Home Forums Articles How To's FAQ Register
Go Back   Xoutpost.com > Off-topic > The Lounge
Arnott
User Name
Password
Member List Premier Membership Search Today's Posts Mark Forums Read

Xoutpost server transfer and maintenance is occurring....
Xoutpost is currently undergoing a planned server migration.... stay tuned for new developments.... sincerely, the management


Reply
 
LinkBack Thread Tools Display Modes
  #1  
Old 07-28-2015, 05:36 PM
Quicksilver's Avatar
Premier Member and retired relic
 
Join Date: Mar 2005
Location: NORCAL
Posts: 17,204
Quicksilver will become famous soon enoughQuicksilver will become famous soon enough
Attention Android users.

Just in case you didn't know here's the latest. And no this is not a hoax so heads up.....
Android bug: MMS attack affects 'one billion' phones.

http://www.bbc.com/news/technology-33689399

Stagefright: It Only Takes One Text To Hack 950 Million Android Phones - Forbes
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.”
Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance…….
Reply With Quote

Sponsored Links

  #2  
Old 07-28-2015, 07:34 PM
Joshdub's Avatar
Member
 
Join Date: Jul 2014
Location: Seattle
Posts: 2,065
Joshdub is on a distinguished road
Quote:
Originally Posted by Quicksilver View Post
Just in case you didn't know here's the latest. And no this is not a hoax so heads up.....
Android bug: MMS attack affects 'one billion' phones.

Android bug: MMS attack affects 'one billion' phones - BBC News

Stagefright: It Only Takes One Text To Hack 950 Million Android Phones - Forbes
It is good to spread information like this, but you might want to edit your original post. It reads as if there has been an attack, when in actuality all that has happened is someone found a security loop hole in the Android OS software that is present on nearly one billion phones.

But it should be noted that due to stock Android software setup, really the only thing important that a "hacker" would have access to is your camera, and I doubt they would have much interest in a bunch of dick pictures. Those who are rooted are most vulnerable, which is a very small fraction of the Android populous. Plus this would really only be useful as a targeted attack on an individual or group, so those of us who would be targeted most likely already have taken safety precautions with their devices.

Here is a more accurate source
Vast Majority Of Android Devices Are Vulnerable To 'Stagefright' Exploit That Can Be Executed Via Text Message, According To Researchers
__________________
03 3.0i mt
89 325is
Reply With Quote
  #3  
Old 07-28-2015, 11:32 PM
Quicksilver's Avatar
Premier Member and retired relic
 
Join Date: Mar 2005
Location: NORCAL
Posts: 17,204
Quicksilver will become famous soon enoughQuicksilver will become famous soon enough
Thank you for your concern. I never said or phrased anything that indicated that there was an attack. I didn't write any of the information. It came from news sources so I posted it as a public service and editing it would have added my thoughts. Thus the Heads up message is for all concerned and should give the warning to take measures to protect their devices..

Since Android is largest the largest OS in the world I doubt seriously that a measurable amount of those targeted have taken measures to protect themselves..most people bearly have a working knowledge of what the Android operating system is or how it works.

In any event Im happy you have responded to provide additional information.

Thanks

PS here's additional info that stresses that all android users should be concerned. Simple Text Message to Hack Any Android Phone Remotely
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.”
Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance…….
Reply With Quote
  #4  
Old 07-29-2015, 12:45 AM
Joshdub's Avatar
Member
 
Join Date: Jul 2014
Location: Seattle
Posts: 2,065
Joshdub is on a distinguished road
Quote:
Originally Posted by Quicksilver View Post
MMS attack affects 'one billion' phones.
That's the line I was talking about.

