Can i collect public emails in database and sell it? - General Questions and Answers

Hello friends,
I want to make a script has a database with thousands of emails and sell this script so is it legal or not ?
Important: These emails are public on a website and, means anyone can see these emails on its owners's pages. I just collect them in one database!
Thanks in advance

eng.ahmed.android said:
Hello friends,
I want to make a script has a database with thousands of emails and sell this script so is it legal or not ?
Important: These emails are public on a website and, means anyone can see these emails on its owners's pages. I just collect them in one database!
Thanks in advance
Click to expand...
Click to collapse
It depends on the country. And there might be different reasons why it is illegal.
One of them is that emails are obviously copyrighted in the U.S. The Supreme Court in Feist Publications, Inc. v. Rural Telephone Service Company has little of a requirement to what that text must be: "[T]he requisite level of creativity is extremely low; even a slight amount will suffice. The vast majority of works make the grade quite easily, as they possess some creative spark, ‘no matter how crude, humble or obvious’ it might be."
So, as soon as it is more than a few words, you will need to contact every author to make sure they are okay with it.

MrQuincle said:
It depends on the country. And there might be different reasons why it is illegal.
One of them is that emails are obviously copyrighted in the U.S. The Supreme Court in Feist Publications, Inc. v. Rural Telephone Service Company has little of a requirement to what that text must be: "[T]he requisite level of creativity is extremely low; even a slight amount will suffice. The vast majority of works make the grade quite easily, as they possess some creative spark, ‘no matter how crude, humble or obvious’ it might be."
So, as soon as it is more than a few words, you will need to contact every author to make sure they are okay with it.
Click to expand...
Click to collapse
But the point in this case that all emails are public and anyone can see it directly. I just collect them and i will add a choice in the email for authors to remove their email from this email list if they want. so what's the case now ?

eng.ahmed.android said:
But the point in this case that all emails are public and anyone can see it directly. I just collect them and i will add a choice in the email for authors to remove their email from this email list if they want. so what's the case now ?
Click to expand...
Click to collapse
Just that it is online doesn't mean that the material is in the public domain. There is a lot of text online that actually qualifies for copyright protection. Emails are no exception. To know if it is actually public domain you either have to contact the author (who might have explicitly donated it to the public domain) or find out when it has been published (after many, many years text becomes public domain).
PS: You use the word "emails", so I understood this as such. If you actually meant "email addresses", I would recommend to ask another question, because that is something totally different.

MrQuincle said:
Just that it is online doesn't mean that the material is in the public domain. There is a lot of text online that actually qualifies for copyright protection. Emails are no exception. To know if it is actually public domain you either have to contact the author (who might have explicitly donated it to the public domain) or find out when it has been published (after many, many years text becomes public domain).
PS: You use the word "emails", so I understood this as such. If you actually meant "email addresses", I would recommend to ask another question, because that is something totally different.
Click to expand...
Click to collapse
Yes, I really mean email addresses not emails content itself. I mean email addresses like ( ccdd[at]gmail[dot]com )
So what is the difference about that ?

MrQuincle said:
Just that it is online doesn't mean that the material is in the public domain. There is a lot of text online that actually qualifies for copyright protection. Emails are no exception. To know if it is actually public domain you either have to contact the author (who might have explicitly donated it to the public domain) or find out when it has been published (after many, many years text becomes public domain).
PS: You use the word "emails", so I understood this as such. If you actually meant "email addresses", I would recommend to ask another question, because that is something totally different.
Click to expand...
Click to collapse
eng.ahmed.android said:
Yes, I really mean email addresses not emails content itself. I mean email addresses like ( ccdd[at]gmail[dot]com )
So what is the difference about that ?
Click to expand...
Click to collapse
Waiting for your clarification friend because this subject is very important for me

eng.ahmed.android said:
Yes, I really mean email addresses not emails content itself. I mean email addresses like ( ccdd[at]gmail[dot]com )
So what is the difference about that ?
Click to expand...
Click to collapse
That's another question. I'm sorry.

MrQuincle said:
That's another question. I'm sorry.
Click to expand...
Click to collapse
You mean you don't know it is legal or no ??

eng.ahmed.android said:
You mean you don't know it is legal or no ??
Click to expand...
Click to collapse
This is just an entire different question. And also this depends on the country etc. etc. It is in this case not related to copyright laws, but to SPAM laws. In Australia for example even the creation of scripts to harvest emails (from public sources) is illegal. In the US there is for example the CAN-SPAM law. This laws forbids to send a message to a harvested address. Regarding the fact that you might have sold these addresses, that very well might be considered complicity.

MrQuincle said:
This is just an entire different question. And also this depends on the country etc. etc. It is in this case not related to copyright laws, but to SPAM laws. In Australia for example even the creation of scripts to harvest emails (from public sources) is illegal. In the US there is for example the CAN-SPAM law. This laws forbids to send a message to a harvested address. Regarding the fact that you might have sold these addresses, that very well might be considered complicity.
Click to expand...
Click to collapse
No, I didn't do that yet so i asked about it first Thanks at all!

eng.ahmed.android said:
No, I didn't do that yet so i asked about it first Thanks at all!
Click to expand...
Click to collapse
You're welcome

