you have to watch out for.
I don´t think you understand
xMrArnoldx said:
Simple no tech answer. Tape a small piece of paper over the lense ,
-------------
I am a dishonest man, and you can always honestly trust a dishonest man to be dishonest. Honestly it's the honest ones you have to watch out for.
Click to expand...
Click to collapse
How it would be useful is cause the networks proxy server would send a push notification that autostarts the app and drops the connection to the device if the app was exited/terminated by the user. I know it´s possible to do it the question is, is it possible to do it without root accsess. That´s how schoool keep themselves out of trouble cause you wouldn´t be allowed to use your phone without being connected to the network. There will also be distruptors set around the school so no tele signals can be used which essentially kills of the problem with calls and SMS. Thankyou for your answer anyways tho
laxan96 said:
How it would be useful is cause the networks proxy server would send a push notification that autostarts the app and drops the connection to the device if the app was exited/terminated by the user. I know it´s possible to do it the question is, is it possible to do it without root accsess. That´s how schoool keep themselves out of trouble cause you wouldn´t be allowed to use your phone without being connected to the network. There will also be distruptors set around the school so no tele signals can be used which essentially kills of the problem with calls and SMS. Thankyou for your answer anyways tho
Click to expand...
Click to collapse
There are some problems with this logic:
1.) The connection to the device will most likely be a wi-fi connection, therefore killing that connection will not stop someone from uploading a picture using the mobile network
2.) You are talking about the school setting up cell disruptors around the campus. You might want to check whether this is legal with the laws in your country, as here in the US it is a felony to tamper with the cell networks using any sort of cell network disruptor.
3.) Since the camera can be used without a network, what is to stop someone from taking a picture of someone, then going home to upload it?
Now, to answer your questions, we would need more information. Are these devices being provided by the school, or are they BYOD (students bring their own devices)? If they are provided by the school, you can create a custom rom that does not have any assets for the camera, therefore any camera app would be forced to close, as they can't access the resources it needs. This would require root access. If it is BYOD, you face a much larger issue as forcing students to install an app that could potentially alter data on their devices might be in conflict with privacy laws in place in your country. Again, you would have to conduct more research into the legal issues that are brought up.
syung said:
There are some problems with this logic:
1.) The connection to the device will most likely be a wi-fi connection, therefore killing that connection will not stop someone from uploading a picture using the mobile network
2.) You are talking about the school setting up cell disruptors around the campus. You might want to check whether this is legal with the laws in your country, as here in the US it is a felony to tamper with the cell networks using any sort of cell network disruptor.
3.) Since the camera can be used without a network, what is to stop someone from taking a picture of someone, then going home to upload it?
Now, to answer your questions, we would need more information. Are these devices being provided by the school, or are they BYOD (students bring their own devices)? If they are provided by the school, you can create a custom rom that does not have any assets for the camera, therefore any camera app would be forced to close, as they can't access the resources it needs. This would require root access. If it is BYOD, you face a much larger issue as forcing students to install an app that could potentially alter data on their devices might be in conflict with privacy laws in place in your country. Again, you would have to conduct more research into the legal issues that are brought up.
Click to expand...
Click to collapse
Oh it is legal there and may be come legal here if things don't change soon. That same law will becoming to us soon don't doubt it. With the privacy concerns coming up we will see this sooner or later.
No to answer the OP. No you won't be able to do this without root. There are some companies that sell devices without cameras just for this purpose as alot of business don't allow camera phones in the building. That maybe you other option.
Wayne Tech Nexus
zelendel said:
Oh it is legal there and may be come legal here if things don't change soon. That same law will becoming to us soon don't doubt it. With the privacy concerns coming up we will see this sooner or later.
No to answer the OP. No you won't be able to do this without root. There are some companies that sell devices without cameras just for this purpose as alot of business don't allow camera phones in the building. That maybe you other option.
Wayne Tech Nexus
Click to expand...
