http://bgr.com/2013/08/02/fbi-android-microphone-hack/
Anyone know how this works or how to block it?
Sent from my Nexus 4 using xda app-developers app
umm wow. that is crazy
I know right. I had no idea something like this was possible.
Sent from my Nexus 4 using xda app-developers app
How the hell could google decline to comment?!?! This story needs to blow up big time and make google have to respond!
Bomb bomb terrorist attack paroxide jihaad president ala Iran Jew plot bin laden Arabian afganistan ...bla bla bla 911 77 government Cameron Obama explosive detonator kill kidnap ....
I wonder if my mic has been switched on?
As long as NSA does not also have this capability I'm ok. FBI still has to get a warrant to spy on someone like this similar to getting a phone tap.
Sent from my Nexus 4 using xda app-developers app
FBI still has to get a warrant
curiousbob said:
As long as NSA does not also have this capability I'm ok. FBI still has to get a warrant to spy on someone like this similar to getting a phone tap.
Sent from my Nexus 4 using xda app-developers app
Click to expand...
Click to collapse
And elves live in my garden too.
The government does what ever it wants. The Constitution has become no more than a speedbump to government employees.
anyone?
Any developers have actual thoughts on this question? If the FBI can do it, it stands to reason that anyone can do it. It would be good to know if this exploit can be blocked by root users.
Surprised that XDAers don't want to figure this one out.
Pretty conformist for a site for custom software.
evilmrt said:
Surprised that XDAers don't want to figure this one out.
Pretty conformist for a site for custom software.
Click to expand...
Click to collapse
How do you know someone is not already working on it? You have to understand that this type of coding would be system wide and hidden very well. It may very well take an entire re-write of the whole OS to remove. Also this is not a custom software site. It is a site to help people learn to do things on their own.
zelendel said:
How do you know someone is not already working on it?
Click to expand...
Click to collapse
You'd know better than I would. Are they?
evilmrt said:
You'd know better than I would. Are they?
Click to expand...
Click to collapse
I wouldn't know any more then you as I am not working on it. This is something that would be kept close to the chest as the min it was released it would be patched. Mainly now that they are using free lance hackers to look for exploits.
Wayne Tech Nexus
It has to be switched on somewhere. Even if it is system wide...
Htm.... I wonder how much Apple paid for this article....
Sent from my SGH-I337 using xda premium
X10D3 said:
It has to be switched on somewhere. Even if it is system wide...
Htm.... I wonder how much Apple paid for this article....
Sent from my SGH-I337 using xda premium
Click to expand...
Click to collapse
Pretty sure Apple has the same thing built into iOS.
edit:
@jcase might be able to give some insight as to how hard this would be to circumvent,
I would think you'd need a kernel level manual override of drivers where x driver cannot be activated under any circumstance unless you manually allow it, kind of like asking for SU permissions, then you use a third party dialer that you personally coded or something of the sort.
I mean you'd basically have to go through the AOSP code line by line I would think to actually locate this.
orangekid said:
Pretty sure Apple has the same thing built into iOS.
edit:
@jcase might be able to give some insight as to how hard this would be to circumvent,
I would think you'd need a kernel level manual override of drivers where x driver cannot be activated under any circumstance unless you manually allow it, kind of like asking for SU permissions, then you use a third party dialer that you personally coded or something of the sort.
I mean you'd basically have to go through the AOSP code line by line I would think to actually locate this.
Click to expand...
Click to collapse
They do say that it's being done by hackers. Usually by an exploit, spyware, etc. There may not be any bugs in AOSP, and it very well could be in carrier/manufacturer programming.
X10D3 said:
They do say that it's being done by hackers. Usually by an exploit, spyware, etc. There may not be any bugs in AOSP, and it very well could be in carrier/manufacturer programming.
Click to expand...
Click to collapse
I wouldn't call it a "bug" if it's being purposely put into the code.
What I am getting is it's being done by the FBI, not "hackers."
http://propakistani.pk/2013/08/02/f...r-android-phone-mic-or-laptop-cameras-report/
"Hacker" seems to just be any word the media uses for anyone who does something questionable on a computer or phone.
