thewayne: (Default)
LG exited the smart phone market four years ago, and they're about to pull the plug with a final update for Android 12. If you're still using one, or have a spare sitting in a drawer, you need to update it and think seriously about replacing it.

Alternatively, according to Slashdot comments, there's the Lineage OS for some models that can be flashed that may keep it running for a while. Batteries and other components may be of variable availability.

https://9to5google.com/2025/04/28/lg-shut-down-update-servers-june-2025/
thewayne: (Default)
This is, surprisingly, a good idea.

There are two types of malware threats with smartphones: persistent threats and non-persistent threats. A persistent threat is very hard to achieve on smartphones running the latest OS and fully-patched. Not impossible, but very hard. You would probably need to be a high-value individual, journalist or military or government official. Something like that. It's also expensive. The bad guys are looking at buying zero-day exploits - software flaws that are not yet known to the phone vendors and thus are unpatched - and those can cost a half million dollars or more to buy.

Non-persistent threats are different. These are newish and a common form is what's known as a zero-click exploit, achieved through sending someone a message in email or text that looks normal but actually is a web page with embedded code that activates an exploit.

There's a big difference between the two. The non-persistent threats vanish after a reboot! Power-cycle the phone, or turn it off for five minutes to let the memory completely drain, and it's gone like it had never been there. And these threats are much more widely seen than persistent threats: visit the wrong web site, or have your email address compromised to certain people, and you're targeted.

And all you need to do is power off your phone for five minutes, and no more threat.

https://www.theguardian.com/technology/2023/jun/23/turn-your-phone-off-every-night-for-five-minutes-australian-pm-tells-residents

This Stackexchange post goes a little deeper into how this works for purging non-persistent threats:
https://security.stackexchange.com/questions/270904/does-rebooting-a-phone-daily-increase-your-phones-security

Now, there's an interesting twist that some non-persistent threats use to keep you from rebooting, and you're going to say something like 'Damn, these people are evil!' when you read this: fake power-off screens and dialogs! It looks like your phone is powering down and rebooting, but it's just screens and dialog presented by the program because it intercepted the power off key signal.

https://yro.slashdot.org/story/23/06/26/1237237/turn-your-phone-off-every-night-for-five-minutes-australian-pm-tells-residents
thewayne: (Default)
This works against both Android and iPhone devices. However, Apple went to facial recognition a few generations ago, so you've got a much older iPhone if you're still using a finger print reader.

The attack is not quick and straightforward. It requires the attacker to have physical control of the devices and can take up to hours to execute. But it is quite clever!

The phone is partially disassembled and a chip is mounted onto the system board. A memory card with a database of fingerprint data is part of this attack system. The basics of the attack is quite simple: while you and I may not have identical fingerprints as far as a fingerprint expert is concerned, they might be similar. This attack exploits a vulnerability in the system and "...manipulates the false acceptance rate (FAR) to increase the threshold so fewer approximate images are accepted."

Meaning that if your fingerprint is similar to mine, and yours is in this fingerprint database, through this system your fingerprint might unlock my phone!

Now, one thing the manufacturers did to prevent multiple attempts at unlocking phones was to code in a hard limit as to how many unlock attempts that you get. This system TRIPLES that limit!

Pretty darn clever.

Now here's the killer: the parts to make this are about $15.

And the database of fingerprints? Biometric database breaches. Not difficult to obtain.

https://arstechnica.com/information-technology/2023/05/hackers-can-brute-force-fingerprint-authentication-of-android-devices/

https://it.slashdot.org/story/23/05/24/0435205/brute-force-test-attack-bypasses-android-biometric-defense
thewayne: (Default)
This is mind-bogglingly bad. "Samsung shipped an estimated 100 million smartphones with botched encryption, including models ranging from the 2017 Galaxy S8 on up to last year’s Galaxy S21."

FOUR YEARS they blew it?! And Samsung was supposed to be the flagship of Droid phones?! There were two major flaws, one was fixed after it was revealed, then the second, dealing with initialization vectors, which was also there from the beginning, wasn't fixed until another paper was published.