Click to collapse
Are you referring to the use of cell disruptors? I highly doubt that this would ever become legal in the states, as the potential for abuse is too great. There is also other concerns that these can be used against law enforcement to block their communication, which could be bad during instances of conducting a search warrant, or to block emergency communication, which is why the use of cell disruptors is prohibited by the FCC in the first place.
syung said:
Are you referring to the use of cell disruptors? I highly doubt that this would ever become legal in the states, as the potential for abuse is too great. There is also other concerns that these can be used against law enforcement to block their communication, which could be bad during instances of conducting a search warrant, or to block emergency communication, which is why the use of cell disruptors is prohibited by the FCC in the first place.
Click to expand...
Click to collapse
We will see. I already keep 2 one in my car and one in my kids car. Activated when the car starts. If they do become legal completely I am sure that law enforcement will have other means.
Wayne Tech Nexus
Answering your questions
syung said:
There are some problems with this logic:
1.) The connection to the device will most likely be a wi-fi connection, therefore killing that connection will not stop someone from uploading a picture using the mobile network
2.) You are talking about the school setting up cell disruptors around the campus. You might want to check whether this is legal with the laws in your country, as here in the US it is a felony to tamper with the cell networks using any sort of cell network disruptor.
3.) Since the camera can be used without a network, what is to stop someone from taking a picture of someone, then going home to upload it?
Now, to answer your questions, we would need more information. Are these devices being provided by the school, or are they BYOD (students bring their own devices)? If they are provided by the school, you can create a custom rom that does not have any assets for the camera, therefore any camera app would be forced to close, as they can't access the resources it needs. This would require root access. If it is BYOD, you face a much larger issue as forcing students to install an app that could potentially alter data on their devices might be in conflict with privacy laws in place in your country. Again, you would have to conduct more research into the legal issues that are brought up.
Click to expand...
Click to collapse
zelendel said:
Oh it is legal there and may be come legal here if things don't change soon. That same law will becoming to us soon don't doubt it. With the privacy concerns coming up we will see this sooner or later.
No to answer the OP. No you won't be able to do this without root. There are some companies that sell devices without cameras just for this purpose as alot of business don't allow camera phones in the building. That maybe you other option.
Wayne Tech Nexus
Click to expand...
Click to collapse
To answer you question yes this is a BYOD type of deal and how the school are going to keep themselves out of trouble, is that you aren´t allowed to use a cell phone without being connected to the network. The cell disruptors are legal and the privacy concerns are also green since there is ofc going to be a terms & conditions agreement to accept or decline the first time you open up the application. Ina ll honesty the school just wanna cover there asses so they don´t have problems in the future. So it´s not there problem anymore if someone kills the app and the phone disconnects from the network and they take a picture. Most people don´t use an autostart manager so it won´t be a huge problem either.
Now you say that it isn´t possible to do this without root access then we got an issue that isn´t solvable. Or is it just to complicated to develop? From what i understand they have the resources to do it if it´s possible.
Why I got involved in all this was cause I had kinda the same ideas and I was talking to one of the teachers and he told me that the principal teacher had similar ideas. So I went and talked to him, my thought process were let´s put our ideas together. Then he told me about this issue. And finally why I´m asking you all this is cause I don´t have any experience in programming alltho I do have a lot of experience with both computers and cell phones.
Thankx yet again for all your replies so far I appreciate it a lot!

HACKED!!!

so this is just a general message to all android users. something everyone SHOULD know about but most (non-tech) smartphone users fall short and victim to... the reason im posting this is because the wifes phone has been acting wierd lately, by wierd i mean apps have been opening up by themselves, internet browsers opened to websites that she would never go to, wallpapers keep getting changed, phone randomly being turned off, all of this happening most of the time while shes at work. now just so we know her wasnt rooted till two days ago which i did to see if maybe there was just something wrong with the stock crap that she had. turns out this wasnt the case. so i decided to post this just to make people more aware and hopefully prevent this from happening to anyone else.
what you can do to prevent this invasion
first and foremost PUT A PASSWORD ON YOUR PHONE!!! even if you have nothing to hide this will help from major things like bank accounts and passwords from emails getting stolen!