I use a Nexus 4 (pure AOSP code) and I would think they could do this to my phone just as easily as say an SGS4 or what have you..
This article seems to indicate that it's not a deliberate backdoor, but an actual exploit that's giving them the mic access. They also mention laptops (obviously not running Android) so I think it's more likely they're just hacking these platforms and using their new privileges to turn the mic on.
Also if you think about it, the mic isn't a restricted device on Linux or Windows. You can touch it without any special permission, so they wouldn't have to completely own your device to listen in on you.
meangreenie said:
Bomb bomb terrorist attack paroxide jihaad president ala Iran Jew plot bin laden Arabian afganistan ...bla bla bla 911 77 government Cameron Obama explosive detonator kill kidnap ....
I wonder if my mic has been switched on?
Click to expand...
Click to collapse
Best laugh I've had all day.
Thank you
Sent from my LG-E980 using xda premium
orangekid said:
Pretty sure Apple has the same thing built into iOS.
edit:
@jcase might be able to give some insight as to how hard this would be to circumvent,
I would think you'd need a kernel level manual override of drivers where x driver cannot be activated under any circumstance unless you manually allow it, kind of like asking for SU permissions, then you use a third party dialer that you personally coded or something of the sort.
I mean you'd basically have to go through the AOSP code line by line I would think to actually locate this.
Click to expand...
Click to collapse
I call BS on any FBI microphone backdoor without hard evidence. Possibility of state sponsored malware that does it? Certainly exists. Don't install random apps you dont trust, stay away from malware and use an international carrier unbranded phone that gets updates frequently (S4 (GT-i9500) and unbranded HTC One likely fit this description, so do GPE devices). Also, most custom roms are horribly outdated as far as security patches go.
jcase said:
I call BS on any FBI microphone backdoor without hard evidence. Possibility of state sponsored malware that does it? Certainly exists..
Click to expand...
Click to collapse
This wouldnt surprise me after reading that they are using free lance hackers to find exploits in different OS.
Related
There’s a new threat in town. And by town, I mean China. Malware authors have created a bit of code called Geinimi that hitchhikes on existing apps when they are redistributed on third-party markets. At the moment it doesn’t do much but lurk, but its capabilities resemble that of a botnet server, according to Lookout, a company that makes antivirus software for Android.
So far the code has been identified as being able to send out your location, IMEI, app list, and to download apps. There could be more. Users outside of China are apparently at little risk, and at any rate your security is in your own hands: if you’re downloading a to-do list app and it wants access to your GPS and calling functions, that’s probably bogus.
Stay safe out there, kids.
Not to sure if this has been posted or not.
This is very disturbing...anything to get info on people..
I don't install antiviruses on my phone,because android is based on linux, and linux doesn't have viruses because of the strong kernel, plus its semi possible that you will have a virus on your phone.:thumbup:
Sent from my GT-S5660 using xda premium
Octane70 said:
There’s a new threat in town. And by town, I mean China. Malware authors have created a bit of code called Geinimi that hitchhikes on existing apps when they are redistributed on third-party markets. At the moment it doesn’t do much but lurk, but its capabilities resemble that of a botnet server, according to Lookout, a company that makes antivirus software for Android.
So far the code has been identified as being able to send out your location, IMEI, app list, and to download apps. There could be more. Users outside of China are apparently at little risk, and at any rate your security is in your own hands: if you’re downloading a to-do list app and it wants access to your GPS and calling functions, that’s probably bogus.
Stay safe out there, kids.
Not to sure if this has been posted or not.
Click to expand...
Click to collapse
Its not a new threat, lookouts announcement of it was in 2010 and in 2011 it was picked up by more press but is actually a two year old threat which afaik never did cause any problems but is checked for by google and therefore probably other app distributors.
Dave
( http://www.google.com/producer/editions/CAownKXmAQ/bigfatuniverse )
Sent from my LG P920 using Tapatalk
I hear Android 5 (JellyBean) includes some kind of in-built malware protection.
Gotta wonder why...
Sent from my unrooted DroidX using Tapatalk
Nate2 said:
I hear Android 5 (JellyBean) includes some kind of in-built malware protection.
