Page 2 of 3

oldtimer - dog new tricks

Posted: Thu Sep 28, 2017 3:28 pm
by bentech
The world's first blockchain smartphone is in development
The $1,000 device is aimed at the crypto community.


https://www.engadget.com/2017/09/26/blo ... y-solarin/" onclick="window.open(this.href);return false;

oldtimer - dog new tricks

Posted: Thu Sep 28, 2017 11:01 pm
by MadMoonMan
Bends over. Inserts long stick in ass. Watches shadow of stick. Waits ........ till sun moves.

14:25 military time

give or take a minute depending on how steady a good marine can hold that sundial motionless.

oldtimer - dog new tricks

Posted: Sun Oct 01, 2017 5:39 pm
by Jesús Malverde
Most phones sold in the EU had two SIM slots because going over intl borders is so much more common there. The EU regs were changed to disallow the roaming tariff, but the phones still often have two slots.

oldtimer - dog new tricks

Posted: Wed Oct 04, 2017 10:48 pm
by deran
so far so good, being aware of the 6 sensors that can be used, im fully aware of being everything ... but invisible...
knowing that gives you tho an tactical advantage delivering "fake news" :D

1 - nfc : holy crap, a nice reader... works even through trousers and womens pandorras bags, hold your smartphone in your hand, put it as close to your target until you hear a beep .. or to be "stealth" until it vibrates, take a look at the screen, save, and start your "social exploit" .. lol
2 - wifi .. do i rly need to post anything, ok, root your box, install kali and penetrate :D
3 - gsm: fucking hardware bottelneck, throughout more than 99% of all chips, the rest 1% is either expansive as hell or 20 years old and most probably disintegrated to dust
4 - gps : i mean wtf, that thing got sold to us as an utility to not get lost ... HELLO!!! anybody at home up in there? to be trendy: "fake news , fake news" ... lol ..faking it actually an integrated part of the OS .. makes you wonder
5 - microphone : THE BUG .. built in
6 - cam : THE CAM .. built in

thats your hardware, you have to deal with... so i went to see how deep the rabbit hole is, and most ppl will be "like" aware, but i will tell you something

something

you dont want to hear :D :P

about more, about the famous set n setting, i have visit at my place, a dude from croatia is here and im helping him getting started his life here in berlin, he is for the 1st time in germany and he doesnt speak the language as well, and im for the ... who the fuck knows , time , a "tourist guide" .. showing him the city and translating stuff with my buddies ... anyways this period is parallel to my usage of this new toy, and this set the boundaries for this experiment ..

the net doesnt forget - AND - you wont find what you are looking for, because its gone from the net (like the cruise missile pic from the traffic lights infront of the pentagon)

i did the exact opposite to this handheld box, to what i have here on the big box going on .. security`wise and paranoid`wise
which means
i opened up nearly all (except a few games, not to bother the contacts on FB, bc i hate this so much myself) communication up to the cloud

and for those of you that still dont know : your email you have already forgotten from the heydays, like hotmail (man .. who hadnt an account lol) or any other known provider has you already integrated, you like or you dont like, thats the way it is

that means, that all ... rly all services from google are your new home

so i was walking around with this guy, took some pics, made some photos all while visiting the city, also very much of this got posted on social medias ... yes, of course .. fb, tw, ig, g+ incl all their "sub-social-interactions" like google maps or google hangouts , to speed up the assimilation process borg style

i ended up with a diary, a movement protocol - even better than fbi`s . bc google knows if you were on foot on bike on train or bus or subway, its nicely graphically illustrated on google maps with lines and curves in different colors, also in berlin you got free wifi at most stations, so you are always logged in, even without using mobile data packets and money of course, bc those stations are hotspots as soon you enter them, you will get infos about delays or actual stops or police events or emergency events including the time table and other schedules, you wont miss any opportunity with its help, hats off .. rly ! ..

but thats not all !

