Related
Is there any software out there where you can connect to a secured wifi (and bypass the password) or hacking a wifi or something?
google kismet but it has nothing to do with this phone.
Retina by Eeye is the only one I know of (for PPC at least). Will allegedly crack WEP passwords.
Googling ends up with the following links (amongst others) -
http://forum.xda-developers.com/showthread.php?t=236630
http://forum.xda-developers.com/showthread.php?p=2037197
http://www.eeye.com/html/downloads/index.html
http://downloads.zdnet.com/search.aspx?kw=Retina+WiFi+Scanner+(Pocket+PC)
Hope that helps.
and cain and able, but on ppc its pointless
i tryed to get the Retina by Eeye but its asking me for a company email address. any have it already dl and want to email it to me?
Why would you want to steal a persons WIFi? That's illegal. To each is own but if the black suits come knocking at your door and hit you in the head with a billy club I'll say I told you so.
wont work on wm6 i think its written for older ppc2003 devices and the driver wil lbe the wrong one
if you want to test it pn me ^^
gqstatus0685 said:
Why would you want to steal a persons WIFi? That's illegal. To each is own but if the black suits come knocking at your door and hit you in the head with a billy club I'll say I told you so.
Click to expand...
Click to collapse
i dont think it's illigal.
ill tell you why i would want to, because im surrounded by all these secure wifi's everywhere i go, and always want to connect to them, they have great signal too.
mikeeey said:
i dont think it's illigal.
ill tell you why i would want to, because im surrounded by all these secure wifi's everywhere i go, and always want to connect to them, they have great signal too.
Click to expand...
Click to collapse
First of all. You can go to jail, for hacking and hi-jacking your neighbor's wi-fi. It is totally ILLEGAL.
Second. Why not get yourself a 3G or 4G account with your phone company, and you can connect to the internet with your 3G.
yes its completely illegal in the states and you shouldn't do it. However if you don't care about breaking the law I don't see how it could be proven in court that you hijacked someones wifi with ur mobile device, and if it came down to it im sure cooking a new rom would delete any hidden data.
If I were you find other options. Like myself. I use my wifi at home and download all the necessary data i need for the day every morning. If i run into anything I need I simply go somewhere like a library or a coffee shop to access their wifi.
Take care and stay out of trouble.
mikeeey said:
i dont think it's illigal.
ill tell you why i would want to, because im surrounded by all these secure wifi's everywhere i go, and always want to connect to them, they have great signal too.
Click to expand...
Click to collapse
In the UK it would come under the Misuse of Computers act 1990, in the section regarding unauthorised access to a secured computer system.
If I were using it, I would be trying to break into my own network to find out how easily someone else could achieve it.
Oh, and if you are using something like "The Cloud", I heard there was some sort of "Feature" whereby you could set up a proxy server (at home) on port 53 (DNS) and use it to connect out. All you then need to do is, when you're wanting to use the Cloud's wifi connection and you can't remember your details, change your proxy settings and away you go.
all i want to do is test my set up because my friend came over with his phone and got in to my secure wifi with out much a problem. so i just want to learn how to test my security for my wifi.
streetknight said:
all i want to do is test my set up because my friend came over with his phone and got in to my secure wifi with out much a problem. so i just want to learn how to test my security for my wifi.
Click to expand...
Click to collapse
Why not ask your friends?
I think your friend must be using 3G network, which he can connect anywhere and anytime.
Interesting and related article from the UK....
http://news.bbc.co.uk/2/hi/technology/4721723.stm
hi guys!
i guess everybody replyed with off topic posts; for sure the user knows it´s illegal, so why not help him instead of bugging him?
I´ve been searching on that subject and i found some interesting programs for ppc:
ministumbler
airscanner´s sniffer
WiFiFoFum
pocketwarrior
also you can check on this website: http://www.irongeek.com/i.php?page=security/ppchack
Cheers and happy wardriving!
Ev0luti0n_ said:
hi guys!
i guess everybody replyed with off topic posts; for sure the user knows it´s illegal, so why not help him instead of bugging him?