Gotta wonder why...
Sent from my unrooted DroidX using Tapatalk
Click to expand...
Click to collapse
Not heard that, would be surprised if it did as google use bouncer to combat the malware problem.
Dave
( http://www.google.com/producer/editions/CAownKXmAQ/bigfatuniverse )
Sent from my LG P920 using Tapatalk
Pancakes_Gio said:
I don't install antiviruses on my phone,because android is based on linux, and linux doesn't have viruses because of the strong kernel, plus its semi possible that you will have a virus on your phone.:thumbup:
Sent from my GT-S5660 using xda premium
Click to expand...
Click to collapse
Wrong in many ways, it doesn't have viruses because the market is next to non-existent and getting a virus on an android device is more and more common.
Welp, as they say. Only install from trusted sources and always check the permissions the apps ask for. If you don't want the risk, go buy an Apple product and play by their rules. These are the risks that open-source brings and one that all of us bears in mind when tinkering with such power.
z33dev33l said:
Wrong in many ways, it doesn't have viruses because the market is next to non-existent and getting a virus on an android device is more and more common.
Click to expand...
Click to collapse
Actually linux does have them, see http://en.m.wikipedia.org/wiki/Linux_malware for some examples.
Linux has few simply because it tends to get patched quicker. Malware on android devices will increase more this year as its the most used mobile os and so offers more potential victims which makes it a more enticing prospect for hackers.
Dave
( http://www.google.com/producer/editions/CAownKXmAQ/bigfatuniverse )
Sent from my LG P920 using Tapatalk
That and there's no real security built-in to android and it's the easiest one to pirate apps on. I personally believe the people trying to get the apps free deserve the viruses though. Does the patching have to do with the Linux distro or the kernel? Serious question as I know little about Linux malware and only briefly used Linux.
i know kernels get patched, i think distros do as well.
alpha-niner64 said:
If you don't want the risk, go buy an Apple product
Click to expand...
Click to collapse
You're joking, right? TLDR: How do you think jailbreaking is possible if Apple is so secure? Indeed, it's the false confidence that comes from them telling users that it's so secure that's precipitated so many of the blunders.
z33dev33l said:
That and there's no real security built-in to android and it's the easiest one to pirate apps on. I personally believe the people trying to get the apps free deserve the viruses though. Does the patching have to do with the Linux distro or the kernel? Serious question as I know little about Linux malware and only briefly used Linux.
Click to expand...
Click to collapse
Kernel gets updated with patches but individual distributions also get system patches or did a few years ago when I last used linux.
I'm curious why you think there's no security built into android, as can be seen at http://developer.android.com/guide/topics/security/security.html there are a number of security measures in place.
Dave
( http://www.google.com/producer/editions/CAownKXmAQ/bigfatuniverse )
Sent from my LG P920 using Tapatalk
Use your brain for security
All the android malware reports I have ever read are just scare tactics used by various news agencys, blogs, etc to generate more views for their site. Almost all android malware can be avoided by simply being smart with where and what you download. Using iOS doesn't make you safe; downloading well known apps from the play store that only use permissions that are appropriate for its described functionality makes you safe.
z33dev33l said:
That and there's no real security built-in to android and it's the easiest one to pirate apps on. I personally believe the people trying to get the apps free deserve the viruses though.
Click to expand...
Click to collapse
I agree 120% with you, cheating people's hard work will get you burnt!
Sent from my HTC Wildfire S A510b using xda premium
Ashmere69 said:
I agree 120% with you, cheating people's hard work will get you burnt!
Sent from my HTC Wildfire S A510b using xda premium
Click to expand...
Click to collapse
Exactly. Buy the app and you don't have to worry about it. Besides, it's not like these apps are fifty bucks each. Pay a couple of dollars and support the ecosyste
I think some of the real culprits to an evil Android is self-awareness on the handset, they always seem to delete and corrupt your stuff before you know it, but yeah, bootlegs are not good at all.
