Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Locked thread
ultramiraculous
Nov 12, 2003

"No..."
Grimey Drawer

this quote is from a section talking about rooting android phones, jesus

Adbot
ADBOT LOVES YOU

Captain Foo
May 11, 2004

we vibin'
we slidin'
we breathin'
we dyin'


don't sign your posts

Truga
May 4, 2014
Lipstick Apathy
in real cia news, they're apparently the original creators of polarssl, now known as mbedssl and used in pretty much everything.

e: also, siemens phones:


these are super popular in european govt orgs.

e2: lmfao

quote:

Files can be transferred to the phone via TFTP (don't forget to chmod a+x the file once it is transferred to the phone).

The web server attempts to execute (yes, execute) any page requested by a client.

i'm the (yes, execute)

Truga fucked around with this message at 16:21 on Mar 7, 2017

b0red
Apr 3, 2013

lmao this cia dump just reassures what everyone was already thinking.

mods pls rename me to MaddeningWhispers
https://wikileaks.org/ciav7p1/cms/page_11628893.html

b0red fucked around with this message at 16:24 on Mar 7, 2017

apseudonym
Feb 25, 2011

Loving Africa Chaps posted:

It's probably because the NSA won't give the FBI any more exploits if they get burned all the time. At the moment they are prosecuting more cases they are having to drop with this exploit so it seems to be a sensible move if they feel it means more paedophiles end up in jail overall




In other news wikileaks have dumped a bunch of CIA docs and tools
https://wikileaks.org/ciav7p1/


The internet of poo poo is not just for botnets and injecting ads!

Judging by the Android section this is pretty old stuff

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender

apseudonym posted:

Judging by the Android section this is pretty old stuff

how old? i imagine that there is a lot of android 2.x use out there

apseudonym
Feb 25, 2011

OSI bean dip posted:

how old? i imagine that there is a lot of android 2.x use out there

https://developer.android.com/about/dashboards/index.html not really.

Given that they don't even mention anything newer than KK in any way maybe 2-3 years at best, all the devices they reference are also at least that old.

fins
May 31, 2011

Floss Finder
https://wikileaks.org/ciav7p1/cms/page_17760284.html
They will be distraught that this leaked

https://wikileaks.org/ciav7p1/cms/page_14588483.html

Also realised that some user's names that are redacted could be recovered from the copyright strings on this page:
https://wikileaks.org/ciav7p1/cms/page_15728683.html

Truga
May 4, 2014
Lipstick Apathy

fins posted:

https://wikileaks.org/ciav7p1/cms/page_17760284.html
They will be distraught that this leaked

:five:

Bulgogi Hoagie
Jun 1, 2012

We

fins posted:

https://wikileaks.org/ciav7p1/cms/page_17760284.html
They will be distraught that this leaked

https://wikileaks.org/ciav7p1/cms/page_14588483.html

Also realised that some user's names that are redacted could be recovered from the copyright strings on this page:
https://wikileaks.org/ciav7p1/cms/page_15728683.html

lol that the CIA is the only organisation in the world that actually bothered to try and jailbreak the airport extreme

Workaday Wizard
Oct 23, 2009

by Pragmatica
i'm not clicking any of these links :tinfoil:

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

apseudonym posted:

https://developer.android.com/about/dashboards/index.html not really.

Given that they don't even mention anything newer than KK in any way maybe 2-3 years at best, all the devices they reference are also at least that old.

To play devil's advocate, this is only the numbers for devices that still contact the play store (iirc). All the garbage Chinese spin-offs that don't come with Google preloaded, or where the user isn't signed into a Google account (I ran into someone with a G1 a couple years back who never signed into a Google account on the device, and didn't realize that there was an app ecosystem) won't be counted in these numbers.

It's a good graph for deciding what minimum API to support for your Dildo Auctioning app but less useful if you're a TLA.

apseudonym
Feb 25, 2011

Volmarias posted:

To play devil's advocate, this is only the numbers for devices that still contact the play store (iirc). All the garbage Chinese spin-offs that don't come with Google preloaded, or where the user isn't signed into a Google account (I ran into someone with a G1 a couple years back who never signed into a Google account on the device, and didn't realize that there was an app ecosystem) won't be counted in these numbers.

