|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
|
|
Android is Linux kernel-based OS designed mainly for smartphones. On application level the main programming language is Java. So outside the kernel it is quite different OS and has little to do with Linux, so in a way it is almost non-linux. While kernel is licensed under GPL 2, the license for Google code is different. Google releases the code under the Apache License. While OS is touted as an "open system", it increasingly serves the role of a portal for Google ads and services and the instrument of spying on users. The main hallmark of Android is very insistent, amateur user interface. This is a real black mark of Google developers. Which is not surprising due to preoccupation with "performance reviews" of neoliberal owners of Google (Larry Page and Sergey Brin). That actually outline them in a negative light. Of course, they probably were puppets of higher lever handlers, but still... Although many suspect that it was Eric Schmitt, who was instrumental in this malaises ( neoliberal hack of Java fame; who was also on Apple board and got their the ideas about smartphone) who managed the company
In recent three years Android became the major player in smartphone market and completely dominates low end of the market. It also exert substantial pressure on iPhone (Nexus, Samsung Galaxy, etc recently became very competitive). In the third quarter of 2012 Android reached 75% market share for smartphones with 500 million devices activated in total and 1.3 million activations per day. In a way, Android repeated the success of DOS on a new level/
It also became a dominant player in the lower segment of tablet market (completely dominates 7" tablets segment, and is strong player on 8" and 9" segment). At the same time it has noticeable and growing presence in 10" segment dominated by iPad. As Reuters reported in October 2013 (Sharper display Apple iPad Mini faces delay sources):
The iPad's total market share almost halved to 32.5 percent in the second quarter from a year ago, while Android devices, including Samsung's Galaxy series, gained nearly a quarter to 62.6 percent, a survey by tech research company IDC showed.
Amazon's new 7-inch Kindle Fire is priced from $229 for 16GB wifi-only models, while Google's second-generation Nexus 7 offers a similar screen size and storage capacity at the same price. By comparison, the cheapest model in Apple's current 7.9-inch iPad Mini lineup with 16GB storage size starts at $329.
Like DOS, it was initially developed by a separate corporation -- Android, Inc., with Google financial backing. Google purchased Android, Inc in 2005. It was the first adventure of Google in the area of OS and huge talent pool that Google assembled helped to achieve ensure a huge success in smartphone market. Since 2008, Android has seen numerous updates. The latest release is Android 4.2 Jelly Bean. As of September 2013 most new smartphones still are using version 4.1. Version 4.3 with important security enhancements (SELinux in kernel) is out, but mass adoption is expected in 2014.
Android has a large community of developers writing applications ("apps") written primarily in a customized version of Java. Linux roots helped here and many application are Linux applications ported to the new platform. For developers it now increasingly resembles Marc Andressen's famous description of Microsoft Windows -- "a poorly debugged device driver layer".
Android first achieved success as a low-cost OS for smartphones, outselling Apple who pushed its idea of "small luxuries" with iPhone way too far. But outsize 7" tablets, so far it has more limited success on tablets, especially after Microsoft launched Windows 8 Intel based tablets, because the OS is underpowered in comparison with Windows 8. For those who never used Android smartphone Windows 8 tablets have more convenient interface and much richer functionality.
Still the synergy with smartphones greatly helps penetration of tablet market, especially for 7" tablets and Android share of the market had grown considerably in 2012 and 2013. But the upper segment of tablets market now belongs to Windows 8 in Intel and Intel based tablets (not Windows 8 RT). Still until recently pricewise Android tablets successfully competed with Windows 8 on lower part of 10" tablet market segment due to lower cost ($399 for an excellent quality 10" Android tablet from Samsung). In comparison Microsoft Surface Pro used to costs around $1K, while less powerful Samsung ATIV Smart PC 500T (which like Galaxy Note 10.1 has built-in stylus) is around $700. Now with Dell Venue 8 Pro ($299) that advantage is less pronounced. Even Google $230 Nexus 7 does not look too attractive in comparison with Dell Venue 8 Pro and $70 difference does not save it from comparison of Windows 8 features and Android features. Only $150 and lower priced 7" tablets now make some sense (here again Dell offers Android-based Venue 7 for $149). In "enterprise" segment Windows 8 tablets dominate: door to the enterprise was shut by release on Windows 8 tablets on Intel CPUs.
That means that only 7" tablets and 10" tablets with Wacom digitizers can defend their position against Windows 8 tablets in high price segment. And as a media consumption device they have difficulties in competing with iPads as they are more or less direct imitation of iPad with just a different OS kernel and Java as an application language (Steve Jobs was very unhappy about this aspect of Android, considering it to be a clone of iPad, and threatened to destroy Google with lawsuits; his death probably spared Google from a very targeted legal attack). In this sense Windows 8 on Intel CPU tablets are head and shoulder ahead, as they can run regular desktop OS -- Windows 8.1 with all huge application ecosystem, that can't be replicated on android anytime soon.
Google's response to these two trends has been to reassert its control by coupling vital phone functions to its own web services and to its online software marketplace called Google Play. It's really no different from lending you a shopping terminal, but you can only use it to buy stuff from the Amazon. Google has also is concerned with "Landfill Android", the cheap, unreliable "noname" phones from China which destroy Android credibility by underpowered hardware.
Win comparison with Windows applications, Android applications are more balkanized with each offering its own unique interface style. There are general guidelines, but they are seldom obeyed. Google proved to be a bad architect and in the area of user interface his record is dismal.
You can get used to it (again experience with smartphones greatly helps), but interface does not inspire any good feelings and for more or less complex tasks you find yourself struggling. Still it is OK as a media consumption device. But in this role it does not have "killer application" that distinguish it from already entrenched iPad although recently S-pen from Samsung came close. It allows to write emails on the screen and send them which greatly improves "ergonomics" of this process in keyboard-less environment (typing on on-screen keyboard is not very convenient on 7" tablets, and is barely acceptable on 10" tablets). See Galaxy Note 10.1 for more details.
Generally tablets are closer to laptops then to smartphones. It is prudent to consider them to be just a different laptop form factor. That means that standard expectation are those of Windows laptops functionality. Android can't deliver functionality yet. Like iPad it is generally limited to media consumption type of tasks. And it can perform them really well: it's much easier to get your weather forecast in the morning from the tablet, then from the laptop, because it is "instant on" device. But not more then that.
That's why "Windows 8 on Intel" tablets essentially wiped out possibility of Android to compete in the corporate market. Also so far Google proved to be a weak match to Microsoft as for ability to create a consistent interface and enforce it with iron hand on application developers.
The same is true for patching: Google looks amazingly incompetent in this respect. And as for security Google repeated on a new level and for a new platform all mistakes Microsoft made trying first to catch the market share at all costs and them resolve the security issues. Now with Android success on smartphone Google have found itself under "Windows curse" spell. Recent attempt to incorporate SELinux functionality into the Android kernel suggest that Google started to realize consequences of Android insecurity. Android 8 used in Samsung Galaxy 8 allows creation of a workplace, but does it in a very clumsy manner.
I think Android market share on tablets on high end is further vulnerable to Windows 8 based tablets onslaught as Intel releases better, more economical CPUs like Ivy Bridge. You simply can not compare functionality of Android with the functionality of a full blown desktop OS like Windows 8 or Linux (and that means that Ubuntu has some theoretical chances at lease on Intel-based segment of tablet market).
Lack of Microsoft Office on Android devices and excessive push to the cloud and privacy intrusions on the part of Google also does not help. Still in more specialized, applications-style tablets like $200 Amazon Kindle and Nook by Barnes and Nobles Android looks more or less acceptable. Kindle and Nook actually have their own ecosystems and the community of users.
Android's user interface is based on imitation of the Apple interface used in iPhone and iPad using touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching and reverse pinching to manipulate on-screen objects.
Up to the version 3.0 Android devices had have four hardware buttons: Home, Back, Menu, and Search. Android version 3.0 and above replaced them with onscreen three touch buttons which can perform two type of actions (direct and alternative):
Direct actions
The Home button takes the user to the phone/tablet home screen. It’s not generally available to applications, unless the app is a home-screen replacement.
The Back button is meant to navigate back in the Android activity stack. This allows the user to easily jump into an app and them return to the previous screen. Apps which are good Android citizen, always allow the user to return to a previous application if they have jumped straight into your app (for example, by pressing a notification or handling an intent created by another application). They don’t force the user to back out of many screens to return to their previous task. But not all applications are good citizens.
The Menu button displays a context-dependent list of options. Use the options menu for displaying infrequently used options for your application. On Android tablets and phones running version 3.0 or greater, this button is not available, and options are instead presented on the action bar.
Alternative actions.
It is also possible to perform an alternative action on some buttons. These actions are activated by long-pressing on the buttons. This way you for example can select text. it's much less convenient than with the mouse but doable. You first put your finder on the part of the text you want to select and keep it until two sliders appear. then you manipulate those two sliders to select what you need. After that you need to press the button at the top to copy the selection.
In Android 8 that changed. While home button still has alternative action Back button doe not. And menu button was redefined to create the set of screen for open applications (line Alt-Tab in Windows).
The response to user input is designed to be immediate, but Java is slow. Still on modern CPUs it can provide as acceptably fluid touch interface,
Newer versions of Android , such as version 4.x can use the vibration capabilities of the device to provide feedback to the user about pressing the button (usually this is a separate setting that might need to activated). Internal hardware such as accelerometers, gyroscopes and proximity sensors are used by some applications to respond to additional user actions.
But in most Android tablets this is not done properly. For example, most tablets allow to adjust the screen from portrait to landscape depending on how the device is oriented. But most are either too sensitive, or not sensitive enough. In the first case you face the problem when device rotate the screen when do not what it way too often which is pretty annoying. In the second case you need special effort to rotate the screen when you need the rotation.
Android devices boot to the homescreen, the primary navigation and information point on the device, which is similar to the desktop found on PCs. There are several Desktop screen as in Linux with one displayed after the book (Android homescreen). Homescreen is typically made up of app icons and widgets selected by manufacturer and unless you adapt it to your needs, you will hate it the next day after you bought the tablet. Most widgets selected by manufacturer can be removed including frost of all Google widget, which is invoked if you use "alternative action on home button".
App icons launch the associated app, whereas widgets display live, auto-updating content such as the weather forecast, the user's email inbox, or a news ticker directly on the homescreen.
Typically a homescreen may be made up of several teenagers oriented widgets and the user need to swipe back and forth between to find a few useful applications. Third party apps available on Google Play and other app stores can extensively re-theme the homescreen, and even mimic the look of other operating systems, such as Windows Phone. Most manufacturers, and some wireless carriers, customize the look and feel of their Android devices to differentiate themselves from the competition.
Present along the top of the screen is a status bar, showing information about the device and its connectivity. This status bar can be "pulled" down to reveal a notification screen where apps display important information or updates, such as a newly received email or SMS text, in a way that doesn't immediately interrupt or inconvenience the user.
In early versions of Android these notifications could be tapped to open the relevant app, but recent updates have provided enhanced functionality, such as the ability to call a number back directly from the missed call notification without having to open the dialer app first.[40]
Notifications are persistent until read or dismissed by the user.
Generally Google tries imitate close-style Apple iPad ecosystem on Android. But there are quit welcome loopholes that makes Android more attractive to power Windows and Linux users who got accustomed to be the administrators of their own PCs. There is no out-of-box opportunity to create an Ghost-style disk image of Android tablet and restore it back on the device. Typically all device provide is compete wipe out and restoration of the initial vendor configuration.
Google Play -- an official application store for Android -- has a large and growing selection of third party applications. Many applications also can be acquired via Amazon Appstore, or by downloading and installing the application's APK file from a third-party site.
Key applications with the exception of Microsoft Office are available for Android. See Selected Free and Low Cost Android Apps
All Google Play Store applications comply with Google's compatibility requirements, but they are very low and interface is balkanized.