Octane70 said:
There’s a new threat in town. And by town, I mean China. Malware authors have created a bit of code called Geinimi that hitchhikes on existing apps when they are redistributed on third-party markets. At the moment it doesn’t do much but lurk, but its capabilities resemble that of a botnet server, according to Lookout, a company that makes antivirus software for Android.
So far the code has been identified as being able to send out your location, IMEI, app list, and to download apps. There could be more. Users outside of China are apparently at little risk, and at any rate your security is in your own hands: if you’re downloading a to-do list app and it wants access to your GPS and calling functions, that’s probably bogus.
Stay safe out there, kids.
Not to sure if this has been posted or not.
Click to expand...
Click to collapse
Eek!
iPhone doesn't have this problem...
L33t Masta said:
iPhone doesn't have this problem...
Click to expand...
Click to collapse
Think again.
Sent from my Inspire 4G using Tapatalk 2
Any suggestions on how to keep our mobile phones safe from intrusions like Dreamdroid, etc.?
Sent from my SCH-I500
Onebryteday said:
Any suggestions on how to keep our mobile phones safe from intrusions like Dreamdroid, etc.?
Sent from my SCH-I500
Click to expand...
Click to collapse
Search for lookout in the market. It scans apps for viruses in every app and they have a separate app that can remove dreamdroid if you get infected somehow.
Sent from my MIUI SCH-i500
Only true way to stay secure is use common sense when downloading. Security software only gives users a fale sense of security. Look at what the app you download accesses and decide yourself on if you feel its safe or not.
Sent from my SCH-I500 using XDA Premium App
I'm going to have to disagree on that.
Disagree as you please. You guys find ways around these phones right? What makes you think there isn't a way around security apps. I know a computer is differ but send me any virus your anti virus software can detect and I can bypass it with the same exact virus. So I'm sure someone could do the same on a phone. Id like to see more people discuss this topic, then I'm sure we could come up with more ideas and ways to protect a phone.
Sent from my SCH-I500 using XDA Premium App
I appreciate the feedback. I would rather be proactive than reactive. Realizing nothing is 100%. Being secure is an on-going endeavour.
Thanks!
Sent from my SCH-I500
im.matt said:
Disagree as you please. You guys find ways around these phones right? What makes you think there isn't a way around security apps. I know a computer is differ but send me any virus your anti virus software can detect and I can bypass it with the same exact virus. So I'm sure someone could do the same on a phone. Id like to see more people discuss this topic, then I'm sure we could come up with more ideas and ways to protect a phone.
Sent from my SCH-I500 using XDA Premium App
Click to expand...
Click to collapse
Far be it for me to put words in add's mouth (or anything for that matter, he bites! LOL), but I suspect what he's getting at is that, as Onebryteday has inferred, the only phone that is 100% secure is the phone that does not exist. That's essentially true for any device that needs securing in one form or another. I agree with what add is saying should that be the case.
It's foolish to depend solely on anti-virus software, yes, but only in that it is foolish to depend solely on *any* one single method. It is therefore equally foolish to completely ignore it on the assumption that anti-virus will be bypassed. It's just one layer of security you can apply, and shouldn't just be wholly ignored because it is not 100% secure.
The more correct way to say it is that it can be bypassed--whether it actually will or not depends on the virus you might pick up, the strength of the anti-virus you're running, how often it's updated, your own app installation choices, browser behavior, etc.
We're kinda bumping into extremes of a continuum here. Don't just ignore anti-virus solutions completely. Don't rely solely on them either. The more different and overlapping security measures you can take---both with software solutions, and simply by being educated about security compromises and proper security behavior---the better off you are.
TY sir! Well stated.
Sent from my SCH-I500
That should be a sticky. I didn't mean to sound like an aver isn't any good, it just isn't enough. I would like to know more about the Android OS and possibly have a topic for security on our phones. The more people who can help prevent intrusions the harder it will be for malware makers to stay undetectable.
Sent from my SCH-I500 using XDA Premium App
I really don't think its much to be concerned about (for the moment at least).
Any keylogger applications for android????
...sanjai...
sure - carrier iq
JR_de said:
sure - carrier iq
Click to expand...
Click to collapse
Lol!
