Related
Does anyone know how to do it on the Droid?
Is there a single honorable reason why you would be interested in doing this?
I sure can't think of one.
well as soon as wifi packet injection works on android i am switching.
¿GotJazz? said:
Is there a single honorable reason why you would be interested in doing this?
I sure can't think of one.
Click to expand...
Click to collapse
Vulnerability testing... an auditor who wants to do bluetooth related pen test with his/her phone?
archangelugp said:
Vulnerability testing... an auditor who wants to do bluetooth related pen test with his/her phone?
Click to expand...
Click to collapse
Lets go with that . So I'm guessing theres no way yet?
alienware777 said:
Lets go with that . So I'm guessing theres no way yet?
Click to expand...
Click to collapse
Nope. Not yet.
I don't see why it matters to anyone why someone wants this.
I want this too. I don't have to explain to anyone as to why I want it. Because, it is absolutely none of your business. If you don't know how to implement it, then don't post.
Lol. This is a public forum. Of course you don't have to explain why you want something. Equally, if someone who could help doesn't want to, because they suspect you're up to no good, they don't have to justify their actions either, let alone help you. Blessed be.
cauli said:
Lol. This is a public forum. Of course you don't have to explain why you want something. Equally, if someone who could help doesn't want to, because they suspect you're up to no good, they don't have to justify their actions either, let alone help you. Blessed be.
Click to expand...
Click to collapse
Touché. I'll admit it. The main reason I want this is to mess with my friends. Nothing actually detrimental. Same reason I like sms bombers, and caller id fakers.
But still, this would be great to add on to my list
This would be so awesome..just from a security standpoint to be able to show and explain to friends and family to not there guards down when it comes to cyber theft and to turn off your radios when not in use
I never quite understand answers like this. This forum is for the exchange of information, not personal opinions. People that think their some kind of 'ethics police' need not be on this type of site. This site is for the exploration, hacking and development of our phones. Rooting & custom firmware is frowned upon by security researchers and manufacturers alike, but because your into it, it's morally correct?
supern0va said:
I never quite understand answers like this. This forum is for the exchange of information, not personal opinions. People that think their some kind of 'ethics police' need not be on this type of site. This site is for the exploration, hacking and development of our phones. Rooting & custom firmware is frowned upon by security researchers and manufacturers alike, but because your into it, it's morally correct?
Click to expand...
Click to collapse
Yep, one man's "not needed" is another man's necessity. This is no less needed than say someone thinking they need a ps3 controller (or wiimote) working with their phone, but no one really complains about that.
here's a very legitimate reason for you so if you know how PM me
Hi,
A friend of mine has an older mobile with a broken touchscreen - the phone no longer has a SIM or a RAM card and is in "Music Sync" mode when it connects to a PC via USB.
They are currently in a court case and need to get their old SMS's off the broken phone - all the "forensic" mobile software out there (from $500 up to $5000!!!) require that the phone is in PC-Suite (or PC-Sync) mode. This can't be changed on the phone as the touchscreen doesn't work.
The only way to get to the SMS's is by Bluesnarfing, so if you know of a PC program or a WinMo 6.5 program that will let me access their phone PM me.
Thanks.
Why is there always that one person that offers no assistance, takes up bandwidth questioning your motives...
For those that don't know:
"Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking, although both exploit others’ Bluetooth connections without their knowledge. Any device with its Bluetooth connection turned on and set to “discoverable” (able to be found by other Bluetooth devices in range) can be attacked. By turning off this feature you can be protected from the possibility of being Bluesnarfed. Since it is an invasion of privacy, Bluesnarfing is illegal in many countries."
Thread closed
So I think I've done enough research to have an idea of why recording the incoming voice stream is so damn elusive and difficult. Basically, it seems that it's an access issue between the baseband processor and the application processor.
So here's my question/idea: Doesn't the app processor have some level of access to the incoming voice stream by virtue of the fact that the stream can be sent to the headset jack, speaker, or even a bluetooth device at will? If the stream cannot be intercepted when going to the standard ear piece, can it perhaps be intercepted via whatever mechanism is diverting the stream to the various types of output?
For example, maybe we could develop a virtual bluetooth device. Similar to a virtual DVD drive in widows. There's no real physical drive, but the driver makes windows think there is and it can be used to mount ISOs... Well, same concept - make a virtual bluetooth device that android thinks is a physical device, and use whatever existing mechanisms to divert the audio stream to the virtual device. Then of course, the back-end for the virtual bluetooth could simply send the sound back to the handset whilst recording the audio stream.
I'm still an Android dev n00b, so coding this would take me quite some time. But what do you veterans think? Does this sound plausable/impossible/stupid? Maybe someone's thought of this and it didn't work out for whatever reason?