Related

Important notice to all Chef's and users regarding the 6.5 rom removal Hoax

EVERYONE need to read this thread in the link below, please post this other threads related to this, BTW it discusses that this is James Young is a HOAX read the last couple of posts
http://forum.xda-developers.com/showthread.php?t=492330
Admins: Just talked with Microsoft being my profession and this was not sitting good with me since it was missing A. a contact phone number and for these cases it must also contain a Digital Signature with that being said they said it is fraud, I gave them the link here and they verified that they do not have a James Young employ and that the email extension [email protected] is not valid furthermore they said on there notices they will also have a phone number for the person(s) to call and correspondence is done through written. I will be receiving an email with the case number and contact information for the antipiracy case manager who verified the information and will forward it to the Admins here and at PPCGeeks as well. If one one the Admins here can PM there email addy so I can send the email to them for future verification on these types of notices.
Click to expand...
Click to collapse
More info on the Ms Hoax please pass this info along to all sites and admins...
http://pocketnow.com/index.php?a=portal_detail&t=news&id=7041
Microsoft Impersonator Sends Fraudulent Letters, Disrupts Community
Posted by Chuong Nguyen
March 13th, 2009 at 02:53 PM
It turns out that there may be an impersonator lurking around disrupting Windows Mobile communities. In response to an article that was posted this morning about Microsoft demanding that Windows Mobile 6.5 ROM images that were cooked unofficially be taken down, our own Microsoft MVP Adam Z. Lein spotted that the guy responsible for the letter to XDA-Developers may be a fraud, as was posted on PPCGeeks.
A similar hoax had occurred before at msmobiles in regards to Windows Mobile 6.5 screenshots. In the cease and desist letter to msmobiles, the gentleman claiming to be with Microsoft's legal department asked the site to remove screenshots of the forthcoming operating system
. The letter was sent after Microsoft had publicly announced and shown the very screenshots at Mobile World Congress 2009. According to msmobiles: "In any case, if it is genuine action on behalf of Microsoft, it is a case of extreme incompetence that this guy is showing because he is requesting removal of pictures of something that has been officially announced few days earlier." It should also be noted that pocketnow.com had posted screenshots and news of Windows Mobile 6.5 before, during, and after Microsoft's Mobile World Congress announcement and we did not receive a cease and desist letter.
The community over at msmobiles performed some additional investigations and found that the gentlemam, James Young, sent emails originating from IP addresses in London and not from Microsoft's corporate headquarters in Redmond, Washington, leading many to believe that he is not connected with the software giant. Additionally, emails were sent from [email protected], and not at a "@microsoft.com" email address.
Whatever the case may be, other forum members in our original post here at pocketnow.com made mention that only the Windows Mobile 6.5 cooked ROM made by ROM chef Da_G was affected and 6.5 ROMs for other HTC-made devices were seemingly okay.
i only hope it is a hoax
I f you read the links I posted you will see that some users and some who work for M$ verified that it was a hoax...
Thanks for this.
It has been raised in the Moderators Forum.
I'll closed this thread now because there are a few of them floating around, might as well keep the discussion focused.
Might I suggest that if this is found to be a hoax, the site admin (or a moderator maybe) will let you know. We would appreciate it if anyone who has had a takedown notice by the admin adears to it until further notice from xda.
Regards,
Dave
I'll re-open this thread for discussion.
Can I request that if Flar removed your ROM images / links that you do not re-add them until you here from Flar (or maybe a moderator).
The takedown notice for those images may be genuine.
Thanks
Dave
thank you Dave,
question, since this has affected several hosting sites, what would be the best way to get them to re-think there decisions ? To me I think is not going to be a easy task to do since they are now very unsure of where they stand..legally that is..I doubt the M$ is going to come right out and tell them "all is well"
Who ever this guy is..he hit a very tender spot and if it was not for a minor slip up this may not have been nipped in the bud as quick as it was..
I have unlimited bandwidth and file space to host...
I am just unsure of the "legality" of ROM images in the US on a file server.
If they are considered legit, and do not contain any illegal software in the ROM image itself, I would be more than willing to host on my 100MBit web server.
What a p*ss take but to be honest someone should have noticed the extension on the email address!!! Or even checked into it... "Just want to clarify not pointing the blame @ anyone"
I know now XDA has to do there research on this and comply with any thing that has happened till the all clear is called.
Just shame the ammount of disruption this has caused to chefs and users alike....
With regards hosting sites i think that they will be fines as i imagine the flagged ROMs were reported by the offender and most hosting sites do not have enough time to check every upload to there servers....
Not sure i got anything else to say except lets all get back to usual.....
stylez said:
With regards hosting sites i think that they will be fines as i imagine the flagged ROMs were reported by the offender and most hosting sites do not have enough time to check every upload to there servers... I have personally had to initiate a DMCA, send it, and follow up with individuals before, as well as removing illegal material from some of the websites our current and former clients have hosted.
Not sure i got anything else to say except lets all get back to usual.....
Click to expand...
Click to collapse
I can speak to that since I am a partner with a game and web hosting company. We do look at the individual files on the box to determine if the reported apps or media violates either our Terms of Service or any copyright laws. We also check into each "report" we get to determine if the report is legitimate, and we do investigate IPs and domains, to determine if they are valid.
In our arena, we do get gaming guilds who pretend to be official companies who try to get us to take down a competitors site or server.
We have also used copyright DMCA ourselves, and we do send email notification, but ONLY after a written certified letter is sent. The email is sent to the listed contact of the company and contains a copy of what was sent via certified mail.
We do this since we normally engage in unofficial conversation if someone has used our copy-righted material to save us money, as most of the time they use it without knowing they can't.
As far as the DMCA goes, we can send notice using our own attorneys, but we HAVE to hire local counsel to serve any legal action notice if we end up going that route. However, we do have a choice of mediation and litigation clause which allows us to use the laws of and conduct legal activity in the state our company is registered in. MS would have to do the same thing.
so when will roms be back? will everyone have to re post them therselves?
If it's truly found to be a hoax, I'd sure hate to be "James Young", or whatever his real name is. He may quickly become the target of thousands of hackers. I would imagine with the combined power of everyone effected, he could find himself with:
An Empty Bank Account
Homeless
Late Vehicle Registration/Stolen Vehicle
On the FBI's Most Wanted List/On MI6's Most Wanted List
His Face In Porn Movies/Beastiality Movies
A Failed Drug Test at Work
On People Magazine's Worst Dressed List
etc, etc...
More info from another thread.
By Dereth
this guy obiously has no life....
he sends these to the pirate bay all the time:
http://static.thepiratebay.org/ms-loveletter.txt
and read this email at the bottom it states the copyright on the email.
http://static.thepiratebay.org/sega_mail.txt
"IMPORTANT: The contents of this email and attachments are confidential
and may be subject to legal privilege and/or protected by copyright.
Copying or communicating any part of it to others is prohibited and may
be unlawful. If you are not the intended recipient you must not use,
copy, distribute or rely on this email and should please return it
immediately or notify us by telephone. While we take every reasonable
precaution to screen out computer viruses from emails, attachments to
this email may contain such viruses. We cannot accept liability for loss
or damage resulting from such viruses. We recommend you carry out your
own virus checks."
Click to expand...
Click to collapse
Tell ya what this guy been everywhere!!!
Last month, Ars reported that Microsoft's Windows Media Audio (WMA) digital rights management protection had been cracked, and a program called FairUse4WM had been written that would strip DRM data from purchased audio files. Microsoft was aware of the workaround, but did not seem too concerned, merely stating that "we designed the Windows Media DRM system to be renewable, so that if such events occur the system can be refreshed to address them." Now it seems that the company has gone a little further than that, sending out cease and desist orders to web sites hosting the FairUse4WM program. According to the owner of the web site BG4G, the orders came in via e-mail.
The notices are of a standard boilerplate format, claiming that the sites are "offering unlicensed copies of, or is engaged in other unauthorized activities relating to copyrighted works published by Microsoft." The copyrighted works are Windows Media Player 10 and 11, and the unauthorized activities are listed as "offering 'Cracks' or 'Product Keys', intended to circumvent technical measures that control access to Microsoft's copyrighted works and that protect Microsoft's copyrights in those works."
The "Demand for Immediate Takedown" e-mail comes from a James Young, "Internet Investigator," who claims to be acting on behalf of Microsoft Corporation. The interesting thing about the e-mail is that it makes no mention of the DMCA, which is the one law that would make FairUse4WM (which does not contain any copyrighted code, portions of Windows Media Player, nor any copyrighted music files themselves) illegal. The DMCA contains provisions against programs that attempt to circumvent copy protection. It also provides a "safe harbor" for Internet Service Providers and web hosts that take down files in a certain amount of time (usually 10 to 14 days) after a warning letter has been received.
The DMCA is a US invention and applies only in the United States, but many companies have attempted to use it outside their country's borders. The notice advising web sites to take down the FairUse4WM program came from the domain Microsoft-Antipiracy.com, which according to DNS records belongs to Microsoft but is actually administered by the ISP Nildram Ltd, which is based in the UK (the web site itself redirects to a page on microsoft.com).
Microsoft has not commented on the takedown notices, but they would be consistent with the sorts of notices given to web sites hosting cracks for other media-related copy protection. In the case of FairUse4WM, the problem may be somewhat more urgent from Microsoft's perspective, as the subscription-based model used by many DRMed WMA online music stores allows downloading an unlimited number of songs, but they can only be listened to for as long as the subscription is active
Click to expand...
Click to collapse
More reading regards this:
http://jamesholden.net/2007/04/25/microsoft-didnt-issue-takedown-notices-for-fairuse4wm/
Tell you what though there is a hell of alot of letters and some of them going back as far as 2004 from what i'm reading lets hope that XDA can nip this in the but...
this is all nice to be a freelance paid by M$ or ? black M$ funds haha. its way back to .... that this guy is scaring on the inet for them . SO XDA WHAT WILL BE RESPONSE TO ALL CLOSED THREADS
edit : i want my thread back restored from backup hehe red lines removed . WHEN ?
Use common sense, people! (Admins mainly)
IF Microsoft would have sent any of such letters, it would require you to remove ALL of their products, not just one - isn't it obvious?
I cannot imagine msoft asking xda to remove anything WM6.5 related, but not mentioning WM6.1 and WM6.0 ROMs and files
It's like Sony would have ask i.e. The Pirate Bay in a C&D letter to remove links to just 1 movie torrent and not mention links to all other Sony-owned movies present there.
I don't think it ever happened that way.
And letter coming from microsoft-antipiracy.com ? That's a no brainer LOL! It's as credible as if it would have come from microsoftsucks.org
Sure it's a hoax.
You've been pwnd
http://who.godaddy.com/WhoIs.aspx?domain=microsoft-antipiracy.com&prog_id=godaddy
http://msmobiles.com/news.php/8059.html
http://pocketnow.com/index.php?a=portal_detail&t=news&id=7041
http://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=4780
http://brian.carr.name/mscompln.htm
F2504x4 said:
More info from another thread.
By Dereth
this guy obiously has no life....
he sends these to the pirate bay all the time:
http://static.thepiratebay.org/ms-loveletter.txt
and read this email at the bottom it states the copyright on the email.
http://static.thepiratebay.org/sega_mail.txt
"IMPORTANT: The contents of this email and attachments are confidential
and may be subject to legal privilege and/or protected by copyright.
Copying or communicating any part of it to others is prohibited and may
be unlawful. If you are not the intended recipient you must not use,
copy, distribute or rely on this email and should please return it
immediately or notify us by telephone. While we take every reasonable
precaution to screen out computer viruses from emails, attachments to
this email may contain such viruses. We cannot accept liability for loss
or damage resulting from such viruses. We recommend you carry out your
own virus checks."
Click to expand...
Click to collapse
Click to expand...
Click to collapse
Interesting... the confidentiality notice is often a sub mail server attachment, meaning its attached to the email as it leaves the companie's mail servers, not when it leaves the users outbox... There are universal clauses out there, but since this one matches pretty much 100% it would be safe to say that the company James Young mailed it from and this company are one and the same, or connected through a parent or something like that. Here is the one that my company attaches once the emails leave our intranet and go out:
This message w/attachments (message) may be privileged, confidential or proprietary, and if you are not an intended recipient, please notify the sender, do not use or share it and delete it. Unless specifically indicated, this message is not an offer to sell or a solicitation of any investment products or other financial product or service, an official confirmation of any transaction, or an official statement of <removed>. Subject to applicable law, <removed> may monitor, review and retain e-communications (EC) traveling through its networks/systems. The laws of the country of each sender/recipient may impact the handling of EC, and EC may be archived, supervised and produced in countries other than the country in which you are located. This message cannot be guaranteed to be secure or error-free. This message is subject to terms available at the following link:
Click to expand...
Click to collapse
James probably worked there at the same company that sent the sony notice and got fired, so he's taking it upon himself. Maybe he got served a notice, and got mad that everyone else has it so he is sending out notices himself as a revenge plot... who knows... he has issues thats all.
Good news for xda developers :
http://www.duttythroy.net/component...crosoft-and-htc-say-ok-to-xda-developers.html
http://tweakers.net/nieuws/59043/microsoft-xda-developers-illegaal-maar-we-pakken-ze-niet-aan.html
Thanks and regards

The US govt. (FCC) wants to be in your phone....

