Edward Snowden interview with BBC
-
- MerkinMaker
- Reactions: 62
- Posts: 3232
- Joined: Wed Mar 21, 2012 11:04 am
Up to you. I'm not a hacker, but it's part of my job to protect systems from people who are, so I have more than a rudimentary understanding. Cracking a vanilla Android phone is easy, just Google it, an encrypted device would be more of a challenge, but is still likely possible given some homework. I can't be bothered to do such homework to win and internet argument, but off the top of my head and ten second of research I would probably try something like this:Gin&Tonic wrote:Still like to know whether YOU could gain remote access to MY phone with only 20 minutes prep time from a powered down state or were you talking of a hypothetical situation involving a generic smartphone and the latest and greatest spy tools from the nsa?
Sorry, I just don't believe you.
1. Get phone and perform ADB backup (5-10 minutes). I now have a backup so can work at cracking it without having the phone in hand
2. Check if it's already rooted. Then work the angle that the security updates likely aren't up to date and look for documented exploits
3. Try a brute force attack on the encryption and hope you have a weak password - https://santoku-linux.com/howto/mobile- ... ncryption/
4. Look for know exploits in the specific model - http://forensicswiki.org/wiki/How_To_De ... Encryption
The encryption will only likely slow down a determined attacker, it won't stop them. The chances of the device not having a documented exploit or one that is yet to be documented by might be at some time in the future is close to zero.
I read it on the internet therefore I can do it.
Before you do step 1 won't the phone need to be turned on?
Before you do step 1 won't the phone need to be turned on?
pew, pew, pew, pew!
-
- Wun Gwo Pee
- Reactions: 0
- Posts: 2484
- Joined: Thu Dec 25, 2014 8:07 am
Whenever I read these debates about how 'they' can access your data, I'm always confused as to who 'they' are. When i ask people, I usually get a mumbled - you know, the bosses, or the politicians or whatever - but that seems a bit asinine to me. Press them harder and then you start to hear dark mutterings about New World Order or illuminati or our controllers, and at that point I lose interest because I realise I'm talking to a fucking nutter at best or an idiot bigot at worst, because it's a small leap from that position to nonsense about Jewish banking families. It's never far behind.
I'm with the others who don't give a shit. The world is a much better place now than it has ever been for more of the population than ever before. If that is the Illumaniti's work, or the result of the dark forces of NSA, or lizard people, then long may their good work continue.
I'm with the others who don't give a shit. The world is a much better place now than it has ever been for more of the population than ever before. If that is the Illumaniti's work, or the result of the dark forces of NSA, or lizard people, then long may their good work continue.
-
- MerkinMaker
- Reactions: 62
- Posts: 3232
- Joined: Wed Mar 21, 2012 11:04 am
I guess you missed the part where I said that it's my job, as in writing code and protecting servers from such attacks is what I do for a living.YaTingPom wrote:I read it on the internet therefore I can do it.
- batshitcrazyweirdo
- Batshit Crazy Weirdo
- Reactions: 3
- Posts: 17313
- Joined: Wed May 27, 2015 3:24 pm
- Location: Bat Cave
Really?
Care to elaborate?
What, Raspberry pie?
I am a coder for a very long time. From Cobalt and FORTRAN to Turbo Pascal and C++
I think you are full of shit, but you can prove it.
And so can I.
Care to elaborate?
What, Raspberry pie?
I am a coder for a very long time. From Cobalt and FORTRAN to Turbo Pascal and C++
I think you are full of shit, but you can prove it.
And so can I.
I doubt you write code but instead install security software from third-parties and tinker with it to suit your needs. Not many companies have dedicated security professionals on board. It's a specialist area.starkmonster wrote:I guess you missed the part where I said that it's my job, as in writing code and protecting servers from such attacks is what I do for a living.YaTingPom wrote:I read it on the internet therefore I can do it.
My point was that you can't access a phones software to install whatever when it's turned off. But as a phone has been offered to you to show us your skills to crack it "in 20 mins" I'll offer my apologies if you do it. If you are indeed a security pro I'll also apologies.
Forgive me. I hear a lot of shite spoken about this Snowden stuff. The guy is unhinged.
pew, pew, pew, pew!
-
- MerkinMaker
- Reactions: 62
- Posts: 3232
- Joined: Wed Mar 21, 2012 11:04 am
Unless you've removed the battery, your phone isn't turned off. It's simply hibernating, waiting for a command to come out of hibernation. How do you know your phone is in hibernation, because the screen is off and the light isn't blinking?YaTingPom wrote:My point was that you can't access a phones software to install whatever when it's turned off.