I´ve been searching on that subject and i found some interesting programs for ppc:
ministumbler
airscanner´s sniffer
WiFiFoFum
pocketwarrior
also you can check on this website: http://www.irongeek.com/i.php?page=security/ppchack
Cheers and happy wardriving!
Click to expand...
Click to collapse
anyone got any of these to work yet?
Aiding and Abetting/Accessory
A criminal charge of aiding and abetting or accessory can usually be brought against anyone who helps in the commission of a crime, though legal distinctions vary by state. A person charged with aiding and abetting or accessory is usually not present when the crime itself is committed, but he or she has knowledge of the crime before or after the fact, and may assist in its commission through advice, actions, or financial support. Depending on the degree of involvement, the offender's participation in the crime may rise to the level of conspiracy.
For example, Andy draws a floor plan of a bank, knowing of Dan's intention to rob it. After Dan commits the robbery, Alice agrees to let him store the stolen money at her house. Both Andy and Alice can be charged with aiding and abetting, or acting as accessories to the robbery.
mikeeey said:
Is there any software out there where you can connect to a secured wifi (and bypass the password) or hacking a wifi or something?
Click to expand...
Click to collapse
Of course, if those secure sites are using WPA, or better, WPA2 or a WPA-enterprise system, you're not going to simply sniff and crack a password. WEP is a rapidly dying standard, and for good reason.
Just saying, you may be going to a lot of effort for zero gain, unless you know for sure these are simple WEP-secured nodes.
And if nothing else, it's immoral - just like houses, people lock their doors to keep strangers out, and a stranger smashing open a window to get in deserves no aid in the act.
gwnorth said:
...just like houses, people lock their doors to keep strangers out...
Click to expand...
Click to collapse
However, let's think about this for a second or two...all the security and locks in the world only truly accomplish one thing...they keep the honest people honest.
The bottom line is this...if someone wants in, it doesn't matter how many highly-paid security guards you have walking the perimeter, they're gonna get in.
Where there's a will...
True, but an honest person needn't help that "someone" to commit their dishonest act.
But you are right, thus far at least, any security system created by humans has proven to be compromisable (is that a word ?) by humans.
Of course, WEP was just a bad design, right from the get-go...
http://forums.t-mobile.com/tmbl/board/message?board.id=AndroidPlans&thread.id=1785
You know they already know about it, so don't give me crap for "Letting the cat out of the bag"
Bump the thread please and lets try to make this a t-mobile policy.
(probably will never happen, but if we can convince them that this polocy will gain them customers it may)
The post for those too lazy to go and read it
Currently there is a way to add your google voice number to MyFaves and avoid using any minutes for almost any call.
I don't know if this is "Working as intended" or is an unplaned gaff....
Let me tell you why T-Mobile should not only let this happen, but encourage this.
I have a G1, cheapest plans possible. my bill is around 60 bucks a month...
If this MyFaves/GV trick became something i could count on here are the actions i will take with out question.
I will Buy my wife the MyTouch (canceling her current Virgin Mobile pay as u go plan)
I will change my calling plan to a "MyFaves" famlie plan
I will have unlimmited data plans on both phones.
I will cancle my current home phone (Vonage)
My T-mobile monthly bill will go from $60 a month to over $125, and it will become my and my wife's main phone lines.
Also with work/friends i am the known "Android hacker" and people listen to me...
When i tell people about this possiblity they get excited and want in on it.
T-Mobile... be the "Data Pipe" Google wants you to be, you will gain subscribers
Click to expand...
Click to collapse
.
ekeefe41 said:
http://forums.t-mobile.com/tmbl/board/message?board.id=AndroidPlans&thread.id=1785
You know they already know about it, so don't give me crap for "Letting the cat out of the bag"
Bump the thread please and lets try to make this a t-mobile policy.
(probably will never happen, but if we can convince them that this polocy will gain them customers it may)
Click to expand...
Click to collapse
Yes, they know about it. That doesn't mean it's a good idea to give them the impression that this is a mainstream usage scenario.
Often service providers will tolerate a small percentage (lets say 1-5%) of their customerbase that uses a signficantly larger proportion of bandwidth than average. They may be losing money on these customers, but as long as the loss is lower than the loss that would be incurred due to negative press from terminating those customers, they will let the small percentage slide.