Thanks
Im not a dev by any means but I wish you luck I would love to have call recording on the Atrix. I can have it on the Cap ONLY on I9000 ROMs, had something to do with one of the eurasian Galaxy S models shipping with a call recording feature baked in to the "Dialer" app and the devs ported that dialer to I9000. Afaik it wont work w CM7 so I cant use it even tho I still have the flashable zip on my sd. Maybe if you change your post title to say you are wanting to dev for call recording you would get more of a response, I know this is the dev forum but as many wrong posts that have been here lately you might get overlooked..
Just remember the laws and regulations if you do indeed succeed. In the US, it is illegal to record a call without notifying the party involved with the call.
Cant wait to see it working.
Sent from Motorola Atrix on TELUS.
nosit1 said:
Just remember the laws and regulations if you do indeed succeed. In the US, it is illegal to record a call without notifying the party involved with the call.
Click to expand...
Click to collapse
You're somewhat correct here. The actual answer here is that it is illegal in some states to record any interaction between two people without notification and acceptance by both parties. Some states it's a simple notification, some states it's illegal period, some states it doesn't matter. It's all by the state.
yup very true, every state has different rulings on the laws of call recording. Mostly big states you must notify the other party saying this call is being recorded blah blah blah... I live in CA so everytime I get a telemarketers call I always hear that BS
why on development?.
Moved.
Mr. Clown said:
why on development?.
Moved.
Click to expand...
Click to collapse
Because it's a development question, necessitating an answer from a developer. The legal conversation is not the intent of this post.
Sent from my MB860 using XDA App
nosit1 said:
Just remember the laws and regulations if you do indeed succeed. In the US, it is illegal to record a call without notifying the party involved with the call.
Click to expand...
Click to collapse
There is already a long thread on this same subject in which I layed out the actual law as it pertains to states and the federal law about recording calls.
Please refrain from posting what is 100% wrong, especially when it relates to legalities. You misinform people who could actually be seeking legal advice.
Read the following and educate yourself from there!
http://www.callcorder.com/phone-recording-law-america.htm
I would ask that the moderators shut down threads where legal arguments arise, as there is so much misinformation from ignorant parties in these threads, that it could cause XDA more problems than they bargain for.
more so threads that are retreads of existing threads that aren't even that old.
No more legal talk!!
Sigh... Why on earth can't we talk about this subject without it turning into a legal discussion??
I don't give a rat's a** about the law here. No, I don't intend to break it, but that's 100% irrelevant. I'm not a lawyer trying to solve a legal problem, I'm an engineer and budding mobile dev hobbyist trying to solve a TECHNICAL problem.
Please, don't thwart an otherwise good and edifying technical discussion with fruitless arguing about legal BS. If I were interested in what the law says, I would not be posting to XDA. Come on, guys! Let's talk baseband processors, hacks, kernel mode drivers, <insert more tech jargon here>...
Maybe this is why no one can get anywhere with this. It always somehow transforms from "solve technical problem" (which is what we're good at, and actually qualified to do) to "get into a legal/philosophical debate". I don't know about you all, but I didn't go to law school; I went to a technical school and got a EE. And last time I checked the xda-developers.com home page, it said that XDA is:
"...the largest Internet community of lawyers/law students who like to discuss legal issues as they pertain to mobile devices."
Oops, no wait. My bad. It actually says:
"...the largest Internet community of smartphone/tablet enthusiasts and developers for the Android and Windows Phone platforms."
Can we please try to focus here? I didn't come here to pick a fight. Let's put our heads together and solve a technical problem.
y2whisper said:
more so threads that are retreads of existing threads that aren't even that old.
Click to expand...
Click to collapse
Those threads aren't productive because they all get off-subject by turning into legal debates. I was hoping that maybe this thread could actually be different and maybe help get some real and productive conversation going about the technical issues.
ah fair enough. Maybe edit the subject for that reason. Personally I would like to have this feature, came in handy once on my touch pro. over here we can record as long as 1 party knows its being recorded.
If you legally can't in your area, this thread might not be for you.
y2whisper said:
ah fair enough. Maybe edit the subject for that reason.
Click to expand...
Click to collapse
That's a good idea. I didn't know I could do that. Having trouble though. Sorry, I'm kind of an XDA n00b as well... how do I edit the subject? I can edit the post, but the subject appears to be read-only.
haha wish I could tell you off hand but I haven't had to edit one before.
First off, I want to apologize if this information is either or both regurgitated and irrelevant.
I was looking for information on eMMC, and there really isn't much, and I found an old article that describes how data reliance works with eMMC. At least a cursory look.
One of the features of Reliance (and Reliance Nitro) file system is that it never overwrites live data. It will always use free space on disk or in case there is no space, it will give “disk full” error back to the application. Reliance also has a special transaction mode called “Application-controlled”. In this case, Reliance only conducts a transaction point when asked by the application.
Click to expand...
Click to collapse
Full article here. Information about integration with embedded linux, here.
What struck me was the "Application-controlled" part. It would explain the technology that is undoing changes to /system when the system kills the temp root. I wonder if its possible for temp root to trigger the "commit" function of reliance once some small changes have been made...
Hope this is of some use.
CyWhitfield said:
First off, I want to apologize if this information is either or both regurgitated and irrelevant.
I was looking for information on eMMC, and there really isn't much, and I found an old article that describes how data reliance works with eMMC. At least a cursory look.
Full article here. Information about integration with embedded linux, here.
What struck me was the "Application-controlled" part. It would explain the technology that is undoing changes to /system when the system kills the temp root. I wonder if its possible for temp root to trigger the "commit" function of reliance once some small changes have been made...
Hope this is of some use.
Click to expand...
Click to collapse
Just an FYI, system is an EXT4 FS. This would require not only a custom kernel, but a lot of one offs in the way it's dealing with data. From what I've seen, this isn't what they are using.
But that's a very good find, I am looking into some of the information. Never heard of this before.
Thanks for the info. I would love to find out more about how this memory technology works. More articles are welcome!
Isn't that basically just wear leveling?
Is your name Ben? Or are you perhaps searching on this because of a post that Ben made on HTC? His claim was that even with an unlocked bootloader, that the eMMC could still be locked and prevent us from getting root. This seems far fetched to me.
edufur said:
Is your name Ben? Or are you perhaps searching on this because of a post that Ben made on HTC? His claim was that even with an unlocked bootloader, that the eMMC could still be locked and prevent us from getting root. This seems far fetched to me.
Click to expand...
Click to collapse
In all reality, I'm thinking this is the eventuality. Sprint knows that with root access we can circumvent the WiFi tether that they want to charge you for. They would never be OK with that.
Sent from my PG86100 using Tapatalk
Just an FYI, system is an EXT4 FS. This would require not only a custom kernel, but a lot of one offs in the way it's dealing with data. From what I've seen, this isn't what they are using.
But that's a very good find, I am looking into some of the information. Never heard of this before.
Click to expand...
Click to collapse
Given that you have taken a much closer look at the inner workings than I have, I will defer to your observation with a caveat
According to wiki eMMC supports something called Reliable Write. This suggests that the reversion capability is a part of the eMMC standard. Reliance sounds more and more like a commercial implementation of this function decoupled from a specific media type. After looking it over again, nowhere in the article about Reliance is eMMC mentioned.
Isn't that basically just wear leveling?
Click to expand...
Click to collapse
Wear leveling is a byproduct of what reliable write is doing. The difference is the ability to defer commitment of file system changes, so that a failed system update wont brick the device.
I do not know if changes made to the device are immediate and revertable (i.e., if eMMC is not told to commit a write, the changes just "go away" when its remounted). Nor do I know if reversions can be made on the fly, as we are experiencing when temp root gets deactivation.
There really isn't much information out there about this that is easy to find.
Is your name Ben? Or are you perhaps searching on this because of a post that Ben made on HTC? His claim was that even with an unlocked bootloader, that the eMMC could still be locked and prevent us from getting root. This seems far fetched to me.
Click to expand...
Click to collapse
Neither. eMMC isn't "locked" per se. HTC is using some mechanism that will revert the contents of /system to a prior state when some unknown condition is met. I do not mean to suggest that this is being done through "reliable write" or "Reliance", since it has already been pointed out by someone much more knowledgable on the subject than I that a standard EXT4 file system is being used. I honestly have no idea. I found this information somewhat by accident, and thought that if it could prove useful I should share it here.
Something is dynamically protecting the contents of /system. Once the phone is rooted, I have no doubt that this "something" will be rendered quite impotent. If it were not possible to do so in the first place, OTAs wouldn't work
Sprint knows that with root access we can circumvent the WiFi tether that they want to charge you for. They would never be OK with that.
Click to expand...
Click to collapse
The first part of your statement is true, Sprint knows full well that we can circumvent their attempts to charge us for WiFi tethering with root access. They have known this for years. They also know that in reality there is no way they can completely prevent someone from tethering their phone in one way or another. Even without root access. Ref: PDANet.
In my opinion, this protection of the eMMC contents was designed to reduce support costs from failed OTA updates bricking phones, and perhaps as protection against malware that can attain root, not unlike what Temp Root does.