Google Play automatically filters the list of available applications to those that are compatible with the user's device, and developers may restrict their applications to particular carriers or countries for business reasons. Purchases of unwanted applications can be refunded within 15 minutes of the time of download.
As of September 2012, there were more than 675,000 apps available for Android, and the estimated number of applications downloaded from the Play Store was 25 billion. But generally only top several thousand applications really matter, so the absolute number of application is a very deceptive metric to compare two tablet OSes.
Applications are developed in the Java language using the Android software development kit (SDK). The SDK includes a set of basic development tools, such as a debugger, software libraries, a handset emulator based on QEMU, documentation, sample code, and tutorials. The officially supported IDE is Eclipse with the Android Development Tools (ADT) plugin.
Other development tools are less common. No good Python support yet. Development in C and C++ is possible but far from being easy. In a way Android SDK is a Google visual environment oriented on novice programmers.
Android consists of a kernel based on the Linux kernel 2.6 (Linux Kernel 3.x in Android 4.0 and later), with middleware, libraries and APIs written in C and application software running on an application framework which includes Java-compatible libraries based on Apache Harmony. Android uses the Dalvik virtual machine with just-in-time compilation to run Dalvik dex-code (Dalvik Executable), which is usually translated from Java bytecode. The main hardware platform for Android is the ARM architecture. There is also an improving support for x86 from the Android x86 project, and Google TV uses a special x86 version of Android.
Android's linux kernel is a fork taking codebase outside Linux kernel development cycle. So this divergence is a mixed blessing. Android does not support the full set of standard GNU libraries, which makes it challenging to port existing Linux applications or libraries to Android.
Linux included the autosleep and wakelocks capabilities in the 3.5 kernel, after many previous attempts at merger of those features from Android. The interfaces are the same but the upstream Linux implementation. They allows for two different suspend modes: to memory (the traditional suspend that Android uses), and to disk (hibernate, as it is known on the desktop).
The flash storage on Android devices is split into several partitions, such as "/system" for the operating system itself and "/data" for user data and app installations.
Android device owners are not given root access to the operating system and sensitive partitions such as /system are read-only. Root access can be obtained by exploiting security flaws in Android. Along with enthusiasts those are used by malicious parties to install viruses and malware. Popularity of Android on smartphones led to "Windows effect" -- stream of sophisticated malware including financial malware and bonnets.
Since Android devices are usually battery-powered, Android is designed to keep power consumption at a minimum. When an Android app is no longer in use, the system will automatically suspend it in memory - while the app is still technically "open," suspended apps consume no resources (CPU cycles) and sit idly in the background until needed again. This also increases responsiveness of Android devices, since previously opened apps don't need to be loaded from SSD if you have enough RAM. And modern Android smartphones and tablet often have staggering amount of RAM -- one gigabyte became pretty common in 2013. Please remember that DOS operated in on megabyte of memory, one thousand times less.
When memory is low, the system will begin killing apps and processes that have been inactive for a while, in reverse order since they were last used (i.e. oldest first). This process is designed to be invisible to the user. There are also third-party task killers and as you can expect, some of them doing more harm than good.
Updates are weak spot of Android. Here Microsoft generally wipes the floor with Android developers. windows 8 update process works like a clock. You can complain about quantity and quality but mechanism itself is pretty robust and well debugged. Parches are provided for Windows for free by Microsoft itself.
In Android this task is offloaded to the vendors. Google does not have a patching framework and does not provide patches. Everything need to be done via vendors.
Horrible status of Android updates by many versions such as Samsung has been widely criticized by consumer groups and the technology media. Some commentators have noted that the industry has a financial incentive not to update their devices, as the lack of updates for existing devices fuels the purchase of newer ones, an attitude described as "insulting".
As the Guardian has complained that the complicated method of distribution for updates is so complicated mainly because manufacturers and carriers have designed it that way. With a typical plan you replace the phone in two-three years. So why bother.
In 2011, Google partnered with a number of industry players to announce an "Android Update Alliance", pledging to deliver timely updates for every device for 18 months after its release. As of 2012, this alliance has never been mentioned since.
In 2013 Dr. Web found a botnet that existed on Android phones.
Many users resent absence of root access to their devices and consider this attempt to replicate Apple-style ecosystem to extract more money from users. I myself consider this situation unacceptable as you can't fully backup and restore the device yourself. The only option is going to factory defaults which for obvious reasons is less impressive solution although you can adapt to it backing up "user space" and reinstalling applications. The latter can be scripted. But like any situation with the severe restriction on user behavior it create similar to Apple wave of Google hate.
As users are not allowed access to root, Android users have became hostages of malware developers, who can. Backup and restore on Android devices are primitive and are severely handicapped in comparison with Linux, where there are such packages as Relax-and-Recover
So restrictions to root access does not help unsophisticated users, who fall victims of malware anyway, and really handicap sophisticated users limiting their ability to backup and restore the system and fight malware by reinstalltion of the clean backup image. That's why rooting Android devices instead of hacker entertainment became a necessity for sophisticated users.
"Windows effect" means that as soon as OS became dominant in particular segment of the market, it became favorite target for malware attacks and hacking. At this point it became difficult to "defend the castle" independently of its technical qualities (not that Windows has a good security architecture). The rule 2:1 of regular warfare probably is applicable here: if the number of fighters on one side is at least twice larger then the amount of fighters on the other side, this numerically inferior side is in trouble.
Like for Microsoft in the past Google primary objective of initial Android development was gaining market share, security be damned. In other words Google from the beginning sold its soul to the devil ;-).
And if the major contingent of a complex and powerful OS are unsophisticated users, then the task of providing good security is really formidable and requires new architectural vision, and innovative solutions. Android as an OS is pretty primitive and uninventive as initially it was designed for devices with very restricted computational capabilities, somewhat similar of relationship between DOS and Unix. As for innovative solutions it has none. Moreover because it is generally understood by users worse then Windows 8 it creates additional security risks. Recently Dr. Web found a botnet that existed on Android smartphones. The problem with Android is that if your phone or tablet is "owned", you can do nothing as you do not have access to root.
If the major contingent of a complex and powerful OS are unsophisticated users, then the task of providing good security is really formidable and requires new architectural vision |
Some promising security approaches within the framework of classic Unix kernel design and some outside it are available, but were never used. For example, it would cost almost nothing to provide all Android tablets with hardware-based token implementing SecurID style authentication scheme. That was not done, and enables banking fraud. So in a way if you bank does not support SecurID style authentication, you better do not access its Web portal from Android devices. Some banks try compensate for this sending SMC messages, but if the you smartphone or tablet is owned by some type of malware this might be not enough. But it is definitely better then nothing.
In other words in its current form Android is unsecure for Web banking. As simple as that. Without such a token, interception of passwords means the compromise of the account.
As Android kernel was based on Linux kernel 2.6 (and now 3.0) some vectors of attacks are related to this heritage. For example linux kernel like any classic Unix kernel has all-powerful root and underpowered regular user accounts. That means that process which, for example, needs to access low port (below 1024) need to became root at leas on temporary basis to perform this part of the task. Ability to access Web and Web-based email portals such as Hotmail, Gmail, Yahoo mail (HTTP and HTTPS use low ports) creates the same spectrum of vulnerabilities as in Linux and Windows.
Being open source also does not help in this regard. It actually hurts as instead of disassembly you can just read regularly available codebase and try to invent some nasty exploit that allows you to become root. So in Android you from the beginning has capability which in Windows world have three latter agencies and large corporation which get Windows source code.
Instead of analyzing code trying to find exploit yourself you can buy a zero day exploit on the black market. Such a market exists for the most popular devices. Possession of not yet patched zero day exploit (and Android vendors are slow in providing patches and Android as an OS has nothing weaker then Windows patching framework) means that you are in if the user replicates the conditions necessary for this exploit, for example access a certain ("inflected") Web site.
Generally the problems with patching of Android are severe due to decentralization of the process.
Google realizes the situation with Android (in)security and in the pipeline is SE Linux framework in kernel. It is badly needed. There is also no Authenticode style cryptographic signing of executables, which provide a clean way to make loading unsigned executable in root mode more difficult. Another missed opportunity is AppArmor style framework, but generally it is just more elegant way to provide SE-linux style functionality.
The unlocking (rooting) and "hackability" of smartphones and tablets remains a source of great tension between the community and industry.
Android applications run in a sandbox, an isolated area of the system that does not have access to the rest of the system's resources, unless access permissions are explicitly granted by the user when the application is installed. Before installing an application, the Play Store displays all required permissions: a game may need to enable vibration or save data to an SD card, for example, but should not need to read SMS messages or access the phonebook. After reviewing these permissions, the user can choose to accept or refuse them, installing the application only if they accept. the scheme does not work for unsophisticated users.
Theoretically both the sandboxing and permissions system lessens the impact of vulnerabilities and bugs in applications, but huge percentage unsophisticated users (Windows-effect), developer confusion and limited documentation has resulted in applications routinely requesting unnecessary permissions and users happily granting them, reducing security to a minimum. In a way Google proved to be completely incompetent to solve this difficult and important problem and decided just to "go with the flow". As a result Google replicated the situation with malware that exists on Windows on a new platform.
Security industry already sensed the opportunity and the necessity to protect Android users from design defects inherent in attempt to provide powerful OS for unsophisticated users and from growing spectrum of Android malware. We can expect that generally there is will be a security tax on Android users, similar to "Windows insecurity tax."
Several Windows AV products vendors have released antivirus software for Android devices. they need to run as root as otherwise sandboxing also applies to such applications
There are multiple types of Android malware in the wild:
Premium service abuse. It is probably the most common type of Android malware, where text messages are sent from infected phones to premium-rate telephone numbers without the consent or even knowledge of the user.
Google engineers have argued that the malware and virus threat on Android is being exaggerated by security companies for commercial gains. They accused the security industry of playing on fears to sell virus protection software to users. Google maintains that dangerous malware on Android is actually extremely rare.
Google currently uses their Google Bouncer malware scanner to watch over and scan the Google Play store apps. It is intended to flag up suspicious apps and warn users of any potential issues with an application before they download it.
Android 4.1 (Jelly Bean) has enhanced security features, including a malware scanner built into the system, which works in combination with Google Play, but can scan apps installed from third party sources as well; and an alert system which notifies the user when an app tries to send a premium-rate text message, blocking the message unless the user explicitly authorizes it.
Android smartphones have the ability to record the location of Wi-Fi access points, encountered as phone users move around, to build databases containing the physical locations of hundreds of millions of such access points. These databases form electronic maps to locate smartphones, allowing them to run apps like Foursquare, Google Latitude, Facebook Places, and to deliver location-based ads. Third party monitoring software such as TaintDroid, an academic research-funded project, can, in some cases, detect when personal information is being sent from applications to remote servers.
Recently another source of security problems for Android was revealed via publication of some materials about Prism program by Snowden. That undermines confidence in the platform as there is no guarantee that all your voice and data streams are not written on some remote NSA server and, adding insult to injury, not without Google help.
That does not increase the confidence about the platform, but two other major platforms (iPads and Windows 8 based tablets) suffer from the same problem. all can contain NSA backdoors and Skype monitoring tools installed without user consent. See Cloud providers as intelligence collection hubs
Google publishes most of the code (including network and telephony stacks) under the Apache License version 2.0, and the rest, Linux kernel changes, under the GNU General Public License version 2.
The Open Handset Alliance develops the changes to the Linux kernel, in public, with source code publicly available at all times. The rest of Android is developed in private by Google, with source code released publicly when a new version is released.
Typically Google collaborates with a hardware manufacturer to produce a 'flagship' device (part of the Google Nexus series) featuring the new version of Android, then makes the source code available after that device has been released.