By bumping/posting that thread, you are basically giving T-Mo (and any other carrier with similar pricing) a reason on a silver plate to go and shut the MyFaves "loophole" right now. Kudos.
*Note: I don't have MyFaves, so I could really not care less how it turns out from a personal standpoint.
jashsu said:
Yes, they know about it. That doesn't mean it's a good idea to give them the impression that this is a mainstream usage scenario.
Often service providers will tolerate a small percentage (lets say 1-5%) of their customerbase that uses a signficantly larger proportion of bandwidth than average. They may be losing money on these customers, but as long as the loss is lower than the loss that would be incurred due to negative press from terminating those customers, they will let the small percentage slide.
By bumping/posting that thread, you are basically giving T-Mo (and any other carrier with similar pricing) a reason on a silver plate to go and shut the MyFaves "loophole" right now. Kudos.
*Note: I don't have MyFaves, so I could really not care less how it turns out from a personal standpoint.
Click to expand...
Click to collapse
I couldn't have said this all better myself.
To OP: Be happy with the loophole you have now. Make this mainstream and you'll see the loophole closed up nice and quick.
Here is the thing...
I personally will not do the things in my post unless i can confirm it is something i can rely on.
scenario
I buy a 2nd phone for the wife
I cancel my home (Vonage) phone line
I then begin to rely on this piggy backing as a part of my monthly finances...
BOOM
T-mobile closes the loophole.
I am stuck with an extra phone/Plan that i can't get out of....
My bill goes through the roof because these phones are now our only voice option.
Until i get a confirmation from T-Mobile i will push the issue...
If it ruins it for everyone... so be it
When it comes to contracts and my monthly finances, there is no room for guess work.
ekeefe41 said:
If it ruins it for everyone... so be it
Click to expand...
Click to collapse
Haha. I like your attitude!
When it comes to contracts and my monthly finances, there is no room for guess work.
Click to expand...
Click to collapse
Then... why are you relying on beta services and loopholes for your core telecommunications?
It seems to me that what you need to get is one of those truly unlimited in-region calling (I think MetroPCS has something like that? Also T-Mo has the Unlimited Loyalty Plan.) You can be assured that you'll be billed a flat monthly rate that way regardless of your usage and regardless of whether or not you are routing through GV.
I love the flimsy rationalization going on this thread.
jashsu said:
Haha. I like your attitude!
Then... why are you relying on beta services and loopholes for your core telecommunications?
Click to expand...
Click to collapse
Not quite...
I have the G1 $60-month
Wife has a pay as you go $20ish-month
home phone is vonage $30-month
About $110 a month for phone services.
If this loophole/beta service turns to be legit. Then I will make major changes to my phone providers. (like i explained in my T-mobile post)
Oh yea... I am cheap and a control freak when it comes to contracts and bills.
uberingram said:
I love the flimsy rationalization going on this thread.
Click to expand...
Click to collapse
Please explain your self.
If i am going to agree to additional contracts, i need to know the scope of what is allowed and what is not for my own protection.
ekeefe41 said:
Please explain your self.
Click to expand...
Click to collapse
1) Your life's micromanagement must make you a joy to be around
2) jashsu said it best. You are giving carriers a reason to enforce "Fav" calling to individuals and not blanket numbers. The phrase "the squeaky wheel gets the grease" only applies if annoying customer (e.g. you) is the only one affected. This is not the case here. Especially since Google purchased the 1 million some odd numbers from Level 3.
3) You're using a known buggy service that's very still much in beta as your sole means of telecommunication. For someone so uptight about control that seems oddly, and stupidly, out of character.
4) It's stupid to think that this will actually gain customers. There are a fixed number of Google Voice numbers in existence and I can pretty much assure you they are all spoken for.
Edit: Just to elaborate on #4, Last night I used the call back feature of GV. Do you know how long it took the service to ring my phone? 8 minutes. That's perfectly acceptable for your only means of telecommunication.
ekeefe41 said:
If this loophole/beta service turns to be legit. Then I will make major changes to my phone providers. (like i explained in my T-mobile post)
Click to expand...