I am not as paranoid as some here and refuse to accept that this was done specifically to thwart efforts to root the phone. The vast (and i mean VAST) majority of people who buy this phone will never even consider rooting the devices. This same majority has a subset of people that are easily stupid enough to screw up an OTA update or download and install malware.
I will take it a step further and opine that the only reason HTC is unlocking the bootloader is because we are such a minority AND that by tinkering with an unlocked device, we are actually helping HTC improve their product. They would rather have a more appealing facebook page than worry about losing a minuscule fraction of wifi tethering income.m Moreover, take a good look at where Sprint stands in the market, and what they have done recently to improve their position. They are doing a lot of really cool things, and have taken impressive steps to improve customer service and corporate image. That they would allow this bashing of HTC to continue unabated over a handful of tethering dollars is unlikely.
I appreciate your canter, very informative. A thanks will come your way.
Sent from my PG86100 using Tapatalk
Does pdanet allow wireless tether? I didn't think it did.
Sent from my PG86100 using Tapatalk
Nutzy said:
Does pdanet allow wireless tether? I didn't think it did.
Sent from my PG86100 using Tapatalk
Click to expand...
Click to collapse
It doesn't act as a hotspot, no.
Sent from my PG86100 using XDA App
Nutzy said:
I appreciate your canter, very informative. A thanks will come your way.
Sent from my PG86100 using Tapatalk
Click to expand...
Click to collapse
Much appreciated!
Sent from my PG86100 using XDA App
So, I would be interested in hearing more thoughts on this. Is the eMMC independent of the OS? In other words, would a custom ROM have to obey and work with the eMMC? Or could a custom ROM be made to either disable the eMMC or make it do what we want?
edufur said:
So, I would be interested in hearing more thoughts on this. Is the eMMC independent of the OS? In other words, would a custom ROM have to obey and work with the eMMC? Or could a custom ROM be made to either disable the eMMC or make it do what we want?
Click to expand...
Click to collapse
I think you're misunderstanding this. The eMMC is the memory inside the device that everything is stored on. It replaced the old NAND chips in older devices.
The OS is stored & runs off of eMMC memory, it's not independent. If you were to 'turn off' the eMMC the device would do nothing. A lot of the security features available on the chip itself probably aren't in use. HTC has been using their own form of write protection since early last year, even on the NAND based Evo 4G. I'd stake a bet they're using the same system here, and we just need to find a way to flash the ENG bootloader like we did last year to get around it.
I agree with you. reliance is setup to ward against "unauthorized" changes to the /system partitions. i believe the developer community takes way too deep a look at each action made by a corporation (htc) and view them as "big brother", when infact most changes are actually approved, reviewed, and committed by someone in accounting with no technical skills whatsoever. these people are forced to look at the bigger scheme of things and make a decision about it (after working for sprint for almost 2 years now...i can tell you how many decisions are literally made by someone who has no idea what the heck he is making decisions on).
instead of looking at them "trying to stop the development community from unlocking wireless tether" look at them as a CEO (who most of the time has no technical knowledge) and a PR rep (who really only cares about how their company is viewed) and using this kind of encryption is only there to "safeguard" their devices against attacks.
one would think the secret to perm rooting the device is triggering the reliance write function so it commits the changes instead of reloading them. if /system doesnt get changed unless theres an OTA of some sorts....theres more than likely a hash table that reliance would check against to verify...so an OTA would need to write to that table first, then make the changes....
more than likely some other noob has already said something along those lines and been flamed for it as well...just throwing it out there....
newkidd said:
.........
one would think the secret to perm rooting the device is triggering the reliance write function so it commits the changes instead of reloading them. if /system doesnt get changed unless theres an OTA of some sorts....theres more than likely a hash table that reliance would check against to verify...so an OTA would need to write to that table first, then make the changes....
........
Click to expand...
Click to collapse
that stuck out in bold to me..... hmmmmmm
I probably was overlooking what eMMC was, however based on the links the user gave, I later learned a little more about its potential. It would appear that HTC is doing something along the lines of the operations expressed in the link. And if they are not fully replicating efforts, it would be a shame. I like the concept of wear leveling and efficient read/writes. It would be my hope that we could integrate all those functions within a custom rom.
I found a page on the Micron site on eMMC. In the tech notes section there are informational downloads for just one chip. Specifically, the Qualcomm QSC6695
You have to register to download them. A process I have already started. Their site claims it takes a half hour to register a new account.
Once I have the PDFs, I will attach them to the OP.
I don't know if this is the chip the evo 3d is using, but if it is these may prove beneficial to have.
EDIT: Nevermind. i'd have to sign an NDA first.
EDIT: Although, this looks interesting.