....They have created an app, it's in the market, and it's called the "FCC Mobile Broadband Test". The app "provides consumers with information about the quality and speed of their mobile data connection. Test the upload speed, download speed, and latency of your mobile broadband connection and share your results with a simple email export." It has access to:
Your location
Network communication
Phone calls
Yeeeeeeeeeeeeeah, no, don't think I'll be installing this one. Who knows what other surreptitious things this app does. Figured everyone else might like to know.
Doesn't speedtest do the same thing?
Sent from my Droid Incredible using XDA App
I'll pass on that one...but think there are many big brother apps out there
whats77inaname said:
....They have created an app, it's in the market, and it's called the "FCC Mobile Broadband Test". The app "provides consumers with information about the quality and speed of their mobile data connection. Test the upload speed, download speed, and latency of your mobile broadband connection and share your results with a simple email export." It has access to:
Your location
Network communication
Phone calls
Yeeeeeeeeeeeeeah, no, don't think I'll be installing this one. Who knows what other surreptitious things this app does. Figured everyone else might like to know.
Click to expand...
Click to collapse
I am fairly certain that every app installed on Android accesses the phone or network or both. It is most likely asking for your location for the exact same reason the website SpeedTest.net asks for it...even if you access it on your PC... and that is so it can measure your speed and latency from the server closest to your location. If you notice this app was not made the US Govt. it was made by someone named Ookla who also made an app called “Speedtest.net Speed Test”.
Let's not get paranoid without actually looking beneath the surface here. More than likely this was just someone trying to make an “official sounding” app. A government agency like the FCC would actually list itself as the publisher of something like this and not any specific individual, especially under the name of “Ookla”.
For example, how many official IRS publications have you ever seen that list an individual person as the author or publisher? Now how many are just listed as “IRS Publication _____”?
As for exporting the resluts, many "Speed Test" websites publish the results of each test and many offer statistical averages for each ISP, state or country. On the surface, this seems like the same thing "speed test" programs have been doing since the '90s.
The only thing that raises a red flag to me is this Ookla guy using the "FCC" name for his own app. That alone is the only thing that would make me think there is anything suspicious about this. Reason to be cautious? Sure. Government conspiracy? Certainly not.
If you are are going to be scared of every app that accesses your phone calls and data connection, I would recommend not downloading any apps at all. As I stated earlier, I am fairly certain they all do and if not all, then certainly a very large majority do.
MagickalShadow said:
I am fairly certain that every app installed on Android accesses the phone or network or both. It is most likely asking for your location for the exact same reason the website SpeedTest.net asks for it...even if you access it on your PC... and that is so it can measure your speed and latency from the server closest to your location. If you notice this app was not made the US Govt. it was made by someone named Ookla who also made an app called “Speedtest.net Speed Test”.
Let's not get paranoid without actually looking beneath the surface here. More than likely this was just someone trying to make an “official sounding” app. A government agency like the FCC would actually list itself as the publisher of something like this and not any specific individual, especially under the name of “Ookla”.
Click to expand...
Click to collapse
1) I surmise you didn't pay attention to the "Visit the developer's Webpage" section (http://www.broadband.gov/qualitytest/about) nor did you pay attention to the "Send mail to developer" link ([email protected]).
Last time I checked, the only entity that could register a .gov domain name would be, hmmmmmmmmmmmm, the govt?
2) So, for s&g's let's just jump over to http://www.broadband.gov/, and lo and behold, it's a site by the FCC.
3) Let's run a quick "who is" query...
"WHOIS information for broadband.gov :
[Querying whois.nic.gov]
[whois.nic.gov]
% DOTGOV WHOIS Server ready
Domain Name: broadband.gov
Status: Active
Please be advised that this whois server only contains information pertaining to the .GOV domain. For information for other domains please use the whois server at RS.INTERNIC.NET."
4) And finally, the privacy statement for the site:
"The FCC is collecting and storing street addresses, IP addresses, and broadband performance information through these speed tests. (The FCC is not collecting email addresses through these speed tests.) The street addresses will not be released, disclosed to the public, or shared with any outside entities, including Ookla and M-Lab, except in the limited circumstances described in the Consumer Broadband Test Privacy Statement. The FCC, Ookla, and M-Lab are collecting and storing broadband performance information and IP addresses, which Ookla and M-Lab may release to the public. The FCC will not make individual IP addresses available to the public except in the limited circumstances described in the Consumer Broadband Test Privacy Statement. For more information, see the complete Consumer Broadband Test Privacy Statement, the Ookla Privacy Policy , and the M-Lab Privacy Policy. The FCC is soliciting this information under authority of the Broadband Data Improvement Act of 2008, Pub. L. No. 110-385, Stat 4096 § 103(c)(1); American Reinvestment and Recovery Act of 2009 (ARRA), Pub. L. No. 111-5, 123 Stat 115 (2009); and Section 154(i) of the Communications Act of 1934, as amended."
So, to counter your false claims and your casually dismissive attitude, I would suggest you follow your own advice next time (and look beneath the surface) before you step into a glass house throwing rocks. I did my research before posting, did you?
And granted, this may be a totally benign app, but given the source and other things they have been known to do, do you *really* want to take that gamble?
whats77inaname said:
1) [/B]).
but given the source and other things they have been known to do, do you *really* want to take that gamble?
Click to expand...
Click to collapse
Who exactly are they and what have they done? Granted, I didn't read the website info, but as I pointed out, this is not really any different than any other app in the entire market.
Last time I checked, the FCC wasn't kicking in the front doors of peoples homes and anal probing them for information about their G-mail contact list. I have no clue who "Ookla" is so, I have no clue what they have been known to do. For that matter I have no clue what M-Lab has been known to do either. If you want to go down the whole Govt. conspiracy "oh no they are after me" road, then hey, knock yourself out. But if they really were after you, they probably wouldn’t take the gamble that you would download their app from Android market. They would probably just legislate it into law that every phone had to ship with it pre-installed.
Unless that would interfere with their plans for the UFO's, the next Sept 11th or the reincarnation of Elvis or whatever other paranoid crap everyone wants to blame a relatively incompetent government of flawlessly doing with the personal information of every citizen within its borders...
I think I am going to text message everyone in my contact and tell them to run a test with this app...then we can all panic that the FCC knows we own cell phones, how fast our internet connections are and where we live...as if they couldn't have figured all this out yesterday before any one of us installed the app...unless they are going to use this to spy on us...oh wait I remember everyone being paranoid about that after watching it happen to Will Smith in "Enemy of the State" back in the '90s...so that can't be it...
Oh well... if I never post on here again, that means they found out I download apps form the Android Market...and god help us all when they find out about everyone else...
Oh and by the way, "Ookla" isn't part of the government: http://www.ookla.com/about.php
MagickalShadow said:
Who exactly are they and what have they done? Granted, I didn't read the website info, but as I pointed out, this is not really any different than any other app in the entire market.
Last time I checked, the FCC wasn't kicking in the front doors of peoples homes and anal probing them for information about their G-mail contact list. I have no clue who "Ookla" is so, I have no clue what they have been known to do. For that matter I have no clue what M-Lab has been known to do either. If you want to go down the whole Govt. conspiracy "oh no they are after me" road, then hey, knock yourself out. But if they really were after you, they probably wouldn’t take the gamble that you would download their app from Android market. They would probably just legislate it into law that every phone had to ship with it pre-installed.
Unless that would interfere with their plans for the UFO's, the next Sept 11th or the reincarnation of Elvis or whatever other paranoid crap everyone wants to blame a relatively incompetent government of flawlessly doing with the personal information of every citizen within its borders...
I think I am going to text message everyone in my contact and tell them to run a test with this app...then we can all panic that the FCC knows we own cell phones, how fast our internet connections are and where we live...as if they couldn't have figured all this out yesterday before any one of us installed the app...unless they are going to use this to spy on us...oh wait I remember everyone being paranoid about that after watching it happen to Will Smith in "Enemy of the State" back in the '90s...so that can't be it...
Oh well... if I never post on here again, that means they found out I download apps form the Android Market...and god help us all when they find out about everyone else...
Oh and by the way, "Ookla" isn't part of the government: http://www.ookla.com/about.php
Click to expand...
Click to collapse
1) I tempered my post with "this could be benign".
2) No one is hollering conspiracy theorist except you, I'm simply providing the facts that this app exists, it will reside on your phone, and there is no real way of knowing what it does outside of what is stated.
3) Yeah, I read Ookla isn't part of the government, did I ever say they were? But at this point, that's just tit for tat. And if you don't know who "they" are (I think I've spelled that out) and what they've "done", about the only thing I can suggest is that you research your history.
I think I'm about with this post. Do want you want, dude.
whats77inaname said:
1) I tempered my post with "this could be benign".
2) No one is hollering conspiracy theorist except you, I'm simply providing the facts that this app exists, it will reside on your phone, and there is no real way of knowing what it does outside of what is stated.
3) Yeah, I read Ookla isn't part of the government, did I ever say they were? But at this point, that's just tit for tat. And if you don't know who "they" are (I think I've spelled that out) and what they've "done", about the only thing I can suggest is that you research your history.
I think I'm about with this post. Do want you want, dude.
Click to expand...
Click to collapse
Actually the whole tone of your post screams "conspiracy theory". Even your reply does when you state:
"there is no real way of knowing what it does outside of what is stated".
That is the very definition of "conspiracy theory" and really the same could be said for any app. Seriously, this is not the only app that gathers information or accesses the same things, it is just the only one you targeted in your post. You're just paranoid about this specific one because it supposedly has "government ties".
And no, you haven't spelled out who "they" are. That is why I asked. Apparently I am mistaken, so please...enlighten.
Telling me to research history is a cop out. I am guessing you have some evidence of something malicious going on or there would be no need for suspicion of the app outside of some paranoid idea you have. Besides I must be missing something if I don't see the danger in this app that you do, so why trust me to uncover anything on my own in my history research? No, I am sure that you actually have some real hard evidence here that you can bestow upon the masses at large to convince us all what evil lurks within the Android Market.
I mean you post this here about this single app based on not so unique characteristics and you're all like "FCC...GOVERNEMNT...HINT, HINT, HINT" (I am paraphrasing of course), yet fail to elaborate on why, then basically say “well, I am not saying there is anything wrong with it” (paraphrasing again). In your own exact words...Yeeeeeeeeeeeeeah....
So, which is it? Are you "warning" everyone that, except for the FCC name, this app is basicaly like every other app or is there something special that you are trying to hint about it that no one but you knows about? If so, then at least say what that is.
No worries though, I understand that even though someone is paranoid, that is not evidence that they aren't out to get us.

Is there a way to edit the forwarded/replied emails?

Hi. I can not figure any way how can I edit the email messages that are being forwarded or replied to? I mean the original message that is being forwarded or replied to.
I am rather new with WP7 and use it for work. I frequently forward sensitive material to others, where some part of the message is not for everyone.
It is probably the biggest complaint I have over WP7
adminlt said:
Hi. I can not figure any way how can I edit the email messages that are being forwarded or replied to? I mean the original message that is being forwarded or replied to.
I am rather new with WP7 and use it for work. I frequently forward sensitive material to others, where some part of the message is not for everyone.
It is probably the biggest complaint I have over WP7
Click to expand...
Click to collapse
Not possible. I don't know what about Mango, but now - not.
Just tried in mango beta 2 and didn't seem like I could delete anything. Tried reply and forward.
adminlt said:
It is probably the biggest complaint I have over WP7
Click to expand...
Click to collapse
I have other complaints that are bigger, but I agree that I miss this simple feature a lot. Many times I'd like to quote certain parts of an email in a reply to comment on them, which is pretty much impossible right now.
Then again, if you look at the way many modern email clients for the desktop work, they all but the original message at the bottom and make you reply on top by default. So maybe this is the "modern" way to do it and I'm just too old to get it ...
Andy.WP7 said:
I have other complaints that are bigger, but I agree that I miss this simple feature a lot. Many times I'd like to quote certain parts of an email in a reply to comment on them, which is pretty much impossible right now.
Then again, if you look at the way many modern email clients for the desktop work, they all but the original message at the bottom and make you reply on top by default. So maybe this is the "modern" way to do it and I'm just too old to get it ...
Click to expand...
Click to collapse
Certainly not Outlook, you can easily edit quoted message...
doministry said:
Certainly not Outlook, you can easily edit quoted message...
Click to expand...
Click to collapse
Of course you can - not only in Outlook but in pretty much all of them. The default though is that the original message is at the botton, underneath some "header" information from the original mail and the reply is at the top.
Since WP7 is positioned as business oriented, inability to edit forwarded e-mails is major bummer.
Major mistake on Microsoft side, as this will alienate many in the business community.
Even BB, which sucked in most aspects, did allow this.
WP7 was never positioned as business oriented. Where did you get this misleading information? Microsoft has always stated that consumer market was their primary focus. They're even pushing Blackberries to enterprises in lieue of WP7 so that they could put Bing on Blackberry smartphones...
A Windows phone syncs very well with SharePoint, while the syncing capabilitis with live.com are rather limited, so no matter what MS official stance on business vs. consumer may be, this is an area where they clearly have done a better job for business users than for consumers.
In any case, an email client that allows you to properly forward and reply to emails (allowing you to delete/change the original mail) is a requirement for business users as well as consumers.
They missed so many email 'default' features, it's become laughable.
hotmail email flagging
quote/edit part of emails
select all / easier select big parts
bulk actions (mark all as read)
bigger polling intervals (6-12 hours)
and yes, nothing in Mango and probably for at least one year more. I was so happy when wp7 was announced...
I would like to see if they bring something new in Email and Office part regarding functinality. I definitely saw threaded messaging in the email coming.
This is a real question and a serious problem.
In my law firm they are using WP7 devices and several lawyers are complaining that they cannot edit the forwarded emails.
This is absolutely weird. Such limitation is not acceptable
WP7 is definitely not a serious OS, and definitely not made for business purposes. It is just a toy.
arturobandini said:
This is a real question and a serious problem.
In my law firm they are using WP7 devices and several lawyers are complaining that they cannot edit the forwarded emails.
This is absolutely weird. Such limitation is not acceptable
WP7 is definitely not a serious OS, and definitely not made for business purposes. It is just a toy.
Click to expand...
Click to collapse
yep, and that's similar to ios a few years ago. But that was 2007. In fact, it seems Microsoft thinks the market is still in 2007 state for some stuff.
Anyway, the supposed statement that wp7 is 'not for business' is just a PR statement. They mean 'wp7 is not a complete os, yet, so it's not ready for business'.
arturobandini said:
This is a real question and a serious problem.
In my law firm they are using WP7 devices and several lawyers are complaining that they cannot edit the forwarded emails.
This is absolutely weird. Such limitation is not acceptable
WP7 is definitely not a serious OS, and definitely not made for business purposes. It is just a toy.
Click to expand...
Click to collapse
Well maybe they think of kids and Facebook **** more than anything else?
I really wanted to get this answer: why this OS, with so many great ideas has so many idiotic limitations. It's beyond me. But I was called a "hater" instead
Editing forwarded/replied email is a very important functionality. And even if native app doesn't allow it, we could have some 3rd party solutions but they are not supported in any way. In my case there were also other email issues: embedded pictures not displaying, sometimes attachements not appearing after download process.
Interesting to know if these things will change in Mango or MS doesn't really care about it. That's the question: does MS care?
doministry said:
Well maybe they think of kids and Facebook **** more than anything else?
I really wanted to get this answer: why this OS, with so many great ideas has so many idiotic limitations. It's beyond me. But I was called a "hater" instead
Editing forwarded/replied email is a very important functionality. And even if native app doesn't allow it, we could have some 3rd party solutions but they are not supported in any way. In my case there were also other email issues: embedded pictures not displaying, sometimes attachements not appearing after download process.
Interesting to know if these things will change in Mango or MS doesn't really care about it. That's the question: does MS care?
Click to expand...
Click to collapse
I have the certainity they don't. They have taken all the bad sides of apple without the efficency, the vision and the appeal

Whether there are any Peer to Peer messaging apps on Android

whether there are any secure peer to peer messaging apps on Android? (The app should not store any message on any servers)
Skype is a great one, but unfortunately it stores messages for 30 days. It also works with calls, and calling to landlines/mobiles.
So whether the skype's messaging is routed through any servers?? So whatever the message sent by us is first sent to Skype's server?
I am looking for a app which would make a secure connection to another phone and which will enable me to send the messages securely..
Yes. Unfortunately, truely peer to peer is hard to find, as all popular IM services use a server in between.
I have a few questions
So incase if I send some objectionable material against Govt,there is a case that I can be tracked by the Govt? by asking Skype or someother provider to share my details? Whether it's possible for my Govt to look into what I have messaged to someone? (in Skype?)
That last post is highly suspicious...
Edit: Sorry if that offended you, removed the last bit.
suspicious? I had just doubts as I am thinking of who has given the Govt right to snoop into conversation between two individuals which is private?
Think about a situation where we are discussing something funnily against Govt and policies in Skype,the same Govt can use the skype evidence against us and can book us!!That's really pretty bad..
Are the government going to stalk on 2 billion people? It's an impossible task.
VOT Productions said:
Are the government going to stalk on 2 billion people? It's an impossible task.
Click to expand...
Click to collapse
Nothing is impossible if you throw enough money at it ! Look how much they go thru every year !
Sent from my SAMSUNG-SGH-I717 using Tapatalk 2
A quick Google search turns up Gibberbot, is this what you want?
You're wrong, it is possible but difficult to implement
It is proposed to use SLIDESMS.COM
Although they also in some way control the messages you send
However, as you send a message from the phone using a public WiFi via this website, no one is able to track down who sent it
Does say:
"Your IP: *censored* will be logged "
Gigerbot was not the one I was looking for as it involves messaging google
I was looking for an app that would
a)send messages directly from one android phone to another android phone
b)Messages should not be routed through any server
c)Messages should not be stored on any server
d)Messages should be encrypted and much more..
Because I have some plans to make one such app..that's why.