Sorry, I'll happily stick with my lovely walled-garden iPhone. But to each their own. It may have its own issues, but I think their attitude to security is better than the Android paradigm.

As a commenter on Slashdot points out, "... Apple just issued a Security Update in September, 2021 that patches iOS 12, covering models clear back to lhe iPhone 5s." Instead, Google just obsoleted the Pixel 3, released three years ago.

'Build things fast and break shit' indeed. Great paradigm when you have your life's history in a device in your pocket. And it's not secure.

https://threatpost.com/samsung-shattered-encryption-on-100m-phones/178606/

https://mobile.slashdot.org/story/22/02/24/222207/samsung-shattered-encryption-on-100-million-phones#comments
thewayne: (Default)
Or buy it from AliExpress for $120.

The maker claims it has a "special secure operating system" that won't report back your personal info to 'the mothership'. Except the phone runs Parlour, Signal, Facebook: all the standard Android apps, making it extremely unlikely it's a custom OS.

Meaning it's a cheap CHINESE phone that people are paying a 3x+ markup for.

But it's FREEDUMB!

The guy who released it is a 22 y/o self-proclaimed Bitcoin millionaire who says the app store is "uncensorable", which means it will be rife with malware and apps guaranteed to steal your personal information. The Wild West! YEEHAW! FREEDUMB! And for only $500!

https://uk.pcmag.com/mobile-phones/134539/freedom-phone-meant-for-trump-supporters-is-also-made-by-chinese-vendor


The description in this Slashdot post header by various articles from The Daily Beast and Gizmodo just highlight the scam aspect.

https://mobile.slashdot.org/story/21/07/17/011226/right-wing-activists-500-freedom-phone-actually-cheap-rebranded-android-model-made-in-china
thewayne: (Cyranose)
Saw this on Slashdot this week:

Phone Passwords Protected By 5th Amendment, Says Federal Court
Posted by timothy on Thursday September 24, 2015 @03:28PM from the good-luck-arguing-this-at-the-border dept.

Ars Technica reports that a Federal court in Pennsylvania ruled Wednesday that the Fifth Amendment protects from compelled disclosure the passwords that two insider-trading suspects used on their mobile phones. In this case,

"the SEC is investigating two former Capital One data analysts who allegedly used insider information associated with their jobs to trade stocks—in this case, a $150,000 investment allegedly turned into $2.8 million. Regulators suspect the mobile devices are holding evidence of insider trading and demanded that the two turn over their passcodes."

However, ruled the court, "Since the passcodes to Defendants' work-issued smartphones are not corporate records, the act of producing their personal passcodes is testimonial in nature and Defendants properly invoke their fifth Amendment privilege."


I expect this will probably end up being appealed to the SCOTUS, still, it's a promising thing for now.

http://yro.slashdot.org/story/15/09/24/2128243/phone-passwords-protected-by-5th-amendment-says-federal-court
thewayne: (Cyranose)
You may or may not have heard of the Pebble, but it is arguably if not the first, one of the first, smart patches. They debuted with a Kickstarter campaign that was awesomely successful, and I kinda regretted not getting in on it but I was unemployed at the time and just couldn't see spending the money.

Well, I'm in trouble. I now am earning a decent salary and they're launching a new Kickstarter campaign.

They've completed engineering and testing for their next generation watch, the Time. The first Pebble, like this one, uses the eInk display found in the original Kindle and the Nook paper white ebook readers, it only uses electricity when the display refreshes, so the Pebble could last upwards of a week between charges.

The Time makes a few changes. It's a bit thinner and designed with a slight curve so it conforms to your wrist. It has a microphone and you can use it as a voice recorder. It also now has a color display, which is kinda cool. It's also water resistant, you can shower and swim with it. But the big change is how it's used: the paradigm is very different than the original Pebble, and you really need to see the video to appreciate it. And the video is quite good, so I would recommend it regardless.

If you back the Kickstarter, you can get one before anyone else, and you'll save $20 off the $200 list price. And the Kickstarter is funded, so it'll be made. And boy, is it funded! They were asking for $500,000 and they currently have $11,700,000. There's 26 days remaining in the fund drive, and yes, I think I'll get one.

You see, there's one thing that I haven't talked about: they're programmable. You can download different watch faces, and there are 6,500 watch faces and applications available, and they're mostly, if not entirely, free. I want to code my own watch face. Even though I make my living with computers and have so for over 30 years, I eschew digital in certain ways, and one area in which I do is watches. Why do I need to know that it's 1:04 right now? I want my watch to say 'Just after 1:00'. And then 'Almost a quarter after'. Or 'About 1:30'. I like the abstract. The last three watches that I've owned have been analog. I don't normally wear a watch, but I think this could be fun and useful, especially having the voice recorder. I've dictated a lot of game design notes while driving to Las Cruces or Phoenix, 100 and 500 miles respectively, but using the one in my iPhone isn't very convenient. In the previous generation of iOS, Siri wouldn't turn on the voice recorder on command, which makes it useless while driving. Now it does, but when I'm driving, I'm usually listening to podcasts. So this wrist voice recorder, assuming it's easy to activate, could be quite useful to me.

Anyway, if you have a smart phone, you might find this interesting. And I think it's more than reasonably priced.

https://www.kickstarter.com/projects/597507018/pebble-time-awesome-smartwatch-no-compromises
thewayne: (Cyranose)
The Blackhat security conference is coming up very soon, and with it, advanced information about all sorts of wonderful problems. In this case, two new ways to compromise smartphones.

First up, a report on a tool that's built in to all smartphones: Androids, Blackberrys, iPhones sold by Sprint. They haven't tested Windows phones yet. It's a management tool that allows the cell providers to update firmware in the phone through over the air updates, and the security implementation isn't very good.

Granted, this is a team of advanced security researchers, but they were able to get in and totally pwn the phones they were working with. They've notified the maker of the management tool and the cell companies, so a fix should be distributed over the next few months that will make this more secure. Also, no evidence of this being exploited in the wild.

http://www.wired.com/2014/07/hackers-can-control-your-phone-using-a-tool-thats-already-built-into-it/


Next up, an iPhone, if connected to a compromised Windows PC, can potentially be turned in to a botnet! This is interesting stuff as it has falsely been assumed that Apple had pretty tight security on its iPhones, which is broadly true, but they're also kinda slow pushing updates. I assume that the exploit would also be effective against iPads that also have cellular radios built-in.

http://www.wired.com/2014/08/yes-hackers-could-build-an-iphone-botnetthanks-to-windows/
thewayne: (Cyranose)
Across the world the theft of smartphones has been a rising crime category while crime overall is trending down. I seem to recall that in New York City that it's the fastest growing crime. Law enforcement across the country and consumers have been begging for legislation requiring cell phone service providers to implement a kill switch, so if your phone is stolen, you can easily have it locked or wiped.

Both Android and iPhones have such capability, I'm not sure about the new generation of Windows smartphones. But you have to be aware of this capability and configure your phone before it's stolen for this to be effective, for iPhones and iPads you install a program called Find My Phone and link it to a free iCloud account: when your device is lost or stolen, you sign on to iCloud and you can lock the device, reformat it immediately, make it beep, display a message that says 'Hey! Return the phone from whence you got it!' or whatever. I don't know how you do this under Android, but I know the capability is there and the process is similar.

Additionally, iOS devices can be configured to wipe themselves after ten failed attempts to get past the security logon, I'm sure Android has a similar feature. So if you think you're going to be arrested, turn off your device and make it that much harder for your phone to be probed. Most smartphones these days are already encrypted but law enforcement forensic tools can typically get part that.

Law enforcement wants this, because it will reduce violent crime: a lot of people get hurt before surrendering their $400 phone. The Federal Department of Justice wants to put a kibosh on this. They say that there's too much of a risk that criminals could have co-conspirators wipe their phone before, and apparently this has happened where a drug gang actually had an IT department who knew to wipe devices if a dealer was arrested.

There's an easy way for law enforcement to preserve evidence. First, turn off the device. Next, in the case of a non-iOS device, remove the battery. Third, put the device in a Faraday bag. This blocks all signals from getting in or out of the device, thus preserving it for when the police get around to getting as search warrant. If the judge decides not to award the warrant or you're released, no harm no fowl. The chickens appreciate the no harm part.

So the Feds want to prevent a technology that would reduce violent crime by making the value of the stolen object pretty much nil, because it would represent a slight increase in the difficulty of doing their job. I wish I had that power, the next time that I get a tech support job I can make it illegal to hire idiots to make my job easier.

http://www.wired.com/2014/04/smartphone-kill-switch/
thewayne: (Cyranose)
I replaced my iPhone a couple of weeks ago, the light sensor had failed and it no longer knew when you were talking on the phone and moved the phone away from your face to use the keyboard. Inconvenient, fortunately I had the extended warranty and the only hassle was driving to El Paso (and having a good Italian dinner and seeing Wolverine) and the time involved in re-syncing it.

One problem came up: we could no longer sync our laptops to my phone.

After the restore was done, the phone configuration was pretty much identical to what it was before, including the phone's WiFi/blue tooth hotspot name. I couldn't figure out why my wife couldn't sync, and started mentally troubleshooting. When you have weird network connectivity problems and you know the wiring is good and you don't think something has changed, you frequently start with flushing caches. In this case, I told my wife's laptop to forget my phone, then I reconnected it. At that point it was fine and had no problems pairing with it.

The issue is something that I wrote about recently: MAC addresses. Even though the name of the phone was the same as far as the laptop that I was trying to connect to it was concerned, the underlying MAC address was different. By telling the laptop to forget my phone, it cleared the cache that maintained that information. When I re-paired it, it saw a phone name that it thought it had never seen before along with a MAC address that it had never seen before, and dutifully added them back in to its cache when I supplied the correct password.

SO. If you ever buy a new smartphone or have to replace one and start having problems pairing your other devices to it, go in to your device's network settings and tell it to forget your original phone, that might be all that you need to do to take care of the problem.
thewayne: (Cyranose)
First, sheer idiocy. A lot of people don't lock their smartphones, a lot of those that do use only a four digit PIN. On my iPhone, I've enabled alphanumeric pass codes. If you're only using four numbers, you've limited your phone to 10,000 possible combinations. I'm assuming Android phones can be set to wipe themselves after X number of failed attempts to enter the correct passcode, but again, that assumes it's enabled. If you take those same four characters and enable alphanumeric passcodes (numbers and letters and punctuation), you greatly increase that number. Using just numbers and letters, not even shifted case, those four characters go from ten raised to the 4th power to 36 raised to the 4th, or 1.68 million combinations. Add in lower case and all of the punctuation symbols on the standard keyboard, and it goes to 96 to the 4th, or 78 million combinations. Add just one digit to your passcode and the number of possible combinations jumps to 7.34 billion.

Motorola wants to simplify that. There's a new tech coming along called Near Field Communications, or NFC. Mostly you see it in these frequent buyer fobs at gas stations where you wave a little piece of plastic at the pump and it charges it to your card. Well, you can do that with certain phones and certain vendors. Motorola has developed a device called the Skip, which you'd clip on to your belt or whatever, and to unlock your phone you'd touch it to the device and *poof*, your phone is unlocked.

So now when you're being robbed, people will also tear random items off of your clothing. And if you're arrested, your fob will be seized and the police will say the phone was unlocked so they had a little stroll, rather than having to get a warrant to search a locked phone.

This is a really stupid idea, and I don't see it lasting long. But I could be wrong. You get three to a set, so they're anticipating you losing them.

http://www.networkworld.com/community/node/83663
thewayne: (Cyranose)
Yesterday, a thread appeared on Slashdot talking that a private company's recycle bins, a dozen all over London, were electronically sniffing you as you walked by. If you had a smart phone, it grabbed your WiFi's MAC address and logged your movement relative to the can. The long-term purpose was targeted advertising since it is difficult, if not impossible, to change this number.

In two test runs, four days in May and eight in June, "...over four million events were captured, with over 530,000 unique devices captured. Further testing is taking place at sites including Liverpool Street Station." The 'event' would be four million people walking by one of their bins, the 'unique devices captured' would be the 8% of those people with smart phones in their pocket. The company, Recycle Now, has around a hundred such recycling bins all over London that also incorporate digital ad boards. They were working towards a Minority Report advertising ecosystem.

According to the firm's CEO, "...As long as we don't add a name and home address, it's legal." He also told Wired UK that "We collect anonymised and aggregated MAC data -- we don't track individuals or individual MACs. The ORBs aggregate all footfall around a pod for three minutes and send back one annonymised aggregated report from each site so the idea that we are tracking individuals again is more style than substance," says Memari in an email. "There are applications in the future which Quartz focused on but during the trial period we are only looking at anonymised and aggregated MAC data."

He adds, "as some of the technology we will be testing will be on the boundaries of what is regulated and discussed it is our intention to discuss it publicly and especially collaborate with privacy groups like EFF to make sure we lead the charge on [adding necessary protections] as we are with the implementation of the technology."


http://www.wired.co.uk/news/archive/2013-08/09/recycling-bins-are-watching-you

The company has a web site that allows you to enter the MAC address of your phone to opt-out of the tracking, which I would think the site would just take and aggregate the data for future use since in the initial version the bins aggregate the data before sending it back to the mother server, which means the individual MAC addresses are not there. They might push an ignore list out to the bins, but I doubt that.

Well, the City of London Corporation has told Renew Now to stop running the program.

http://www.techweekeurope.co.uk/news/recycling-bin-firm-denies-tracking-london-phones-with-wi-fi-124461


FYI, a MAC address is a unique identifier built-in to the networking part of your equipment. Your smart phone or tablet has one if it can access the internet, any network card or a computer with a built-in network card has one, which is pretty much all computers made today. So does your DVR, your networked printer, your BluRay player, etc. It's a two-part number consisting of six hexadecimal digits, normally each digit is represented with a colon separator, like this: 01:23:45:67:89:ab. The first three digits identify the manufacturer, the last three are unique to the card. This gives a total number of unique values of 247 x 10 to the 14th. A unique MAC address is essential to network routing, that is, getting the packets that your computer sends to a specific web site returned back to you and not to someone else. In Windows and Mac PCs, you cannot change this number. In Linux machines, even though the number is burned in to a read-only memory chip, it can be changed if you want to tinker at that level. I don't know if you can change it on an Android smart phones whose operating system is based on Linux.

In this case, Renew Now claimed that they were just gathering the manufacturer code of the MAC address, so it wasn't tracking you, it was tracking who made your smart phone. Marketers like to make assumptions about people based on branding, for example, some web sites look to see if you're accessing them from a Mac, and if so, they charge you a higher price because they know you'll pay more money for some types of computer hardware. It's a very broad brush that they're painting with, and I think it's fallacious when it comes to smart phones. If someone drives a Ferrari, yes, you can assume they're wealthy. Smart phones, not so much. I was making less than $30k annually when my wife bought me my iPhone, that ain't wealthy.


The only way to truly block tracking like this is to either turn off the WiFi on your phone when you're out in public, or turn off your phone altogether. How many people could or would actually do that? It's funny to think about 20 years ago when almost no one owned a cell phone.
thewayne: (Cyranose)
The defense contractor arm of Boeing is going to make a highly secure smart phone, based on the Android platform.

"Earlier this week, it was revealed that aerospace firm Boeing was working on a high security mobile device for the various intelligence departments. This device will most likely be released later this year, and at a lower price point than other mobile phones targeted at the same communities. Typically, phones in this range cost about 15,000-20,000 per phone, and use custom hardware and software to get the job done. This phone will most likely use Android as it's main operating system of choice, which lowers the cost per phone, since Boeing's developers don't have to write their own operating system from scratch."

$15-20k per unit. Yep, sounds like a defense contractor. Wasn't it just recently that the NSA announced that it was going to do a secure phone system based on Android? I'm sure their unit cost would be a bit lower.

I am curious, though, who would build this? Boeing is not an electronics manufacturer per se, they're certainly not a cell phone maker. If they intend this for covert use, they're going to have to buddy-up to someone like Nokia or Samsung or LG to make the phone look like a standard smart phone to allay suspicion, plus it can't really have a Boeing label on it, that'd be a bit of a giveaway.