Geniusdog254 said:
A lot of the security features available on the chip itself probably aren't in use. HTC has been using their own form of write protection since early last year, even on the NAND based Evo 4G. I'd stake a bet they're using the same system here, and we just need to find a way to flash the ENG bootloader like we did last year to get around it.
Click to expand...
Click to collapse
Perhaps, but a hint at the design really tells me that it would only make sense to offload this protection to the eMMC. Posted a link just a minute ago with the eMMC "enablement" model in PDF form. Interesting read...
CyWhitfield said:
I found a page on the Micron site on eMMC. In the tech notes section there are informational downloads for just one chip. Specifically, the Qualcomm QSC6695
You have to register to download them. A process I have already started. Their site claims it takes a half hour to register a new account.
Once I have the PDFs, I will attach them to the OP.
I don't know if this is the chip the evo 3d is using, but if it is these may prove beneficial to have.
EDIT: Nevermind. i'd have to sign an NDA first.
EDIT: Although, this looks interesting.
Click to expand...
Click to collapse
VERY interesting link & read for sure
CyWhitfield said:
The first part of your statement is true, Sprint knows full well that we can circumvent their attempts to charge us for WiFi tethering with root access. They have known this for years. They also know that in reality there is no way they can completely prevent someone from tethering their phone in one way or another. Even without root access. Ref: PDANet.
In my opinion, this protection of the eMMC contents was designed to reduce support costs from failed OTA updates bricking phones, and perhaps as protection against malware that can attain root, not unlike what Temp Root does.
I am not as paranoid as some here and refuse to accept that this was done specifically to thwart efforts to root the phone. The vast (and i mean VAST) majority of people who buy this phone will never even consider rooting the devices. This same majority has a subset of people that are easily stupid enough to screw up an OTA update or download and install malware.
I will take it a step further and opine that the only reason HTC is unlocking the bootloader is because we are such a minority AND that by tinkering with an unlocked device, we are actually helping HTC improve their product. They would rather have a more appealing facebook page than worry about losing a minuscule fraction of wifi tethering income.m Moreover, take a good look at where Sprint stands in the market, and what they have done recently to improve their position. They are doing a lot of really cool things, and have taken impressive steps to improve customer service and corporate image. That they would allow this bashing of HTC to continue unabated over a handful of tethering dollars is unlikely.
Click to expand...
Click to collapse
I completely agree with all of that. Other carriers have taken many steps to try to prevent wireless tethering. They've asked google to filter certain apps from the market from their customers, they've sent out letters to their customers who they suspect of tethering, they've used ECM's to try to stop it.
But Sprint...they've been remarkably silent on that front. Hell they don't even seem to plan on putting any usage caps in place. In my opinion, I suspect that Sprint wants to be different from the other carriers. They can't outright allow tethering because people would go nuts with it and it would saturate their network. Instead they have this approach of telling you that you can't do it without paying extra, but they look the other way when you do.
I don't know if I fully agree on why HTC locks the phone so tight though. I mean they really went out of their way to make sure nobody touches it. There could have been far more simple countermeasures in place to prevent malware yet still be open to somebody who has physical access to the phone.
It can't be that Sprint insisted on it being that way, otherwise Sprint would have insisted that the Nexus S be fully locked, so I don't believe that this is a carrier issue at all, at least not as far as the Evo 3D is concerned.
One of my suspicions is that HTC may make a profit off of having certain apps installed, much in the way that PC OEM's get paid to preload different apps (e.g. norton.) It could be that they want to make sure that you can't remove them. However that profit they make off of these apps may be significantly offset by having a really negative facebook page, hence the decision to unlock.
Hard to say really.
Ciq well I honestly believe it.doesn't matter
Maybe battery is the only real saver
With or without ciq you still send texts through a system
You still have to pull data
You still went to CNN.com on.4g and they had to process that and send data and receive data back and forth
and carriers can see that whether or not ciq is there
And they say they cant see
I say BS
Comcast says the same thing
They look at the aggregate data
(mmmmmhmmm)
The only way
carriers.couldn't track you I.see is.Unless you're always wifi and texting through Skype..
But then your ISP can track you
But then your so paranoid you use free Wifi hotspots.to stay hidden
..then you probably shouldn't own a smart phone
I honestly believe its people being over paranoid
If you own a smart phone your being tracked with or without gps..
Position can be triangulated based
off of cell signal
I prevented ciq from actually starting on 2.3.6
So its there and not.. but to completely remove
It and still think you're not being tracked is crazy...
If you commit a crime and they want to know where you've been .. Im sure all they really have to do is ask google
Cyanogen or not
Just my thoughts
Sent from my SAMSUNG-SGH-I727 using XDA App
We don't have CIQ on our phones.
Unless its on the skyrocket then your on the wrong section.
Sent from my SAMSUNG-SGH-I777 using XDA App
Damn this.xda.app
Still applies to the world and people being paranoid about tracking
Sent from my SAMSUNG-SGH-I727 using XDA App
They can monitor keystrokes even on an encrypted connection because it is client based and not a "man in the middle". They can also view the data on encrypted connections, which is what people worry the most about. Comcast cannot view encrypted data.
CIQ really comes down to privacy invasion.
What concerns me is that society is becoming more and more desensitized to privacy invasion.It's becoming "the norm" for companies to steal personal info without the consumer knowing or fully understand how much they're taking and what explicitly it is being used for. Just because others do it doesn't make it right, just because there's other methods to get the same info doesn't make it any more acceptable either. I'm concerned that it's becoming common for people to think it's no big deal to have their privacy invaded just because everyone else does it or "they can get it by doing x y or z anyways so it's ok".
People should have the option to know exactly what's being taken and what it's being used for, what is stored and why. Yes they often have it in fine print that they'll take/use your information, but they're often extremely vague on what's gathered or it's buried in technical/legal writing that the average consumer doesn't even begin to understand. I think if more consumers had better knowledge of how much info is being taken and for what, they'd probably feel a bit differently.
Ok so I have a 3D on my line which belongs to my sister. Well she works at the mall and some Indian guy that used to work for Sprint is telling her he hacks into her phone all the time and uses her internet and that if he wanted to he can access her photos too. So is this possible or is he just bs'in to spark coversations with her? I'm about ready to go over to her job and confront him. I find that sort of behavior creepy and intolerable! Any1 has any idea??
Sent from my SPH-D710 using XDA
I don't know if it's possible, but that is creepy and disgusting. If that happened to my family member, I would not put up with it.
Sent from my ICS 3VO with Tapatalk 2
You need to go to the mall and take care of business...
Sent from my PG86100 using Tapatalk
I'm starting to believe its possible. She just called me from her work phone to tell me she pulled out her battery bcuz it freaked her out and he asks what did she do bcuz he no longer has internet access. I might catch a case tonight I'm highly upset..
Sent from my SPH-D710 using XDA
idk man, you need to do some dental work.
I don't know if a "random" person could hack a phone. But:
1. Is the phone rooted? That would give a person more ability to do something bad.
2. There are "spy" software out there. But the guy would have had to have a few minutes alone with the phone.
3. Maybe install malware through an E-mail or text message.
But to use her phone for Internet access sounds pretty weak. Easier and better methods of doing that at a mall where public WIFI is all around.
Bottom line, if you are actually concerned, just have your sister do a factory restore, that wipes everything and then reinstall her apps one at a time validating all are suppose to be on her phone.
weidnerj said:
I don't know if a "random" person could hack a phone. But:
1. Is the phone rooted? That would give a person more ability to do something bad.
2. There are "spy" software out there. But the guy would have had to have a few minutes alone with the phone.
3. Maybe install malware through an E-mail or text message.
But to use her phone for Internet access sounds pretty weak. Easier and better methods of doing that at a mall where public WIFI is all around.
Bottom line, if you are actually concerned, just have your sister do a factory restore, that wipes everything and then reinstall her apps one at a time validating all are suppose to be on her phone.
Click to expand...
Click to collapse
1. No
2. I know about the spy software stuff. I don't know if the guy ever had access to the phone. She did say she bought a case from him b4 and i wouldn't put it past her to put it on a strangers hands in her times of frustration. She's always having problems and going to someone for help.
3. Probably
And yea I guess I'll tell her to do a hard reset. Thanks!
Sent from my SPH-D710 using XDA
RayTrue04 said:
And yea I guess I'll tell her to do a hard reset. Thanks!
Sent from my SPH-D710 using XDA
Click to expand...
Click to collapse
You should hard reset his face . Just kidding. Violence is not the answer. Can't we all just get along.
Sent from my ICS 3VO with Tapatalk 2
Yea f that. Reset her phone and then reset that guys face
Sent from my PG86100 using xda premium
Just check she hasn't got portable wifi Hotspot switched on on her phone.
I sometimes use that on my phone when I'm out to connect family members phones and laptops to the internet.
Sent from my HTC EVO 3D X515m using XDA
abdeviation said:
This thread is hilarious
Click to expand...