[Q] extent to which google tracking built in to Os

Hi, I am wondering to what extent Google has built into the android OS, ways of collecting data on the user, even when the user does not open a google account and uses only side loaded apps. ? Does anyone know the answer to this?
jaifora said:
Hi, I am wondering to what extent Google has built into the android OS, ways of collecting data on the user, even when the user does not open a google account and uses only side loaded apps. ? Does anyone know the answer to this?
Click to expand...
Click to collapse
Read this thread, even if it's about Xiaomi, on the 2nd page you will find your answer!
setmov said:
Read this thread, even if it's about Xiaomi, on the 2nd page you will find your answer!
Click to expand...
Click to collapse
I've read trough the second page and couldn't find what you're aiming at. So far as I can see it's only about xiaomi ROMs and their proprietary apps, that cause the security holes.
nerotNS said:
I've read trough the second page and couldn't find what you're aiming at. So far as I can see it's only about xiaomi ROMs and their proprietary apps, that cause the security holes.
Click to expand...
Click to collapse
What you were asking is actually just the same! Short answer: Google is in your phone at a API level, and there is no way to get rid of it!
setmov said:
What you were asking is actually just the same! Short answer: Google is in your phone at a API level, and there is no way to get rid of it!
Click to expand...
Click to collapse
It's not the same as the API itself is not the thing that sends the data. The apps that USE those APIs are the ones that route the data.
The apps on the thread
* AntHalService
* XiaomiServiceFramework
* Cleanmaster
* com.xiaomi.gamecenter.adk.service
* com.duokan.airkan.phone
Click to expand...
Click to collapse
None of them are Google apps. All of them are 3rd party. For example, my nexus 4 with stock Android doesn't have these apps, therefore no data is sent.
nerotNS said:
It's not the same as the API itself is not the thing that sends the data. The apps that USE those APIs are the ones that route the data.
The apps on the thread
None of them are Google apps. All of them are 3rd party.
Click to expand...
Click to collapse
An app has not to be Google proprietary. Android is!!! Are you aware of what info are sent out of your android phone without you will be able to intercept them? You are right, apps are sending info, as also Google per se are collecting info, all the time. Please, don't believe me, actually I'm suggesting you not to believe me, but sooner or later, you'll see! There is no firewall, root, or any other trick able to stop them or control them! The only way is to strip Android apart, and recreate a new API, but then, bye bye functionality!
setmov said:
An app has not to be Google proprietary. Android is!!! Are you aware of what info are sent out of your android phone without you will be able to intercept them? You are right, apps are sending info, as also Google per se are collecting info, all the time. Please, don't believe me, actually I'm suggesting you not to believe me, but sooner or later, you'll see! There is no firewall, root, or any other trick able to stop them or control them! The only way is to strip Android apart, and recreate a new API, but then, bye bye functionality!
Click to expand...
Click to collapse
Android is open source, if there were serious security exploits they would have already been found and patched out. If not by Google itself, then by 3rd party developers. It's true that Google collects data like your location, but ONLY if you allow it. Also, even if you're correct, disabling the internet will help anyone who's paranoid enough. Besides, the xiaomi thread deals in stuff a lot more serious (eg. money) than the misc data such as the % of time you spent playing a game. All in all, while it's possible to exploit Android and steal data from incautious users, Android as a system doesn't sell or give your key info (user, pass, card no etc.) to anyone.
nerotNS said:
Android is open source, if there were serious security exploits they would have already been found and patched out. If not by Google itself, then by 3rd party developers. It's true that Google collects data like your location, but ONLY if you allow it. Also, even if you're correct, disabling the internet will help anyone who's paranoid enough. Besides, the xiaomi thread deals in stuff a lot more serious (eg. money) than the misc data such as the % of time you spent playing a game. All in all, while it's possible to exploit Android and steal data from incautious users, Android as a system doesn't sell or give your key info (user, pass, card no etc.) to anyone.
Click to expand...
Click to collapse
That's right, we don't have to be afraid of Google to use our data like Xiaomi, but....here is what I know for sure:
(copied from Xiaomi thread)
The point is that is not important what OS you are using, or what is the phone manufacturer. All of them send your data to their "masters". Said that, let's take a look at google. The first time you boot your precious phone, and you connect to the net, Google will receive your IMEI, your phone number, your location (based on network or gps, depends) an all the data you have on your phone. Ok, I know, I know, they are the owners of the Android OS, and they can do whatever they want, and you will never know what they are doing if you have a stock rom, You will not know what they are doing as a power user with highly customized rom as well. Why? Well, because their API. To be clear, the API, also known as "application programming interface (API) specifies a software component in terms of its operations, their inputs and outputs and underlying types. Its main purpose is to define a set of functionalities that are independent of their respective implementation, allowing both definition and implementation to vary without compromising each other.(as per wikipedia)" in not always an "open source project" and the Android core platform API is not "open source" at all, even in the "AOSP" project. The point is that when you use an android platform, if you want it or not, Google receive your data. Let me go further....a month or so ago, Google has implemented their Gmail policy, and started a new monitoring program against pedophilia, and at my point of view, this is a good thing, but, you have to know what's going on. actually they scan every email in your inbox and to or from their Gmail service searching for clues. If they find something, then you're screwed, because they know who you are. Believe me, they know! But this is not the point, so, where they store all the infos on you, and your Gmail account, when they find nothing? Oh, of course on their servers in the US!!! Based on the Patriot Act, the "Agencies" do not need any kind of "court order" to take a peek inside your life. They can do whatever they want, and actually they are doing it. Google will never say NO, and it's obvious why. Based on what is above mentioned, all the US based companies do the same. Unfortunately, the most of the world use Android, even if the manufacturer is Chinese or Vietnamese or whatever else. If you strip Android apart because all of that and you want your privacy back, you will find an interesting thing, that your Android will no more work correctly, and you will find it unusable. This is exactly because the core functionalities that spy on us. We can discuss this as much as we want, but these are facts. To be completely sure that no one is spying on you, someone would have to rebuild the whole Android system, but without a lot of money and the right "crew" this will never happen. Same thing you can expect from Apple (no need to mention the leakage of their cloud system) or Microsoft. Xiaomi, also use services that need your personal data...cloud, sms, mms, whatever, and by buying their product you agreed with them. They will not stole your credit card, but their "agencies" will know who you are, and what you do. But, to be honest, they will do you nothing if you are a non-Chinese citizen. I have never seen Chinese Agencies doing something to the rest of the world, but I have seen US agencies doing bad things to their citizens and the rest of the world. So, let's be honest and admit it, as much as we talk about laws, no one is protected by them. If you are gonna buy a phone, you have to face the fact that you will be under surveillance and monitored. If you have the luck and you live in Switzerland, then you're ok, if not, well....face it, you are SOL. You have just to understand that no provider, manufacturer or OS developer will never solve this issue, because there is no interest.
About AOSP: (from their site!!!)
- First, the software gets built into a system image for a device, and put through various forms of certification, including government regulatory certification for the regions the phones will be deployed. It also goes through operator testing. -really? YES!
- Once the release is approved by the regulators and operators, the manufacturer begins mass producing devices, and we turn to releasing the source code. hmm....
- In some releases, core platform APIs will be ready far enough in advance that we can push the source code out for an early look in advance of the device's release; however in others, this isn't possible. - hahahaha, ask yourself why!!!
And this is just for start. This is not an app-related issue, we are talking about Android CORE! I love Android, I am using it actively and I am happy with it, it's just that sometimes I feel that this is not fair, but hey, who am I to told them what is or it's not fair? Is not a matter of OS, nor device. All have the same core functionality! NO PRIVACY for them! Accept it or not, these are facts.
I'll start with this:
First, the software gets built into a system image for a device, and put through various forms of certification, including government regulatory certification for the regions the phones will be deployed. It also goes through operator testing. Once the release is approved by the regulators and operators, the manufacturer begins mass producing devices.
Click to expand...
Click to collapse
Government regulatory certification means that the device being certified is built in compliance with the laws of a specific country. That includes building materials, but is mostly focused on radio frequencies. This is to ensure that you don't get a "wild" device with random frequencies (since it has various radios for ex. GSM, GPS, Wi-Fi etc.) which can disrupt the normal functionality of a GSM tower for example. It also ensures that the device is safe (that's what we need FCC for), in terms of radio waves radiation. Operator testing means that when the device is being sold via a carrier like Verizon, AT&T etc., it is compliant with their proprietary software (more commonly known as bloatware) as well as that the device will work properly on their frequency bands. This is the main reason OTAs for Carrier devices are usually quite late compared to the "stock" or OEM devices.
Now about that Gmail scanning service, it doesn't mean that they STORE the results of the scan, they could be read only, meaning that their bot goes over the contents, but doesn't save anything on their servers (this was an issue earlier, but due to lawsuits, Google had to stop saving data, and delete the data already saved).
Next, it's true that Google receives your IMEI, but only AFTER you log in to your Google account. And this is not that they can sell it to someone, but to help identify that particular device on your account for uses of Google services (for example the Google Play web interface; if you had two same device models on your account how would you know which is which?), and IMEI is easy to get and since it's unique it fits the purpose. Your location is used for the same purpose, and even that is not pinpointed exact location but approximate location (which serves the purpose, but isn't intrusive). There is also the use of services such as the Android Device Manager which is a good thing, since it helps find and lock lost/stolen devices. Again, for this you need a unique identifier, and location (in this case precise).
Also, depending on your country of residence they DO have to get at least a court order with reasons for the investigation in order to access your files.
Further down the road, an API can't do anything by itself, it's sort of something that enables an APP to do something. Now that's a big difference, because you can't say "That API sent my data". It' the app that USES the specific API that transmits the data to a 3rd party. That's two worlds apart, because an app we can easily block via a firewall or even delete it completely if we find the need to.
Finally, agencies such as the NSA, FBI, or any other state agency don't have much interest in an ordinary person. There just isn't much to find about a regular citizen, as they don't really care about your every day life (setting up private meetings, sending pics to each other etc.).
nerotNS said:
I'll start with this:
Government regulatory certification means that the device being certified is build and in compliance with the laws of the specific country. That includes building materials, but is mostly focused on radio frequencies. This is to ensure that you don't get a "wild" device with random frequencies (since it has various radios for ex. GSM, GPS, Wi-Fi etc.) which can disrupt the normal functionality of a GSM tower for example. It also ensures that the device is safe (that's what we need FCC for), in terms of radio waves radiation. Operator testing means that when the device is being sold via a carrier like Verizon, AT&T etc., it is compliant with their proprietary software (more commonly known as bloatware) as well as that the device will work properly on their frequency bands. This is the main reason OTAs for Carrier devices are usually quite late compared to the "stock" or OEM devices.
Now about that Gmail scanning service, it doesn't mean that they STORE the results of the scan, they could be read only, meaning that their bot goes over the contents, but doesn't save anything on their servers (this was an issue earlier, but due to lawsuits, Google had to stop saving data, and delete the data already saved).
Next, it's true that Google receives your IMEI, but only AFTER you log in to your Google account. And this is not that they can sell it to someone, but to help identify that particular device on your account for uses of Google services (for example the Google Play web interface; if you had two same device models on your account how would you know which is which?), and IMEI is easy to get and since it's unique it fits the purpose. Your location is used for the same purpose, and even that is not pinpointed exact location but approximate location (which serves the purpose, but isn't intrusive). There is also the use of services such as the Android Device Manager which is a good thing, since it helps find and lock lost/stolen devices. Again, for this you need a unique identifier, and location (in this case precise).