But anyway. You said that most barely have a working knowledge of the OS, that is exactly my point. Those people, by nature, aren't going to have any information really worth "hacking" stored on their phones. You banking apps and others aren't vulnerable even if your phone is compromised by this exploit. If the phone is rooted (which is extremely unlikely for those users), then they could be compromised. Super users are much more vulnerable as they probably have rooted phones as well as sensitive information stored on the device. This kind of exploit really will only be used be either A) law enforcement agencies, such as the NSA or B) competitors. There is simply nothing to gain from a random untargeted attack.

TLR the average user isn't important enough to be targeted. The people who do need to worry are the Ross Ulbrichts.
__________________
03 3.0i mt
89 325is
Reply With Quote
  #5  
Old 07-29-2015, 11:55 AM
Quicksilver's Avatar
Premier Member and retired relic
 
Join Date: Mar 2005
Location: NORCAL
Posts: 17,204
Quicksilver will become famous soon enoughQuicksilver will become famous soon enough
Quote:
Originally Posted by Joshdub View Post
That's the line I was talking about.

But anyway. You said that most barely have a working knowledge of the OS, that is exactly my point. Those people, by nature, aren't going to have any information really worth "hacking" stored on their phones. You banking apps and others aren't vulnerable even if your phone is compromised by this exploit. If the phone is rooted (which is extremely unlikely for those users), then they could be compromised. Super users are much more vulnerable as they probably have rooted phones as well as sensitive information stored on the device. This kind of exploit really will only be used be either A) law enforcement agencies, such as the NSA or B) competitors. There is simply nothing to gain from a random untargeted attack.

TLR the average user isn't important enough to be targeted. The people who do need to worry are the Ross Ulbrichts.
Hey I didn't make it up nor did I author that line. It's the title of the article.
Android bug: MMS threat affects 'one billion' phones - BBC News

Really? TLR the average user isn't important enough to be targeted?
Everyone's information is important even the average user so why not let all Android users make that call.
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.”
Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance…….
Reply With Quote
  #6  
Old 07-29-2015, 01:22 PM
Joshdub's Avatar
Member
 
Join Date: Jul 2014
Location: Seattle
Posts: 2,065
Joshdub is on a distinguished road
It just looked like that because that statement wasn't in quotes, and the title of that article is fearmongering and inaccurate click bait.

But anyway, I don't think you are understanding me.

If I were to "hack" your phone, all I would have access to is your camera and microphone, maybe your gallery, maybe your texts, and maybe your contact list. Now tell me, what am I, a "hacker", going to do with a bunch of pictures of your family and some texts to your wife? What am I going to gain by activating your camera? A video of you playing flappybird while you poop?

You (not you as an individual, you as the average user) provide me no useful information. I'm not going to take the time to intiate an attack, nor will I take the time to sit there and sift through the data. (Untargeted)

If you are a competitor of mine who I suspect is developing a new product. Yes I have something to gain from attempting to hear or see what you are doing. Maybe activate the mic during board meetings, activate the camera periodically to catch a glimpse of something, sift through photos and texts to catch a hint of what's going on. (Targeted)

As the government I have a vested interest in catching you do something illegal. If I suspect you of crime I'll hack your phone to gain as much data as possible. Chances are if your phone provides any incriminating evidence, you are probably involved with cybercrime, so your phone will be setup differently than the average user, and will provide much more useful information. (Targeted)

The only untargeted attack would most likely be that of government data farming. Plain and simple.

John Doe who is a stand up citizen with 3 kids, a wife, a dog, and is a manager at Wal-Mart simply doesn't provide any useful information to anyone to warrant an attack. You might find that offensive, but it is the reality.
__________________
03 3.0i mt
89 325is
Reply With Quote
  #7  
Old 07-29-2015, 02:42 PM
Quicksilver's Avatar
Premier Member and retired relic
 
Join Date: Mar 2005
Location: NORCAL
Posts: 17,204
Quicksilver will become famous soon enoughQuicksilver will become famous soon enough
Joshdub:

I understand you perfectly. What you don't understand is i don't care about the details.
It was a public service post meant to help anyone who could use it. If that's not you
then so be it. I'm an iPhone user so i really have no use for the information.