Sent from my MoPho using XDA-Premium
Ahh no... but lol
Sent from my MB860 using XDA App
If you have a htc phone, you probably already have one with the Carrier IQ crud on it. Hands down I would trust TrevE over a corporation that has patents on snooping technology.
What these so called market researchers and their ilk seem to always forget, is that bad people will wind up piggy-backing on the technology, and do bad things to us.
For those who say that it cannot happen, remember when Mark Rusinnovich of SysInternals caught Sony putting rootkits on their music cd's?
That's why I went from having an all Sony audio visual home theater setup I'm staying away from every sony product that I can.
I feel sure of that as soon as John Q. Public realizes what the device manufacturers, C-IQ, and the wireless carriers are up to doing, these corporate snoops will be punished.
Just my 2 cents worth.
/s/ BezantSoft
Sent from my DROID BIONIC using XDA App
why you need keylogger when you can have keyboards
Ya know, I would like to know as well.
Not that I would have any use for one myself, but it shouldn't be something hard to code for Android.
You'd think they would be more prominent.
rsanjai said:
Any keylogger applications for android????
...sanjai...
Click to expand...
Click to collapse
Did you mean mobile spy or android spy? I searched online and I find many applications for android. You can google it.
Few days ago I was involved in a conversation where couple of people were sure that the government can tap our phones even when not in conversation but when they are actually in stand by on the table.
I tried to argue that when in stand by, android for example has very minimal processes going on, just enough to keep the time and realize when the power button is pressed or send notification.
The counter-argument was that there might be backdoors in the ROM for example which enables the authorities to get sound from the mic directly without the need of the OS as an interface.
I don't see how this can be done, but you as developers might want to provide some solid, technical arguments which would set the discussion once at for all
I guess if you're really that worried about it, there's always airplane mode.
Sent from my HTC PH39100 using xda premium
Worried about monitoring using a google/facebook/twitter device?
Pull some foil off your hat, and wrap it around the phone. Problem solved.
Just do what Eric says "Do no Evil" and who cares if the gummint is watching you!
I'm not worried at all as should be obvious if you actually read my post :>
Fking1 said:
I don't see how this can be done, but you as developers might want to provide some solid, technical arguments which would set the discussion once at for all
Click to expand...
Click to collapse
Well, I'm no developer but if you are going to lurk deeper on backdoors, you'll soon find out that bigger corporations than Gooogle have implemented backdoors in their systems.
Still, this doesn't tell you how it's done, but proofs that has been done and afaics is no problem to do it again.
If I remember correctly some time ago Indian government tried to force BlackBerry to backdoor their devices for Indian market.
So judge it for yourself, but don't think that this is some Atlantis conspiracy but is actually happening all over the place..
B33zal said:
Well, I'm no developer but if you are going to lurk deeper on backdoors, you'll soon find out that bigger corporations than Gooogle have implemented backdoors in their systems.
Click to expand...
Click to collapse
Care to elaborate?
Also it will be enough if someone says why it's impossible to pull audio from the mic when the phone is on standby
In all actuality if the gumment wanted to monitor you they already are....
Fking1 said:
Care to elaborate?
Also it will be enough if someone says why it's impossible to pull audio from the mic when the phone is on standby
Click to expand...
Click to collapse
It's not impossible. Don't brick your head with such things. And why is that question anyway? Do you affraid that you can get caught?
If you are not doin anything against the law, after a while they would not even listen to you
chaki- said:
It's not impossible. Don't brick your head with such things. And why is that question anyway? Do you affraid that you can get caught?
If you are not doin anything against the law, after a while they would not even listen to you
Click to expand...
Click to collapse
well to be honest, i'm big time criminal in my country, so the answer to that question is critical to me :>
Fking1 said:
I tried to argue that when in stand by, android for example has very minimal processes going on, just enough to keep the time and realize when the power button is pressed or send notification.
Click to expand...
Click to collapse
Just because a listening device is not always on doesn't mean it doesn't exist. A single push notification can activate a hidden app or feature, should a government have installed it.
Indeed, there are "lost phone" apps on the market that let you do similar things (though I'm not sure about listening in per se, more like gps, alarm sound, take photos).
so, it's technically possible?