Although the software is open-source, device manufacturers cannot use Google's Android trademark unless Google certifies that the device complies with their Compatibility Definition Document (CDD). Devices must also meet this definition to be eligible to license Google's closed-source applications, including Google Play.
|
Switchboard | ||||
Latest | |||||
Past week | |||||
Past month |
Jul 19, 2021 | www.zerohedge.com
Southfront reports that an Israeli company's spyware was used in attempted and successful hacks of 37 smartphones belonging to journalists, government officials and human rights activists around the world, according to an investigation by 17 media organizations, published on July 18th.
Unmute Fullscreen Pause Up Nexthttps://imasdk.googleapis.com/js/core/bridge3.472.0_en.html#goog_621104237 12 Retailers Where Plastic Bags May Disappear Soon NOW PLAYING MLB All-Star Game: Best Home Run Props To Target UP NEXT Boeing Finds Flaws in 787 Dreamliners, Cuts Delivery Target Big Tech, Earnings, Meme Stock Momentum – On TheStreet Monday Target, Walgreens close early due to thefts in California stores Rose McGowan supports Britney Spears' over conservatorship Rose McGowan is "brutally angry" about Britney Spears' conservatorship How To Check if You're Actually Getting a Good Deal on Prime Day
One of the organizations, The Washington Post, said the Pegasus spyware licensed by Israel-based NSO Group also was used to target phones belonging to two women close to Jamal Khashoggi, a Post columnist murdered at a Saudi consulate in Turkey in 2018.
One of them was his fiancee, and she and the other woman were targeted both before and after his death.
The Guardian, another of the media outlets, said the investigation suggested "widespread and continuing abuse" of NSO's hacking software , described as malware that infects smartphones to enable the extraction of messages, photos and emails; record calls; and secretly activate microphones.
The investigation highlights widespread and continuing abuse of NSO's hacking spyware called 'Pegasus' which the company confirms is only intended for use against terrorist groups, drug and human traffickers, and criminals.
Pegasus is a very advanced malware that infects iOS and Android devices to allow operators of the spyware to copy messages, photos, calls and other data, including secretly activate microphones and cameras.
Based on the investigation, the leak contains a list of 50,000 phone numbers that have been identified as those of people of interest by clients of NSO since 2016.
The list includes many close family members of one country's ruler, suggesting he might have instructed the country's intelligence agencies to explore the possibility of tracking and spying on their own relatives.
anti-bolshevik 8 hours ago (Edited)Southern_Boy 10 hours ago (Edited) remove linkTwo articles from Motherboard Vice:
Is Israel EXEMPT from the ' rules-based order ' that Biden / Blinken / Yellen constantly affirm?
Any incoming Sanctions? Any Treasury asset-seziures?
NSO Group Impersonated Facebook to Help Clients Hack Targets May 20, 2020
Motherboard uncovered more evidence that NSO Group ran hacking infrastructure in the United States.
A former NSO employee provided Motherboard with the IP address of a server setup to infect phones with NSO's Pegasus hacking tool. Motherboard granted the source anonymity to protect them from retaliation from the company.
Amazon Shuts Down NSO Group Infrastructure July 19, 2021
The move comes as activist and media organizations publish new findings on the Israeli surveillance vendor.
Amazon has previously remained silent on NSO using its infrastructure . In May 2020 when Motherboard uncovered evidence that NSO had used Amazon infrastructure to deliver malware , Amazon did not respond to a request for comment asking if NSO had violated Amazon's terms of service.
MASTER OF UNIVERSE 11 hours agoThe licensor of software is not the user of the software. An Israeli company developed it and may have used it.
In weapons terms, an Israeli company was the arms developer.
However, there are the licensees and users of the software. The factions and individuals who actually used this weapon of war and political coercion.
In weapons terms, there are others, like the US and other country intelligence communities who will be the ones who pulled the trigger.
The "trigger pullers include the Bolshevik Democrat party and the Biden campaign, which used it to control citizens through intelligence gathering (remember Judge Roberts?) and extract political donations from corporations and rich individuals. Don't forget the Globalist GOP RINOs and Tech monopolists, who have used this weapon to control and subvert anyone that they need to subjugate.
Bye bye Apple, Xiomi and Google Android. You just lost your market of brainwashed sheep for new mobile phones. Even the unwashed Joe Six-Packs of this world now know they are being manipulated with the phones that are so expensive.
WorkingClassMan 10 hours agoI've spent many years studying Experimental Psychology & Personality Theory and can honestly state that malware can't determine appropriate behavioural signals intelligence enough to act responsibly, or judiciously.
Algos are dependent upon Behavioural Science & human analytics. They are crude tools that employ hit & miss techniques that hardly ever work accurately.
Israeli intelligence tries to look state of the art, but they are just as dimwitted as the CIA.
NAV 10 hours ago remove linkThey might be dimwitted and hamfisted but like an elephant with a lobotomy they can still do a lot of damage flailing around. Worst part about it is them not caring about the consequences.
2banana 12 hours ago (Edited)It's amazing how the "dimwits" control the entire apparatus of the most powerful Empire in the world and the entire world media.
gregga777 12 hours ago (Edited)It's not just some politicians and journalists.
It's everyone.
Your phone spys on you in every possible way.
Pegasus is a very advanced malware that infects iOS and Android devices to allow operators of the spyware to copy messages, photos, calls and other data, including secretly activate microphones and cameras.
truth or go home 12 hours agoIt's been widely for at least a decade that carrying a smart phone is really like wiring oneself up for 24/7/365 audio and/or video surveillance. They only have themselves to blame if they've been spied upon by the world's so-called secret intelligence agencies.
[Ed. The next time in a crowded public space, turn on Wi-Fi and count the number of unlocked phones under the "Other Networks" menu.]
philipat 11 hours ago remove linkIf you have no phone, and no facebook, then you are likely immune from prosecution. My neighbor the Fed agent told me 10 years ago that these two sources are 90% of every investigation. That number has only gone up. They track you with it, they find out your contacts with it. They find out your secrets with it. Just try to get either of those things anonymously. You can't.
Ura Bonehead PREMIUM 7 hours agoLand of the Free....
Steeley 4 hours ago'truth or go home', 'having no Facebook' doesn't help you as FB secures the same information via data-sharing arrangements with any number of apps you may download, that came on your phone, or are embedded deep on your phone. Just a fact.
E5 10 hours agoA friend that lives in Pahrump, NV reports that every time he crosses into California a smart phone Covid Health Tracking App activates and he starts getting notifications. Can't turn it off or find where it resides. When he crosses back into Nevada it stops.
zzmop 9 hours ago (Edited)"After checking their claims, we firmly deny the false allegations made in their report,"
Really? So if 99 claims are true and one false? Never did they say there was truth to the accusation that they hacked phones.
If you are going to commit a crime I suppose you want to "issue a statement" that you didn't. I guess we have to ask them 2 more times: then it is a rule that you must tell all. No minion can resist the same question three times.
eatapeach 9 hours agoKeyword -'Israeli', Not Russian, Israeli, Not 'Russian hackers', Israeli hackers
consistentliving PREMIUM 7 hours agoThis is old news. Congresswoman Jane Harman was all for spying/eavesdropping until she got busted selling her power to Israel, LOL.
vova_3.2018 10 hours agoNot USA fake paper pushers but Mexican journalists deserve mention here
Revealed: murdered journalist's number selected by Mexican NSO client
not just journalists either (i know SLATE but hey) https://slate.com/technology/2019/09/mit-media-lab-jeffrey-epstein-joi-ito-moral-rot.html
wizteknet 10 hours agoA smart phone is a spying device .....
Spying & .... Israeli cybersecurity firm "NSO Group" has been selling surveillance software Pegasus, enabling the murder of dissident journalist.
Snowden: Israeli Spyware Used By Governments to Pursue Journalists Targeted for Assassination
https://www.mintpressnews.com/snowden-israeli-spyware-used-by-governments-to-pursue-journalists-targeted-for-assassination/251612/Israel: Snowden accuses Israeli cybersecurity firm of enabling Khashoggi murder
https://www.youtube.com/watch?v=_LeOt4HCI-MIsraeli cybersecurity firm "NSO Group" Which Sold Pegasus Spyware, paid Biden's political advisers in SKDKnickerbocker consulting firm.
https://sputniknews.com/world/202107191083412056-biden-advisers-consulting-firm-got-paid-by-israeli-nso-group-which-sold-pegasus-spyware-report/Israel doesn't respect human rights!. Israel has been killing defenseless people in Palestine for more than 50 years. The sad thing is that US support these genocidal sick sycophats.
vova_3.2018 9 hours ago (Edited)Where's a list of infected software?
Steeley 4 hours agoWhere's a list of infected software?
If they take yr phone under control they'd have access to everything & then they can use the info against you or anybody else in the info.
https://www.youtube.com/watch?v=iuBuyv6kUKIIsraeli spy-wear "Candiru" works a little bet different than Pegasus but is also used to hack & track journalists and activists.
https://www.youtube.com/watch?v=nWEJS0f6P6kThe magic number of "6 million" will be the Get out of Jail Card once again.
And, these idiots keep preaching about the great risk China poses...
Kugelhagel 12 hours ago (Edited)Embedded in the OS...
HippieHaulers 11 hours agoIs that article an attempt to get some sympathy for "politicians", "journalists" and "activists"? Try again.
WhiteCulture 7 hours ago (Edited)Exactly. Don't forget Kashogi was CIA. And they're using another asset (Snowden) to roll this out. This story stinks.
TheInformed 7 hours agoI installed Nice Systems onto 600 desk tops in 2003 at 3 separate call centers, a call monitoring and a PC, mainframe CICS, or email, screen scrape capability. When the call audio was recorded we also captured whatever was on the screen. No doubt the government has been doing this on our phones and all personal computers for over a decade.
two hoots 10 hours ago (Edited)Your example shows that people are dumb, it's not evidence of some grand 'government backdoor' conspiracy. Don't conflate the two.
Globalist Overlord 12 hours agoForget the petty herd/individual surveillance, this is a "super power" tool for investment opportunities, negotiation advantage, strategic decisions, military/covert decisions, etc. you can be sure that the most improved (undisclosed) versions are in use in the usual suspect country. Likely spying on the spy's that bought the software from them. These are those steps beyond Nietzsche's amoral supra-man.
tunetopper 12 hours agoWhitney Webb was writing about this in 2018.
Snowden: Israeli Spyware Used By Governments to Pursue Journalists Targeted for Assassination
Occams_Razor_Trader 11 hours agoIf Pegasus is used against Human Traffic-ers, then why didnt they get Jeffrey Epstein earlier?
RasinResin 11 hours agoWhy 'get' people when you can 'use' these people ........................?
CryptoingTheLightFantastic 11 hours agoI use to be in IT and worked in association with Radcom. Now you may ask who is that? They are the Israeli company that is truly behind all monitoring and spying of your phones in America
EVIL incarnate
donebydoug 11 hours ago"Reuters' spokesman Dave Moran said, "Journalists must be allowed to report the news in the public interest without fear of harassment or harm, wherever they are. We are aware of the report and are looking into the matter."
I love the sanctimonious clutching of pearls, wringing of hands, and bleating from the purveyors of CCP propaganda, woketardness, and globalism whenever the velvet hand that feeds them punishes them with a throat punch instead.
Watt Supremacist 12 hours agoJournalists can't be spies, right? That would never happen.
nowhereman 11 hours agoYes but do the people working for Reuters know all that?
Grumbleduke 11 hours agoJust look at the signature on your paycheck.
Enraged 10 hours agothey're in the news business - of course they don't!
You know the adage "when your livelihood depends on not knowing" or something....
Max21c 10 hours ago (Edited)Listening in on calls is a distraction story by the propaganda media.
The real story is the blackmailing of politicians, judges, corporate executives, etc. for many years by the intelligence agencies with tapes of them with underage girls and boys. This was included in the Maxwell/Esptein story.
These people are compromised, which is the reason for the strange decisions they make, as they support the globalist elite.
There is no reason to spy on journalists, as they are part of the intelligence agency operations.
Wayoutwilly 12 hours ago remove linkThere is no reason to spy on journalists, as they are part of the intelligence agency operations.