Also, depending on your country of residence they DO have to get at least a court order with reasons for the investigation in order to access your files.
Further down the road, an API can't do anything by itself, it's sort of something that enables an APP to do something. Now that's a big difference, because you can't say "That API sent my data". It' the app that USES the specific API that transmits the data to a 3rd party. That's two worlds apart, because an app we can easily block via a firewall or even delete it completely if we find the need to.
Finally, agencies such as the NSA, FBI, or any other state agency don't have much interest in an ordinary person. There just isn't much to find about a regular citizen, as they don't really care about your every day life (setting up private meetings, sending pics to each other etc.).
Click to expand...
Click to collapse
@nerotNS I am not going to make a discussion with you, on some points you are right, on others, you're very wrong! I would love to be like you!
So, between you, you seem to be saying that an android phone can definitely send info to Google via an app, but you disagree on whether there is anything built into the API which sends info to Google independently of any app which can be clearly seen in the OS. I am wondering if there is anyone who actually knows the answer to this, through being involved in the development of the OS, other than a Google employee who may not be free to tell the truth, if the answer would be unpopular. I wonder if a user can be free of their snooping simply by not opening an account or using any of their products, or whether the only solution is to wait for a truly independent developer to produce a stable, quality device?
QUOTE=nerotNS;56965212]I'll start with this:
Government regulatory certification means that the device being certified is built in compliance with the laws of a specific country. That includes building materials, but is mostly focused on radio frequencies. This is to ensure that you don't get a "wild" device with random frequencies (since it has various radios for ex. GSM, GPS, Wi-Fi etc.) which can disrupt the normal functionality of a GSM tower for example. It also ensures that the device is safe (that's what we need FCC for), in terms of radio waves radiation. Operator testing means that when the device is being sold via a carrier like Verizon, AT&T etc., it is compliant with their proprietary software (more commonly known as bloatware) as well as that the device will work properly on their frequency bands. This is the main reason OTAs for Carrier devices are usually quite late compared to the "stock" or OEM devices.
Now about that Gmail scanning service, it doesn't mean that they STORE the results of the scan, they could be read only, meaning that their bot goes over the contents, but doesn't save anything on their servers (this was an issue earlier, but due to lawsuits, Google had to stop saving data, and delete the data already saved).
Next, it's true that Google receives your IMEI, but only AFTER you log in to your Google account. And this is not that they can sell it to someone, but to help identify that particular device on your account for uses of Google services (for example the Google Play web interface; if you had two same device models on your account how would you know which is which?), and IMEI is easy to get and since it's unique it fits the purpose. Your location is used for the same purpose, and even that is not pinpointed exact location but approximate location (which serves the purpose, but isn't intrusive). There is also the use of services such as the Android Device Manager which is a good thing, since it helps find and lock lost/stolen devices. Again, for this you need a unique identifier, and location (in this case precise).
Also, depending on your country of residence they DO have to get at least a court order with reasons for the investigation in order to access your files.
Further down the road, an API can't do anything by itself, it's sort of something that enables an APP to do something. Now that's a big difference, because you can't say "That API sent my data". It' the app that USES the specific API that transmits the data to a 3rd party. That's two worlds apart, because an app we can easily block via a firewall or even delete it completely if we find the need to.
Finally, agencies such as the NSA, FBI, or any other state agency don't have much interest in an ordinary person. There just isn't much to find about a regular citizen, as they don't really care about your every day life (setting up private meetings, sending pics to each other etc.).[/QUOTE]
So, between you, you seem to be saying that an android phone can definitely send info to Google via an app, but you disagree on whether there is anything built into the API which sends info to Google independently of any app which can be clearly seen in the OS. I am wondering if there is anyone who actually knows the answer to this, through being involved in the development of the OS, other than a Google employee who may not be free to tell the truth, if the answer would be unpopular. I wonder if a user can be free of their snooping simply by not opening an account or using any of their products, or whether the only solution is to wait for a truly independent developer to produce a stable, quality device?
It's not about API, it's about what data apps can access and what is sent over the internet, and it actually goes much further than what most people think.
Use apps like Network Log or Network Connections and give Wire Shark a try, and track which IPs apps connect to.
You'll be surprised...
On my Samsung, after I had removed all the google spyware (erggghhh, I mean google apps) and about 150 stock apps, I saw that the kernel was connecting to some google related IPs and to google's DNS, eventhough I had set the phone to use Open DNS in the resolv.conf file, and that the android system was calling home (read "at google's central office in mountain view, California") everytime I connected (note that my phone had never been linked to any google account whatsoever).
Some of the IPs could easily be blocked by using a firewall script, but for some others and for the DNS leaks I had to patch some jars in /system/framework.
One thing is that it differs from phone to phone, I've checked on a Lenovo and there is much less of such unwanted connections.
Is it embedded in the AOSP code? Maybe, I don't use AOSP or CM based roms so I can't tell, but what I can tell is that it's funny to see people screaming about Xiamoi when it's the same elsewhere.
Anyway, if one wants to protect oneself it's possible albeit a bit involved.
First is first, root.
Second, use Xprivacy and a good firewall like AF+.
Then, make a script to block inbound and outbound disturbing IPs.
So, am I good to go now?
Not yet, let's get a step further...
You need now to decompile some of your system apps and some of your jars, and track lines refering to specific websites and DNS.
- Note that if you really are privacy concerned you should uninstall as many system apps as you can (only 11 left on my phone) and replace them with third part apps that are much easier to restrict and have less privileges. Forget about google spyware (erggghhh and sorry again, I mean google apps), facebook spyware-apk, what's app etc... -
That's it?
Still not, there's more!
Xprivacy is a fantastic tool, but due to android limitations it can't restrict ids for the android system.
Have tou ever heard of android.id, build.serial, ro.boot.serialno, ro.serialno etc.? And what about the serial_no and the mac in the efs folder? And the cpu info in proc? And the serial_number in sys?
- I'll deliberately stay vague on those matters, only people that know what they are doing should mess with that kind of stuff. -
Those are ids specific to your device and of course they identify you, that's what they are meant for!
An example, have a look at the wpa_supplicant.conf localised in data/misc/wifi. You'll see that it has your serial_number which means, and experts please correct me if I am wrong, that everytime you connect on the wifi your serial_number gets sent.
You want to change it manually?
Yeah sure, edit it directly from the file. Now start you wifi and check again the serial_number, you are back to the original value.:cyclops:
I'm not sure whether, if your firewall script is well done and if Xprivacy has been well configured (read "VERY restrictively configured"), those ids leaks or not, but since I like to have more than one protection layer I've edited all of them.
Some ids are easily changed using setpropex or an init script, some are harder and require boot.img editing, but I won't explain any further since as written above only people knowing what they do should play with that stuff.
If all of the above has been done I don't think that anyone can get much data from your phone, but I'm not a security expert and I'd like to hear what you guys think.
Note 1
Trust no one.
I found that apps I had created for testing purposes were requesting my serial, my MCC and my MNC upon installation, eventhough I hadn't given them access to that data neither in the code nor in the android manifest), and then I found that nearly all apps request the same.
Does it come from the IDEs (I have tried with two different brands and it was the same) or does it come from the android OS itself?
I have risen the issue here but nobody seemed interested and nobody blessed me with any relevant answer. Was it that they thought I was unworthy of their attention, or was it that they just didn't know? Or both? Who knows but once more I tell you, TRUST NOONE!!!!
Note 2
Someone said that the NSA and other agencies don't have much interest in a regular person which is true, but they nevertheless gather as much info as they can about as many people as they can, just in case.
In the 50's it was illegal to be a communist in the USA, if cell phones had existed at that time Mac Carthy would have found his job greatly eased.
During the Bush era it was either one was with him or one was against him and was dubbed a bad american (even if one wasn't a terrorist but simply agains Bush's policies), with Guantanamo around the corner if one was suspected of too much empathy with the arab victims.
What's next?
They decide what is subversive and what isn't, and maybe one day you could be subversive because you are against capitalism, or against globalisation, or sympathetic to the people that defend their land agains US invasions and US backed puppet governments.
Or because you rooted your phone?
Keep your eyes open and stay aware guys...
Well, you can always turn on Androids built in Device Encryption (if you don't mind slower r/w speeds). Combine that with a firewall and what you mentioned above and I think you're good.
unclefab said:
It's not about API, it's about what data apps can access and what is sent over the internet, and it actually goes much further than what most people think.
Use apps like Network Log or Network Connections and give Wire Shark a try, and track which IPs apps connect to.
You'll be surprised...
On my Samsung, after I had removed all the google spyware (erggghhh, I mean google apps) and about 150 stock apps, I saw that the kernel was connecting to some google related IPs and to google's DNS, eventhough I had set the phone to use Open DNS in the resolv.conf file, and that the android system was calling home (read "at google's central office in mountain view, California") everytime I connected (note that my phone had never been linked to any google account whatsoever).
Some of the IPs could easily be blocked by using a firewall script, but for some others and for the DNS leaks I had to patch some jars in /system/framework.
One thing is that it differs from phone to phone, I've checked on a Lenovo and there is much less of such unwanted connections.
Is it embedded in the AOSP code? Maybe, I don't use AOSP or CM based roms so I can't tell, but what I can tell is that it's funny to see people screaming about Xiamoi when it's the same elsewhere.
Anyway, if one wants to protect oneself it's possible albeit a bit involved.
First is first, root.
Second, use Xprivacy and a good firewall like AF+.
Then, make a script to block inbound and outbound disturbing IPs.
So, am I good to go now?
Not yet, let's get a step further...
You need now to decompile some of your system apps and some of your jars, and track lines refering to specific websites and DNS.
- Note that if you really are privacy concerned you should uninstall as many system apps as you can (only 11 left on my phone) and replace them with third part apps that are much easier to restrict and have less privileges. Forget about google spyware (erggghhh and sorry again, I mean google apps), facebook spyware-apk, what's app etc... -
That's it?
Still not, there's more!
Xprivacy is a fantastic tool, but due to android limitations it can't restrict ids for the android system.
Have tou ever heard of android.id, build.serial, ro.boot.serialno, ro.serialno etc.? And what about the serial_no and the mac in the efs folder? And the cpu info in proc? And the serial_number in sys?
- I'll deliberately stay vague on those matters, only people that know what they are doing should mess with that kind of stuff. -
Those are ids specific to your device and of course they identify you, that's what they are meant for!
An example, have a look at the wpa_supplicant.conf localised in data/misc/wifi. You'll see that it has your serial_number which means, and experts please correct me if I am wrong, that everytime you connect on the wifi your serial_number gets sent.
You want to change it manually?
Yeah sure, edit it directly from the file. Now start you wifi and check again the serial_number, you are back to the original value.:cyclops:
I'm not sure whether, if your firewall script is well done and if Xprivacy has been well configured (read "VERY restrictively configured"), those ids leaks or not, but since I like to have more than one protection layer I've edited all of them.
Some ids are easily changed using setpropex or an init script, some are harder and require boot.img editing, but I won't explain any further since as written above only people knowing what they do should play with that stuff.
If all of the above has been done I don't think that anyone can get much data from your phone, but I'm not a security expert and I'd like to hear what you guys think.