Click to collapse
I don't know what industry you work in, but let me just put it bluntly and say that generally large multinational corporations don't make potentially significant alterations to their business plan based on whiny posts on their forums. It is questionable whether anyone with the authority to make a declaration of the kind you are hoping for even reads or has a pr secretary that reads that forum on t-mobile.com.
If (and i'm not holding my breath here) they legitimize unlimited calling in some kind of promotion/profit-sharing deal with Google, that was probably planned months in advance by a team of profit-cost analysts and in no way whatsoever did they give two ****s about your petition. I can just about guarantee that.
uberingram said:
1) Your life's micromanagement must make you a joy to be around
2) jashsu said it best. You are giving carriers a reason to enforce "Fav" calling to individuals and not blanket numbers. The phrase "the squeaky wheel gets the grease" only applies if annoying customer (e.g. you) is the only one affected. This is not the case here. Especially since Google purchased the 1 million some odd numbers from Level 3.
3) You're using a known buggy service that's very still much in beta as your sole means of telecommunication. For someone so uptight about control that seems oddly, and stupidly, out of character.
4) It's stupid to think that this will actually gain customers. There are a fixed number of Google Voice numbers in existence and I can pretty much assure you they are all spoken for.
Edit: Just to elaborate on #4, Last night I used the call back feature of GV. Do you know how long it took the service to ring my phone? 8 minutes. That's perfectly acceptable for your only means of telecommunication.
Click to expand...
Click to collapse
The only thing i manage like this is my bills....
Wife does not even know the password to our banking acc...
It is not even something we discuss, it is something i just handle..
So in fact, i am a pleasure to be around, because it is something i just do, and never talk about.
But thanks for trying to be insulting.
I have been using GV for almost a week now, no 8 minute, no bugs.
The service has been good enough that i am considering major changes to my service providers. A change that would give me more functionality at almost the same cost...
I am not sure i fully grasp your hostility.
Any contract i am involved with i like to know everything i can.
If that is strange to you... well that's your issue.
ekeefe41 said:
The only thing i manage like this is my bills....
Wife does not even know the password to our banking acc...
It is not even something we discuss, it is something i just handle..
So in fact, i am a pleasure to be around, because it is something i just do, and never talk about.
Click to expand...
Click to collapse
I don't want to take this thread too far off-topic, and in no way should this be taken as an insult, but i'd be pretty concerned if my partner opened a joint bank account and didn't share the password. Maybe that's just me though...
Have you perhaps considered the possibility that you just think you're pleasurable to be around?
jashsu said:
I don't know what industry you work in, but let me just put it bluntly and say that generally large multinational corporations don't make potentially significant alterations to their business plan based on whiny posts on their forums. It is questionable whether anyone with the authority to make a declaration of the kind you are hoping for even reads or has a pr secretary that reads that forum on t-mobile.com.
If (and i'm not holding my breath here) they legitimize unlimited calling in some kind of promotion/profit-sharing deal with Google, that was probably planned months in advance by a team of profit-cost analysts and in no way whatsoever did they give two ****s about your petition. I can just about guarantee that.
Click to expand...
Click to collapse
I suppose it is less a petition, and more of a wish for clarification.
I know for a fact that google would like ISP's and Tel-Co to be more like a "Pipe" for data. With Google controlling as much content as they can (for advertisement $$)
This Google Voice product is a perfect example of this coming to fruition.
All you need is one TelCo jumping on board and prices come down for everyone.
Thank you for calling my post "whiny"... i was trying to make a point. I must have done a poor job.
ekeefe41 said:
If it ruins it for everyone... so be it
Click to expand...
Click to collapse
That is a ****ty attitude and goes against everything this forum stands for. It sounds like a child, if I cant have it then no body will. I just hope you realize your place, you should be thankful you have a FREE Google voice number and that there are ways of saving large amounts of money through minor hacks. If you can use them to your advantage then awesome, if not, then oh well you arent loosing anything. I just think you would get a much better reception if you came into this looking for help and trying to help the community instead of the ultimatum you have presented us with.
jashsu said:
I don't want to take this thread too far off-topic, and in no way should this be taken as an insult, but i'd be pretty concerned if my partner opened a joint bank account and didn't share the password. Maybe that's just me though...