make the password hard to guess by this i dont mean use your kids names or birthdays but something no one would ever guess and use a combination of numbers and letters and never use the same password twice!
change your password atleast once a week! this will help to keep potential hackers guessing and make it harder for them to figure it out and hey if they figure it out this week they may not next week.
try to stay off of unsecured wifi networks, most routers these days have a firewall built in and if the network is protected by a password this will make it that much harder for a hacker to get into your files!
make sure you have your bluetooth set up so that other devices can only see you if they are paired or just keep it turned off when its not being used! same goes for NFC, Smart Beam, Bump, things of that nature...
dont let browsers like firefox, google chrome, e.g. save password this will also help to prevent the hacker from getting access to your email's and bank accounts! also a good idea to make sure you sign out of apps when you close them instead of leaving them open.
i hope this helps anyone else who may have had or has a problem with this from it ever happening again!
Common sense, that's all you need.
Changing your password once a week is a bit drastic in my opinion.
Sent from my SGH-T999 using xda premium
Just don't install wonky apps and dont connect to public networks. As simple as that.
Does setting a password really block remote access to your phone? I thought it only blocked a user from operating the device. I think you have to set up full encryption to protect yourself from invasions. Also. Google offers 2 step verification from the play store, which makes your accounts more secure.
So how did someone get remote access to the device? Maybe if you told us the cause and how it happened it would help the rest of us to not get caught in that situation.
if this is happening mainly at work is it possible she's using there wifi and if she is how do you know a fellow employee is not hacking in to her phone.
phatmanxxl said:
So how did someone get remote access to the device? Maybe if you told us the cause and how it happened it would help the rest of us to not get caught in that situation.
Click to expand...
Click to collapse
Unfortunatly I dont know the answer to this question as its her phone. I know she doesnt have any "remote access" apps installed.
biker4033 said:
if this is happening mainly at work is it possible she's using there wifi and if she is how do you know a fellow employee is not hacking in to her phone.
Click to expand...
Click to collapse
no she has confermed that she doesnt use the wifi at work doesnt even have it in her connection list so no fellow employee is doing it even though I suspect this one guy that seems to sit up there all day just for the free wifi, even though wifi isnt the only way a hackwr can get into ur files its just easier.
sauprankul said:
Just don't install wonky apps and dont connect to public networks. As simple as that.
Does setting a password really block remote access to your phone? I thought it only blocked a user from operating the device. I think you have to set up full encryption to protect yourself from invasions. Also. Google offers 2 step verification from the play store, which makes your accounts more secure.
Click to expand...
Click to collapse
setting a password doesnt block total access no but it would help to detur hackers and yes encryptions would prolly be better! Disnt even thing about that!!!
Da Kine said:
Common sense, that's all you need.
Changing your password once a week is a bit drastic in my opinion.
Exactly common sense... unfortunatly the world is filles with retards which was the main point of this post. Smartphones where made for "unfortunatly" stupid people... yes changing the password may be a bit drastic but maybe it would detur said hacker long enough to bore him with trying to figure it out and make him leave u alone... :/
Sent from my SGH-T999 using xda premium
Click to expand...
Click to collapse
This message was sent from the a satellite in the sky.
Most of it is just common sense. Who leaves open connections unattended, anyway? Bloody hell, I turn 3G off when I'm not using it... (Mainly for battery life and the near border, but the fact stands.)
As for the passwords. Once a week is more than a bit paranoid, once every three months is a better aim.
And Don't use ridiculous sentimental passwords, such as your pets or family names and birth dates. A quick Facebook search and some logical thinking is all that's needed to figure out your password. You do not wish to know how many times I've had to do it for people who've forgotten theirs or when I needed access to a computer without the owner present. It's laughably easy, people are far too simple for their own good.
Another stupid thing I've seen people do: Leave their phone unattended in good faith or sheer negligence. Leaving your phone on your desk, or in your bag near your desk, when you go grab a new cup of tea, print something, speak with someone or visit the loo is just asking for someone else to mess with your phone. People can't be trusted. Nobody! Also, do not lend it to someone without supervision, Do Not Let It Out Of Your Sight!