Note 1
Trust no one.
I found that apps I had created for testing purposes were requesting my serial, my MCC and my MNC upon installation, eventhough I hadn't given them access to that data neither in the code nor in the android manifest), and then I found that nearly all apps request the same.
Does it come from the IDEs (I have tried with two different brands and it was the same) or does it come from the android OS itself?
I have risen the issue here but nobody seemed interested and nobody blessed me with any relevant answer. Was it that they thought I was unworthy of their attention, or was it that they just didn't know? Or both? Who knows but once more I tell you, TRUST NOONE!!!!
Note 2
Someone said that the NSA and other agencies don't have much interest in a regular person which is true, but they nevertheless gather as much info as they can about as many people as they can, just in case.
In the 50's it was illegal to be a communist in the USA, if cell phones had existed at that time Mac Carthy would have found his job greatly eased.
During the Bush era it was either one was with him or one was against him and was dubbed a bad american (even if one wasn't a terrorist but simply agains Bush's policies), with Guantanamo around the corner if one was suspected of too much empathy with the arab victims.
What's next?
They decide what is subversive and what isn't, and maybe one day you could be subversive because you are against capitalism, or against globalisation, or sympathetic to the people that defend their land agains US invasions and US backed puppet governments.
Or because you rooted your phone?
Keep your eyes open and stay aware guys...
Click to expand...
Click to collapse
@unclefab - well said!!!
I completely agree with you. I have also tried to rise some awareness, but I keep seeing answers like "agencies don't have much interest in a regular person" and those are the first that are wrong (or are working for "someone")! Yes guys, when you first start your phone, and connect to the internet, in that very first moment, Google will receive your data, no matter what you did to restrict the leakage! You don't connect to internet? No problem, your operator will receive the same thing when you put their sim into your device! I am no developer, and I am not calling myself as such, but I know what I am talking from a security stand point! I am not a conspiracy theorist, and I will not tell you what I am doing for living, but definitely I know what I am talking about! Some times people are definitely dumb! Are you "people" aware that Google has a direct line (yes a "red phone" connect directly with the gov.?Are you aware what a little cookie can do? Are you aware why they use fake cell towers? Are you aware why they collect your data? Ads improvement? Service Improvement? Court orders? Really? Google isn't storing your data? Or Facebook even worse? Can't you really see what is going on? You can think I am an idiot, but as @unclefab said, trust no one! I am telling you this as a fairy tale, you can or can't believe me, but check for yourself and you'll see!
nerotNS said:
Well, you can always turn on Androids built in Device Encryption (if you don't mind slower r/w speeds). Combine that with a firewall and what you mentioned above and I think you're good.
Click to expand...
Click to collapse
No you're not good to go! Not if you're trying to avoid gov. agencies! And just to be fully clear, encryption will help you with the local thief, any gov. agency will break it in no time (at this time only Lollipop is causing issues to decrypt) !!! But hey, you have any right to believe otherwise!
Just a little off topic example....do you think this is the work of some hacker: http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance
"I completely agree with you. I have also tried to rise some awareness, but I keep seeing answers like "agencies don't have much interest in a regular person" and those are the first that are wrong (or are working for "someone")! "
Yeah, I've noticed the same, and they sometimes remain suspiciously silent on other subjects (like the questions I asked in my previous post or the issue I rose about illegitimate perms in home made apps), so I start to think the same than you.
Which means that we re back to the:
TRUST NOONE!
"when you first start your phone, and connect to the internet, in that very first moment, Google will receive your data, no matter what you did to restrict the leakage!"
True, that's why before to connect for the first time one should do the things I mentionned in post #12, plus some other settings that I will explain about in a soon to come tutorial on how to secure one's phone.
"You don't connect to internet? No problem, your operator will receive the same thing when you put their sim into your device!"
True again, but there's an easy way to bypass that.
First, don't give your real name when you buy a phone (sounds obvious but most people don't even think about it).
Second, don't give your real name when you buy a sim (same remark as above).
Third, with Xprivacy, AF+ Firewall, AppSettings, a firewall script, some init.d scripts etc. I don't think one's operator can get much in terms of private data out of the phone, apart from the sim imsi, the phone number and how many credits left there are.
To secure the internet connection use Tor, your operator will know that you use it but it won't know anything else.
It still knows who we are calling, for how long etc. when we use the phone functions and AFAIK there's no way to prevent that, except maybe by using those apps that encrypt communications (I can't comment on that since I don't use my phone to phone or to text, and anyway I don't believe in encryption, see below).
But then comes common sense and the TRUST NOONE concept, if you call mum for her birthday you can use your phone, if you want to make a sensitive call use a public phone.
"Are you "people" aware that Google has a direct line (yes a "red phone" connect directly with the gov.?"
Yep, the same applies to Microsoft and Skype, Facebook, Twitter, Apple etc.
It's true that they don't really care about us for now but still, they gather as much data as possible in case one day they need to chase people like you and me because of a new anti subversion law.
"And just to be fully clear, encryption will help you with the local thief, any gov. agency will break it in no time"
I agree with you, and I even think that encryption is dangerous cuz it gives people a false sense of security. I don't think there's any encryption that can resist a two storeys computer, and there probably are anyway backdoors everywhere regardless of what their devs claim.
The same applies to Linux, it has been compromised by the NSA since 2003.
Open source, the code can be reviewed blah blah, yeah, sure, and who reviews it?
Who has weeks to spend reading boring lines of code?
The schema is simple, as soon as you have an app, a website or an operating system, or whatever that becomes relatively popular, the men in black come knocking at your door.
Unless you have been clever enough to hide properly, but most of the time that's not the case (see how easily they caught silk road, how easily they trace anonymous hackers, the list goes endless).
You want another example?
After Snowden's revelation many so called secure emails have popped out here and there. I've tried quite a few and guess what?
You can't use most of them if you are on Tor with java script disabled. The funny thing being that you still can use gmail or yahoo without java script, interesting isn't it?
Now back to encryption, instead of using it once more one has to use one's common sense:
DO NOT store sensitive data in your phone, that's it.
If you have sensitive data keep it on an usb stick, or a hard disk, the idea is to have it on a support that is not web connected.
"do you think this is the work of some hacker: http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance"
Hehehe, the only question is which men in black agency made it.
The US? China? Russia? The zionist? India?
unclefab said:
"I completely agree with you. I have also tried to rise some awareness, but I keep seeing answers like "agencies don't have much interest in a regular person" and those are the first that are wrong (or are working for "someone")! "
Yeah, I've noticed the same, and they sometimes remain suspiciously silent on other subjects (like the questions I asked in my previous post or the issue I rose about illegitimate perms in home made apps), so I start to think the same than you.
Which means that we re back to the:
TRUST NOONE!
"when you first start your phone, and connect to the internet, in that very first moment, Google will receive your data, no matter what you did to restrict the leakage!"
True, that's why before to connect for the first time one should do the things I mentionned in post #12, plus some other settings that I will explain about in a soon to come tutorial on how to secure one's phone.
"You don't connect to internet? No problem, your operator will receive the same thing when you put their sim into your device!"
True again, but there's an easy way to bypass that.
First, don't give your real name when you buy a phone (sounds obvious but most people don't even think about it).
Second, don't give your real name when you buy a sim (same remark as above).
Third, with Xprivacy, AF+ Firewall, AppSettings, a firewall script, some init.d scripts etc. I don't think one's operator can get much in terms of private data out of the phone, apart from the sim imsi, the phone number and how many credits left there are.
To secure the internet connection use Tor, your operator will know that you use it but it won't know anything else.
It still knows who we are calling, for how long etc. when we use the phone functions and AFAIK there's no way to prevent that, except maybe by using those apps that encrypt communications (I can't comment on that since I don't use my phone to phone or to text, and anyway I don't believe in encryption, see below).
But then comes common sense and the TRUST NOONE concept, if you call mum for her birthday you can use your phone, if you want to make a sensitive call use a public phone.
"Are you "people" aware that Google has a direct line (yes a "red phone" connect directly with the gov.?"
Yep, the same applies to Microsoft and Skype, Facebook, Twitter, Apple etc.
It's true that they don't really care about us for now but still, they gather as much data as possible in case one day they need to chase people like you and me because of a new anti subversion law.
"And just to be fully clear, encryption will help you with the local thief, any gov. agency will break it in no time"
I agree with you, and I even think that encryption is dangerous cuz it gives people a false sense of security. I don't think there's any encryption that can resist a two storeys computer, and there probably are anyway backdoors everywhere regardless of what their devs claim.
The same applies to Linux, it has been compromised by the NSA since 2003.
Open source, the code can be reviewed blah blah, yeah, sure, and who reviews it?
Who has weeks to spend reading boring lines of code?
The schema is simple, as soon as you have an app, a website or an operating system, or whatever that becomes relatively popular, the men in black come knocking at your door.
Unless you have been clever enough to hide properly, but most of the time that's not the case (see how easily they caught silk road, how easily they trace anonymous hackers, the list goes endless).
You want another example?
After Snowden's revelation many so called secure emails have popped out here and there. I've tried quite a few and guess what?
You can't use most of them if you are on Tor with java script disabled. The funny thing being that you still can use gmail or yahoo without java script, interesting isn't it?
Now back to encryption, instead of using it once more one has to use one's common sense:
DO NOT store sensitive data in your phone, that's it.
If you have sensitive data keep it on an usb stick, or a hard disk, the idea is to have it on a support that is not web connected.
"do you think this is the work of some hacker: http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance"
Hehehe, the only question is which men in black agency made it.
The US? China? Russia? The zionist? India?
Click to expand...
Click to collapse
@unclefab finally someone with some common sense!!! BRAVO!!!!
I am really glad you have elaborated my post! Probably the most will not even see what we wrote here, but hey, someone maybe will be able to learn something new!
Again...BRAVO!!!!
unclefab said:
It's not about API, it's about what data apps can access and what is sent over the internet, and it actually goes much further than what most people think.
Use apps like Network Log or Network Connections and give Wire Shark a try, and track which IPs apps connect to.
You'll be surprised...
On my Samsung, after I had removed all the google spyware (erggghhh, I mean google apps) and about 150 stock apps, I saw that the kernel was connecting to some google related IPs and to google's DNS, eventhough I had set the phone to use Open DNS in the resolv.conf file, and that the android system was calling home (read "at google's central office in mountain view, California") everytime I connected (note that my phone had never been linked to any google account whatsoever).
Some of the IPs could easily be blocked by using a firewall script, but for some others and for the DNS leaks I had to patch some jars in /system/framework.
One thing is that it differs from phone to phone, I've checked on a Lenovo and there is much less of such unwanted connections.
Is it embedded in the AOSP code? Maybe, I don't use AOSP or CM based roms so I can't tell, but what I can tell is that it's funny to see people screaming about Xiamoi when it's the same elsewhere.
Anyway, if one wants to protect oneself it's possible albeit a bit involved.
First is first, root.
Second, use Xprivacy and a good firewall like AF+.
Then, make a script to block inbound and outbound disturbing IPs.
So, am I good to go now?
Not yet, let's get a step further...
You need now to decompile some of your system apps and some of your jars, and track lines refering to specific websites and DNS.
- Note that if you really are privacy concerned you should uninstall as many system apps as you can (only 11 left on my phone) and replace them with third part apps that are much easier to restrict and have less privileges. Forget about google spyware (erggghhh and sorry again, I mean google apps), facebook spyware-apk, what's app etc... -
That's it?
Still not, there's more!
Xprivacy is a fantastic tool, but due to android limitations it can't restrict ids for the android system.