Have you perhaps considered the possibility that you just think you're pleasurable to be around?
Click to expand...
Click to collapse
ha ha ha!
I have like a "Quiz" day with her every once in a while.. aka, if i died could you access our bank accounts.
She Fails on a regular basis.
She does not have access to this stuff by my choice, in fact i have given it to her multiple times, multiple ways for her to remember.
She wants nothing to do with it.
It's not that i am a control freak... it's that she is lazy and does not want to concern her self with this stuff.
But yea, we have spiraled way too far in to my personal life, hehe
brandenk said:
That is a ****ty attitude and goes against everything this forum stands for. It sounds like a child, if I cant have it then no body will. I just hope you realize your place, you should be thankful you have a FREE Google voice number and that there are ways of saving large amounts of money through minor hacks. If you can use them to your advantage then awesome, if not, then oh well you arent loosing anything. I just think you would get a much better reception if you came into this looking for help and trying to help the community instead of the ultimatum you have presented us with.
Click to expand...
Click to collapse
I am asking people to bump the thread in the t-mobile thread... if they like the idea of this piggybacking.
I myself, for the way i treat bills and contracts, need specific clarification so i will keep pushing regardless.
If you don't agree, then don't bump the t-Mobile thread.
Ugg.... never mind.
It looks like it is official a bug (not intended)
http://devin.reams.me/free-google-voice-calls-with-t-mobile-myfaves/
UPDATE: as mentioned by Josiah in the comments, this violates this statement on T-Mobile’s website: “Your five numbers must be US domestic numbers and must not include … customers’ own numbers; and single numbers allowing access to 500 or more persons.”
Click to expand...
Click to collapse
aad4321 said:
yeah but because you wont have free incoming you will have to set the gv number to show on an incoming call and add it to the fav5. long story short u will not know who i calling you unless you have that stupid press 1 to accept thing.
Click to expand...
Click to collapse
That would be the big limitation
But with google voice you can listen in on the message before you pick up
yea this needs a lot of clearing up....gvoice isnt widely available
UMA
ekeefe41 said:
Not quite...
I have the G1 $60-month
Wife has a pay as you go $20ish-month
home phone is vonage $30-month
About $110 a month for phone services.
If this loophole/beta service turns to be legit. Then I will make major changes to my phone providers. (like i explained in my T-mobile post)
Oh yea... I am cheap and a control freak when it comes to contracts and bills.
Click to expand...
Click to collapse
why dont you get a UMA phone form T-mobile, for a few bucks a month and drop your Vonage right there saves u about 25$
Disclaimer: everything discussed here is for educational purpose only etc...
OK, so from June 12 this Hell act will take effect in UK, and downloading Torrents etc will become difficult, as ISPs to disclose details of customers who repeatedly infringe copyright, with a possible fine of £250,000 for non-compliance and requirement that ISPs block access to sites that allow "substantial" infringement as well as disconnecting users from Internet etc...
more info @ http://en.wikipedia.org/wiki/Digital_Economy_Act_2010
so, we all know we download Music and TV series etc...
how are we gonna protect our self from this ACT ?
Encryption is one idea, but encryption have to be done on both sides of the connection so this could be tricky....
any thought on the issue ?
Such ideas are preposterous, as they simply bypass Global Internet Neutrality.
IP-Spoofs and Proxies will always HELP protect the user, but the easiest way to prevent "being caught" if you're doing something you legally should not be, is to create a Private Domain amongst either a Router itself, or a Protected Virtual Machine.
Preferably a Virtual Machine due to the odd ports they access for Internet Access, plus, if "Big Brother" were to kick down your door... Most Protected Virtual Machines (Example:: Virtual Machine Encrypted with Bit-locker Technology) can take several months or years to "break into" for data... unless of course, you have the Key RIGHT THERE in hands reach.
Agent Zach said:
Virtual Machine Encrypted with Bit-locker Technology) can take several months or years to "break into" for data...
Click to expand...