I suspect that is also how your wife got her phone hacked; she probably left it in her bag or on her desk for a few minutes as she went to do something out of the line of sight.
I don't know if someone has stated this already but something that can also help out a lot and I know that a lot of people do it including myself on one or two occasions is staying legit. Meaning do not go online looking for an app for free to save yourself a dollar or so. Just pay for the app because it took time to develope and the creator deserves the donation, not to mention the apk could contain malware!
Sent from my SAMSUNG-SGH-I317 using xda premium
ShadowLea said:
Most of it is just common sense. Who leaves open connections unattended, anyway? Bloody hell, I turn 3G off when I'm not using it... (Mainly for battery life and the near border, but the fact stands.)
As for the passwords. Once a week is more than a bit paranoid, once every three months is a better aim.
And Don't use ridiculous sentimental passwords, such as your pets or family names and birth dates. A quick Facebook search and some logical thinking is all that's needed to figure out your password. You do not wish to know how many times I've had to do it for people who've forgotten theirs or when I needed access to a computer without the owner present. It's laughably easy, people are far too simple for their own good.
Another stupid thing I've seen people do: Leave their phone unattended in good faith or sheer negligence. Leaving your phone on your desk, or in your bag near your desk, when you go grab a new cup of tea, print something, speak with someone or visit the loo is just asking for someone else to mess with your phone. People can't be trusted. Nobody! Also, do not lend it to someone without supervision, Do Not Let It Out Of Your Sight!
I suspect that is also how your wife got her phone hacked; she probably left it in her bag or on her desk for a few minutes as she went to do something out of the line of sight.
Click to expand...
Click to collapse
This was already stated.... you basicly reiterated
what I already said but made it sound smarter... and she works at a fast food joint so it stays in her pocket or in the locked car when charging...
XBearingArmsX said:
I don't know if someone has stated this already but something that can also help out a lot and I know that a lot of people do it including myself on one or two occasions is staying legit. Meaning do not go online looking for an app for free to save yourself a dollar or so. Just pay for the app because it took time to develope and the creator deserves the donation, not to mention the apk could contain malware!
Sent from my SAMSUNG-SGH-I317 using xda premium
Click to expand...
Click to collapse
I must admit I am one of rhose people that downloads the .apk but not to one up google play or the dev but simply cus google doesnt give u but 15 mins to get a refund and lets face it thats no where near enough time to test an app to see if its something that will suit ones needs, so I download the apk file to see if its something that I would wanna keep and if it is then I go back whrn I have the extra cash to buy said apps...
This message was sent from the a satellite in the sky.
Rookie407 said:
I must admit I am one of rhose people that downloads the .apk but not to one up google play or the dev but simply cus google doesnt give u but 15 mins to get a refund and lets face it thats no where near enough time to test an app to see if its something that will suit ones needs, so I download the apk file to see if its something that I would wanna keep and if it is then I go back whrn I have the extra cash to buy said apps...
This message was sent from the a satellite in the sky.
Click to expand...
Click to collapse
This is probably where your malware came from. I'd suggest doing a factory reset and stop downloading pirated apps. If you want a refund after the 15 minute trial period just email Google or the developer, they are usually pretty good at giving refunds.
Sent from my SGH-I747M using xda app-developers app
gc84245 said:
This is probably where your malware came from. I'd suggest doing a factory reset and stop downloading pirated apps. If you want a refund after the 15 minute trial period just email Google or the developer, they are usually pretty good at giving refunds.
Sent from my SGH-I747M using xda app-developers app
Click to expand...
Click to collapse
I know it wasnt the downloading of apps as my wife is one of those non-techy people ive been talking about... it could have however been from her dl'ing music from unreliable websites.
This message was sent from the a satellite in the sky.
If anything suspicious was happening to my phone I would immediately wipe/flash a new rom.
Banking apps are pretty risky too if they are easily logged into.
nmur said:
If anything suspicious was happening to my phone I would immediately wipe/flash a new rom.
Banking apps are pretty risky too if they are easily logged into.
Click to expand...
Click to collapse
Sadly if you were hacked you would need to do alittle more then just wipe and reflash, u would need to delete all email accounts tied to said phone and apps used in the past + get a new number basicly start EVERYTHING new!
This message was sent from the a satellite in the sky.
If u happen to know the hackers ip address and or phone number you could always call your provider and have them block it also
This message was sent from the a satellite in the sky.
I could recommend to you wifi protector against hackers via wifi.. and also an antivirus for safety purpose
Wifi protector is available here in xda..
Sent from my A618 TV Duo using xda app-developers app
FROST_wyrm said:
I could recommend to you wifi protector against hackers via wifi.. and also an antivirus for safety purpose
Wifi protector is available here in xda..
Sent from my A618 TV Duo using xda app-developers app
Click to expand...
Click to collapse
Didnt know there was an app like that ty for this post! And we have lookout so we are covered on the anti virus part...
This message was sent from the a satellite in the sky.
That app was actually an anti.wifikill and for other apps that will try to access your phone just like hacking your fb account and others.
Sent from my A618 TV Duo using xda app-developers app
Thanks
nice tip..gona take ur advice
Talking about being hacked, I fell victim to this too a year ago and I was able to put a stop to it. But first I'll explain my ordeal. One night I started getting calls from friends very pissed off that I kept calling them at 1 and 2 in the morning and waking them up and hanging up the phone. I kept telling them I swear I never called you. This went on to the point I lost a few friends until I saw it happen right before me eyes. Bet I know what your thinking, Pocket dialing? NOPE. My phone was dialing on it's own while sitting on the table at night charging.
So here it is 1 AM in the morning and I notice the light on my LG Optimus's screen coming on. I walked over and took a look, and to my surprise!! The darn thing was opening up the dial pad, moving to callers on my list and calling each one. This freaked me out. I thought I had ghost in the house. haha.
I reported this to Virgin and yea right, not much help. They must of thought I was on drugs. I decided to research this and low and behold, others were having this same problem with all models of phones. So someone did something about this and written an App called, "Called Confirmed Code." Nice thing was every time my phone attempted to make a phone call on its own, a password box appears asking for the pin number. Wrong pin rejects the call and closes the dial-er.
So I installed in hopes to find out if this is a glitch in Froyo 2.2.1 or a hacker. It happened once again. Phone woke up on its own that night and I watched in horror as the password box came up and someone was attempting to guess the pin number. each time he failed, the dial-er closed. I knew now someone was in my phone.
Did more research and read that there are open ports used a remote OTA Virgin uses to update your software over the air was being exploited and allowing hackers to fool my phone into thinking I had updates and allowing software to install on the phone. I took my phone to my local police dept and have a detective look into it and sure enough, it was a piece of software that got into the phone through the OTA port. Another words, What I though was a legit security update was nothing more then a backdoor installed.
So, I made copies of the police reports and faxed everything to Virgin's headquarters and weeks later, said there is no proof such a thing can happen.
WHAT!! Weather or not this is possible guys, it happen to me and that's what pushed me to root and flash my phone. Never did update through the OTA again. That's o.k. because Virgin Mobile did away with OTA updates because why??? Exploits. They still wont admit it today. And it doesn't stop there. That's my story how I got hacked. Maybe your's is different.
Do you always turn your wifi on?
hackers can only hack you if you are connected
No harsh feelings please, smile ka din

Blackphone opinions???

I ran into this article today and I wanted to see what the people on XDA think about it. This company is working on a Android phone that it's primary purpose is to protect the users privacy.
Here's the link: http://mobile.theverge.com/2014/1/1...nn-silent-circle-geeksphone-blackphone-launch
Read the article, watch the video and let me know what you think.
Sent from GNote 3 rooted with kingo.
Saw news about this and came here to seek out does any1 have opinions about it.
i wonder, does the safety come from hardware or is it the OS what makes this so safe.. if it is the OS, i hope some1 smart enough makes custom rom for this.
I really don't see how this phone is gonna change anything. Apps and websites have keyloggers, You still need a carrier to get service from and they have control of all your traffic. What about radio frequencies that can be intercepted, IP addresses, GPS chips sending signals to satellites, baseband and firmware are connected thru the cell towers of the carrier. I'm starting to think this phone is a scam.
They said nothing about how they're dealing with all this. They are probably using the whole NSA scandal momentum to fool people into believing they are safe if they buy this phone.
Sent from GNote 3 rooted with kingo.
I saw an article about this venture also. This is a good thing. If he gets press about this phone, maybe other venders will take notice and start building in privacy features as well. :good:
I don't see the need for new hardware here. If they really want to secure something, they could create a mod for Android, that could be installed on a variety of devices for example.
Besides, if they encrypt telephony, messages and stuff, they will need to be decrypted again - but the question is where and how? I bet they won't have any hardware encryption module and even if they do, it will make communication with other phones impossible. Software encryption means other phones will need to install some additional software to communicate with the Blackphone and it might be a bit inconvenient.
orangek3nny said:
I don't see the need for new hardware here. If they really want to secure something, they could create a mod for Android, that could be installed on a variety of devices for example.
Besides, if they encrypt telephony, messages and stuff, they will need to be decrypted again - but the question is where and how? I bet they won't have any hardware encryption module and even if they do, it will make communication with other phones impossible. Software encryption means other phones will need to install some additional software to communicate with the Blackphone and it might be a bit inconvenient.
Click to expand...
Click to collapse
That's a good point. how a non blackphone device is gonna decipher the encryption? how is it going to get the key? How can a non blackphone device even a establish the same "secure" connection?
Sent from GNote 3 rooted with kingo.
Andronote3 said:
That's a good point. how a non blackphone device is gonna decipher the encryption? how is it going to get the key? How can a non blackphone device even a establish the same "secure" connection?
Sent from GNote 3 rooted with kingo.
Click to expand...
Click to collapse
I think you are missing the point. As you or I may not NEED this kind of security, I'm sure you can think of someone who does.
Obviously, there would be two levels of privacy/security... Connections between 2 black phones and everything else. So who utilize a black phone? How about corporations and governments? Law offices, professional sports teams, or doctors and hospitals.
Now, even though I do not NEED this, if it was affordable, I would heavily consider it.
Sent from my Nexus 5 using XDA Premium 4 mobile app
JamieFL said:
I think you are missing the point. As you or I may not NEED this kind of security, I'm sure you can think of someone who does.
Obviously, there would be two levels of privacy/security... Connections between 2 black phones and everything else. So who utilize a black phone? How about corporations and governments? Law offices, professional sports teams, or doctors and hospitals.
Now, even though I do not NEED this, if it was affordable, I would heavily consider it.
Sent from my Nexus 5 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
I understand what you are saying and I completely agree with you. It looks like a device that corporations and the government would "benefit" more than regular users. Either way, It won't fix 90% of all the problems people face when it comes to staying safe against privacy/security breaches. I truly believe that they are using the whole NSA scandal momentum to make people believe that they are safe/secured if they buy this phone.
P.S: Nice quotes.
I saw this phone.
It isn't an answer to every privacy issue.
What its an answer to is, not having to agree to an android apps permissions to gain access to the app.
These apps don't make their money off the app sales, they make their money sending information to retailers.
Retailers own the world.
The question I still pose is... What's wrong with retailers knowing where you are?
There's nothing you can do about the government. They won't let us make things that are government proof, nor would they (The retailers ) want to.
But, what's wrong with these apps fine tuning my specific desires to my Location?
You can't stop people from stealing your identity. The hacker/firewall paradox is, for every walk you build, they will build a taller ladder.
The only thing really close to full privacy in data sending is, that light source that sends data. It's a light bulb, and the light has data in it, a sensor receives it. It can be held within the walls of a room. But that only effects a closed circuit type system. If that light source is connected to the Internet, then game over.
Why do you think record companies and movie companies keep their computer systems offline and deal in only physical media? A hacker will get into anything I'd you give him the tools and time.
This phone gives a sense of security that is non existant
You've Just Been Tapatold ♧♢dbombROMv3.4♤♡
My Theme ( Taking Requests )
http://forum.xda-developers.com/showthread.php?t=2658527
SaintCity86 said:
I saw this phone.
It isn't an answer to every privacy issue.
What its an answer to is, not having to agree to an android apps permissions to gain access to the app.
These apps don't make their money off the app sales, they make their money sending information to retailers.
Retailers own the world.
The question I still pose is... What's wrong with retailers knowing where you are?
There's nothing you can do about the government. They won't let us make things that are government proof, nor would they (The retailers ) want to.
http://forum.xda-developers.com/showthread.php?t=2658527
Click to expand...
Click to collapse
nailed it
The problem is Android itself. Thanks to Xprivacy, it's a lot easier to control what leaks out of your device. Personally I'd rather see more encryption mechanisms than this. FFOS seems to be on the right path
There Is nothing you can do to stop identity theft.
Nothing.
And there is nothing you can do to do the government from tapping your lines.
You want a safer form of communicating, send Voice recordings over text.
That's an entirety separate warrant, and harder to get. Other than that. It's hopeless
You've Just Been Tapatold ♧♢dbombROMv3.4♤♡
My Theme ( Taking Requests )
http://forum.xda-developers.com/showthread.php?t=2658527
d1rX said:
FFOS seems to be on the right path
Click to expand...
Click to collapse
I think you mean FOSS[1] = Free and Open Source Software. Anyway, I fully agree, in fact, that is the ONLY way. Closed source encryption programs can't be 100% trusted by definition. There might be security flaws, intentional or not.
Anyway. the NSA has backdoors to every operating system[2], so if you're really a target, they get you. Also, there are more than enough security holes in the layers under the operating system[3].
I think what these phones are supposed to do is bring end-to-end encryption for e.g. industry users so they don't get spied on. The NSA and the US government can get their hands on encryption keys for servers like in Lavabits case[4]. But this is the transport encryption. The data is, if not otherwise secured, available in plain text on the servers of providers. This also means, the officials can decrypt ANY data that comes in, not just the one of actual targets.
Now, end-to-end encryption makes sure even the provider can't see your data in plain text because you encrypt and decrypt it on your device. What Blackphone does is, it uses the apps from Silent Circle, a closed source encryption programm for VoIP and messages. Although the owner of that company is the well trusted cryptographer Phil Zimmerman, one can never be sure.
That's a good point. how a non blackphone device is gonna decipher the encryption? how is it going to get the key? How can a non blackphone device even a establish the same "secure" connection?
Click to expand...
Click to collapse
You can install and use Silent Circle on any(ok, a lot of) phone(s). Just make sure you don't have additional malicious software installed. Any yes, it costs $100/year or so. And you get a subscription for SpiderOak, sort of a Dropbox but they encrypt the data before uploading. Any you get a better overview over what app uses what permissions. A few extra tweaks basically.
Alternative: Android Phone with CyanogenMod/Replica. TextSecure for messages, RedPhone for VoiP and owncloud for files. Way cheaper too, and open source, also made by well respected cryptographers like Moxie Marlinspike[5]
[1] de.wikipedia.org/wiki/Free/Libre_Open_Source_Software
[2] zerohedge.com/news/2013-09-08/nsa-has-full-back-door-access-iphone-blackberry-and-android-smartphones-documents-re"]backdoors to every operating system
[3] forum.xda-developers.com/showthread.php?t=2530044
[4] techdirt.com/articles/20131002/17443624734/lavabit-tried-giving-feds-its-ssl-key-11-pages-4-point-type-feds-complained-that-it-was-illegible.shtml
[5] thoughtcrime.org
if they want to spy on us they can ... that's it...