It wouldn't be difficult to write a program that every five minutes activates only Bluetooth/3G/Wi-Fi, listens for a specific type of connection request. If it hears it, it keeps the screen and status light off, but starts everything else and starts broadcasting, if it doesn't it goes back to sleep.
The difficulty would be hiding such a program from people who know what to look for, but not difficult if you're the NSA or GCHQ and you can just lean on the various hardware and software producers involved. But we know they have already been doing that: https://en.wikipedia.org/wiki/PRISM_(su ... e_program).
Last edited by starkmonster on Tue Oct 06, 2015 3:23 pm, edited 1 time in total.
- Phuket2006
- The Internet is my Friend
- Reactions: 100
- Posts: 6986
- Joined: Fri Jan 05, 2007 7:00 am
one thing that is recommended if ur surfing/buying on the dark net
and ur worried about not being seen
take ur laptop to a starbucks or anywhere offering FREE wifi
log on to a vpn
start up tor
about as safe as ur going to get nowadays
and ur worried about not being seen
take ur laptop to a starbucks or anywhere offering FREE wifi
log on to a vpn
start up tor
about as safe as ur going to get nowadays
Who Uses Tor?
Normal PeopleFamily & Friends
People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.
BusinessesBusinesses
Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.
Activists & WhistleblowersActivists
Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.
Journalists and the MediaMedia
Journalists and the media use Tor to protect their research and sources online
Military and Law EnforcementMilitary & Law Enforcement
Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence
"We are turning into a nation of whimpering slaves to Fear—fear of war, fear of poverty, fear of random terrorism, or suddenly getting locked up in a military detention camp on vague charges of being a Terrorist sympathizer." HST
Phuket2006 wrote:one thing that is recommended if ur surfing/buying on the dark net
and ur worried about not being seen
take ur laptop to a starbucks or anywhere offering FREE wifi
log on to a vpn
start up tor
about as safe as ur going to get nowadays
Who Uses Tor?
Normal PeopleFamily & Friends
People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.
BusinessesBusinesses
Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.
Activists & WhistleblowersActivists
Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.
Journalists and the MediaMedia
Journalists and the media use Tor to protect their research and sources online
Military and Law EnforcementMilitary & Law Enforcement
Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence
How can you be sure Tor isn't controlled by the Illuminati, or NSA or the reptilians?
You can tell me all you want and show me wiki articles that "prove" what you're saying. You still haven't risen to the challenge, or answered my comments about your actual job role, to show you can hack a phone in 20 minutes.starkmonster wrote:Unless you've removed the battery, your phone isn't turned off. It's simply hibernating, waiting for a command to come out of hibernation. How do you know your phone is in hibernation, because the screen is off and the light isn't blinking?YaTingPom wrote:My point was that you can't access a phones software to install whatever when it's turned off.
It wouldn't be difficult to write a program that every five minutes activates only Bluetooth/3G/Wi-Fi, listens for a specific type of connection request. If it hears it, it keeps the screen and status light off, but starts everything else and starts broadcasting, if it doesn't it goes back to sleep.
The difficulty would be hiding such a program from people who know what to look for, but not difficult if you're the NSA or GCHQ and you can just lean on the various hardware and software producers involved. But we know they have already been doing that: https://en.wikipedia.org/wiki/PRISM_(su ... e_program).
I worked in IT (development and admin) for many years and one thing I've learnt is that the majority of people in IT bluff their skills or talk bullshit to confuse the uninitiated. Coding requires an amount of common sense which most coders, back when the original languages were written, didn't have. Even MS get you to agree (otherwise you can't load the software) that the software you load (MS own) might not work properly with your OS (MS own!).
Saying the that it's why most systems are so shit on reliability and security. Even LINUX, although as its open source it's probably the best.
There's nothing worse than to listen to IT geeks argue about the best sub-routines or arguments etc. I'd rather eat fish heads and listen to batshitcrazywierid for an hour.
(I'm not having a dig at you just expressing my views on Snowden and IT twats)
pew, pew, pew, pew!
I do believe that there's no spy software and Snowden does work for the NSA and he's a plant.
It's all to keep the world feeling insecure.
It's all to keep the world feeling insecure.
pew, pew, pew, pew!
-
- MerkinMaker
- Reactions: 62
- Posts: 3232
- Joined: Wed Mar 21, 2012 11:04 am
You can make fun now, but you won't be laughing when the lizard people take over.
-
- K440 Acolyte
- Reactions: 0
- Posts: 835
- Joined: Sun Mar 22, 2015 8:32 pm
They already did, they've been running this show for thousands of years according to a friend of mine, we were created by them, hence the story of Adam and Eve and ye' ole snake in the tree offering the apple of change, to have us start wearing fashionable clothing et. al.
of course I have no real proof, but it's all over the inter webs.
of course I have no real proof, but it's all over the inter webs.