Fking1 said:
so, it's technically possible?
Click to expand...
Click to collapse
It is possible and google patented an ad technique that involved using the microphone to listen for background noises and words to produce better more personalised ad results but haven't implemented it yet.
Also you can remotely activate phone features as well as push data to a phone so yes it could be done but they would need at least an app installed on your phone to do so.
So unless you allow someone to install hidden apps on your phone there's no chance of it.
Dave
( http://www.google.com/producer/editions/CAownKXmAQ/bigfatuniverse )
Sent from my LG P920 using Tapatalk 2
Interesting.
What if the government forces Google, Apple and Rim to leave such backdoors accessible by them?
Android is open source but the kernel is not as far as i know?
Fking1 said:
Interesting.
What if the government forces Google, Apple and Rim to leave such backdoors accessible by them?
Android is open source but the kernel is not as far as i know?
Click to expand...
Click to collapse
even if thats the case: just flash an own kernel like we all do.
i don't think there's something in android, because it's open source. someone would see that..
and the kernel problem is solved when you flash another one i guess
but those normal ppl out there.. the weird ones who doesn't flash their devices, they are ****ed then. xP
but are the kernels we flash open source? I guess even with custom ROM you use the default google kernel, since if it haven't been open source in the first place, i don't think anyone has written it from scratch.
The more important question is, can something like this be hidden in the kernel, or it needs to run in the OS as normal, but hidden app?
Fking1 said:
Care to elaborate?
Click to expand...
Click to collapse
NSAKEY. I'd post links but I can't.
B33zal said:
NSAKEY. I'd post links but I can't.
Click to expand...
Click to collapse
NSAKEY?
post them sripped or PM me
Is it possible? Yes is it likely? No. At least in the US they would need to prove you were a threat to national security to get a judge to sign off on it.
The android kernel is open source completely.
As an example there is a root binary that grants root access without user prompt or notification of any kind. So while it can be done I would not worry about it much.
FEMA chip anyone?
Sent for a corner cell in Arkham
dmhdogpro said:
In all actuality if the gumment wanted to monitor you they already are....
Click to expand...
Click to collapse
Bingo
I do not worry about my Government, if they want me they
will come and get me (and I won't be able to stop them)
It is my fellow citizens whom scare me the most.
B33zal said:
Well, I'm no developer but if you are going to lurk deeper on backdoors, you'll soon find out that bigger corporations than Gooogle have implemented backdoors in their systems.
Click to expand...
Click to collapse
That is true and some EULAs even suggest that there is no privacy on the data commited to the systems. Simple software we use daily (specially in the MS Windows world) is gathering info about what data you search, what you download, what kinda documents you type, etc. Even cloud storage services have a EULA that guarantee you no privacy (Box, Dropbox, Google drive, etc)
As for Android, I highly doubt the problem lies in the operating system, since it is open source and anyone can take a look at it.
Now if you want a conspiracy theory, then read on...
Have you guys noticed how many of the browsers in Play Store are from chinese developers? Specially Dolphin, which many of you adore. Who can tell it isn't secretly sending your browsing habits to the Chinese government? How many people have been sniffing traffic to/from Dolphin (using tcpdump, for instance) to make sure it isn't doing other things?
Chrome (and Chromium) is another example: most people simply have to access their google accounts from these browsers. These browsers effectively send private user data to google. The question here is: how is google making use of such data and who is it sharing it with (for a profit or not)???
It's almost a paradox that in the information age we are more and more willing to have privacy but we have never shared so much of their personal lives with so many as we do now. Take, for instance, Facebook, Google+, Twitter,
I could go on and on... but I gotta some wifi sniffing to do right now and some wardriving later.
I got a samsung S3. At times I notice the status bar change different colors and flash weird letters. It almost looks alien like. This happens like twice a week. Could this be the government spying on me?
yahanna said:
I got a samsung S3. At times I notice the status bar change different colors and flash weird letters. It almost looks alien like. This happens like twice a week. Could this be the government spying on me?
Click to expand...