Click to collapse
I'm not sure but aren't law enforcements have some sort of agreement with MS to have backdoor in to windows and BitLocker or something ? (maybe just a roomer i heard somewhere)
with IP-spoofing and Proxies, would that still not be traceable ? and also sow down connection badly ?
i mean when i in Russia i don't use any sort of proxies or anything just download things if Rapidshare and Pirate Bay as it is and i get good 1 or 2MB/s most of the time,
but in UK even now the Uni giving me the headache with their firewalls and WebSence...
i have to RDP all my downloads back in Russia and then send them as files to myself on like Microsoft Skydrive and other online hostings that Uni dosent block (Rapidshare and Depositfiles, iFolder are all blocked)
next year mm no longer living on campus and will have my own network contract with ISP and this D.E.2010ACT
worry me... I'm mean i on average download 30 - 40GB a week, that just on torrents...
one idea is to there a way to encrypt and tunnel all the Traffic form UK PC to Russia and back so ISP see nothing at all just flow of Encrypted data ? and how this can be achieved ?
and also what are the Chances of PirateBay and Utorrent incorporating some sort of Privacy features to it ? like utorrent have encryption but initial connection is still open
Well, honestly, due to Privacy Laws, unless a Windows User is a KNOWN convict, thief, or pedofile, allowing Law Enforcement backdoor access to ALL Windows Users is, again, violating Net Neutrality AND ones Privacy. Anyone and EVERYONE can be "violated" via malware.. and have their PC/Laptop turned into a Server for hosting & sharing illegal content, so there are SEVERAL conflicting issues with this.. atleast in the US. [As the user is not at fault. Their security software would be.] The same reason that most Professionals against the Digital Economy Act worry about Open Access Points.
And for Encrypting & Tunneling traffic, torrent sites, as well as other file sharing sites, would have to incorporate Server-Side Security. Massive 128 bit or even 256 bit encryption. Also, the user, us, would have to mirror the security methods these sites are using. So it would cause a "Worm Hole" through Internet Traffic Space.. thus making it look like the downloaded files came from no-where, and went no-where.
Such security and encryption methods could require several man-hours to "Up-Hold" as well as Maintain. So such an act could cause either Global Domain Dominance or the death of sites we all enjoy today.
AgentZach, I think you might want to brush up on your english skills. In no way is "Server" meant to be capitalized, among other clear mistakes that make you impossible to understand. But I digress. Most of the law isn't all that bad, however, I'm troubled by this, "the requirement that ISPs block access to sites that allow "substantial" infringement[4]." That could be a real issue. As for backdoor access, I'm pretty damn sure that violates multiple laws, plus how the hell would microsoft know what only you know?
Well, honestly, due to Privacy Laws, unless a Windows User is a KNOWN convict, thief, or pedofile, allowing Law Enforcement backdoor access to ALL Windows Users is, again, violating Net Neutrality AND ones Privacy
Click to expand...
Click to collapse
How exactly does accessing someones files violate net neutrality law? It doesn't even currently exist, thanks to our beloved Bush administration, net neutrality is treating all traffic equally. Plus, even being a known criminal does not give law enforcement the right to search your personal things without a warrant of some fashion.
TLDR:
Don't use torrents without a vpn. ..Or the internet.
DanielLyme said:
AgentZach, I think you might want to brush up on your english skills. In no way is "Server" meant to be capitalized, among other clear mistakes that make you impossible to understand. But I digress. Most of the law isn't all that bad, however, I'm troubled by this, "the requirement that ISPs block access to sites that allow "substantial" infringement[4]." That could be a real issue. As for backdoor access, I'm pretty damn sure that violates multiple laws, plus how the hell would microsoft know what only you know?
How exactly does accessing someones files violate net neutrality law? It doesn't even currently exist, thanks to our beloved Bush administration, net neutrality is treating all traffic equally. Plus, even being a known criminal does not give law enforcement the right to search your personal things without a warrant of some fashion.
TLDR:
Don't use torrents without a vpn. ..Or the internet.
Click to expand...
Click to collapse
GTFO. Who signs up just to be a smartass?