True the press are either spies or puppets and vassals of Big Brother and the secret police. They're all mostly agents of the Ministry of Truth. But sometimes they get the weather report right.
Brushy 11 hours agoBet they have sh!t on Roberts, Kavanaugh and Barrett too.
Dis-obey 10 hours ago remove linkWait a minute, you mean the tracking spy device that you carry around and put all of your personal information on is actually tracking and spying on you?!!
Yog Soggoth 10 hours agoThey have data on everyone but not enough eyes to look at everyone all the time. So when you get flagged then they can open all the data on your device to investigate u.
ay_arrowLawn.Dart 10 hours agoKhashoggi was not a journalist. While interesting, this is not the story of the year.
Max21c 10 hours agoAlmost every intellegence agent is a writer of some kind.
The 3rd Dimentia 9 hours agoNOS is just one company out of many. They have the willing complicity of the security services of other countries including the CIA, FBI, NSA, DOJ, in the USA and similar per UK. Secret police use these special contractors to help them engage in crimes and criminal activities and it does not matter whether the secret police use a foreign or domestic secret police agency or contractor as they're all in on it together. It's just a criminal underworld of secret police, secret police bureaus & agencies, and "intelligence" agencies. They're all crooked. They're all crooks and criminals and thieves that rob and persecute innocent civilians just like the Bolsheviks, Nazis, Gestapo, Waffen SS, Viet Kong, Khmer Rouge, Red Guards, ISIS, Stasi, KGB, etc. It's all the same or similar secret police, police state tactics, state security apparatus abuses of power, absolute power & its abuses, and spy agencies and intelligence agencies... and those that go along with it and collaborate. It's all just criminal enterprises and crime agencies.
Dis-obey 10 hours agoone other tentacle- https://archive.4plebs.org/dl/pol/image/1590/02/1590026057592.jpg
Bostwick9 10 hours agoSo you can solve the 10,000 open murder investigations in Chicago with this. That's how its being used right...
NAV 11 hours ago remove link"We are deeply troubled to learn that two AP journalists, along with journalists from many news organizations, are among those who may have been targeted by Pegasus spyware," said Director of AP Media Relations Lauren Easton.
OMG . Not journalists !!!!!!!!!!
Guess NSO is a "buy", then.
Norseman_Aura 10 hours agoTo believe that the Israelis will not use the information that they have is absurd.
Here's one example:
The American Anti-Defamation League under Abe Foxman long made it a practice for decades to tail all Congressmen – liberal or conservative -- as was brought out in allegations in the San Francisco trial of its head operative Roy Bullock on charges of buying blackmail information from members of the San Francisco Police Department as reported by the San Francisco Examiner. Bullock had collected information and provided it to the ADL as a secretly-paid independent contractor for more than 32 years.
Can it be that there's a connection between data of this kind and the unbelievable unification of almost every congressman behind every Israeli position?
Of course, the San Francisco Examiner no longer is in existence. But Israeli trolls continue to gather like wasps upon meat to destroy any information that might reveal their nefarious purposes.
novictim 8 hours agoIn 1993 the FBI interviewed 40-year undercover ADL operative Roy Bullock , who had improperly obtained social security numbers and drivers licenses from San Francisco Police Department officer Tom Gerard. Gerard and Bullock infiltrated and obtained information on California Pro-Palestinian and anti-Apartheid groups as paid agents of both the ADL and South African intelligence services. The ADL paid tens of thousands in damages over the incident and promised not to collect confidential information in the future.
SARC '
Sarrazin 8 hours agoWhat do you want to bet that Orange Hitler and associates along with MAGA Republicans, their attorneys, friendly patriot reporters, etc, have had their phones widely hacked going all the way back to 2016?
Because when you are a "progressive" in power, anyone who wants to unseat you is a terrorist threat and you can do just about anything you want to them because you are saving the world.
LEEPERMAX 9 hours ago (Edited)unseat you is a terrorist threat and you can do just about anything you want to them because you are saving the world.
Funny, it's the same formula US foreign policy applies to all it's victims nations around the world. Fighting terrorists in the name of saving the world.
OldNewB 11 hours ago💥BOOM !!!
In 2020 alone, Facebook and Amazon spent more money on lobbyists than did Raytheon, Northrup Grumman, Lockheed Martin, and Boeing -- major players in the defense-industrial complex !!!
Let that sink in.
SummerSausage PREMIUM 12 hours ago"Journalists must be allowed to report the news in the public interest without fear of harassment or harm, wherever they are."
This hasn't happened in ages. What the large majority of MSM operatives (so called "journalists" ) convey to the public is propaganda and agenda driven misinformation and disinformation.
Mute Button 11 hours agoObama spying on Trump and Fox reporters - meh.
Same Obama intelligence services spying on WaPo & leftist reporters - FASCIST
Ivy Mike 8 hours agoWe're supposed to be outraged even though Trump & co. know they're being "spied" on.
Its just a game of the uniparty.
MeLurkLongtime 5 hours agoYawn. Smart phones have swiss cheese security. Who knew.
If you have a secret that you really don't want people to know, don't put in on a device that ever touches the internet. Don't talk about important stuff on a phone call. Any mob boss from the 70's could tell you that.
_0000_ 9 hours ago remove linkI would add if you have Alexa, don't converse on any sensitive topics in front of her, either.
Rectify77 PREMIUM 10 hours ago" Pegasus is a very advanced malware that infects iOS and Android devices to allow operators of the spyware to copy messages, photos, calls and other data, including secretly activate microphones and cameras."
This is a non-story. Lots of smoke, lots of brew-ha-ha.
Why is THIS a jaw dropping story now when the NSA/CIA have been doing this to ALL iOS and Android devices years ago? RE: CALEA , signed into law in 1996 by Bill Clinton.
Just more misdirection... meant to distract from something else. What?
NAV 10 hours agoIsn't it odd that Iran, Russia and China are not on the map? Who are the Israelis playing?
Market Pulse 13 hours agoIsn't is amazing that Russia is giving asylum to Edward Snowden who will be arrested and inflicted with only God knows what if captured by the USA?
dog breath 4 hours agoAnd we are surprised, why??? Everyone's phones are spied upon with all the data collected. All part and parcel of the NWO and the "Information Age". How else are they going to get all that information to control everything. And just think, once upon a time, there were no cell phones and the people were fine. They also were happier and much more free. Hint - ditch the phone!
Hello? This stuff has been going on for two decades. Bill Binney, former NSA, been talking about this since after 911. Five eyes is a way over going around internal rules. Every country does this. Russia, China, EU, USA, Australia, etc. are all spying on their own citizens. This world is turning into a corrupt crap pile and I'm waiting for the Lord to come.
Feb 10, 2021 | arstechnica.com
Jamjen831 </> , 2021-02-08T19:55:08+00:00" rel="nofollow peachpuff wrote:
Barcode scanners and flashlight apps... who installs these? Phones come with these features already baked in.I assume some of it is just old stuff people just re-download without thinking. Android hasn't always had a built in flashlight app (and am I crazy in that the early ones required root?). And I'm pretty sure that's the same with QR readers. I hadn't realized that Google Lens was a QR scanner until fairly recently.
Jul 03, 2020 | www.zdnet.com
Google has removed this month 25 Android applications from the Google Play Store that were caught stealing Facebook credentials.
Before being taken down, the 25 apps were collectively downloaded more than 2.34 million times.
The malicious apps were developed by the same threat group and despite offering different features, under the hood, all the apps worked the same.
According to a report from French cyber-security firm Evina shared with ZDNet today, the apps posed as step counters, image editors, video editors, wallpaper apps, flashlight applications, file managers, and mobile games.
The apps offered a legitimate functionality, but they also contained malicious code. Evina researchers say the apps contained code that detected what app a user recently opened and had in the phone's foreground.
If the app was Facebook, the malicious app would overlay a web browser window on top of the official Facebook app and load a fake Facebook login page (see image below: blue bar = actual Facebook app, black bar = phishing page).
If users entered credentials on this phishing page, the malicious app would log the data and send it to a remote server located at (the now-defunct) airshop.pw domain.
IT security and privacy: Concerns, initiatives, and predictions (TechRepublic Premium)
This archived TechRepublic Premium report, originally published in February 2015, is available for free to registered TechRepublic members. For all the latest research reports, 100+ ready-made policies, IT job descriptions, and more, check out TechRepubli... Research provided by TechRepublic Premium
Evina said it found the malicious code that stole Facebook credentials in 25 apps they reported to Google at the end of May. Google removed the apps earlier this month, after verifying the French security firm's findings. Some of the apps had been available on the Play Store for more than a year before they were removed.
The full list of 25 apps, their names, and package ID, are listed below. When Google removes malicious apps from the Google Store, the company also disables the apps on a user's devices and notifies users via the Play Protect service included with the official Play Store app.
Dec 16, 2019 | www.makeuseof.com
GPS is great for recovering your device when lost or stolen and navigating while driving with Google Maps . And it's especially nifty because GPS works even when disconnected from the internet . Just download your maps ahead of time! Advertisement
But how about using an Android phone as a GPS tracker? It may not be the most reliable option, and it does comes with some not-so-insignificant drawbacks, but it can get the job done if you're desperate. Here's how to turn your Android phone into a GPS tracker.
Note: These instructions are based on a Samsung Galaxy S8 running Android 8.0 Oreo, but the steps should be relatively similar for most Android devices.
Tracking With Native Android FeaturesMost Android devices released in 2014 or later have a built-in feature called Find My Device (formerly called Find My Android). This service constantly pings your device's location back to Google's servers so that Google knows where your device is . You can then use Google's web interface to see where your device is at any given time. You'll need a Google account to use this feature.
How to Enable Find My Device on Android
- Navigate to your device's Settings .
- Tap on Lock screen and security .
- Tap on Other security settings . (This step may be unnecessary depending on your particular device and Android version.)
- Tap on Device admin apps . (This step may be called Device Administrators depending on your particular device and Android version.)
- Tap Find My Device .
- Tap Activate .
Note: In order to activate this service, you'll need to allow four permissions: 1) the ability to erase all data, 2) the ability to change your screen unlock password, 3) the ability to lock the screen, and 4) the ability to turn off functions on the lock screen.
AdvertisementThe nice thing about Find My Device is that it's not just a tracker -- it lets you control the device from afar in the above-mentioned ways. Learn more in our overview of Find My Device .
How to Use Find My Device on AndroidOnce enabled, all you have to do is launch a web browser, navigate to the Find My Device dashboard , and sign into your Google account (the same one associated with your device).
Once you're logged in, select the device you want to locate, click the Locate button for said device, and it'll show its last known location and how long ago it was last spotted. It's fairly accurate in my experience, but I live in an urban environment; it can be off by up to 20 meters in areas with poor GPS visibility.
Tracking With Third-Party Android AppsIf you don't like Find My Device for whatever reason, you can always resort to one of the many third-party alternatives available on the Google Play Store. These apps are easy to install and you don't really have to do anything beyond creating an account to use them.
There are two that we recommend:
1. Lookout : Lookout is an all-in-one security solution where device tracking is just one of its many features. As such, it might be too bloated if device tracking is the only feature you're interested in. But if your device currently lacks a good antivirus app, you might as well use this one and kill two birds with one stone.
2. Prey : In practical usage, Prey is very similar to Find My Device. Its one big advantage is availability across multiple other platforms, including Windows, Mac, Linux, and iPhone, so you can track ALL of your devices from anywhere.
Most of these are marketed as anti-theft and anti-loss security apps for Android -- and they're certainly useful for those purposes -- but you can use them for straight-up tracking if you so wish.
Once your device is set up as trackable, whether using Find My Device or a third-party app, there's only thing left to do: attach the device to the person or object that you want to track . Obviously, this is much easier said than done.
Want to know how to track a car with a cell phone?