you get a free diary too!
all those pics are in a perfect time frame, days, weeks, months, years, and they are inserted in your own timeline, reading like this:
left home on bicycle, duration 7 minutes, to destination THIS, by this route, then you see a picture you have takes a few days ago, google just uses it, and puts it into your timeline .. holy cow ... all in the background, you do : NOTHING ... but thats not all !
you get additional infos, depending on your location ... we were at the park and got infos about it .. how old is it, who made it, whats impotant to see .... and so on .. nice .... but thats not all ....
google also takes your pics and magically "fixes" them in a arty way , of course in the background without you knowing that ... sometimes the results are even very good ! hats off ! but thats not all ... :D
when you get to a google known location, you get the possibility to add further infos regarding this locations, be it photos, videos, written descriptions (maybe even sound - didnt check this one out yet)
when you do this, google invites you to become a trip advisor, which i already am, the more questions you can answer to google, the more google points you earn, which whom you can make transfers to the real world money, if i understood that right, anyways, its simple click yes or no or dont know, doesnt take much time, less than 30 seconds

as you see, its nearly like wearing a body cam, thats running the whole day and more, bc google knows when you sleep ...
everything (and more) does exist somewhere as a binary file ... its all there ... really scary ...


but why this long text you sick motherfucker ??? why why ??

thats why

just because you dont have a "SMART" phone, doesnt mean that google knows nothing ... well to make it short ... only the pics are missing ...

thats the truth my friends


if you cant beat em - join em
lol

oldtimer - dog new tricks

Posted: Wed Oct 04, 2017 10:58 pm
by MadMoonMan
I know my theory sounds a little shoddy but all we need to solve the equations is the standard temperature piss freezes in mid air. We need funds to travel to antarctica.

oldtimer - dog new tricks

Posted: Fri Oct 06, 2017 8:14 pm
by bentech
'Our minds can be hijacked': the tech insiders who fear a smartphone dystopia



https://www.theguardian.com/technology/ ... y-dystopia" onclick="window.open(this.href);return false;

oldtimer - dog new tricks

Posted: Sat Oct 07, 2017 2:35 pm
by bentech
You keep your bluetooth turned off right?

oldtimer - dog new tricks

Posted: Wed Oct 11, 2017 4:11 pm
by Intrinsic
^^ only to save power, Bluetooth broadcasting is fairly innocuous, i think. i mean if your playing music with it as intended. what else could get one in trouble?

oldtimer - dog new tricks

Posted: Wed Oct 11, 2017 4:15 pm
by Intrinsic
Thanks deran, i'll chew over yer post later but first ...
Downloading Kali to check it out.
But i don't know what penetration here means. might be moot for me since my phone is not rooted, but my home linux systems intrinsically are.

oldtimer - dog new tricks

Posted: Wed Oct 11, 2017 6:09 pm
by bentech
Intrinsic wrote:^^ only to save power, Bluetooth broadcasting is fairly innocuous, i think. i mean if your playing music with it as intended. what else could get one in trouble?
An anonymous reader quotes a report from Bleeping Computer:
Security researchers have discovered eight vulnerabilities -- codenamed collectively as BlueBorne -- in the Bluetooth implementations used by over 5.3 billion devices. Researchers say the vulnerabilities are undetectable and unstoppable by traditional security solutions. No user interaction is needed for an attacker to use the BleuBorne flaws, nor does the attacker need to pair with a target device. They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, impacting almost all Bluetooth device types, from smartphones to laptops, and from IoT devices to smart cars. Furthermore, the vulnerabilities can be concocted into a self-spreading BlueTooth worm that could wreak havoc inside a company's network or even across the world. "These vulnerabilities are the most serious Bluetooth vulnerabilities identified to date," an Armis spokesperson told Bleeping Computer via email. "Previously identified flaws found in Bluetooth were primarily at the protocol level," he added. "These new vulnerabilities are at the implementation level, bypassing the various authentication mechanisms, and enabling a complete takeover of the target device."
Consumers are recommended to disable Bluetooth unless you need to use it, but then turn it off immediately. When a patch or update is issued and installed on your device, you should be able to turn Bluetooth back on and leave it on safely. The BlueBorne Android App on the Google Play Store will be able to determine if a user's Android device is vulnerable. A technical report on the BlueBorne flaws is available here (PDF).



BlueBorne Vulnerabilities Impact Over 5 Billion Bluetooth-Enabled Devices (bleepingcomputer.com)

https://slashdot.org/index2.pl?fhfilter=bluetooth" onclick="window.open(this.href);return false;