Plus, your TLDR didn't do anything except sum up what he was saying. With a tad bit of extra stupidity.
Oh, English IS ment to be capitalized. How are you going to insult someone's English and miss the most important word in the sentence. Rofflecakes.
In no way is "Server" meant to be capitalized, among other clear mistakes that make you impossible to understand.
Click to expand...
Click to collapse
In no way is "server" (don't reinvent the mistake, that's just sloppy) meant to be capitalized, and among with other clear mistakes, you are impossible to understand. (You didn't accidentally the whole thing, did you?)
I could go on, but you get the picture. Don't insult until you have the grounds to do so.
@ r3s-rt: Thanks for putting your boot up his/her ass.
I admit, I was half asleep when I typed that up... as it was 3AM my time, and I had a long Mothers Day with my family. I expected flaws, but as long as my main points were said correctly, "spelling & capitalization correct or not - sorry Adolf" I think I've shard my opinion.
The important thing is: Users, who intend to break the law on the internet, must lose their solo dependency for Security Suite software, and start learning how encryption and Virtual Private Networks work, as a whole. It's not only their ass they'll be saving. They'll be saving all of the rest of a torrents "seeders" who haven't stepped-up their games yet...
Agent Zach said:
@ r3s-rt: Thanks for putting your boot up his/her ass.
I admit, I was half asleep when I typed that up... as it was 3AM my time, and I had a long Mothers Day with my family. I expected flaws, but as long as my main points were said correctly, "spelling & capitalization correct or not - sorry Adolf" I think I've shard my opinion.
The important thing is: Users, who intend to break the law on the internet, must lose their solo dependency for Security Suite software, and start learning how encryption and Virtual Private Networks work, as a whole. It's not only their ass they'll be saving. They'll be saving all of the rest of a torrents "seeders" who haven't stepped-up their games yet...
Click to expand...
Click to collapse
No problem, I can't stand people who attack other people and then make the same mistake their attacking. Plus, who cares if your English is exactly perfect? As long as it's READABLE. That's the only time English becomes a problem.
u r wanna hlo me donload dis new gme but frum whr i unno?
lolwat?
I've always wondered one thing. I don't know much exactly how they work - I just know I need protection.
People who download and don't seed.... do they even have a chance at getting caught? I honestly wouldn't figure they would. Maybe for like.... 20 min they have a chance then what? Do they just disappear? I use a site where you actually have to keep an upload/download ratio just for the reason I hate leeches.
Also, stay away from public torrent sites is probably a good idea. THOSE are the ones they get all your info from.
r3s-rt said:
I've always wondered one thing. I don't know much exactly how they work - I just know I need protection.
Click to expand...
Click to collapse
For "Basic" security and encryption, without much manual handling, I'd recommend using either Kaspersky Internet Security 2010 or Norton Internet Security 2010 (or 360 v4).
r3s-rt said:
People who download and don't seed.... do they even have a chance at getting caught? I honestly wouldn't figure they would. Maybe for like.... 20 min they have a chance then what? Do they just disappear? I use a site where you actually have to keep an upload/download ratio just for the reason I hate leeches.
Click to expand...
Click to collapse
Well, getting caught, without seeding, varies upon the host/torrent site. Private Sites like Demonoid save logs for User Ratio data... and that Ratio data includes your IP Address you use when downloading & uploading torrents. Now if you were to use a Proxy, you may get a tad bit slower connection speed, but your TRUE IP Address would be "spoofed" to the Proxy IP. In other words, the host of the Proxy would be investigated, not you.
r3s-rt said:
Also, stay away from public torrent sites is probably a good idea. THOSE are the ones they get all your info from.
Click to expand...
Click to collapse
Good idea, and true. Most public trackers display all seeding & leeching data to anyone interested.. but the same goes as I've said above. Proxies may cut your speeds, but does speed really have more importance than your personal safety & privacy?
I'll leave that for you all to decide.
To be a smartass ain't why I signed up, and sorry if it seemed that way. Since you want to be a douche I'll speak your language - at least my TLDR made some sense, unlike his entire post.