The easiest and most effective option is to use a magnetic car mount . Most two-piece kits come with a magnetic insert (that you place inside your device case) and a magnetic base (that you attach to whatever you want to mount). With a good model, the magnetic force should be strong enough for your phone to "snap" onto the base and stay there securely.
Oct 23, 2019 | tech.slashdot.org
Posted by msmash on Tuesday October 15, 2019 @06:10PM from the pushing-the-limits dept.
At Google's hardware event this morning , the company introduced a new voice recorder app for Android devices , which will tap into advances in real-time speech processing, speech recognition and AI to automatically transcribe recordings in real time as the person is speaking. From a report:
The improvements will allow users to take better advantage of the phone's voice recording functionality, as it will be able to turn the recordings into text even when there's no internet connectivity. This presents a new competitor to others in voice transcriptions that are leveraging similar AI advances, like Otter.ai, Reason8, Trint and others, for example.
As Google explained, all the recorder functionality happens directly on the device -- meaning you can use the phone while in airplane mode and still have accurate recordings.
"This means you can transcribe meetings, lectures, interviews, or anything you want to save," said Sabrina Ellis, VP of Product Management at Google.
The Recorder app was demonstrated onstage during the event, live, and was offering -- from what was shown -- an error-free transcription.
Sep 23, 2019 | economistsview.typepad.com
anne , September 21, 2019 at 06:30 AM
https://news.cgtn.com/news/2019-09-21/Huawei-s-pivotal-moment-KabssDHWdq/index.htmlSeptember 21, 2019
Huawei's pivotal moment
By Tom FowdyHuawei launched its Mate 30 series on Friday, the first new device produced by the Shenzhen telecommunications firm since it has been blacklisted by the United States government and excluded from American technology markets.
The subsequent result of the listing had led Google to sever ties with the company and prohibit new devices from using its Play Store services and operating system, something which ultimately impacts the Mate 30 Series, which is using an open-source version of Android.
The impact of it all has led Western commentators to ask questions about Huawei's future in Western smartphone markets, particularly what applications can it access.
However, not all is bleak, and what may start off as a hindrance for the company is set to transform into an opportunity. The United States' assault on the company has forced Huawei to innovate.
With the inaugural "Huawei AppGallery" emerging with the Mate 30, the company has now positioned itself on an investment trajectory to create a new "Huawei core" to compete with the world of Google-led Android systems outright.
In this case, what seems like a detriment is part of a broader pivotal moment for Huawei. The company's portfolio is about to change forever.
Beyond Apple and the iPhone, the Android operating system dominates in the global smartphone market. Describing it as an "operating system" is barely fitting; it might otherwise be described as "an ecosystem" with a wide range of Google orientated services within it.
They include the popular browser Chrome, the YouTube video service, Google mail and, most critically, the "Google Playstore," which, owing to its popularity, attracts more developers and investors than any other unofficial App stores. This "ecosystem" creates a "web of comfort" which effectively entrenches the consumer in the Android orbit.
U p until May 2019, Huawei was a part of this orbit. Its subsequent estrangement from Android owing to the American government's decision has forced some difficult choices. It has made markets keen to observe how the Mate 30 will perform given its lack of Google applications and the need for users to obtain some apps through third-party stores.
So, the question is: How are they now adapting and making that transition? Bengt Nordstrom of North Stream research in Sweden notes that "they have a strategy to become completely independent from U.S. technology. And in many areas, they have become independent."
First of all, we are well aware that Huawei is developing its own Harmony Operating System as a contingency measure, although it has not chosen to apply it to the Mate 30 as an olive branch to Google.
Second, and most excitingly is Huawei's announced bid to invest over 1 billion U.S. dollars in developing its own application "core" or ecosystem. This, in essence, is an effort to get developers to establish applications for the new "Huawei App store" and thus establish a self-reliant, independent path from the world of Android.
To achieve this, the company has pledged a competitive revenue sharing scheme of 15 percent to developers, half of that what Apple and Google demand for participation in their own app-stores.
This effort is combined with a wider scope in research and development from the company, which is also designed to forfeit dependence upon American technology chains in terms of critical components and other parts.
We have already seen massive investment pledges from Huawei to build new research and development centers in the United Kingdom, Belgium, Italy and Brazil. They are not empty promises, but a serious and strategic effort.
In this case, what was intended to be a political effort to destroy and contain Huawei is likely to prove a pivotal turning point in the company's history with huge repercussions for global smartphone and technology markets.
Instead of having once been reliant on and thus beneficial to American technology markets, the outcome is that Huawei will re-emerge independent of and competing against it.
Armed with a pending new operating system, a new application development drive and a broader research effort, what seemed otherwise a detriment is likely to bring a massive opportunity. Thus, it is very important to examine the long-term prospects for the company's fortunes ahead of short-term challenges.
Jun 19, 2019 | theweek.com
The App Store also instituted the idea of tech products being part of a vertically-integrated, closed platform. Apple and Google (with its Google Play store) became the dominant platform owners for mobile, because their scale and network effects made them the gatekeepers for companies that wanted to enter the mobile market and access the app marketplace. Even a company with as much power as Microsoft could do nothing to break the mobile duopoly .
So whatever your opinion of Google's Huawei snub, it certainly demonstrates just how much power Google has, and how that power is centralized. For phone makers, Google is the only option -- Apple being its own walled garden -- and for app makers and consumers alike, the App Store and Google Play are the only existing choices.
This is hardly a secret or conspiratorial. Huawei has long been attempting to develop its own operating system , precisely to prevent such situations as this. Similarly, despite being the largest Android vendor by far, Samsung still has its own Tizen operating system. Building your business on someone else's platform leaves you at their mercy. There's also the question of user experience: Consumers can't actually buy books on the Kindle app on an iPhone or iPad, because Amazon understandably wants to avoid the 30 percent cut that Apple takes on its operating system.
Perhaps a closed app store linked to a platform has outlived its early usefulness. Not only does it cement power among entrenched companies, it also puts up barriers to competition. This idea isn't so radical. Recently, the Supreme Court ruled that Apple's customers can sue the company under antitrust law for monopolistic behavior for the way in which it takes that 30 percent of everything on the app store. There are technical avenues forward: Progressive Web Apps, or PWAs, operate in a more open, more platform-neutral manner, and have significantly improved in functionality recently; they could offer a more neutral way for companies to offer apps outside the constraints of an app store.
Jun 16, 2019 | www.asiatimes.com
Say hello to the Russia-China operating system
The US ban on Huawei is pushing it to develop alternative systems that may rival Google and Android
Google cuts Huawei off Android; so Huawei may migrate to Aurora. Call it mobile Eurasia integration; the evolving Russia-China strategic partnership may be on the verge of spawning its own operating system – and that is not a metaphor.
Aurora is a mobile operating system currently developed by Russian Open Mobile Platform, based in Moscow. It is based on the Sailfish operating system, designed by Finnish technology company Jolla, which featured a batch of Russians in the development team. Quite a few top coders at Google and Apple also come from the former USSR – exponents of a brilliant scientific academy tradition.
In 2014, Russian entrepreneur Grigory Berezkin started co-owning Jolla, and from 2016 his Mobile Platform company started developing a Russian version of the operating system. In 2018, Rostelecom, a state company, bought a 75% share in Open Mobile Platform.
Ahead of the St Petersburg International Economic Forum last week, Huawei chairman Guo Ping discussed the possibility of adopting Aurora with Russian minister of digital development and communications, Konstantin Noskov. According to Guo, "China is already testing devices with the Aurora pre-installed. "
In Moscow, before moving to St Petersburg, Presidents Putin and Xi Jinping discussed multiple possible deals; and these include Huawei-Aurora, as well as where to locate some of Huawei's production lines in Russia.
Google, here we comeAurora could be regarded as part of Huawei's fast-evolving Plan B. Huawei is now turbo-charging the development and implementation of its own operating system, HongMeng , a process that started no less than seven years ago. Most of the work on an operating system is writing drivers and APIs (application programming interfaces). Huawei would be able to integrate their code to the Russian system in no time.
Sep 20, 2018 | www.rt.com
Omnipresent tech giant Google told US senators that it lets third-party apps read data from Gmail accounts and share this information with marketers, even though Google itself allegedly stopped this practice last year. In a letter sent to the lawmakers in July and made public on Thursday, Google said that developers may share your data with third parties for the purposes of ad-targeting, "so long as they are transparent with the users about how they are using the data."
In practice, this means that any app that shares your private data with advertisers must disclose this fact in their privacy policy. This is seen first in a pop-up box that includes a note that the app wants permission to "read, send, delete and manage your email." However, information about the marketers this data is shared with can often be more difficult to find.
Read more Google lets 3rd-party app developers read your emails - report
Google's letter came in response to a request by Republican senators for information about the scope of the email content accessible to these third parties. In their letter to the company, the senators claim that one marketing company, Return Path Inc, read the private contents of 8,000 emails to train its AI algorithms.
Return Path told the Wall Street Journal at the time that, while it did not explicitly ask users whether it could read their emails, permission is given in their user agreements, which state that the company collects personal information including but "not limited to your name, email address, username and password."
At least 379 apps available on the Apple and Android marketplaces can access users' email data. In Google's letter to Congress, the firm declined to say when, if ever, it has suspended an app for not complying with its rules.
Google itself has mined users' emails since Gmail was launched in 2004, but announced last year that it would stop the practice, amid privacy concerns and a federal wiretapping lawsuit.
Now, privacy officials from Google, Apple and Amazon are preparing to travel to Capitol Hill next week, for a Commerce Committee hearing . There, the tech companies will be asked to "discuss possible approaches to safeguarding privacy more effectively."
Everything you've ever searched for on any of your devices is recorded & stored by Google https://t.co/8KGgO0xT92
-- RT (@RT_com) March 30, 2018The hearing is another in a series of grillings faced by the tech industry since the Cambridge Analytica privacy scandal revealed in March that Facebook allowed a third party to collect personal information on millions of users. Google CEO Larry Page was invited to a Senate Intelligence Committee hearing on political bias, foreign interference and privacy on tech platforms earlier this month, but declined to show up, sending a written testimony instead.
Like this story? Share it with a friend!
Sep 07, 2018 | yro.slashdot.org
(duo.com) 46 Trailrunner7 writes: Researchers have discovered a weakness in all version of Android except 9 , the most recent release, that can allow an attacker to gather sensitive information such as the MAC address and BSSID name and pinpoint the location of an affected device. The vulnerability is a result of the way that Android broadcasts device information to apps installed on a device. The operating system uses a mechanism known as an intent to send out information between processes or applications, and some of the information about the device's WiFi network interface sent via a pair of intents can be used by an attacker to track a device closely.
A malicious app -- or just one that is listening for the right broadcasts from Android -- would be able to identify any individual Android device and geolocate it. An attacker could use this weaknesses to track a given device, presumably without the user's knowledge. Although Android has had MAC address randomization implemented since version 6, released in 2015, Yakov Shafranovich of Nightwatch Cybersecurity said his research showed that an attacker can get around this restriction.
Oct 21, 2017 | news.softpedia.com
Samsung announced Samsung DeX earlier this as a way for users to transform their mobile phones into full-fledged desktops or workstations by attaching a monitor, mouse, and keyboard. DeX is currently limited the Galaxy S8 and S8+, as well as Note 8, bringing you a desktop-like experience powered by your smartphone.
And now, Samsung wants to expand the DeX's capabilities by introducing "Linux on Galaxy," a new concept promising to bring the Linux PC experience to your mobile device. Linux on Galaxy comes in the form of an app that you can install on your smartphone to run multiple Linux-based operating systems.
"Although it's in a trial phase, Linux on Galaxy is our innovative solution to bring the Linux experience on PC to mobile, and then further onto a larger display with Samsung DeX. Now developers can code using their mobile on-the-go and with Samsung DeX, and can seamlessly continue the task on a larger display," says Samsung.