Click to collapse
I guess its not about government spying as if a government spies it does via network so it does affect the hardware or phone software.
can you post screenshot?
yahanna said:
I got a samsung S3. At times I notice the status bar change different colors and flash weird letters. It almost looks alien like. This happens like twice a week. Could this be the government spying on me?
Click to expand...
Click to collapse
Maybe you should wrap your Galaxy S3 in aluminum foil. That should prevent alien attacks, at least.
Do you not watch the news? The government is spying on us all. Congress knows about it. The judicial branch says it is ok and the Executive just doesn't care.
Its only because you rooted your device and was put in a watch list.... Government doesn't like not having control... [emoji12]
One way to be sure you are bing watch is if you ever notice light aircraft or helicopters in your area then you can be sure the have seen you. If you look at them and they fly off then they have notice you have seen them are are trying to be inconspicuous. Never go outside without a tinfoil hat. You can hide one easily under a top hat or cowboy hat, even a bowlers hat.
We all gonna dieeeeeeeeeee!
Nonsense, the only people spying on your phone is the Illuminati, They're watching us all...
Sent from my HP Slate 7 using XDA Free mobile app
@SidDev said:
I guess its not about government spying as if a government spies it does via network so it does affect the hardware or phone software.
can you post screenshot?
Click to expand...
Click to collapse
It flashes so fast that I got no time to take a screenshot. I wish though.
jasonmerc said:
Maybe you should wrap your Galaxy S3 in aluminum foil. That should prevent alien attacks, at least.
Click to expand...
Click to collapse
Maybe you should wrap your head in concrete. That should prevent people noticing you.
Festrada007 said:
One way to be sure you are bing watch is if you ever notice light aircraft or helicopters in your area then you can be sure the have seen you. If you look at them and they fly off then they have notice you have seen them are are trying to be inconspicuous. Never go outside without a tinfoil hat. You can hide one easily under a top hat or cowboy hat, even a bowlers hat.
Click to expand...
Click to collapse
One way to be sure youre a paranoid troll with tendencies to harm women is if you post comments like this, people like myself will reply with comments like mine. If you look at them and they dont look at you, it explaims why youre angry at them. Never try to talk to them. You'll only end up being rejected and as a result, more angry.
nobe1976 said:
Its only because you rooted your device and was put in a watch list.... Government doesn't like not having control... [emoji12]
Click to expand...
Click to collapse
My phone isn't rooted yet. Youre right about the government though.
In first world countries this is an issue, yet I cannot say that this is very true for all classes of countries, namely 3rd world countries.
I am sensitive that NSA surveillance in the US does overlap the barriers of privacy and security, as the main operators are humans and not machines, yet I do not confirm this is true, this is just speculation. They can choose to cross those barriers without us even noticing them.
However in regards to being spied upon by the government, it will go as far only as you'd let them get information. I have simulated your errors by means of Network Security testing, and yes I am a Network Admin and simulate stealing information. What i can say is this, if the government uses technology by means of any frequency via Wifi, Bluetooh, GPS, etc and you have these on, then you have to be extra careful. Most tracking agencies do not leave the spying to machines, they do it themselves and can choose to go beyond stealing your "Intellectual Rights" so to speak.
I also have Hardbricked and soft-bricked devices in my simulations. But what I can is that you should be responsible for gathering facts and truths about this matter. It is foolish to speculate upon the government without knowing of the tools that they use in acquiring private information.
I hope my article has helped you, and i do wish this thread is closed as it is.
yahanna said:
It flashes so fast that I got no time to take a screenshot.
Click to expand...
Click to collapse
try airplane mode for a while and see if it stop
if it does you are right
if it continues in airplane mode also its hardware or software problem.
BTW I am happy Indian government doesn't spy like you people.
This thread is hilarious. Thanks for the laugh, OP.
@SidDev said:
BTW I am happy Indian government doesn't spy like you people.
Click to expand...
Click to collapse
BUT MAYBE THAT'S WHAT THEY WANT YOU TO THINK!!!!!!
yahanna said:
Maybe you should wrap your head in concrete. That should prevent people noticing you.
Click to expand...
Click to collapse
Will try. Thanks for the heads up.