Click to collapse
this thread is exactly the kind Papa Smurf posted about...basic networking rules...the ONLY way he can intercept her wireless internet signal is if she is connected to the malls wifi... thing is i personally have programs that will allow me to spoof ANY gateway that i am connected to and collect cookies, not to mention use them. i have a program that if i connect to a server that she is connected to i can kill her internet signal... i have one also to where i can connect into her phone or computer.. bottom line... if its wireless and a public server...it becomes public info... so if she stays off the malls wifi and uses just her providers internet connection then she will be fine...unless he clones her phone which he would have to steal first .... now.. prompoting violence is childish ...its not what the forum is for...if anything reprt the guy to the police and give him a record that will ride with him...
RayTrue04 said:
I'm starting to believe its possible. She just called me from her work phone to tell me she pulled out her battery bcuz it freaked her out and he asks what did she do bcuz he no longer has internet access. I might catch a case tonight I'm highly upset..
Sent from my SPH-D710 using XDA
Click to expand...
Click to collapse
Ok try this and check if it works.....post back the results.
https://play.google.com/store/apps/details?id=com.gurkedev.wifiprotector
If you want it free, the developer posted a free version for XDA users here ----> http://forum.xda-developers.com/showthread.php?t=1350941
If that Indian guy (not me ) is using android phone or PC, he surely is using apps like FaceNiff, Cain & Abel, ANTI, ettercap, DroidSheep, NetCut etc....
So this app should help but it will not work to its full potential as your Sisters phone is not rooted.
Or you can tell her to disable internet or wifi on her phone.
P.S You said the guy used to work for Sprint, Is your Sis using a Sprint Phone?
Is her phone CIQ free?
wloftus had it down.
The only other thing I can think of is he has get password to a security app that can backup pictures and whatnot.
Bottom line is this sounds like a classic harassment case. Get him to text her about this for evidence, go to the police, he gets arrested and the girl is protected by a no contact order. Pretty simple.
wloftus said:
this thread is exactly the kind Papa Smurf posted about...basic networking rules...the ONLY way he can intercept her wireless internet signal is if she is connected to the malls wifi... thing is i personally have programs that will allow me to spoof ANY gateway that i am connected to and collect cookies, not to mention use them. i have a program that if i connect to a server that she is connected to i can kill her internet signal... i have one also to where i can connect into her phone or computer.. bottom line... if its wireless and a public server...it becomes public info... so if she stays off the malls wifi and uses just her providers internet connection then she will be fine...unless he clones her phone which he would have to steal first .... now.. prompoting violence is childish ...its not what the forum is for...if anything reprt the guy to the police and give him a record that will ride with him...
Click to expand...
Click to collapse
I've hope it's obvious that I was joking about the violence as I do think the police should get involved if this guy is harassing her. The implication from the op is that this guy is doing this from a distance so the wifi hot spot does not seem to be the way he is doing it. Since he worked for sprint, he could be using a back door of some sort.
Sent from my ICS 3VO with Tapatalk 2
RayTrue04 said:
1. No
2. I know about the spy software stuff. I don't know if the guy ever had access to the phone. She did say she bought a case from him b4 and i wouldn't put it past her to put it on a strangers hands in her times of frustration. She's always having problems and going to someone for help.
3. Probably
And yea I guess I'll tell her to do a hard reset. Thanks!
Sent from my SPH-D710 using XDA
Click to expand...
Click to collapse
its not possible - andvwhen he works for sprint, you should go to his boss.
when he touched her mobile phone, you can go to court (when you want to)
has she enebled usb-debugging/adb access? disable it.
check all installed user apps if there is dome suspicious with ****loaads of permissions (camera, file access, microphone, etc)
lol enough to kick this guy in the ass with your rights
mnomaanw said:
Ok try this and check if it works.....post back the results.
https://play.google.com/store/apps/details?id=com.gurkedev.wifiprotector
If you want it free, the developer posted a free version for XDA users here ----> http://forum.xda-developers.com/showthread.php?t=1350941
If that Indian guy (not me ) is using android phone or PC, he surely is using apps like FaceNiff, Cain & Abel, ANTI, ettercap, DroidSheep, NetCut etc....
So this app should help but it will not work to its full potential as your Sisters phone is not rooted.
Or you can tell her to disable internet or wifi on her phone.
P.S You said the guy used to work for Sprint, Is your Sis using a Sprint Phone?
Is her phone CIQ free?
Click to expand...
Click to collapse
She doesn't connect to public wifi shes on sprints network so i doubt that app would help. I just had her do a hard reset on it. Hopefully that helps idk.. And yes its a Sprint phone Evo 3D completely stock on the latest software htc released.
Sent from my SPH-D710 using XDA
e3d said:
its not possible - andvwhen he works for sprint, you should go to his boss.
when he touched her mobile phone, you can go to court (when you want to)
has she enebled usb-debugging/adb access? disable it.
check all installed user apps if there is dome suspicious with ****loaads of permissions (camera, file access, microphone, etc)
lol enough to kick this guy in the ass with your rights
Click to expand...