Developers will be able to use their favorite GNU/Linux distroWith the Linux on Galaxy app, developers will be able to use their favorite GNU/Linux distribution on their mobile devices. When using Samsung DeX with Linux on Galaxy, users can also run Linux apps that aren't available on their smartphones, which run Google's Android mobile operating system, also powered by the Linux kernel.
Best of all, Samsung Linux on Galaxy will enable developers to use a fully functional development environment to create content on a big screen, all powered by their Samsung S8/S8+ or Note 8 devices. At the moment, Linux on Galaxy is in heavy development, but you can find out more about it at seap.samsung.com/linux-on-galaxy .
Jul 11, 2017 | access.redhat.com
If you can't dismiss an app by pressing the "back" button, it may just be a glitch or crappy app, but it could also be something much worse . That's why Google has quietly slipped in a new Android feature called "panic detection" that can preemptively close an app if you stab at the back button multiple times. So far the feature, spotted by XDA Developers , has appeared in some, but not all devices with Android 7.1 Nougat.Google hasn't said anything about the feature-- XDA just happened to discover the code in a recent build of Android 7.1. Essentially, it listens for back button presses, and if enough of them happen (four to be exact) in rapid succession (with less than a third of a second delay) then Android will override the app and bring back the home screen. This could apply to apps that just freeze, but also to rogue software that tries to intercept any and all actions, like malware or adware.
It's a smart idea, because what's the first thing you do when you can't make an app go away? Frantically pressing the back key is probably the first thing, so that will kill the app and allow you to uninstall or disable it until you figure out the problem.
You'll have to enable the feature to get it to work, apparently. Google seems to be rolling it out on a limited basis, and may in fact just be testing it, so it may be some time before it ends up on your device.
Aug 01, 2017 | observer.com
In its November report, Kryptowire wrote that it detected devices sending data about call history, text messages, the unique identifier of the mobile service subscriber, the device's unique identifier and call histories.
It also found evidence that the software specifically searched text messages for key words and sent full text messages back to Adups servers in China. These messages were encrypted, but Kryptowire was able to find the key and decrypt them.
Since the Kryptowire finding, Adups has reported that it is no longer collecting personally identifiable information, but Kryptowire told Black Hat attendees that it has continued to observe the same behavior, though more carefully hidden and not necessarily on Blu devices.
In a November statement , Adups explained the searching and parsing of users' text messages by saying it had created an application to screen and block promotional messages. It wrote, "In response to user demand to screen out junk texts and calls from advertisers, our client asked Adups to provide a way to flag junk texts and calls for users. [The] application flags texts containing certain language associated with junk texts and flags numbers associated with junk calls and not in a user's contacts."
Blu devices aren't the only ones to carry the Adups software, and Kryptowire has noted that it behaves differently from device to device. Another maker of cheap Android phones, Cubot, also uses Adups software. " In May 2017 on the Cubot X16S device, we observed the user's call log, text message metadata, browser history, list of installed apps, list of apps used and unique device identifiers being exfiltrated by Adups," Kryptowire's Tom Karygiannis wrote the Observer in an email.
On Wednesday, Kryptowire released additional technical details, describing tests from May on Blu Grand M, LifeOne X2 and Advance 5.0 devices.
Subsequent to the Black Hat presentation, Amazon has closed off sales for the complete line of Blu Android phones ...
Jul 28, 2017 | www.msn.com
discovered and blocked a new family of Android malware developed by a cyber arms company that may have its roots in state-sponsored spying efforts.
The malware!known as Lipizzan!contained references within its code to an Israeli tech firm called Equus Technologies, which offers "tailor made innovative solutions for law enforcement, intelligence agencies, and national security organizations."
In the Android Developers Blog , Megan Ruthven of Android Security and Ken Bodzak and Neel Mehta of Google's Threat Analysis Group detailed the malicious software, which they called a "multi-stage spyware product."
The researchers found Lipizzan had the ability to monitor and steal communications from the device. The malware could hijack a user's email, SMS messages, location information, voice calls and local media. It could also snap screenshots of the user's device and hijack the camera to take pictures or record video.
When active, Lipizzan could steal data from a number of apps including Gmail, Google Hangouts, LinkedIn, Facebook Messenger, Skype, Snapchat, popular messaging platforms like WhatsApp and Viber and encrypted communications app Telegram.
Most troubling about Lipizzan was that it was found in apps on the Google Play Store disguised as legitimate apps. The malware was most often found in apps posing at popular utilities with names like "Backup" or "Cleaner." A second wave of apps containing the malware posed as notepad, sound recorder, and alarm manager apps.
When a user would install one of the infected apps, the app would begin to download a "license verification" that would examine the device. If the handset met certain criteria, the second stage of Lipizzan would kick in and root the device while establishing a connection to the Command and Control server operated by malicious actors to send back files and recordings.
While the spyware was available to download through apps in the Google Play Store, Google reported very few instances in which infections were found. According to the company's findings, fewer than 100 devices had the malicious apps installed on their devices. Google claimed that would make the infection rate only 0.000007 percent.
Lipizzan and the apps that contain it have been removed from the Google Play Store, and Google recommends users make use of Google Play Protect , a security suite for Android devices.
Google also advised users to download apps exclusively from the Google Play Store rather than from third-party app stores and to disable installations from unknown sources. The search giant also suggested keeping devices up to date with the most recent security patch.
While Google may have caught and eliminated Lipizzan, the company has run into a fair amount of malware slipping through the cracks of its Google Play Store. Earlier this year, an adware scheme managed to infect 40 million phones through Google's official marketplace.
Jul 11, 2017 | www.msn.com
If you can't dismiss an app by pressing the "back" button, it may just be a glitch or crappy app, but it could also be something much worse . That's why Google has quietly slipped in a new Android feature called "panic detection" that can preemptively close an app if you stab at the back button multiple times. So far the feature, spotted by XDA Developers , has appeared in some, but not all devices with Android 7.1 Nougat.Google hasn't said anything about the feature-- XDA just happened to discover the code in a recent build of Android 7.1. Essentially, it listens for back button presses, and if enough of them happen (four to be exact) in rapid succession (with less than a third of a second delay) then Android will override the app and bring back the home screen. This could apply to apps that just freeze, but also to rogue software that tries to intercept any and all actions, like malware or adware.
It's a smart idea, because what's the first thing you do when you can't make an app go away? Frantically pressing the back key is probably the first thing, so that will kill the app and allow you to uninstall or disable it until you figure out the problem.
You'll have to enable the feature to get it to work, apparently. Google seems to be rolling it out on a limited basis, and may in fact just be testing it, so it may be some time before it ends up on your device.
Jun 17, 2017 | arstechnica.com
Citizen Lab, the University of Toronto group that monitors government surveillance in the digital age, analyzed the recently discovered instance of the fake Qatif Today app in a blog post headlined Police Story: Hacking Team's Government Surveillance Malware . The account provides a rare glimpse into malware developed by "Hacking Team," a highly secretive outfit based in Italy that charges governments top dollar for extremely stealthy spyware that's often referred to as a "lawful intercept" program.The Trojan is known as an Android implant because it cloaks itself inside a legitimate third-party app. People who are infected with it must first be tricked into obtaining the Android installation package (APK) from a non-authorized source, which in this case was this now-shuttered Dropbox location . Aside from that, victims may have little indication anything is amiss. To lend it legitimacy, the malicious APK was signed by a digital certificate that appeared to be related to Java and its original creator Sun Microsystems. Citizen Labs identified six other samples signed by the same certificate.
Once installed, the app establishes contact with command and control servers located at 91.109.17.189 and 106.186.17.60, which are addresses Citizen Lab has seen used in previous Hacking Team campaigns. The implant also attempts to break out of its Android-imposed security sandbox by exploiting a vulnerability in older Android versions on specific handsets that allows apps to gain unfettered root privileges.
The trojan next tries to access local files stored by a variety of social media, chat, and call apps including Facebook, Viber, WhatsApp, Skype, LINE, and QQ. The app has audio recording, camera, video, key logging, and "live mic" capabilities, as well as a "crisis" module that provides anti-analysis functionality. The researchers also found evidence of what appears to be location, screenshot-taking, and browsing activity modules. The implant even seems to have a filter to specify date ranges to narrow the mail and text messages it sends back to the control servers. (It's not clear what happens when the app runs on Android versions that have patched the rooting vulnerability.)
"We also see information about how the implant exfiltrates data, along with its C2 servers," Tuesday's post reported. "Interestingly, it appears that the implant is capable of monitoring the devices' connectivity (e.g. Wi-Fi, cellular network), choosing connection type, and rate limiting the bandwidth. Note that these are the same servers we observed in the implant's network communications."
The Citizen Lab researchers provided an overview of the remote control system (RCS) architecture that works with Android trojans and trojans for other platforms. The architecture relies on a series of system administrators, technicians, and analysts to funnel information pulled off an infected device to the interested parties. Unverified screenshots an anonymous person provided to Citizen Lab show RCS works on computers running Windows, Mac OS X, or Linux.
It comes with a dazzling number of capabilities, including:
Network Injection: via injected malicious traffic in cooperation with an ISP Tactical Network Injection : on LAN or Wi-Fi Melted Application : bundling a Hacking Team dropper alongside a bait application Installation Package : a mobile installer Exploit : document-based exploit for mobile and desktop Local Installation : mobile installation via USB or SD card Offline Installation: create an ISO for a bootable SDHC, CD, or USB. This option includes the ability to infected hibernated and powered off devices QR Code: a mobile link that, when pictured, will infect the target Applet Web: likely a malicious website (depreciated after v. 8.4) Silent Installer: a desktop executable that will install the implant Infected U3 USB : an auto-infecting U3 USB WAP Push Message : the target will be infected if the user accepts the message (works on all mobile operating systems apart from iOS)
Citizen Lab researchers wrote:
The implant ("agent") offers one-click functionality for requesting information from target devices. Technicians are encouraged to add functionality as needed.
... ... ...
Selection of available surveillance modulesAccessed files Address Book Applications used Calendar Contacts Device Type Files Accessed Keylogging Saved Passwords Mouse Activity (intended to defeat virtual keyboards) Record Calls and call data Screenshots Take Photographs with webcam Record Chats Copy Clipboard Record Audio from Microphone
Other CapabilitiesWith additional Voice and silence detection to conserve space
Realtime audio surveillance ("live mic:" module is only available for Windows Mobile) Device Position URLs Visited Create conference calls (with a silent 3rd party) Infect other devices (depreciated since v. 8.4)Once an implant is operational its collection operations can be updated. In addition files can be sent to and received from the device.
In addition, implants have a default cap on "evidence" space of 1GB on the target device. Recording of new material stops when the space is reached. Operators also have the ability to delete not-yet-transmitted data on the device.
Programs such as RCS are marketed to governments as legitimate wares, but Citizen Lab points out that many countries have few legal guidelines and little oversight for the way they're used.
"In light of the absence of guidelines and oversight, together with its clandestine nature, this technology is uniquely vulnerable to misuse," the report warns. "By analyzing the tools and their proliferation at the hands of companies like Hacking Team and Gamma Group, we hope to support efforts to ensure that these tools are used in an accountable way, and not to violate basic principles of human rights and rule of law." , Jun 24, 2014 9:47 PM
Quote:MatthewSleeman , Ars Praetorian Jun 24, 2014 10:34 PMThe implant also attempts to break out of its Android-imposed security sandbox by exploiting a vulnerability in older Android versions that allows apps to gain unfettered root privileges.According to your link Dan, this affects only the Samsung Galaxy S3 or anything with Samsung's Exynos chipset. It isn't an Android root exploit in general. It's already been patched a year ago. blockquote
This is more interesting because all android apps are signed and if an app wished to update an app already installed (and with the same name, otherwise it will show up as a separate app), it has to have a matching signature.
aleph_nought wrote:goretsky , Smack-Fu Master, in training Jun 25, 2014 12:33 AMWhen does lawful intercept cross the line into total surveillance? Post-Snowden, the concept of lawful intercept has no meaning when everything can be intercepted and used at a later time.