Have tou ever heard of android.id, build.serial, ro.boot.serialno, ro.serialno etc.? And what about the serial_no and the mac in the efs folder? And the cpu info in proc? And the serial_number in sys?
- I'll deliberately stay vague on those matters, only people that know what they are doing should mess with that kind of stuff. -
Those are ids specific to your device and of course they identify you, that's what they are meant for!
An example, have a look at the wpa_supplicant.conf localised in data/misc/wifi. You'll see that it has your serial_number which means, and experts please correct me if I am wrong, that everytime you connect on the wifi your serial_number gets sent.
You want to change it manually?
Yeah sure, edit it directly from the file. Now start you wifi and check again the serial_number, you are back to the original value.:cyclops:
I'm not sure whether, if your firewall script is well done and if Xprivacy has been well configured (read "VERY restrictively configured"), those ids leaks or not, but since I like to have more than one protection layer I've edited all of them.
Some ids are easily changed using setpropex or an init script, some are harder and require boot.img editing, but I won't explain any further since as written above only people knowing what they do should play with that stuff.
If all of the above has been done I don't think that anyone can get much data from your phone, but I'm not a security expert and I'd like to hear what you guys think.
Note 1
Trust no one.
I found that apps I had created for testing purposes were requesting my serial, my MCC and my MNC upon installation, eventhough I hadn't given them access to that data neither in the code nor in the android manifest), and then I found that nearly all apps request the same.
Does it come from the IDEs (I have tried with two different brands and it was the same) or does it come from the android OS itself?
I have risen the issue here but nobody seemed interested and nobody blessed me with any relevant answer. Was it that they thought I was unworthy of their attention, or was it that they just didn't know? Or both? Who knows but once more I tell you, TRUST NOONE!!!!
Note 2
Someone said that the NSA and other agencies don't have much interest in a regular person which is true, but they nevertheless gather as much info as they can about as many people as they can, just in case.
In the 50's it was illegal to be a communist in the USA, if cell phones had existed at that time Mac Carthy would have found his job greatly eased.
During the Bush era it was either one was with him or one was against him and was dubbed a bad american (even if one wasn't a terrorist but simply agains Bush's policies), with Guantanamo around the corner if one was suspected of too much empathy with the arab victims.
What's next?
They decide what is subversive and what isn't, and maybe one day you could be subversive because you are against capitalism, or against globalisation, or sympathetic to the people that defend their land agains US invasions and US backed puppet governments.
Or because you rooted your phone?
Keep your eyes open and stay aware guys...
Click to expand...
Click to collapse
setmov said:
@unclefab - well said!!!
I completely agree with you. I have also tried to rise some awareness, but I keep seeing answers like "agencies don't have much interest in a regular person" and those are the first that are wrong (or are working for "someone")! Yes guys, when you first start your phone, and connect to the internet, in that very first moment, Google will receive your data, no matter what you did to restrict the leakage! You don't connect to internet? No problem, your operator will receive the same thing when you put their sim into your device! I am no developer, and I am not calling myself as such, but I know what I am talking from a security stand point! I am not a conspiracy theorist, and I will not tell you what I am doing for living, but definitely I know what I am talking about! Some times people are definitely dumb! Are you "people" aware that Google has a direct line (yes a "red phone" connect directly with the gov.?Are you aware what a little cookie can do? Are you aware why they use fake cell towers? Are you aware why they collect your data? Ads improvement? Service Improvement? Court orders? Really? Google isn't storing your data? Or Facebook even worse? Can't you really see what is going on? You can think I am an idiot, but as @unclefab said, trust no one! I am telling you this as a fairy tale, you can or can't believe me, but check for yourself and you'll see!
No you're not good to go! Not if you're trying to avoid gov. agencies! And just to be fully clear, encryption will help you with the local thief, any gov. agency will break it in no time (at this time only Lollipop is causing issues to decrypt) !!! But hey, you have any right to believe otherwise!
Just a little off topic example....do you think this is the work of some hacker: http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance
Click to expand...
Click to collapse
unclefab said:
"I completely agree with you. I have also tried to rise some awareness, but I keep seeing answers like "agencies don't have much interest in a regular person" and those are the first that are wrong (or are working for "someone")! "
Yeah, I've noticed the same, and they sometimes remain suspiciously silent on other subjects (like the questions I asked in my previous post or the issue I rose about illegitimate perms in home made apps), so I start to think the same than you.
Which means that we re back to the:
TRUST NOONE!
"when you first start your phone, and connect to the internet, in that very first moment, Google will receive your data, no matter what you did to restrict the leakage!"
True, that's why before to connect for the first time one should do the things I mentionned in post #12, plus some other settings that I will explain about in a soon to come tutorial on how to secure one's phone.
"You don't connect to internet? No problem, your operator will receive the same thing when you put their sim into your device!"
True again, but there's an easy way to bypass that.
First, don't give your real name when you buy a phone (sounds obvious but most people don't even think about it).
Second, don't give your real name when you buy a sim (same remark as above).
Third, with Xprivacy, AF+ Firewall, AppSettings, a firewall script, some init.d scripts etc. I don't think one's operator can get much in terms of private data out of the phone, apart from the sim imsi, the phone number and how many credits left there are.
To secure the internet connection use Tor, your operator will know that you use it but it won't know anything else.
It still knows who we are calling, for how long etc. when we use the phone functions and AFAIK there's no way to prevent that, except maybe by using those apps that encrypt communications (I can't comment on that since I don't use my phone to phone or to text, and anyway I don't believe in encryption, see below).
But then comes common sense and the TRUST NOONE concept, if you call mum for her birthday you can use your phone, if you want to make a sensitive call use a public phone.
"Are you "people" aware that Google has a direct line (yes a "red phone" connect directly with the gov.?"
Yep, the same applies to Microsoft and Skype, Facebook, Twitter, Apple etc.
It's true that they don't really care about us for now but still, they gather as much data as possible in case one day they need to chase people like you and me because of a new anti subversion law.
"And just to be fully clear, encryption will help you with the local thief, any gov. agency will break it in no time"
I agree with you, and I even think that encryption is dangerous cuz it gives people a false sense of security. I don't think there's any encryption that can resist a two storeys computer, and there probably are anyway backdoors everywhere regardless of what their devs claim.
The same applies to Linux, it has been compromised by the NSA since 2003.
Open source, the code can be reviewed blah blah, yeah, sure, and who reviews it?
Who has weeks to spend reading boring lines of code?
The schema is simple, as soon as you have an app, a website or an operating system, or whatever that becomes relatively popular, the men in black come knocking at your door.
Unless you have been clever enough to hide properly, but most of the time that's not the case (see how easily they caught silk road, how easily they trace anonymous hackers, the list goes endless).
You want another example?
After Snowden's revelation many so called secure emails have popped out here and there. I've tried quite a few and guess what?
You can't use most of them if you are on Tor with java script disabled. The funny thing being that you still can use gmail or yahoo without java script, interesting isn't it?
Now back to encryption, instead of using it once more one has to use one's common sense:
DO NOT store sensitive data in your phone, that's it.
If you have sensitive data keep it on an usb stick, or a hard disk, the idea is to have it on a support that is not web connected.
"do you think this is the work of some hacker: http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance"
Hehehe, the only question is which men in black agency made it.
The US? China? Russia? The zionist? India?
Click to expand...
Click to collapse
You guys are way too paranoid. First off, if you're all into don't track us down, why are you using the Internet in the first place? Now for the technical part.
The kernel is trying to get the the DNS because guess what? DNS is needed for Internet connectivity. Android is a smartphone and many of its services rely on having an Internet connection. So it's rather normal that a system-level part is trying to establish a network connection. OEM kernels have more of this compared to AOSP because they use their proprietary services.
And sure, you can use 3rd party apps, but they too can contain tracking data, and prior to 4.4/5.0 core system apps were open source, and you still don't have to use gapps.
Next, you can't change hardware embedded data like serial numbers for a number of reasons, security being one of them. If it was that easy you could never track down stolen phones for example. Much like a motor engine serial number in a car. Same goes for IMEI. Then you spoke about the past. Things change over time, it's not the Cold War ETA anymore. Next yes, court orders. According to international law they DO NEED a court order to see your data. And even that is done only in high profile criminal cases. You can read quite a lot about privacy laws online.
Further, yes you ARE good to go. Androids built in encryption system is pretty tough. If your bootloader is locked down, you have no custom recovery, it ain't that easy to get to your data (excluding nexus devices, because of their development nature this can be relatively easily bypassed). Plus, they'd have to have physical access to your device.
They won't receive any of your "precious" data except your rough location and serial numbers as well as your IMEI that will be bound to your Google account. I've already explained why, plus it's for their statistics for example the number of active android devices, new Android device activations on a daily basis etc.
You say you don't use a real name when buying a phone? Well tell me then, what about ID cards? You fake them too when signing a contract? Buying a prepaid SIM card doesn't need a name anyway. And buying a phone? Same thing, unless bought on contract, in which case the ID card problem persists.
Calling encryption dangerous is ridiculous to say the least. And yes, even "two story computers" are gonna have a bad time cracking it. Ever heard of a 256-bit AES?
Finally saying that nobody reviews "boring source code" is ignorant if nothing else. There are tens of thousands of people PAID to do this. It's not a single guy doing it. Plus just because YOU find it boring, doesn't mean everybody else finds it boring too.
Conclusion: Yes, there are ways to compromise security and data. Yes you can block most of those ways. But this level of paranoia is ridiculous to say the least and sounds like something I'd see in a conspiracy TV commercial. Reading trough your posts here I half expected to see "The end is nigh. Hide your children!" kind of sentence. If you believe that we're all monitored, then throw your router trough the window, smash all your tech, and live in a candle lit room. But please don't spread unfounded fear on a public forum based purely on your assumptions, or on what you see on a TV.
Now setmov I'm speaking directly to you. Calling other people stupid because they don't agree with you is a direct violation of xda's rules. Please refrain from doing it again. Thanks in advance.
nerotNS said:
You guys are way too paranoid. First off, if you're all into don't track us down, why are you using the Internet in the first place? Now for the technical part.
The kernel is trying to get the the DNS because guess what? DNS is needed for Internet connectivity. Android is a smartphone and many of its services rely on having an Internet connection. So it's rather normal that a system-level part is trying to establish a network connection. OEM kernels have more of this compared to AOSP because they use their proprietary services.
And sure, you can use 3rd party apps, but they too can contain tracking data, and prior to 4.4/5.0 core system apps were open source, and you still don't have to use gapps.
Next, you can't change hardware embedded data like serial numbers for a number of reasons, security being one of them. If it was that easy you could never track down stolen phones for example. Much like a motor engine serial number in a car. Same goes for IMEI. Then you spoke about the past. Things change over time, it's not the Cold War ETA anymore. Next yes, court orders. According to international law they DO NEED a court order to see your data. And even that is done only in high profile criminal cases. You can read quite a lot about privacy laws online.
Further, yes you ARE good to go. Androids built in encryption system is pretty tough. If your bootloader is locked down, you have no custom recovery, it ain't that easy to get to your data (excluding nexus devices, because of their development nature this can be relatively easily bypassed). Plus, they'd have to have physical access to your device.
They won't receive any of your "precious" data except your rough location and serial numbers as well as your IMEI that will be bound to your Google account. I've already explained why, plus it's for their statistics for example the number of active android devices, new Android device activations on a daily basis etc.