It's a good graph for deciding what minimum API to support for your Dildo Auctioning app but less useful if you're a TLA.

If you're a TLA it depends on your targets, you're still going to be needing to attack flagships.

A Pinball Wizard
Mar 23, 2005

I know every trick, no freak's gonna beat my hands

College Slice

bicycle posted:

I;m guessing they used a different NIT for that one particular pedophile otherwise they're going to be dropping a LOT of cases.

They can continue using the NIT for now and then once they burn it then can grab the guy again within statue of limitations so I'm guessing that's their plan here.


Also holy poo poo re: wikileaks

nah they just get all the people who can't afford a lawyer/say something dumb to the cops, and let the few rich pedos off the hook

Migishu
Oct 22, 2005

I'll eat your fucking eyeballs if you're not careful

Grimey Drawer
Is it OK for me to now till my own crypto? This is important

Migishu
Oct 22, 2005

I'll eat your fucking eyeballs if you're not careful

Grimey Drawer

Volmarias posted:

Dildo Auctioning app

Mods??????

Cold on a Cob
Feb 6, 2006

i've seen so much, i'm going blind
and i'm brain dead virtually

College Slice

quote:

YOSPOS > Security Fuckup Megathread - v13.3 - the s in iot stands for security

:golfclap:

big scary monsters
Sep 2, 2011

-~Skullwave~-

Migishu posted:

Is it OK for me to now till my own crypto? This is important

so-called security "experts": don't roll your own crypto! ddon't roll your own crypto! duhhh.. download crypto from the internet like a goddamn skiddie, probably written by the cia

me: i use my highly advanced cs knowledge and sophisticated understanding of the latest advances in mathematical research to "roll" my own nigh-unbreakable cryptographic algorithms that no attacker even knows about

hth

Pryor on Fire
May 14, 2013

they don't know all alien abduction experiences can be explained by people thinking saving private ryan was a documentary

holy loving poo poo

I'm just gonna move my entire loving life offline, gently caress this noise

Shame Boy
Mar 2, 2010

big scary monsters posted:

so-called security "experts": don't roll your own crypto! ddon't roll your own crypto! duhhh.. download crypto from the internet like a goddamn skiddie, probably written by the cia

me: i use my highly advanced cs knowledge and sophisticated understanding of the latest advances in mathematical research to "roll" my own nigh-unbreakable cryptographic algorithms that no attacker even knows about

hth

did u know that AES, the industry standard internet security technology, was made BY THE NSA????

ultramiraculous
Nov 12, 2003

"No..."
Grimey Drawer

apseudonym posted:

https://developer.android.com/about/dashboards/index.html not really.

Given that they don't even mention anything newer than KK in any way maybe 2-3 years at best, all the devices they reference are also at least that old.

this page only seems to have device updates up through July 2015, so you might not be far off.

apseudonym
Feb 25, 2011

Pryor on Fire posted:

holy loving poo poo

I'm just gonna move my entire loving life offline, gently caress this noise

Finally posting quality will improve.

anthonypants
May 6, 2007

by Nyc_Tattoo
Dinosaur Gum

Shinku ABOOKEN posted:

i'm not clicking any of these links :tinfoil:
me either but i really want to read more about how the cia wrote polarssl

James Baud
May 24, 2015

by LITERALLY AN ADMIN

Truga posted:

in real cia news, they're apparently the original creators of polarssl, now known as mbedssl and used in pretty much everything.

I glanced around for this and didn't see it, please tell me there's more in support of it than people misunderstanding "Building PolarSSL on Solaris x86 and SPARC"..?

Truga
May 4, 2014
Lipstick Apathy
sorry, i was told that in irc, but then I went searching and found nothing and forgot to post in here about it. cia did not build polarssl, as far as i can tell.

Bhodi
Dec 9, 2007

Oh, it's just a cat.
Pillbug

apseudonym posted:

Judging by the Android section this is pretty old stuff

https://twitter.com/matthew_d_green/status/839161256061857792

ultramiraculous
Nov 12, 2003

"No..."
Grimey Drawer

yeah there's a page breaking down active iOS exploits and the latest version mentioned is iOS 9.2 (Dec 2015), and the main page blog post mentions that it came from 2016. I'm guessing a decent amount of this is actionable...

this exploit is at least fixed, though:

quote:

WinterSky leaks the kernel address of the ipc_port struct of a user provided mach port.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

apseudonym posted:

If you're a TLA it depends on your targets, you're still going to be needing to attack flagships.

Sure, but the point was that the graph isn't necessarily representative of the actual demographics of Android in the world.

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

time to slap :nsa: stickers over the camera and mic of every piece of equipment you own

Wiggly Wayne DDS
Sep 11, 2010



it's an interesting look but there's not a lot of actionable data on specific exploits (outside of iOS), they've redacted all the parts with useful information per usual

BangersInMyKnickers
Nov 3, 2004

I have a thing for courageous dongles

Wiggly Wayne DDS posted:

it's an interesting look but there's not a lot of actionable data on specific exploits (outside of iOS), they've redacted all the parts with useful information per usual

Yeah but the toolkit is circulating and now we're in the dumbest possible race to see if someone with a conscious forwards it to the appropriate parties before someone makes good use of it

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
verifone was breached

https://krebsonsecurity.com/2017/03/payments-giant-verifone-investigating-breach/



from the comments:

Mark Jeanmougin posted:

Please take down or modify the picture of the email that went to all VeriFone Employees. No sense in helping out spammers and phishers by showing them what their internal mails look like.

:allears:

spankmeister
Jun 15, 2008






Truga posted:

sorry, i was told that in irc, but then I went searching and found nothing and forgot to post in here about it. cia did not build polarssl, as far as i can tell.

Some guy working at Fox-IT in the Netherlands wrote PolarSSL as a fork from XySSL, not the cia lol.

FlapYoJacks
Feb 12, 2009
Our current product only does SSLv3. There are no plans to update it because I am making a new product.


Also grandstream phones don't support HTTPS.

:allears:

apseudonym
Feb 25, 2011

Volmarias posted:

Sure, but the point was that the graph isn't necessarily representative of the actual demographics of Android in the world.

Given the number of devices that go into it it's still pretty representative overall outside of China.

Lain Iwakura
Aug 5, 2004

The body exists only to verify one's own existence.

Taco Defender
so this came up in the sh/sc help thread

Downs Duck posted:

I read the OP previously, I will read it again. Sorry if stuff here have been answered already, it's just that as time moves on, programs become obsolete and new, better ones emerge. Hopefully I won't be scolded too much for posting this, please just ignore it if you don't have any info I could use. Googling a lot of this stuff redirects me to a ton of sites with varying degrees of information, and I am a cynical person, so I want some recommendations from you guys instead.

I'm looking for some Beginner's Home/Private OPSEC Tips and wondered if someone could help me with some best practices/programs? I'd like the "paranoid" comments to be at an absolute minimum, please. I'm trying to learn here, so bear with me. I'm a regular guy that just wants to avoid being hosed over by some script kiddie just because I pissed him off at some random forum or didn't lock my "house" properly. I'm gonna be honest about what I've done, and I know something if not everything have been stupid. I'm trying to rectify that now.

I have no virus, malware, infections or similar that I struggle with or know of. No special happenings, just want to be proactive here. Currently doing a 30 day Kaspersky trail, and a 5 day Freedome VPN trail to check it out, been only using WIndows Defender and no VPN/TOR before that. Looking into some free alternatives before I land on paying for one.

I'm using Windows 10 (looking into Ubuntu/Kali/other Linux, but I'm not sure it's ever gonna happen, because games running on Windows, etc. I know of Wine, but just trying to be realistic here).

I have a SSD in my computer, an external disk connected with a USB cable for basic backup of all files, and a third disk not connected except when I do a manual basic backup of files every month. I've used batch files for 5 different folders with FreeFileSync to backup to the 2nd disc, manually just dragging the folders when copying from 2nd to 3rd each month. Have set up my router to the best of my ability, but not sure it's enough. It's the one my ISP have provided me with (it says Cisco EPC3925), and I have no idea what I should be buying instead of it.