Better question: How is this lawful to begin with? Unless they set things up so that, in theory, only terrorists and other *valid* targets of surveillance download then app, I don't see how it could be given the uproar over the stuff Snowden releasedHello,Pueo , Smack-Fu Master, in training Jun 25, 2014 3:48 AMThe SHA-256 hash for the file is 8e64c38789c1bae752e7b4d0d58078399feb7cd3339712590cf727dfd90d254d .
According to this VirusTotal report, this program is currently detected by the following programs:
Avira AntiVir - Android/FakeInst.ES.4
Baidu-International - Trojan.Android.FakeInst.bES
ESET - a variant of Android/Morcut.A
Kaspersky - HEUR:Trojan-Spy.AndroidOS.Mekir.a
ThreatTrack VIPRE - Trojan.AndroidOS.Generic.AFive out of fifty-three program, or a little under 10%. I'm sure the detection rate will go up in the next 24 hours to (or at least, near) 100%, though.
Regards,
Aryeh Goretsky
MatthewSleeman wrote:julienm , Wise, Aged Ars Veteran Jun 25, 2014 9:39 AMaleph_nought wrote:blockquote
Better question: How is this lawful to begin with? Unless they set things up so that, in theory, only terrorists and other *valid* targets of surveillance download then app, I don't see how it could be given the uproar over the stuff Snowden releasedConsider the likely target of the malware. It is someone using a news app focusing on a Saudi Arabian province. It assumes that the target will be connected in social media (Facebook and Whatsapp) and making international calls (Skype, QQ, and Viber). It was spread through twitter. This app is not targeting terrorists, it is targeting journalists and activists. Most likely it was produced for the security services of Saudi Arabia. If it's "lawful" for Saudi Arabia to jail and torture human rights activists I have no doubt they consider it "lawful" to spy on them as well. I doubt the monarchy is concerned with adding spying to its long list of human rights violations.
Ostracus wrote:nonars , Smack-Fu Master, in training Jun 25, 2014 10:16 AM New Postershow nested quotesMatthewSleeman wrote: blockquote aleph_nought wrote: blockquote
Better question: How is this lawful to begin with? Unless they set things up so that, in theory, only terrorists and other *valid* targets of surveillance download then app, I don't see how it could be given the uproar over the stuff Snowden releasedConsider the likely target of the malware. It is someone using a news app focusing on a Saudi Arabian province. It assumes that the target will be connected in social media (Facebook and Whatsapp) and making international calls (Skype, QQ, and Viber). It was spread through twitter. This app is not targeting terrorists, it is targeting journalists and activists. Most likely it was produced for the security services of Saudi Arabia. If it's "lawful" for Saudi Arabia to jail and torture human rights activists I have no doubt they consider it "lawful" to spy on them as well. I doubt the monarchy is concerned with adding spying to its long list of human rights violations.
True, although I doubt they're the only country that would benefit from such a tool.
BTW when is the IOS version coming out? I can't image just running a different brand would provide the needed security?
there has been several stories about iOS malwares used by government agencies.
some are using public jailbreak exploits to install:
http://blog.kaspersky.com/iphone-spyware/others, aimed at high value targets, would use 0day flaws (browser exploits, PDF exploits,...).
so far, haven't heard of any such malware targeting WP7/8, but that's probably due to market share. Interestingly, such spying toolkits still have modules for Windows Mobile 6 (that might be explained by the fact it was much easier to develop malware on that old platform without sandboxing or modern memory protection features)
All of these app permissions are shared by and android app named "MobileTracker 1.0", which comes with many of the cell phones straight from the manufacturers. The full list of MobileTracker 1.0 is scary and this app cannot be disabled. It smells a lot like another CarrierIQ to me. Be aware of this app.
Jan 25, 2017 | www.nytimes.com
President Trump has carried his Twitter habit into his presidency. He has also brought with him another tech habit that is causing concern.
Mr. Trump has been using his old, unsecured Android phone to post on Twitter since moving to Washington late last week.
The president's desire to use his old, personal smartphone raises concerns that its use could be exposing him and the nation to security threats.
He is using the Android smartphone mainly to post on Twitter, not to make calls. But it's unclear what security measures have been put in place on the device and how vulnerable he could be to someone stealing data or breaking into his Twitter account.
The White House did not respond to a request for comment.
Twitter requires a connection to the internet, which exposes the device to security vulnerabilities if proper measures like two-factor authentication - a password and a code texted to a phone, for example - are not in place. If he uses the smartphone on an unsecure Wi-Fi network, he could be exposing his location and other personal information on the device.
"The absolutely minimum Trump could do to protect our nation is to use a secure device to protect him from foreign spies and other threats," said Senator Ron Wyden, a Democrat from Oregon on the Intelligence Committee. "It would be irresponsible in the extreme for the commander in chief to use an unsecure device that could be easily hacked or intercepted."
Among the concerns by security experts:
It is unclear if the device and its functions like texting are encrypted to thwart hacking. The device could be more vulnerable to hacking if used on unsecured Wi-Fi and cellular networks, such as when Mr. Trump travels between meetings or anywhere outside the White House. Hackers could access the device to turn on the camera and microphone. Stingray devices, a type of surveillance tool often used by law enforcement, can track a device's location and other information.
"There are a lot of questions, but it is clear there are often vulnerabilities in our phones and internet systems - and it is critical that people take precautions to ensure their sensitive information is protected from hackers and other malicious actors," said Neema Singh Guliani, legislative counsel with the American Civil Liberties Union.
The president's use of the personal device is particularly notable given his criticism of Hillary Clinton for using a personal email address and server when she was secretary of state.
In 2009, President Barack Obama fought to become the first president with a smartphone; though he won, the use of a White House-issued secure device came with many rules.
"As president, he is the biggest sitting target in the world," said Kevin Bankston, the director of New America's Open Technology Institute.
Dec 26, 2016 | it.slashdot.org
(bleepingcomputer.com) 60 Posted by msmash on Tuesday December 13, 2016 @11:12AM from the security-woes dept.An anonymous reader writes:
Security researchers have found malware hidden in the firmware of several low-end Android smartphones and tablets , malware which is used to show ads and install unwanted apps on the devices of unsuspecting users. 26 Android device models have been found to be vulnerable. The common link between all these devices is that all are low-cost devices, mostly marketed in Russia, and which run on MediaTek chipsets.
According to security researchers from Dr.Web , a Russian antivirus vendor, the malware appears to have been added to the firmware by "dishonest outsourcers who took part in [the] creation of Android system images decided to make money on users." The security firm has informed MediaTek and the device vendors about this issue so the affected companies can inspect their distribution chain and find the possible culprits.
Dec 26, 2016 | news.slashdot.org
(linuxjournal.com) 63Posted by BeauHD on Tuesday December 20, 2016 @07:45PM from the buyer-beware dept. Long-time Slashdot reader emil writes about how ADUPS , an Android "firmware provisioning" company specializing in both big data collection of Android usage and hostile app installation and/or firmware control, has been found pre-loaded on Barnes and Noble's new $50 tablet :
ADUPS was recently responsible for data theft on BLU phones and an unsafe version of the ADUPS agent is pre-loaded on the Barnes and Noble BNTV450 . ADUPS' press releases claim that Version 5.5 of their agent is safe, but the BNTV450 is running 5.2. The agent is capable of extracting contacts, listing installed apps, and installing new apps with elevated privilege. Azzedine Benameur, director of research at Kryptowire, claims that " owners can expect zero privacy or control while using it ."
Dec 26, 2016 | tech.slashdot.org
(onthewire.io) 42 Posted by msmash on Wednesday November 30, 2016 @12:25PM from the security-woes dept. Reader Trailrunner7 writes: A new version of an existing piece of malware has emerged in some third-party Android app stores and researchers say it has infected more than a million devices around the world , giving the attackers full access to victims' Google accounts in the process. The malware campaign, known as Gooligan, is a variant of older malware called Ghost Push that has been found in many malicious apps. Researchers at Check Point recently discovered several dozen apps, mainly in third-party app stores, that contain the malware, which is designed to download and install other apps and generate income for the attackers through click fraud. The malware uses phantom clicks on ads to generate revenue for the attackers through pay-per-install schemes, but that's not the main concern for victims. The Gooligan malware also employs exploits that take advantage of several known vulnerabilities in older versions of Android, including Kit Kat and Lollipop to install a rootlet that is capable of stealing users' Google credentials.Although the malware has full remote access to infected devices, it doesn't appear to be stealing user data, but rather is content to go the click-fraud route. Most users are being infected through the installation of apps that appear to be legitimate but contain the Gooligan code, a familiar infection routine for mobile devices.
YouTube
AndroidPIT
Access Chrome tabs from other devices
If you're using Chrome as your default browser – and let's be honest: who isn't? – were you aware that you can access the Chrome tabs from your other devices on your phone or tablet?
As long as you're logged into Chrome, when you launch a new tab you'll see the Recent tabs option at the bottom right. Tap this to see the urls that are open on your other logged-in devices and quickly access any of them.
Document scanner
In the early days of digitizing documents and photographs, you had to invest in a large flatbed scanner to make the physical digital. Nowadays you can use your smartphone camera as a makeshift scanner. Although the quality isn't quite as good, the process is a lot more convenient.
CamScanner is one of the best document scanners. / © ANDROIDPIT
CamScanner -Phone PDF Creator Install on Google Play
If you want to use your phone in this way there are a number of options. You can just snap a document and save it as an image, while Google Drive can convert scans into PDF files and read the text within them, as can the excellent CamScanner and Evernote.If found, return to:
This is another great tip for anyone with a tendency to misplace their things or for those with the bad habit of leaving your phone on the restaurant table while they dash off to the bathroom. If your phone gets lost and you suspect it has been picked up by someone, you can put a message on the lock screen telling the finder of your phone how to get in contact with you.
Remote lock or wipe your lost phone
There's not much worse than losing your phone, apart from losing your phone and knowing that someone might have access to your data. It's not only depressing, it's downright dangerous. Did you know that Google has an awesome feature called Android Device Manager that lets you track and take control of your phone if you ever lose it?
ADM goes beyond just tracking your phone though: you can use it to ring your phone, remotely lock it or even factory reset it if you know you're never getting it back. Just enable Android Device Manager in Settings > Security > Device Administrators and access the site on your computer if you ever lose your phone.
Nov 05, 2015 | Datamation
Mr. Number
There is little in life that's more annoying than having your smart phone ring during dinner. Even worse than that, is discovering the call is coming from a phone solicitor. This is where Mr. Number saves the day. You can use Mr. Number to block problem incoming numbers. Best of all, you'll have the ability to either send the caller directly to voicemail or just block them completely.SwiftKey
I've tried to use the default Android keyboard. It's "okay," however I need something that will help catch my written mistakes. While not perfect, I've found that SwiftKey is pretty close. If you allow it to learn from your phone's history, it's surprisingly accurate in its suggestions and auto-corrections. Install, choose the keyboard skin you want and you're all set. The only downside is that I lack this on my desktop PC.
Tasker
I've had a bit of a love/hate relationship with Tasker. I love it as it allows me to automate various aspects of my phone's interaction with the real world. But I hate it because I keep finding new uses for it. From using location services to make your phone turn off certain services to sending SMS messages when you get to work – this app does it all! I should point out that this is not an easy app to use out of the box. You will need to spend some time working with it to fully get the hang of it.Elixir 2
If there is one application you install, it needs to be Elixir 2. It's designed to help the masses understand some of the mysterious stuff running in the background of their Android devices. This app is also awesome for hardware troubleshooting. Proximity sensor or software issues bugging you? Elixir 2 will allow you to verify that your Android phone's sensors are all acting correctly. I have found that its report generator is an invaluable tool for determining device health, component temperature and if everything is firing on all cylinders.
PIA (Private Internet Access)
If you find yourself using untrusted wifi on occasion, then you're going to want to make sure you're using the PIA VPN app for Android. It's dead simple to use, simply enter in your account information once and connect. The VPN software will ensure you're connecting to the fastest VPN server and your getting solid throughput performance. There are other VPN solutions out there for Android, however none of them match both the speed and performance found with PIA.SmartThings
It's been said that 2015 is the year that "the Internet of things" becomes a common buzzword with smart devices working together to make life around your home easier. Recently I've been testing out a smart device hub called SmartThings. It comes with a smart hub that I connected to my router, then I added smart sensors to expand the "network" of smart devices. The key to controlling these items comes from their SmartThings Android app. It allows me to monitor sensors being triggered and even turn devices on or off. What I love about this app is that it offers me the ability to receive alerts as push notifications and SMS alerts. Bundle their alerts with the ability to make real-time changes to aspects of my home from anywhere and it's easy to see why SmartThings is such a popular concept.
Dec 07, 2015 | Datamation
Fing – Having a clear, real-time list of the devices attached to my home network is a huge time saver. Fing provides this for me without any extra effort. It even provides me with the assigned IP addresses, device manufacturer name and hostname for each appliance. Fing goes further by providing me with ping, traceroute and DNS lookup options. And as an added benefit, I can even execute WAL (Wake on LAN) for any computers setup to receive the "magic packet."
BaconReader – Reddit is a guilty pleasure of mine. But rather than bother to load up Reddit in Chrome, I prefer to use BaconReader. Its UI is intuitive, simple to use and runs very smoothly. I also like that I can share comments or a direct link to a Reddit post with minimal screen presses.
JuiceSSH –I spend more than a fair amount of time in SSH these days, between checking logs and working with my crontab. I've been known to monitor server performance or track down issues, while using JuiceSSH on my Android phone. I need SSH access to Debian ARM on a Pogoplug, Ubuntu Server on a Raspberry Pi and Ubuntu MATE and Arch (Antergos) dual-booting on my main rig. With JuiceSSH, I have simple access to all of these machines. Add in Dynamic DNS and I have SSH access from anywhere in the world. The biggest thing that sold me on JuiceSSH vs other related apps are the plugins available. An importer for my ssh_config, performance monitor for my remote servers, a port knocker, even a solid audit log.
... ... ...
The Wall Street Journal reported Thursday, citing sources with knowledge of the matter, that Google plans to fold its Chrome operating system into Android.
It follows on from reports two years ago when Google's executive chairman Eric Schmidt refused to rule out merging the two Linux based operating systems.
What's Hot on ZDNet
- Perfectly legal ways you can still get Windows 7 cheap (or even free)
- In laptop reliability survey, one brand trumps all
- Before the Web: Online services of yesteryear
- iPad Pro: Apple's tablet is a big fat enterprise failure
Last year, rumors emerged that Google was already at work in combining its popular end-user operating systems. And, in June 2014, Sundar Pichai -- now Google's CEO -- said that the company will be giving Chrome OS the power to run Android apps..
This move make a great deal of sense. Android and Chrome OS are Linux-based operating systems, which support apps in different ways but share the same foundation. Android forms its own distribution family, while Chrome OS is based on Gentoo Linux.
Both have their own strengths they could bring to a merged smartphone, tablet, and desktop operating system. Android, which runs on more than a billion devices, is the single most popular end-user operating system, with more than 1.6 million apps. Chrome OS has shown that Web-based apps are sufficient enough for many desktop users. In addition, Android is plagued with multiple versions that are very difficult to upgrade.
Chrome OS updates all versions on all systems. If Google gets vendors to update their Android devices using Chrome OS' upgrade methodology, Android would instantly become much more secure.
Sources close to the matter said that Chrome OS isn't going away any time soon, however.
"Google will still be pursuing Chromebook partnerships, for example since Chromebooks are doing better than ever in US schools."
Another source said that it makes sense now to explore with mobile devices becoming the primary device. There are opportunities to provide an open platform for both mobile and desktop. This is already happening. Examples of this direction include Chromecast running on a version of Android and the new Pixel C Android tablet.
In a recent issue of Fast Company, Google engineer Hiroshi Lockheimer, one of the leading Android developers, said that with the Android and Chrome OS now under the same management its "easier to implement cross-platform features such as the ability to use an Android phone to unlock a Chromebook."
We can now see the where these cross-platforms efforts are leading to: A new merged operating system.
Alas, while the marriage license may be signed, the actual release date is still over a year in the future. The Journal reports that the combined "Android Chrome OS" won't ship until 2017.
A beta version may be available sometime in 2016.
Feb 08, 2015 | Linux Today
Security vendor Avast warned on Feb. 3 that it had found three popular apps in the Google Play Android apps store that were infecting users with adware.
A Google spokesperson confirmed to eWEEK Feb. 4 that all of the malicious apps identified in the Avast report had been suspended from Google Play.
Complete StoryRelated Stories:
- Google Isn't Fixing Some Old Android Bugs(Jan 13, 2015)
- FakeID and MasterKey Still Pose Risks for Android(Jan 07, 2015)
- Android Lollipop is out, but almost no one is using it(Jan 08, 2015)
Android smartphones are kind of like Hummers. Reminiscent of the oversize, gas-guzzling S.U.V.'s, Androids have the biggest screens and tend to use much more data than other types of smartphones, including iPhones. And that higher data usage could rack up heftier phone bills.
In a recent study, Ericsson, the networking company, found that global mobile Internet traffic varied greatly, depending on the software system and the network that a phone uses.
But the highest average data consumption was seen on Android phones, which consumed an average of 2.2 gigabytes of data a month on one network, the study said. By contrast, iPhones used roughly 1.7 gigabytes a month and Windows phones used approximately 1.4 gigabytes a month, Ericsson found.
Chetan Sharma, a telecom analyst who is a consultant for wireless carriers, also has found that Android phones were the biggest data hogs. In the United States, high-end Android phones used about 4 gigabytes a month on average this year, he said. That is well above the average of 1.2 gigabytes a month that American wireless subscribers consumed this year.
So why does Android use more data?
The reasons are multifold. The most obvious is that Android phones tend to have the largest screens, so they download bigger files and video with more pixels, Mr. Sharma said.
Another factor is that Android is less efficient at managing apps than Apple's iOS. For instance, multiple Android apps may be running in the background with things like location data being collected, Mr. Sharma said. Also, Android users typically don't upgrade their operating systems as frequently as iOS users, so their smartphones may not receive fixes improving data management, he said.
Jan Dawson, an independent telecom analyst who previously worked for Ovum, noted that the data traffic numbers may also reflect the profiles of the people who choose Android versus those who choose iPhones. People with larger Android phones are more likely to skip buying a tablet, whereas iPhone owners may be buying iPads and consuming a lot of content there.
Regardless of how much data whichever phone consumes, the greater concern is how difficult it is to monitor data usage, Mr. Dawson said. While the carriers provide tools for monitoring data usage, there is no easy and intuitive way to keep close track of the megabytes or gigabytes you're using - no equivalent to a gas gauge to see how close you are to empty.
AutomateIt
Your smartphone is pretty smart, but apps like AutomateIt can make it even smarter.
The app lets you automate actions on your phone, so that whenever certain criteria are met, the action is triggered.
You can use AutomateIt for a variety of tasks, including sending a reply with your phone's location whenever a person texts you asking where you are. Or you can use it to turn Wi-Fi on and off under certain conditions to save battery life. You can even have AutomateIt switch your phone to vibrate mode whenever a meeting saved on your calendar starts.
If all of these settings seem a little too utilitarian, and just not fun enough, consider this: You also can use AutomateIt to play audio that says "Don't Touch Me!" whenever anyone comes too close to the proximity sensor on your phone.
May 15, 2013 | Slashdot
Drakino
This isn't always good though
It's great to see Open Source used as a tool to help foster healthy competition where it otherwise may not happen. But it's also potentially bad if the Open Source path leads to worse results for end users.
Take for example the iPhone/Android comparison made. The iPhone took control away from the mobile phone carriers in regards to the device, allowing all iPhone users to see updates all at the same time. It also put a dent in the phone crapware problem. Android has done nether, suffering problems because devices can't be all easily updated. Google today announced that they will be updating APIs through Google Play. All because their attempts to update those APIs at the OS level failed due to carrier and device manufacturers holding up, or never providing OS updates.
Google is only regaining control and providing better user experience on Android by becoming more closed, at least when it comes to how they deal with carriers and device manufacturers.
jedidiah
Re: This isn't always good though
Android gives users more control over their hardware and their user experience. It also presents a more diverse and meaningful set of choices.
A lot of people like to whine about Android fragmentation and then ignore how badly forced OS upgrades can run on an iPhone.
Even without Google trying to emulate Apple. Android provides a useful and distinct alternative.
There is nothing about Google engaging in Apple style megalomania that will improve my user experience as an Android user. Those perpetuating the usual FUD in this area never highly any actual real consequence of this so-called tragic fragmentation.
I Never Have Any Idea What The Back Button Will Do
Here is a screen cap from Google's official Galaxy Nexus User Guide (PDF), explaining what the Back button is supposed to do:
So the Back button should open the previous screen. Use of the word "History" makes me think it should work like the back button in your browser. Boy, would that be awesome. There are so many times when that just doesn't happen.
The back button is broken in a million different ways. Here, I'll show you.
... ... ...
Since we can't believe the user manual, let's be smart users and learn from this interaction: the Back button takes you to the "main page" of an app, then a second back press will get you to where you were - lesson learned.
In the case you would like to find the most advanced community support use the following:* Android development kit from Google;* use Eclipse as the IDE since it's being widely used and has needed plugins;* build your app in Java in the case you are targeting only Android devices and your application functionality demands full platform API set;* build your app logic in JavaScript, HTML5 and use PhoneGap as a glue if your application mostly consist from data presentation layers and you are targeting multiple platforms like iOS, BlackBerry;* would you like to build it as JavaScript, HTML5 but using Java for coding - Google Web Toolkit your choice along with PhoneGap; There are many other ways but I would rather say they are not that easy comparably to said above.
Java is the primary language for developing Android applications. On top of that you can use scripting language like Python, JRuby, Lua,PERL, JavaScript. For using the scripting languages you have to install SL4A (Scripting layer for Android).
Stack Overflow
As a python lover and Android programmer, I am sad to say this is not really a good way to go. There's two problems.
One problem is that there is a lot more than just a programming language to the Android development tools. A lot of the Android graphics involve XML files to configure the display, similar to HTML. The built-in java objects are really integrated with this XML layout, and it's a lot easier than writing your own code to go from logic to bitmap.
The other problem is that the G1 (and probably other Android devices for the near future) are really not that fast. 200 Mhz processors, and RAM is very limited. Even in Java you have to do a decent amount of rewriting-to-avoid-more-object-creation if you want to make your app perfectly smooth. Python is going to be too slow for a while still on mobile devices.
====
gdw2Carl SmithUsing SL4A (which has already been mentioned by itself in other answers) you can run a full-blown web2py instance (other python web frameworks are likely candidates as well). SL4A doesn't allow you to do native UI components (buttons, scroll bars, and the like), but it does support WebViews. A WebView is basically nothing more than a striped down web browser pointed at a fixed address. I believe the native Gmail app uses a WebView instead of going the regular widget route.
This route would have some interesting features:
- In the case of most python web frameworks, you could actually develop and test without using an Android device or Android emulator.
- Whatever Python code you end up writing for the phone could also be put on a public webserver with very little (if any) modification.
- You could take advantage of all of the crazy web stuff out there: query, HTML5, CSS3, etc.
SL4A does what you want and is actively developed. You can install it from the Market and don't need root. It supports a range of languages, Python support is currently for version 2.6, but the owner, Robbie, is personally working on Python3. Check it out.
http://code.google.com/p/Android-scripting/
Update: Python3 is out, but it's not running very well.
You can run, create, load, save, manage scripts on your Android device.
Google matched content |
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March 03, 2020