You say you don't use a real name when buying a phone? Well tell me then, what about ID cards? You fake them too when signing a contract? Buying a prepaid SIM card doesn't need a name anyway. And buying a phone? Same thing, unless bought on contract, in which case the ID card problem persists.
Calling encryption dangerous is ridiculous to say the least. And yes, even "two story computers" are gonna have a bad time cracking it. Ever heard of a 256-bit AES?
Finally saying that nobody reviews "boring source code" is ignorant if nothing else. There are tens of thousands of people PAID to do this. It's not a single guy doing it. Plus just because YOU find it boring, doesn't mean everybody else finds it boring too.
Conclusion: Yes, there are ways to compromise security and data. Yes you can block most of those ways. But this level of paranoia is ridiculous to say the least and sounds like something I'd see in a conspiracy TV commercial. Reading trough your posts here I half expected to see "The end is nigh. Hide your children!" kind of sentence. If you believe that we're all monitored, then throw your router trough the window, smash all your tech, and live in a candle lit room. But please don't spread unfounded fear on a public forum based purely on your assumptions, or on what you see on a TV.
Now unclefab I'm speaking directly to you. Calling other people stupid because they don't agree with you is a direct violation of xda's rules. Please refrain from doing it again. Thanks in advance.
Click to expand...
Click to collapse
@nerotNS
- First thing, I've wrote "Some times people are definitely dumb!" not @unclefab! Please prove me that what I wrote is not right!
- Second, everything WE said is right! Why are you trying so hard prove it otherwise?
- Third, you can see what you have the ability to see! Maybe in your country the prosecutors, law enforcement agencies or else, need a court order, in the US they don't! You know why? Because of Patriot Act! Maybe you don't even know what this is, and you haven't seen the effect of it, but this doesn't mean it not exist!
- Fourth, you have your believes, and I have mine, so I will respect that and not try to change yours, and for me this discussion is over!
To the OP @jaifora, men, believe what you want, you have the right to!
Good luck
@neronS
"Things change over time, it's not the Cold War ETA anymore. Next yes, court orders. According to international law they DO NEED a court order to see your data. And even that is done only in high profile criminal cases. You can read quite a lot about privacy laws online. "
Saying that shows that you are either very young, or that you have never left your home town, or both.
It's not the cold war anymore, true, now it's the so called war on terror, the US allways need to have an ennemy (before that back in the 90's it was the war on narcotics, but you may have not heard about it).
International laws you said?
You think the States care about those laws?
Did they care about it when the UN said that the invasion in Iraq violates such international laws?
Have you heard about the Abou Ghaib jail? That was another nice example on how international laws are followed by the States.
Apart from that, have you heard about corrupted indian officials tracking indian facebook users that expose their scamms?
Have you heard about that indonesian atheist that got severely beaten up by an angry mob because he had declared on his facebook account that he doesn't believe in god, and that endded up in jail (the atheist, not the mob) for blasphemy?
Have you heard about that bangladeshi blogger that may be executed cuz he wrote on his blog that he's an atheist?
You want more examples?
Oh yeah, I almost forgot, the states, the country of freedom and democracy, the country where you need a court order.
What a joke!
Have you heard about all what the US did these last 200 years? And have you heard about what the US is currently doing in 2014?
I guess you didn't, hence your last reply...
But as for me I did, and that's why I can't trust such a country. That said, I can't trust the european, the chinese, the indian or the russian either, not to mention the middle eastern, as I already said I trust NOONE...
"They won't receive any of your "precious" data except your rough location and serial numbers as well as your IMEI that will be bound to your Google account."
Really?
What about permissions like access fine location (precise gps location), read sms, send sms without the user's knowledge, write sms, read bookmarks, write bookmarks, read contats, write contacts, read call log, write call log, read contact card, read user dictionary, get accounts on the device, perms that can be found in apps where such perms are not needed, you want more?
Have a look at all the data leakage when you connect to the internet, and you'll see that it's not only about a few digits...
"You say you don't use a real name when buying a phone? Well tell me then, what about ID cards? You fake them too when signing a contract? Buying a prepaid SIM card doesn't need a name anyway. And buying a phone? Same thing, unless bought on contract, in which case the ID card problem persists. "
You have just proved once more that you have never been away from home.
The vast majority of android users are people from emerging countries where one can buy a phone without giving one's name (so no need to fake anything) and the same applies for the sim.
Those people are not rich arrogant westerners, who think they know everything because mum and dad sent them to a good school, and they don't have any subscription cuz in most of those countries it doesn't exist or if it does it's very limited.Those people buy prepaid credits when they have money, that's it.
How many people in the States? 315 millions.
How many people in western Europe? About 300 millions.
Add Canada, 30, Australia, 20, how many is that?
India, 1.2 billion or even more.
China, 1.2 billion and counting.
Africa, nearly 1 billion.
Indonesia, 250 millions.
Maybe you should leave your hometown and travel a bit, the world doesn't end in the west's boundaries.
"Finally saying that nobody reviews "boring source code" is ignorant if nothing else. There are tens of thousands of people PAID to do this. It's not a single guy doing it. Plus just because YOU find it boring, doesn't mean everybody else finds it boring too. "
Do a search with "linux kernel nsa", you will learn a lot.
" don't spread unfounded fear on a public forum based purely on your assumptions, or on what you see on a TV. "
Well, I haven't seen it on the tv, I have seen it on the field and I know very well what human beings are capable of, which you obviously don't.
So please, don't spread unfounded reinsurance that everything goes fine, that google and the governments are ok, just because a guy talking on their behalf on the tv said they are.
Then, you can call me a conspirationist or whatever, I don't care, I didn't write those posts for people like you but for people that have their eyes open.
"Now unclefab I'm speaking directly to you. Calling other people stupid because they don't agree with you is a direct violation of xda's rules. Please refrain from doing it again. Thanks in advance"
Where did I call anyone "stupid?
You, on the contrary, said that:
"Finally saying that nobody reviews "boring source code" is ignorant if nothing else".
So son, instead of playing mister moderator maybe YOU should watch a bit your language.
Ah the kids of today...:silly:
unclefab said:
@neronS
"Things change over time, it's not the Cold War ETA anymore. Next yes, court orders. According to international law they DO NEED a court order to see your data. And even that is done only in high profile criminal cases. You can read quite a lot about privacy laws online. "
Saying that shows that you are either very young, or that you have never left your home town, or both.
It's not the cold war anymore, true, now it's the so called war on terror, the US allways need to have an ennemy (before that back in the 90's it was the war on narcotics, but you may have not heard about it).
International laws you said?
You think the States care about those laws?
Did they care about it when the UN said that the invasion in Iraq violates such international laws?
Have you heard about the Abou Ghaib jail? That was another nice example on how international laws are followed by the States.
Apart from that, have you heard about corrupted indian officials tracking indian facebook users that expose their scamms?
Have you heard about that indonesian atheist that got severely beaten up by an angry mob because he had declared on his facebook account that he doesn't believe in god, and that endded up in jail (the atheist, not the mob) for blasphemy?
Have you heard about that bangladeshi blogger that may be executed cuz he wrote on his blog that he's an atheist?
You want more examples?
Oh yeah, I almost forgot, the states, the country of freedom and democracy, the country where you need a court order.
What a joke!
Have you heard about all what the US did these last 200 years? And have you heard about what the US is currently doing in 2014?
I guess you didn't, hence your last reply...
But as for me I did, and that's why I can't trust such a country. That said, I can't trust the european, the chinese, the indian or the russian either, not to mention the middle eastern, as I already said I trust NOONE...
"They won't receive any of your "precious" data except your rough location and serial numbers as well as your IMEI that will be bound to your Google account."
Really?
What about permissions like access fine location (precise gps location), read sms, send sms without the user's knowledge, write sms, read bookmarks, write bookmarks, read contats, write contacts, read call log, write call log, read contact card, read user dictionary, get accounts on the device, perms that can be found in apps where such perms are not needed, you want more?
Have a look at all the data leakage when you connect to the internet, and you'll see that it's not only about a few digits...
"You say you don't use a real name when buying a phone? Well tell me then, what about ID cards? You fake them too when signing a contract? Buying a prepaid SIM card doesn't need a name anyway. And buying a phone? Same thing, unless bought on contract, in which case the ID card problem persists. "
You have just proved once more that you have never been away from home.
The vast majority of android users are people from emerging countries where one can buy a phone without giving one's name (so no need to fake anything) and the same applies for the sim.
Those people are not rich arrogant westerners, who think they know everything because mum and dad sent them to a good school, and they don't have any subscription cuz in most of those countries it doesn't exist or if it does it's very limited.Those people buy prepaid credits when they have money, that's it.
How many people in the States? 315 millions.
How many people in western Europe? About 300 millions.
Add Canada, 30, Australia, 20, how many is that?
India, 1.2 billion or even more.
China, 1.2 billion and counting.
Africa, nearly 1 billion.
Indonesia, 250 millions.
Maybe you should leave your hometown and travel a bit, the world doesn't end in the west's boundaries.
"Finally saying that nobody reviews "boring source code" is ignorant if nothing else. There are tens of thousands of people PAID to do this. It's not a single guy doing it. Plus just because YOU find it boring, doesn't mean everybody else finds it boring too. "
Do a search with "linux kernel nsa", you will learn a lot.
" don't spread unfounded fear on a public forum based purely on your assumptions, or on what you see on a TV. "
Well, I haven't seen it on the tv, I have seen it on the field and I know very well what human beings are capable of, which you obviously don't.
So please, don't spread unfounded reinsurance that everything goes fine, that google and the governments are ok, just because a guy talking on their behalf on the tv said they are.
Then, you can call me a conspirationist or whatever, I don't care, I didn't write those posts for people like you but for people that have their eyes open.
"Now unclefab I'm speaking directly to you. Calling other people stupid because they don't agree with you is a direct violation of xda's rules. Please refrain from doing it again. Thanks in advance"
Where did I call anyone "stupid?
You, on the contrary, said that:
"Finally saying that nobody reviews "boring source code" is ignorant if nothing else".
So son, instead of playing mister moderator maybe YOU should watch a bit your language.
Ah the kids of today...:silly:
Click to expand...
Click to collapse
setmov said:
@nerotNS
- First thing, I've wrote "Some times people are definitely dumb!" not @unclefab! Please prove me that what I wrote is not right!
- Second, everything WE said is right! Why are you trying so hard prove it otherwise?
- Third, you can see what you have the ability to see! Maybe in your country the prosecutors, law enforcement agencies or else, need a court order, in the US they don't! You know why? Because of Patriot Act! Maybe you don't even know what this is, and you haven't seen the effect of it, but this doesn't mean it not exist!
- Fourth, you have your believes, and I have mine, so I will respect that and not try to change yours, and for me this discussion is over!
To the OP @jaifora, men, believe what you want, you have the right to!
Good luck
Click to expand...
Click to collapse
I apologize for the mistype I didn't mean unclefab, I meant setmov with his "stupidity" remark.
As for you, I HAVE been around the world quite a lot more than you think. And in case you haven't noticed, I said that you need to give your name ONLY if on contract. I even said that using prepaid doesn't include this. And even according to the Patriot Act they still DO NEED at least a search warrant, otherwise it would be breaking the US Constitution. All the examples you gave above may be true, but you forgot to mention the fact that it was all placed PUBLICLY AND WILLINGLY. The aftermath is a completely unrelated thing. And yes, even though I am 18 I k of quite a lot of the matter as well as other things. Assuming something about someone based on age is immature to say the least. And finally you told me to search Linux kernel NSA. Mate, if you believe everything on Google, I hope you have anti alien cannons in your house. Also claiming that westerners are "rich and arrogant" is considered nationalism. Don't do it, it's bad. Plus everything I learned, I learned on my own. Not in a "good school". As setmov said, as far as I'm concerned the discussion is over, I don't want this to become a public fight. If you wish further talk, you can contact me in a PM.

Categories

Resources