NoGoolag
4.52K subscribers
14K photos
7.29K videos
597 files
14.7K links
Download Telegram
NSW mobile detection 'loophole' generating millions of dollars

Almost one in 10 motorists caught by NSW mobile phone detection cameras are using companies to avoid the penalty in what the state's opposition is describing as a loophole that's keeping dangerous drivers on the roads.

More than $19 million was generated from the new cameras between March and June this year, Revenue NSW statistics reveal, with about 43,000 fines issued. Eight per cent of those were linked to businesses that said they could not confirm who was driving.

https://www.smh.com.au/national/nsw/nsw-mobile-detection-loophole-generating-millions-20200803-p55i4z.html

#australia #mobile #surveillance
Media is too big
VIEW IN TELEGRAM
Betrusted

https://betrusted.io

A prototype security-foccussed open-software/hardware device (akin to a PDA) for delegating your sensitive information and tasks to. It has a microkernel and userspace in rust and the development version uses a reconfigurable FPGA instead of a CPU.

Betrusted is a secure and private communications system. It gives users an evidence-based reason to believe that private matters are kept private.

Betrusted is more than just an app, and more than just a gadget – it is a co-designed hardware + software solution that provides safe defaults for everyday users. It’s also open source, empowering advanced users to analyze, extend and explore this secure
mobile computer.


#betrusted #mobile #phone #alternatives
Bing mobile apps suffered a data leak, leaking 6.5TB of search data

Microsoft’s Bing mobile apps, available on Android and iOS, have been the victim of a data leak. Security researchers found an Elastic server that had its password protection removed, reportedly as a “misconfiguration” of the server, which has resulted in 6.5TB of search data being made available publicly on the internet, which grew by up to 200GB per day.

Security researchers from WizCase found the unprotected server on September 12, although the authentication is estimated to have been removed 2 days prior. After discovering the data was coming from Bing’s mobile apps, by performing a search themselves and seeing it appear in the data, the researchers contacted Microsoft on September 13, and the information was given to Microsoft’s Security Response Centre, who acted to resolve the problem a few days later.

The data leak has exposed a trove of data that Microsoft collects from users who use the Bing mobile apps. The data included:

Search terms (excluding any searches in ‘private’ mode)

GPS coordinates (if location permissions are enabled, with a ~500 metre accuracy)

Date and time of the search

Firebase notification tokens

Coupon data

Partial list of the URLs visited by the user from the search results

Device model

Operating system

3 unique identifiers, including:
⭕️ ADID: possibly an identifier for a Microsoft Account
⭕️ deviceID
⭕️ devicehash

None of the data was encrypted.

https://www.onmsft.com/news/microsoft-bing-data-leak

#Microsoft #Bing #mobile #app #dataleaks
Revealed: China suspected of spying on Americans via Caribbean phone networks

Security expert claims Chinese surveillance may have affected tens of thousands of Americans

China appears to have used mobile phone networks in the Caribbean to surveil US mobile phone subscribers as part of its espionage campaign against Americans, according to a mobile network security expert who has analysed sensitive signals data.

The findings paint an alarming picture of how China has allegedly exploited decades-old vulnerabilities in the global telecommunications network to route “active” surveillance attacks through telecoms operators.

The alleged attacks appear to be enabling China to target, track, and intercept phone communications of US phone subscribers, according to research and analysis by Gary Miller, a Washington state-based former mobile network security executive.

https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks

#China #US #mobile #phone #networks #intelligence #spy #surveillance
Media is too big
VIEW IN TELEGRAM
The Shameless EXTORTION in Mobile Gaming

The mobile gaming industry has long been dominated by scams, false advertising, and shady business practices but today we can add extortion to the list, because 37GAMES, a world renowned developer with top 100 properties on the app-store, has decided to extort their low paying users (not their whales) for large amounts of cash.

