This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Friday, October 31, 2014

Some new Sony Xperia handsets seem to contain the Baidu spyware.

The Baidu folder appears to be created by Sony’s ‘my Xperia’ service each time a connection is made and is reported to be sending pings to China. There is no further information known on what these pings are transmitting but nevertheless they do seem to be transmitting.

About a month ago, a group of community users of Sony smartphone detected the presence of a strange folder, named “Baidu”, mysteriously appeared from among those present in various versions of Android for these handsets.

Just unpacked my Sony Z3 compact, haven't installed a single app and its connecting to China. I am not so concerned about the folder itself but my phone now has a constant connection to an IP address in Beijing which I am not too happy about.” Reddit user commented.


The creepy part is that the folder is created automatically without the owners permission and there is no way of deleting it. Even if someone tries to remove it, it instantly reappears as well as unticking the folder from device administrator equally seems to do nothing, neither does starting the phone in Safe Mode.

PERSONAL INFORMATION SEND TO CHINA
Going deep, several users reported they found that the Chinese government is able to detect the status and identity of the device, take pictures and make videos without the consent of the user. A user, going by the handle Elbird, posted on Sony Forums that with the help of Baidu folder, the Chinese Government can:
  • Read status and identity of your device
  • Make pictures and videos without your knowledge
  • Get your exact location
  • Read the contents of your USB memory
  • Read or edit accounts
  • Change security settings
  • Completely manage your network access
  • Couple with bluetooth devices
  • Know what apps you are using
  • Prevent your device from entering sleep mode
  • Change audio settings
  • Change system settings

Thankfully this is a spyware and you can check to see if you have or not. If you see the folder named Baidu in your device then your device contains the spyware. But, for users it isn't the folder which seems to be the real cause for concern, though; it’s the fact that the phones open a connection to servers.

According to the reports affected devices include the new Sony Xperia Z3 and Z3 Compact, and several users from the Reddit community have also reported about the presence of this folder on their mobile phones, too — and not necessarily phones made by Sony. One owns an HTC One M7, another an HTC One X, a few others the OnePlus One.

STEPS TO DISABLE BAIDU SPYWARE
  1. Backup your important data and factory reset the device.
  2. Turn on the device and go to Settings -> Apps -> Running and Force stop both “MyXperia” apps.
  3. Then remove the baidu folder using File Kommander app.
  4. Go to Settings -> About Phone -> Click 7 times on the Build Number to enable developer mode.
  5. Download or Install the Android SDK on your computer and then connect the Sony device to it using USB cable.
  6. Run the adb tool terminal : adb shell
  7. In adb shell, type the command: pm block com.sonymobile.mx.android
  8. Exit adb shell
  9. Reboot the device.

Note that the spyware does not necessarily affect the process or functionality of your mobile devices, so you shouldn't be worried in this respect. Sony has not officially responded to this ‘baidu’ folder issue.

However, the company has recognized the issue and has said that in the next release the problem will be fixed. Unless Sony can roll out some kind of fix in the near future then it seems you might have to wait until Lollipop rolls out in January before you can get rid of Baidu.

Recently Chinese smartphone manufacturer Xiaomi has been called out for spying on personal user data using their smartphones. According to F-Secure Xiaomi Smartphones were sending user data back to the servers based in China.








Tuesday, October 28, 2014

The Launch of the Nxtty Crypto Messenger


The Launch of the Nxtty Crypto Messenger
DUBAI, UAE, October 27, 2014, PRNewswire

The Nxtty Crypto Messenger is a new, exciting messenger app that is launching on the 28th October in the Google Play Store and brings with it the future in encrypted messaging services that are seamlessly integrated on a technology platform and design that has been developed for direct access to privacy in a mobile communication service.