Click to collapse
He no longer works for them he used to.
Well if anything I'm just tryna get his whole name because the Sprint rep last night wanted to flag him and start a case. So far only know first name so I have to wait till I go again this week.
I doubt she would enable usb debugging she's not that kind of girl to know what that is. All she do is calls, text, fb, and some web browsing at the most..
Sent from my SPH-D710 using XDA
Do any of you know anything about software at all? there is only one way to get into the phone and that is through the bluetooth. Other than that, very unlikely someone IN A MALL COULD DO THAT! there are hundreds of phones. plus, one threat like that to start off is subject to be terminated from any position he is in. HE likely got fired from sprint because he acts like he can do things he has no idea about.
However, 99.9% chance there is NO WAY the stupid small penis indian man can get into her phone. but one fact is that his face needs punched more than a few times... just make sure no one rats you out. make sure there is no one that sees you smash his face in. If the Indian doesn't learn a lesson now he'll just keep playing this game with everyone he walks into. He needs to learn one way or another.
Oh, I'm being nice too. If we were in any other country. he'd just have a bullet through his head.
However, I shouldn't even have said anything about the bluetooth part... but everyone needs to understand.. this is a topic we shouldn't even talk about. the reason is that kids that have no lives will use this information to attempt to find ways to spy on their gf's and stuff because they are low life fools.
anyway, to end this off.. I do thank everyone in here for being valued members of this forum... Remember do things responsibly. Anyone caught in here violating any law or creeping on others should be banned without question and legally should be held responsible for their actions.
to finish it completely off. the indian guy is a creep. he was fired from sprint for the same bs he doing to her. report him and have him fired again. PS. there is nothing in my comment that is racist, wrong, bad, blahblahblah. I'm a perfect little angel.
runcool said:
Do any of you know anything about software at all? there is only one way to get into the phone and that is through the bluetooth. Other than that, very unlikely someone IN A MALL COULD DO THAT! there are hundreds of phones. plus, one threat like that to start off is subject to be terminated from any position he is in. HE likely got fired from sprint because he acts like he can do things he has no idea about.
However, 99.9% chance there is NO WAY the stupid small penis indian man can get into her phone. but one fact is that his face needs punched more than a few times... just make sure no one rats you out. make sure there is no one that sees you smash his face in. If the Indian doesn't learn a lesson now he'll just keep playing this game with everyone he walks into. He needs to learn one way or another.
Oh, I'm being nice too. If we were in any other country. he'd just have a bullet through his head.
However, I shouldn't even have said anything about the bluetooth part... but everyone needs to understand.. this is a topic we shouldn't even talk about. the reason is that kids that have no lives will use this information to attempt to find ways to spy on their gf's and stuff because they are low life fools.
anyway, to end this off.. I do thank everyone in here for being valued members of this forum... Remember do things responsibly. Anyone caught in here violating any law or creeping on others should be banned without question and legally should be held responsible for their actions.
to finish it completely off. the indian guy is a creep. he was fired from sprint for the same bs he doing to her. report him and have him fired again. PS. there is nothing in my comment that is racist, wrong, bad, blahblahblah. I'm a perfect little angel.
Click to expand...
Click to collapse
well, you can not only go into it via wifi. so my question: do you know anything? (exploits, etc)
if the mall has a open wlan, she should use secure sites only "https://blablabla.com" only... it is possible to hijack traffic, for example in malls "man in the middle method" (do not know why i know this.... )
another way to secure her phone is, to deactivate the installation of unsigned / non-market apps.
also, a password or sth other to unlock isnt a bad idea.
so, have fun - btw, you could ask that question for every android handset, op
e3d said:
well, you can not only go into it via wifi. so my question: do you know anything? (exploits, etc)
if the mall has a open wlan, she should use secure sites only "https://blablabla.com" only... it is possible to hijack traffic, for example in malls "man in the middle method" (do not know why i know this.... )
another way to secure her phone is, to deactivate the installation of unsigned / non-market apps.
also, a password or sth other to unlock isnt a bad idea.
so, have fun - btw, you could ask that question for every android handset, op
Click to expand...
Click to collapse
There are WiFi sniffing tools on android. There are WiFi spoofing tools on android.
Possibility is there, change Gmail password never hurts.
But seriously, no sharing WiFi with other people and logging into private bank/Facebook/ other sites where your logged in with 50 other people on open WiFi. That stuff can be picked up, username/passwords.
Intimidation is the best answer...big guy comes up "alright who's the yutz messing with MY sister!"