In the world of exploit or "glitch" punishment by gaming developers, this might be the worst response I have ever seen.

https://www.youtube.com/watch?v=ZADqK-D6vPo

#mobile #gaming #industry #extortion #video
🎥 @nogoolag 🎥 @blackbox_archiv
recycled-numbers-latest.pdf
347.8 KB
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States

35 million phone numbers are disconnected in the U.S. every year. Standard industry practice is to reassign those numbers to other subscribers. But this leads to many types of security and privacy risks, which our study analyzes rigorously.

https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf

https://recyclednumbers.cs.princeton.edu/

#security #privacy #phone #number #recycling #usa #mobile #carriers #pdf
📡 @nogoolag 📡 @blackbox_archiv
Off the Grid Messenger

Off The Grid (OTG) Messenger is an easy way for people to communicate through text messages when in remote areas. With a theoretical transmission range of 10 miles (16kms), OTG messenger can be used by groups of people to stay connected when they are in areas not serviced by mobile connectivity.

For portability and low power purposes, the device was created by re-purposing an old Nokia e63 phone I had laying around. The enclosure, LCD, keypad, backlighting and speaker have been re-used however the motherboard was re-designed from the ground up with low power components, a modern STM32 H7 microcontroller, an ISM LoRA radio and expanded flash memory.

https://github.com/TrevorAttema/OTGMessenger

Comments
https://news.ycombinator.com/item?id=27659105

https://hackaday.com/2021/06/26/lora-messenger-in-nokias-shell/

#otg #offthegrid #grid #im #messenger #alternatives #cellphone #mobile #nokia
0xor0ne@infosec.exchange - Nice short blog post by Aditya Dixit explaining how to intercept and manipulate AES encrypted traffic used by mobile applications

https://blog.dixitaditya.com/manipulating-aes-traffic-using-a-chain-of-proxies-and-hardcoded-keys

#android #infosec #cybersecurity #AES #APK #mobile #encryption
Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away | Ars Technica

Researchers have devised a novel attack that recovers the secret encryption keys stored in smart cards and smartphones by using cameras in iPhones or commercial surveillance systems to video record power LEDs that show when the card reader or smartphone is turned on.
The attacks enable a new way to exploit two previously disclosed side channels, a class of attack that measures physical effects that leak from a device as it performs a cryptographic operation. By carefully monitoring characteristics such as power consumption, sound, electromagnetic emissions, or the amount of time it takes for an operation to occur, attackers can assemble enough information to recover secret keys that underpin the security and confidentiality of a cryptographic algorithm.


Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED – https://eprint.iacr.org/2023/923

#Hacking #Crypto #mobile
Finding You: The Network Effect of Telecommunications Vulnerabilities for Location Disclosure | The Citizen Lab –
26/10/2023

The information collected by, and stored within, mobile networks can represent one of the most current and comprehensive dossiers of our life. Our mobile phones are connected to these networks and reveal our behaviours, demographic details, social communities, shopping habits, sleeping patterns, and where we live and work, as well as provide a view into our travel history. This information, in aggregate, is jeopardized, however, by technical vulnerabilities in mobile communications networks.

#Vulnerabilities #mobile #Networks
When You Roam, You’re Not Alone | Lawfare –

A fix is long overdue for one of the most extensive, yet lesser-known surveillance risks of our age: the technical vulnerabilities at the heart of the world’s mobile communications networks

We’ve all been there before: You’re traveling abroad, and as your plane lands and is taxiing to the gate, you reach for your phone, wait for it to connect to the local network, and then you are greeted with a text message: “Welcome abroad, you’re now roaming!” Beyond the exorbitant fees, few of us are likely to give the matter much thought.

However, hidden within this seemingly routine transaction lies one of the most extensive, yet lesser-known surveillance risks of our age: the technical vulnerabilities at the heart of the world’s mobile communications networks.

#Mobile #Network #Cellular #Roaming #Vulnerabilities
Furi Phone FLX1: Debian smartphone debuts • The Register

Furi Labs' FLX1 is a Debian-based smartphone with decent specs at a competitive price.

The FLX1 runs its own build of 'Trixie' but has an Android layer

Furi Labs' FLX1 smartphone is much more current. It's an octa-core device with 128 GB of flash, 6 GB of RAM, a 50 MP camera, and a 5,000 mAh battery, and the company is asking $499 for it. It runs its own build of Debian "Trixie" – the future #Debian 13 – with #GNOME phosh on Wayland as the user interface. The Hong Kong-based company is working with a Chinese OEM to make sure that there are native Linux drivers for all the device's hardware.

#Mobile