Sent from my HTC Rezound using XDA Free mobile app
Planterz said:
This thread is hilarious. Thanks for the laugh, OP.
Click to expand...
Click to collapse
You sound like a nerd.
jasonmerc said:
Will try. Thanks for the heads up.
Click to expand...
Click to collapse
Youre a weirdo.
yahanna said:
Ha ha ha... no.
Click to expand...
Click to collapse
The truth is that you ARE being spied upon by the government. The FBI, CIA, TSA, and NSA are SO incompetent in their spy work that their spying causes graphical glitches on your phone. These glitches are caused by the syncing with the NFC chip that was injected into you the least time you got a shot at the doctor's office. You only noticed these glitches because there weren't enough pacifying hallucinogens in the atmosphere spread by the gubment in those inexplicable chemtrails you see crisscrossing the air above you.
Because, obviously, someone of such incredible genius such as yourself is of extreme interest by the government's top intelligence and law enforcement agencies that they'll spend tens of thousands of dollars in tech, equipment, and man-hours to monitor 24/7.
Or maybe there's just a software or hardware glitch in your phone.
---------- Post added at 06:59 AM ---------- Previous post was at 06:52 AM ----------
Oh, and since you posted this on a public forum (searchable by Google and other search engines), the government knows their cover has been blown. Expect a team of "cleaners" to arrive soon.
jasonmerc said:
BUT MAYBE THAT'S WHAT THEY WANT YOU TO THINK!!!!!!
Will try. Thanks for the heads up.
Sent from my HTC Rezound using XDA Free mobile app
Click to expand...
Click to collapse
nope
its not like the us government
@SidDev said:
nope
its not like the us government
Click to expand...
Click to collapse
They don't need to. The US, UK, Pakistani, and Chinese governments already spy on India enough.
I work for a large telephony company. In the US, if the government was spying on you, you wouldn't know about it. There's actually regulations built around how they spy on you, called CALEA (http://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act)
Basically, the telephone company has a security group whose job is to receive CALEA requests, and essentially they fork your call into a 3 way call whenever you make/receive anything. That's how modern wiretapping works. No one outside of that group is legally allowed to know anything about it. It doesn't show up in call signalling.
As for the wide-spread stuff that the NSA was grabbing, they're grabbing "call metadata" so essentially the signaling information, and CDRS (call detail records). It's not the same thing as a wiretap, but you can still get a lot of information out of it.
msarro said:
I work for a large telephony company. In the US, if the government was spying on you, you wouldn't know about it. There's actually regulations built around how they spy on you, called CALEA (http://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act)
Basically, the telephone company has a security group whose job is to receive CALEA requests, and essentially they fork your call into a 3 way call whenever you make/receive anything. That's how modern wiretapping works. No one outside of that group is legally allowed to know anything about it. It doesn't show up in call signalling.
As for the wide-spread stuff that the NSA was grabbing, they're grabbing "call metadata" so essentially the signaling information, and CDRS (call detail records). It's not the same thing as a wiretap, but you can still get a lot of information out of it.
Click to expand...
Click to collapse
There are also "taps" or pass through skimmers at a lot of the data pipes throughout the country.
SSL should cover this, but SSL is so freaking broken its not even funny
Sent from my m7spr
But all jokes aside ('bout time someone took this half-seriously besides SidDev), I would try getting a stock firmware image and just flash that through ODIN. Doing this will erase your data, so make a backup of anything you really care about. I remember my old Rugby Smart had an issue where if the device was off and I plugged it into the wall socket to charge, it would say there was no battery inserted. However there was one inserted, and it would charge just fine if it was on. I just flashed back to stock firmware through ODIN and it fixed the issue.
If it still persists after flashing through ODIN, then it is probably a hardware issue. Unfortunately, I am not as experienced with hardware-related issues, so I wont be able to help with that if that is what it comes down to.
SidDev is right. It is either a software or hardware relates issue. Although the gubmit is spying on you (n' all of us as well), it wouldn't cause anything like that. If anything, the gubmit WOULDN'T want the phone to show weird signs, because that would make you suspicious..
Sent from my MB855 using XDA Free mobile app