Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: devnullius
« on: 22. April 2014., 22:49:03 »

S3 owner wakes up...

Good share!

Awaiting my new China phone... Curious how that turns out :)

China phone! Built in the GrateWall. All messages and every thing if forward to the National Security of China. :D

Yeah, but they hate copyright too! So I don't mind ;-)
Posted by: Pez
« on: 22. April 2014., 09:33:46 »

S3 owner wakes up...

Good share!

Awaiting my new China phone... Curious how that turns out :)

China phone! Built in the GrateWall. All messages and every thing if forward to the National Security of China. :D
Posted by: devnullius
« on: 18. April 2014., 00:30:57 »

S3 owner wakes up...

Good share!

Awaiting my new China phone... Curious how that turns out :)
Posted by: Fintech
« on: 20. March 2014., 19:56:31 »

Thanks from your feedback @Samker! I hope however all the best for you. :bih:
Fin... ;)
Posted by: Samker
« on: 20. March 2014., 19:48:18 »

Truely great stuff @Pez, for me personally, truely not to be Samsug Galaxy's!  :up:

I forgot to mention that I'm still using GALAXY S II.  :-\

Posted by: Fintech
« on: 20. March 2014., 19:45:14 »

Truely great stuff @Pez, for me personally, truely not to be Samsug Galaxy's!  :up:
Posted by: Samker
« on: 20. March 2014., 19:39:13 »

...

The FSF encourages all current Samsung Galaxy owners to appeal publicly to SamsungMobile for an explanation (they can also be emailed). Samsung should release this program as free software, without the backdoor, so that Replicant doesn't have to continue defusing the traps they have apparently left for their users.

...

I hope that this will compel Samsung to patch "the hole". ;)

Thanks P. :thumbsup:



Posted by: Pez
« on: 20. March 2014., 12:55:50 »

Replicant developers find and close Samsung Galaxy backdoor

While working on Replicant, a fully free/libre version of Android, we discovered that the proprietary program running on the applications processor in charge of handling the communication protocol with the modem actually implements a backdoor that lets the modem perform remote file I/O operations on the file system.

This is a guest post by Replicant developer Paul Kocialkowski. The Free Software Foundation supports Replicant through its Working Together for Free Software fund. Your donations to Replicant support this important work.

Today's phones come with two separate processors: one is a general-purpose applications processor that runs the main operating system, e.g. Android; the other, known as the modem, baseband, or radio, is in charge of communications with the mobile telephony network. This processor always runs a proprietary operating system, and these systems are known to have backdoors that make it possible to remotely convert the modem into a remote spying device. The spying can involve activating the device's microphone, but it could also use the precise GPS location of the device and access the camera, as well as the user data stored on the phone. Moreover, modems are connected most of the time to the operator's network, making the backdoors nearly always accessible.

It is possible to build a device that isolates the modem from the rest of the phone, so it can't mess with the main processor or access other components such as the camera or the GPS. Very few devices offer such guarantees. In most devices, for all we know, the modem may have total control over the applications processor and the system, but that's nothing new.

While working on Replicant, a fully free/libre version of Android, we discovered that the proprietary program running on the applications processor in charge of handling the communication protocol with the modem actually implements a backdoor that lets the modem perform remote file I/O operations on the file system. This program is shipped with the Samsung Galaxy devices and makes it possible for the modem to read, write, and delete files on the phone's storage. On several phone models, this program runs with sufficient rights to access and modify the user's personal data. A technical description of the issue, as well as the list of known affected devices is available at the Replicant wiki.

Provided that the modem runs proprietary software and can be remotely controlled, that backdoor provides remote access to the phone's data, even in the case where the modem is isolated and cannot access the storage directly. This is yet another example of what unacceptable behavior proprietary software permits! Our free replacement for that non-free program does not implement this backdoor. If the modem asks to read or write files, Replicant does not cooperate with it.

Replicant does not cooperate with backdoors, but if the modem can take control of the main processor and rewrite the software in the latter, there is no way for a main processor system such as Replicant to stop it. But at least we know we have closed one specific backdoor.

The FSF encourages all current Samsung Galaxy owners to appeal publicly to SamsungMobile for an explanation (they can also be emailed). Samsung should release this program as free software, without the backdoor, so that Replicant doesn't have to continue defusing the traps they have apparently left for their users.


Original article: by Paul K   — Published on  Mar 12, 2014 04:50 PM

For even more info read here!
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising