|
Xoutpost server transfer and maintenance is occurring.... |
Xoutpost is currently undergoing a planned server migration.... stay tuned for new developments.... sincerely, the management |
|
LinkBack | Thread Tools | Display Modes |
#1
|
||||
|
||||
Attention Android users.
Android bug: MMS attack affects 'one billion' phones. http://www.bbc.com/news/technology-33689399 Stagefright: It Only Takes One Text To Hack 950 Million Android Phones - Forbes
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.” Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance……. |
Sponsored Links | |
|
#2
|
||||
|
||||
Quote:
But it should be noted that due to stock Android software setup, really the only thing important that a "hacker" would have access to is your camera, and I doubt they would have much interest in a bunch of dick pictures. Those who are rooted are most vulnerable, which is a very small fraction of the Android populous. Plus this would really only be useful as a targeted attack on an individual or group, so those of us who would be targeted most likely already have taken safety precautions with their devices. Here is a more accurate source Vast Majority Of Android Devices Are Vulnerable To 'Stagefright' Exploit That Can Be Executed Via Text Message, According To Researchers
__________________
03 3.0i mt 89 325is |
#3
|
||||
|
||||
Thank you for your concern. I never said or phrased anything that indicated that there was an attack. I didn't write any of the information. It came from news sources so I posted it as a public service and editing it would have added my thoughts. Thus the Heads up message is for all concerned and should give the warning to take measures to protect their devices..
Since Android is largest the largest OS in the world I doubt seriously that a measurable amount of those targeted have taken measures to protect themselves..most people bearly have a working knowledge of what the Android operating system is or how it works. In any event Im happy you have responded to provide additional information. Thanks PS here's additional info that stresses that all android users should be concerned. Simple Text Message to Hack Any Android Phone Remotely
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.” Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance……. |
#4
|
||||
|
||||
That's the line I was talking about.
But anyway. You said that most barely have a working knowledge of the OS, that is exactly my point. Those people, by nature, aren't going to have any information really worth "hacking" stored on their phones. You banking apps and others aren't vulnerable even if your phone is compromised by this exploit. If the phone is rooted (which is extremely unlikely for those users), then they could be compromised. Super users are much more vulnerable as they probably have rooted phones as well as sensitive information stored on the device. This kind of exploit really will only be used be either A) law enforcement agencies, such as the NSA or B) competitors. There is simply nothing to gain from a random untargeted attack. TLR the average user isn't important enough to be targeted. The people who do need to worry are the Ross Ulbrichts.
__________________
03 3.0i mt 89 325is |
#5
|
||||
|
||||
Quote:
Android bug: MMS threat affects 'one billion' phones - BBC News Really? TLR the average user isn't important enough to be targeted? Everyone's information is important even the average user so why not let all Android users make that call.
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.” Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance……. |
#6
|
||||
|
||||
It just looked like that because that statement wasn't in quotes, and the title of that article is fearmongering and inaccurate click bait.
But anyway, I don't think you are understanding me. If I were to "hack" your phone, all I would have access to is your camera and microphone, maybe your gallery, maybe your texts, and maybe your contact list. Now tell me, what am I, a "hacker", going to do with a bunch of pictures of your family and some texts to your wife? What am I going to gain by activating your camera? A video of you playing flappybird while you poop? You (not you as an individual, you as the average user) provide me no useful information. I'm not going to take the time to intiate an attack, nor will I take the time to sit there and sift through the data. (Untargeted) If you are a competitor of mine who I suspect is developing a new product. Yes I have something to gain from attempting to hear or see what you are doing. Maybe activate the mic during board meetings, activate the camera periodically to catch a glimpse of something, sift through photos and texts to catch a hint of what's going on. (Targeted) As the government I have a vested interest in catching you do something illegal. If I suspect you of crime I'll hack your phone to gain as much data as possible. Chances are if your phone provides any incriminating evidence, you are probably involved with cybercrime, so your phone will be setup differently than the average user, and will provide much more useful information. (Targeted) The only untargeted attack would most likely be that of government data farming. Plain and simple. John Doe who is a stand up citizen with 3 kids, a wife, a dog, and is a manager at Wal-Mart simply doesn't provide any useful information to anyone to warrant an attack. You might find that offensive, but it is the reality.
__________________
03 3.0i mt 89 325is |
#7
|
||||
|
||||
Joshdub:
I understand you perfectly. What you don't understand is i don't care about the details. It was a public service post meant to help anyone who could use it. If that's not you then so be it. I'm an iPhone user so i really have no use for the information. Have a great day..
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.” Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance……. |
#8
|
||||
|
||||
Quote:
And since you are an iPhone user, you are subject to worse. Apple specifically built in a back door to bypass any and all encryption. Maybe you'll find a use for this information? iOS 'backdoor' entry is real, says Jonathan Zdziarski. Not for NSA, says Apple : PERSONAL TECH : Tech Times
__________________
03 3.0i mt 89 325is |
#9
|
||||
|
||||
Quote:
That information is so 2013. And as you so eloquently put it nobody cares about what's on my phone so why do you belabor the point? Are you just looking for an argument? I believe my intention was as I explained. But if you say that my intention is to spread FUD (Whatever that is) and dismiss any actual information pertaining to the issue then you IMO are saying I had dishonorable intentions. If that's what you believe then our conversation is finished. Let's just give it a rest.
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.” Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance……. |
#10
|
||||
|
||||
FUD: Fear, uncertainty, and doubt.
You are either incredibly stupid or are purposefully being an arrogant ass. I made it very clear multiple times that I was not talking about you as an individual, but using the word you to represent the average user. The article I linked is dated July 23rd 2014, but yes iOS has always had this security issue. Had you read any of the articles I linked you would understand. I hope that whom ever was put into a state of worry from your two original bullshit fearmongering articles reads the factual information that I referenced. Clearly you have zero desire to properly educate your self or others on the issue. I am not saying you set out with bad intentions. You are just willfully ignorant to the actual facts and oddly somewhat defensive about your original links, which I find rather amusing.
__________________
03 3.0i mt 89 325is |
Bookmarks |
Thread Tools | |
Display Modes | |
|
|
|