I'm thinking of:
Running a overwriting tool for clearing absolutely all data from my backup drives.run a clean transfer of all files I have for now.
Stripping EXIF from pictures and picture folder, not sure what's the best tool.
Renaming all pictures to generic names before I back them up. I don't have many so shouldn't be a problem.
Stripping my music library for similar EXIF data if such a thing even exists?
Stripping my video library for similar EXIF data if such a thing even exists?
Backup all files on the 2nd and 3rd disk, then remove only the 3rd disk or both. Thinking of having the 2nd connected just because I otherwise might not backup as much as I do now.

Social media:
I ditched FB maybe 5-6 years ago, can't remember. Didn't post much, if anything. I signed up for LinkedIn and became too liberal in posting stuff there for my resume, thinking it would help me get a job. It didn't so I've already taken some steps to rectify that; it now only has an anonymous picture and a brief summary of my skills. I am thinking of just ditching it altogether and create a new, anonymous profile.

I have 2 gmail accounts I use for everything and I want that to change. Not sure what the best alternative is, looking into protonmail or similar. I had my email ordered into folders before, I am now doing housecleaning and removing anything I can, picturing someone breaking in and reading everything I have neatly organized for them to browse through.

I've tried out some VPN options, but haven't decided on one yet. For now, between test trials, my IPadress is open to all, because I don't trust the end node system of TOR, otherwise I would have used that.

Thinking of using VeraCrypt to encrypt all drives, but am a bit nervous I will gently caress it up and ot get back my data. Thinking of maybe just encrypt disk 1 and 2, and let the 3rd one be unencrypted just so I don't lose all my data by accident.

I am currently in the process of checking every site I've used LastPass on, like job sites and similar, removing my info or obscuring my info on all of them.

Thinking of writing any and all passwords in a physical notebook.

Router is setup with a non-default username and password, same with SSID. I've looked into some of the aircrack -ng tools and know people could sniff out and spoof MAC listed devices, but thinking of doing it anyway.

I have a Steam account and have used Archi's to farm for some cards in the past and used Steam Inventory Helper. Thinking of ditching that altogether.

Looking into secure browsers, been using Chrome for a while. Not sure if the standard Firefox is my best bet, been looking into Iridium and White Hat Aviator, just something I can lock down as default and open up if/when some page tells me to. Very open to suggestions from you here.

I have an Android phone, a Samsung Galaxy A3 that I want to root. I have the wifi and bluetooth turned off whenever I don't specifically need them, but don't trust it anymore. Been looking into rooting it with Odin or something or maybe buying a burner phone or at least using an old Nokia that I have.

I actually got a job offer via LinkedIn the other day, but there were some documents in the message and I would like to not open them up without having some kind of sandbox environment. Is there a nice free option I could install on my PC and use for such purposes?

I am sure I forgot a lot already, but let's start with this. Anything I overlooked or any suggestions for a step by step thing I could do to build up my private home IT-security would be appreciated. Most of all I want SIMPLE, because I don't give a poo poo about most social media or sharing whatever I eat and do throughout the day.

:psypop:

i think i made a mistake in trying to reply to this... mess

spankmeister
Jun 15, 2008






That guy is the didn't read lol gif personified

Bluecobra
Sep 11, 2001

The Future's So Bright I Gotta Wear Shades

OSI bean dip posted:

so this came up in the sh/sc help thread


:psypop:

i think i made a mistake in trying to reply to this... mess

tell him to blockchain technology

James Baud
May 24, 2015

by LITERALLY AN ADMIN

OSI bean dip posted:

so this came up in the sh/sc help thread


:psypop:

i think i made a mistake in trying to reply to this... mess

50/50 odds of enthusiast / budding child pornographer.

Adbot
ADBOT LOVES YOU

burning swine
May 26, 2004



Volmarias posted:

To play devil's advocate, this is only the numbers for devices that still contact the play store (iirc). All the garbage Chinese spin-offs that don't come with Google preloaded, or where the user isn't signed into a Google account (I ran into someone with a G1 a couple years back who never signed into a Google account on the device, and didn't realize that there was an app ecosystem) won't be counted in these numbers.

It's a good graph for deciding what minimum API to support for your Dildo Auctioning app but less useful if you're a TLA.

I tried about a year ago to do android sans google, and it's a loving mess. Even if you install apps from alternate stores (f-droid, etc), drat near everything expects the play framework to be present and will just crash when the api calls fail. Android without google these days basically means android without apps, I doubt there are really that many people in that segment

  • Locked thread