Seems to me that it's a monumental waste of money if the NSA is already doing a similar project.

http://mobile.slashdot.org/story/12/04/15/1513222/boeing-preparing-an-ultra-secure-smartphone

Ah, yes: March 8, NSA and German government encrypting Android phones: http://thewayne.livejournal.com/787608.html


Last month the results of the 'Honey Stick Project' were announced in which Symantec 'lost' several bugged smart phones to see what people do when they find one. The results pretty much confirm the worst of human nature.

"In order to get a look at what happens when a smartphone is lost, Symantec conducted an experiment, called the Honey Stick Project, where 50 fully-charged mobile devices were loaded with fake personal and corporate data and then dropped in publicly accessible spots in five different cities ...Tracking showed that 96-percent of the devices were accessed once found (PDF), and 70-percent of them were accessed for personal and business related applications and information. Less than half of the people who located the intentionally lost devices attempted to locate the owner. Interestingly enough, only two phones were left unaccounted for; the others were all found."

My aunt found a cell phone in a casino. The smart thing to do would be to give it to casino security, instead she took it home. Fortunately it still had a charge when she told me about it, and I found an address book entry for Dad and called it and found out his daughter had lost it, conveniently she worked for FedEx in El Paso, so she called the Las Cruces office and I dropped it off there. I don't think I would poke in to a discovered smart phone beyond trying to identify the owner and get it back to them, but human nature being what it is, who knows? This particular lost phone wasn't a smart phone, which reduces the temptation to pry in to personal information. My phone does contain sensitive information, but the really sensitive info is in a password-protected encrypted system, so it's fairly safe. And there's no banking info on it, nor has it ever accessed my bank account, so that's safe.

Plus, it's an iPhone, so it's easy for me to remotely brick if I lose it, assuming the discoverer doesn't know how to pop the SIM chip.

http://mobile.slashdot.org/story/12/03/12/2351227/honey-stick-project-tracks-fate-of-lost-smartphones


And finally, Google's Android app store Play has been found to have lots of malware lurking inside in the form of apps that send expensive SMS messages without you knowing it.

"We've seen quite a few Android malware discoveries in the recent past, mostly on unofficial Android markets. There was a premium-rate SMS Trojan that not only sent costly SMS messages automatically, but also prevented users' carriers from notifying them of the new charges, a massive Android malware campaign that may be responsible for duping as many as 5 million users, and an malware controlled via SMS. Ars Technica is now reporting another Android malware discovery made by McAfee researcher Carlos Castillo, this time on Google's official app market, Google Play, even after Google announced back in early February that it has started scanning Android apps for malware. Two weeks ago, a separate set of researchers found malicious extensions in the Google Chrome Web Store that could gain complete control of users' Facebook profiles. Quoting the article: 'The repeated discoveries of malware hosted on Google servers underscore the darker side of a market that allows anyone to submit apps with few questions asked. Whatever critics may say about Apple's App Store, which is significantly more selective about the titles it hosts, complaints about malware aren't one of them.'"

This would well and truly suck. I think that most of the freedoms that Android offers are great, but as it has been said, the price of freedom is eternal vigilance and it's difficult for an end user to be vigilante about the software on their phone because most of us are not programming experts that would allow us to determine if a program is safe or not.

http://mobile.slashdot.org/story/12/04/14/195215/more-malicious-apps-found-on-google-play
thewayne: (Cyranose)
They're applying strong crypto and logging to the voice stack, not much detail as to whether the data on the phone is encrypted which I think would be fairly trivial. They're also discussion about Germany encrypting other smart phone OS's. It'd be cool if the software were released to the public, but that'd totally screw law enforcement and CALEA.

http://www.h-online.com/security/news/item/NSA-German-government-using-Android-for-secure-phones-1466294.html

May 2025

S M T W T F S
    1 23
45678910
1112 131415 1617
18 19 20 212223 24
25262728 2930 31

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 7th, 2025 07:16 am
Powered by Dreamwidth Studios