Have a great day..
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.”
Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance…….
Reply With Quote
  #8  
Old 07-29-2015, 03:11 PM
Joshdub's Avatar
Member
 
Join Date: Jul 2014
Location: Seattle
Posts: 2,065
Joshdub is on a distinguished road
Quote:
Originally Posted by Quicksilver View Post
Joshdub:

I understand you perfectly. What you don't understand is i don't care about the details.
It was a public service post meant to help anyone who could use it. If that's not you
then so be it. I'm an iPhone user so i really have no use for the information.

Have a great day..
Lol okay. So you are just here to spread FUD and dismiss any actual information pertaining to the issue?

And since you are an iPhone user, you are subject to worse. Apple specifically built in a back door to bypass any and all encryption. Maybe you'll find a use for this information?

iOS 'backdoor' entry is real, says Jonathan Zdziarski. Not for NSA, says Apple : PERSONAL TECH : Tech Times
__________________
03 3.0i mt
89 325is
Reply With Quote
  #9  
Old 07-29-2015, 03:26 PM
Quicksilver's Avatar
Premier Member and retired relic
 
Join Date: Mar 2005
Location: NORCAL
Posts: 17,204
Quicksilver will become famous soon enoughQuicksilver will become famous soon enough
Quote:
Originally Posted by Joshdub View Post
Lol okay. So you are just here to spread FUD and dismiss any actual information pertaining to the issue?

And since you are an iPhone user, you are subject to worse. Apple specifically built in a back door to bypass any and all encryption. Maybe you'll find a use for this information?

iOS 'backdoor' entry is real, says Jonathan Zdziarski. Not for NSA, says Apple : PERSONAL TECH : Tech Times

That information is so 2013. And as you so eloquently put it nobody cares about what's on my phone so why do you belabor the point? Are you just looking for an argument? I believe my intention was as I explained. But if you say that my intention is to spread FUD (Whatever that is) and dismiss any actual information pertaining to the issue then you IMO are saying I had dishonorable intentions. If that's what you believe then our conversation is finished. Let's just give it a rest.
__________________
"What you hear in a great jazz band is the sound of democracy. “The jazz band works best when participation is shaped by intelligent communication.”
Harmony happens whenever different parts get to form a whole by means of congruity, concord, symetry, consistency, conformity, correspondence, agreement, accord, unity, consonance…….
Reply With Quote
  #10  
Old 07-30-2015, 12:58 PM
Joshdub's Avatar
Member
 
Join Date: Jul 2014
Location: Seattle
Posts: 2,065
Joshdub is on a distinguished road
FUD: Fear, uncertainty, and doubt.

You are either incredibly stupid or are purposefully being an arrogant ass. I made it very clear multiple times that I was not talking about you as an individual, but using the word you to represent the average user.

The article I linked is dated July 23rd 2014, but yes iOS has always had this security issue. Had you read any of the articles I linked you would understand.

I hope that whom ever was put into a state of worry from your two original bullshit fearmongering articles reads the factual information that I referenced. Clearly you have zero desire to properly educate your self or others on the issue.

I am not saying you set out with bad intentions. You are just willfully ignorant to the actual facts and oddly somewhat defensive about your original links, which I find rather amusing.
__________________
03 3.0i mt
89 325is
Reply With Quote
Reply

Bookmarks

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On





All times are GMT -4. The time now is 09:05 AM.
vBulletin, Copyright 2024, Jelsoft Enterprises Ltd. Search Engine Friendly URLs by vBSEO 3.6.0
© 2017 Xoutpost.com. All rights reserved. Xoutpost.com is a private enthusiast site not associated with BMW AG.
The BMW name, marks, M stripe logo, and Roundel logo as well as X3, X5 and X6 designations used in the pages of this Web Site are the property of BMW AG.
This web site is not sponsored or affiliated in any way with BMW AG or any of its subsidiaries.