More info?
Hi all - looking for more info on this phone - just joined XDADev to post this.
Specifically, what brands might this hardware be found under? Know it's a Tinno S8515 but have yet to find out anything about that; seems like Tinno generally makes phones for other companies?
Any help is appreciated!
Best,
-Cx
:cyclops::cyclops::cyclops:
The greatest challenge to securing a phone is not the OS or the apps running on it, it's the baseband. We have known for well over 30+ yeasr how to harden a *nix based system (like AOS), but we haven't even started to question WTF is going on in the closed source 10-100 MB baseband RTOS, which have fulll access to your entire FS and the most important phone operations, like SIM, RF, EMMC etc etc.
Only forcing the corrupt modem OEM's to release the sources of the Baseband firmware could improve the situation. This will never happen, unless there is another baseband Snowden out there somewhere...
We already know that the BP/CP FW is extremely insecure, and relies almost solely on obscurity as their main mechanism of protection. If this was not the case, the iPhone unlock developers would have been fekked long time ago, and the rest of us would sit around with SIM/network locked bricks filling up our bookshelves.
Unfortunately the greatest majority of the millions of XDA members are completely carefree about this issue and are only happy as long as they can "tweak some ROMs". So this will never be the place to find/see any serious baseband reversing, no matter how important it would be from a security standpoint.
So to summarize, your Qualcomm baseband will continue to send your exact GPS coordinates to the network provider at will, without you ever knowing, and without anyone (here) caring. So goes for the FM transmitter that is part of the baseband FW in both Intel and Qualcomm based phones. Do you have control over that? Never.
Only a serious long term spectrum analysis study could reveal whats going on there, where and when you're not (able) to watch.
This phone is the biggest scam lol.
hyshys said:
Saw news about this and came here to seek out does any1 have opinions about it.
i wonder, does the safety come from hardware or is it the OS what makes this so safe.. if it is the OS, i hope some1 smart enough makes custom rom for this.
Click to expand...
Click to collapse
I was wondering this too. If it is only the rom (just like the $1300 pwnphone). It should be port-able
iliass01 said:
I was wondering this too. If it is only the rom (just like the $1300 pwnphone). It should be port-able
Click to expand...
Click to collapse
Blackphone. - no hardware security, just software, and most of it is NOT open source. Some here (@SaintCity86 , @repat) has their points, and they are mostly right! If you want some security (and I said some!!!), then get rid of most of your apps (permission check and some common sense), all Google apps (yes, all of them), install a paid (not free) and high quality VPN software, don't use the phone feature (only data sim-prepaid), get an internet phone number (with no personal details), use end to end encrypted apps to make calls and send and receive texts, install Xposed and Xprivacy (or any other variant) and limit even more the apps you have on your phone. Don't use it as your only phone, but as a secure device and share your number and other infos with trusted people! In this case, maybe, you will be able to add some layer of security and actually be able to use it. And most important, don't give your phone in the hands of anyone! It is a bit paranoid, but it's the only way! But, don't be fooled! You can have some security, only if you stay under the radar, and don't gain some attention. If yes, then you have no luck! Personally, I have seen the Blackphone, and tested it for some time, and I am not really convinced it can be trusted.
Good luck!
Andronote3 said:
I really don't see how this phone is gonna change anything. Apps and websites have keyloggers, You still need a carrier to get service from and they have control of all your traffic. What about radio frequencies that can be intercepted, IP addresses, GPS chips sending signals to satellites, baseband and firmware are connected thru the cell towers of the carrier. I'm starting to think this phone is a scam.
They said nothing about how they're dealing with all this. They are probably using the whole NSA scandal momentum to fool people into believing they are safe if they buy this phone.
Sent from GNote 3 rooted with kingo.
Click to expand...
Click to collapse
Would just like to correct this common misconception, GPS is one way.
GPS receivers as found in your phones, or navigation systems, receives GPS signals only. Nothing gets sent to satellites in this process, the algorithm is purely one way.

Categories

Resources