Nxtty is structured to be a whole and full-featured crypto messenger that aims to keep its in-built economy relevant and accessible with the use of Nxttycoin and through the NXTTYconomy that involves various features to connect, share, and use its crypto currency. The concept of the NXTTYconomy is to create a complete backdrop for Nxtty as a social messenger with anonymous Open Chat, private chat, a wallet feature, and a simple search option for contacts. Transactions are designed to take place in the app through the use of Nxttycoins that can be spent on intriguing and insightful photo posts from users while the wallet feature is designed to track incoming and outgoing Nxttycoins that will be fully transferable.


Nxtty will distribute the majority of itself to users who download and begin to use the app as the signal for its first time users to have the knowledge and key to the company. The first sign-up of 100,000 users will receive 2,500 Nxttycoins that work in the dynamics of the messenger for users who are active and want to tip posts in the Open Chat. Later on the Nxttycoins will become invaluable to the users who will be able to convert and spend them as a real currency. The 100,000 users that receive this will own and represent 25% of Nxtty through the crypto currency and they will have a dynamic lead in the world of crypto messaging with Nxtty's future developments.

Nxtty is the world's first mobile-based social enterprise that has erupted from the inherent need for privacy in our communication and will continue to follow with its streamlined design that has the ability to address the next generation privacy status.

Please find us on social media and discuss with us further:
Website: http://nxtty.com  
Facebook: Nxtty
Twitter: Nxtty @cryptomessenger
Instagram: @nxtty_app

Monday, October 27, 2014

Android L is for Lockdown : Unrootable but still open source

Root is, without a doubt, the (un)holy grail of the Android world. Those wonderful permissions that allow you as the user to pretty much do as you please with your device are certainly a major delight, and really one of the top reasons why Android devices have gained as much popularity as they have–not just among end users but among developers as well. There is yet another aspect of the OS that keeps people coming back for more, and that is the fresh, constant stream of updates and new OS versions. However, these two can hardly coexist with one another. Normally, whenever a new update for … well… anything comes out, it does so with features, bug fixes, and plugged holes. The latter are the ones that are normally required to obtain things such as root level access on our devices. This means that if you update, for the most part, you can kiss root goodbye. Granted, there are apps that will help root survive even an OTA upgrade but still companies making these OS and devices always are on the look out to ensure that the holes and exploits are plugged.

 XDA Senior Recognized Developer and Senior Moderator Chainfire has been warning us of all the upcoming changes in the Android world for quite some time now, especially since the newer Jelly Bean and KitKat updates hit the shelves. Well, so far, we can officially say that he has been dead on target on everything he has said regarding the increased security on new versions of Android. The newest Lollipop update, LPX13D, seems to break root, like most updates do. However, it seems to do more than just break it because with the correct combination of factors, a device can become unrootable. Chainfire goes on to explain that the reason why root gets “broken” is mainly because the script required to grant root is no longer allowed to run at boot time from init.d, but rather it is forced to run from a SELinux dedicated context instead. This, apparently, is a new requirement for all apps and services running at boot.

The solution that Chainfire provides is to enable root at kernel level. In other words, you need a custom kernel in order to obtain root. However, many times, you need root in order to flash a custom kernel. Fine, some of you might say that by flashing via custom recovery, that the kernel can be flashed with ease. What if the bootloader is locked? Better yet, what if the bootloader cannot be unlocked? Yup, you got yourself a stock device forever (or until someone gets past the security measures). Essentially, Google is giving manufacturers a golden opportunity to put root access to rest for good. They will not do it to their devices, as the Nexus line has an unlockable bootloader, but no one can guarantee the case will be the same for other manufacturers.

The latest and greatest installment of our beloved Android OS is Lollipop (Android 5), which is something that has been on pretty much everyone’s mouth in the tech world for the last week or so as it became available in the latest and most functional Developer Preview. The latest Lollipop installment is build version LPX13D, and aside from being one step closer to the final release, this one also brings the kiss of death for root, which pretty much is the case with all updates as we mentioned earlier. No biggie, right? We simply root again and be done with it, right? Or we simply use a root survival app and we keep going, right?? Nah, not exactly. There are several changes in device security, prompted in part by people and companies seeking the security and sanctuary of their precious data and nude pics. So, with that in mind, Google came to the rescue.


source: