Hackers find exploit in Android phones

Keep it clean but fun.
Post Reply
User avatar
Verahta
Posts: 440
Joined: Wed Aug 24, 2011 1:50 am

Hackers find exploit in Android phones

Post by Verahta »

"In order to understand recursion, one must first understand recursion".
User avatar
Chris
Posts: 1580
Joined: Wed Sep 30, 2009 7:22 pm

Re: Hackers find exploit in Android phones

Post by Chris »

Nothing new. iOS has worse flaws :D you can bruteforce iOS through Bluetooth.

Don't jailbreak your iPhone 5s cause I'll get your fingerprint :D
Fighting for peace is declaring war on war. If you want peace be peaceful.
User avatar
Jackolantern
Posts: 10891
Joined: Wed Jul 01, 2009 11:00 pm

Re: Hackers find exploit in Android phones

Post by Jackolantern »

Maybe I am just cynical, but I always have a tendency to not trust traditional media when they start talking about technology. They just get so many things horribly wrong, and they take small details and blow it up to make it look scary. They also get tricked so often with things that simply aren't true. I think it was for the iPhone 5 that many news agencies were duped into running a story that the new model would have a projected keyboard and other similarly stupid things that anyone with any tech experience would have known were a joke.

There may be some truth here, but I have strong doubts whenever any news agency uses the phrase "the app can take control of the device", because Android runs each app in isolation as a restricted Linux user. So the software doesn't even exist in the OS for an app to take control of the phone without tons of Intent pop-ups, asking how you want to allow the app to take control of the camera, etc. Every time one of these stories shows up, it always ends up being that the researchers had to have a specific app installed already that was given broad permissions access when it was downloaded, and then they can script through a vulnerability to send an Explicit Intent to the app to start it up. But if you aren't downloading random, no-name apps that come with a fleet of permissions, you are fine. The news always seems to downplay the fact that you needed the malicious app installed first.
The indelible lord of tl;dr
User avatar
Callan S.
Posts: 2042
Joined: Sun Jan 24, 2010 5:43 am

Re: Hackers find exploit in Android phones

Post by Callan S. »

Very good point, Jack! They could use you as a technical advisor. Apart from sensationalism, it's probably a good deal to do with ignorance as well.
User avatar
Sharlenwar
Posts: 523
Joined: Mon May 28, 2012 7:14 pm

Re: Hackers find exploit in Android phones

Post by Sharlenwar »

But that doesn't minimize the fact that most people who use technology are unaware of what potentially could be done with it. I believe the internet was designed as a surveillance tool for the military. Just with the basic fact that everything you do from your computer is tracked. Of course there are ways at hiding this information, but to those who don't understand won't. At work here, we subscribe to something called Act-On. And man, it is basically big brother for your website. You are able to track when people open their emails, what they click, even on the websites that have the tracker code in them will track how long you have been on the pages, where you've clicked, etc.

It is an amazing marketing tool, but scary at how much information you can actually pull from a connecting IP.

Understand the world we live in, and understand the technology that helps it run.
Deep within the Void of Quasion, a creation.

**My Corner of the Web**
***NEW***GrindFest - My own PHP/MySQL game!
Sharlenwar's Adventures
Torn-City - Massively multiplayer online text based RPG
User avatar
Jackolantern
Posts: 10891
Joined: Wed Jul 01, 2009 11:00 pm

Re: Hackers find exploit in Android phones

Post by Jackolantern »

Actually, the Internet was designed to be a highly tolerant communications network, unlike the phone and other communication networks. Also, the way the Internet is designed actually makes tracking extremely difficult because it is not centralized. The Internet is made up of tons of hardware, most of which is in the private sector. And tracking things would mean getting a subpoena to every piece of that private sector hardware, which just isn't going to happen. That is how people in Anonymous can stay...well...anonymous, even with the government wanting to track down their big fish. Once you have gone behind a couple of anonymous proxies with hardware in different nations, no one will be able to track you down.
The indelible lord of tl;dr
Post Reply

Return to “Off-Topic”