But while we're on the topic of stupidity;
"Global Internet Neutrality
IP-Spoofs
Private Domain amongst either a Router itself, or a Protected Virtual Machine.
Preferably a Virtual Machine due to the odd ports they access for Internet Access
Virtual Machine Encrypted with Bit-locker Technology"
Just what is this "Global internet neutrality"? We're having a hard enough time trying to hold on to such in our OWN country, and other countries have none, so- doesn't exist.
"IP spoofs"- ANY idea how the internet actually works? Not possible to just arbitrarily IP spoof, you need special conditions.
"Private Domain"? Hurf durf, what? How's it work, what IS it?
"a virtual machine due to the odd ports they use for internet access"? WHAT are you takling about, have you ever actually USED a VM? Going by that comment I doubt it. I give up.
I can tell I'm talking to an avid 4chan lover. Good luck finding anyone who can understand what he's saying, I personally left my decoder ring at home.
Stop trying so hard, get enough sleep and have some caffeine, it'll do you good and you just may come across as halfway coherent next time. And maybe try to stop using large words on the net, because you're doing it totally out of context (which makes you look stupider than i'd like to believe you are)
The English syntax really wasn't the issue here, just that it was way off base and incomprehensible. Don't talk about something unless you have at least a BASIC idea of how it works. The RIAA and MPAA go after people who seed mainly. Private torrent sites are overrated and just not worth it- keeping a ratio mostly requires a seedbox so you don't get banned.
And the culmination of my wall of text, anyone who puts "Number of bricks to date:0" in their sig really shouldn't go attacking others. True men actually try to brick their **** and don't brag when they haven't.
DanielLyme said:
To be a smartass ain't why I signed up, and sorry if it seemed that way. Since you want to be a douche I'll speak your language - at least my TLDR made some sense, unlike his entire post.
But while we're on the topic of stupidity;
"Global Internet Neutrality
IP-Spoofs
Private Domain amongst either a Router itself, or a Protected Virtual Machine.
Preferably a Virtual Machine due to the odd ports they access for Internet Access
Virtual Machine Encrypted with Bit-locker Technology"
Just what is this "Global internet neutrality"? We're having a hard enough time trying to hold on to such in our OWN country, and other countries have none, so- doesn't exist.
"IP spoofs"- ANY idea how the internet actually works? Not possible to just arbitrarily IP spoof, you need special conditions.
"Private Domain"? Hurf durf, what? How's it work, what IS it?
"a virtual machine due to the odd ports they use for internet access"? WHAT are you takling about, have you ever actually USED a VM? Going by that comment I doubt it. I give up.
I can tell I'm talking to an avid 4chan lover. Good luck finding anyone who can understand what he's saying, I personally left my decoder ring at home.
Stop trying so hard, get enough sleep and have some caffeine, it'll do you good and you just may come across as halfway coherent next time. And maybe try to stop using large words on the net, because you're doing it totally out of context (which makes you look stupider than i'd like to believe you are)
The English syntax really wasn't the issue here, just that it was way off base and incomprehensible. Don't talk about something unless you have at least a BASIC idea of how it works. The RIAA and MPAA go after people who seed mainly. Private torrent sites are overrated and just not worth it- keeping a ratio mostly requires a seedbox so you don't get banned.
And the culmination of my wall of text, anyone who puts "Number of bricks to date:0" in their sig really shouldn't go attacking others. True men actually try to brick their **** and don't brag when they haven't.
Click to expand...
Click to collapse
http://en.wikipedia.org/wiki/Network_neutrality - lol. Wow, kid. Get on Google if you don't know what something is. =]
Proxies - Safer than using your regular IP, genius. If they weren't, we wouldn't use them.
http://en.wikipedia.org/wiki/Domain_privacy - Again, you NEED to Google.
About the seeding - we have a leech! Private sites ARE worth it. If you were even worthy to get an invite, you'd know. Let me guess, the most private site you know is Demonoid. *chuckle*
Avid 4chaner? Only a real /b/rother would be able to tell that.
And the culmination of my wall of text, anyone who puts "Number of bricks to date:0" in their sig really shouldn't go attacking others. True men actually try to brick their **** and don't brag when they haven't.
Click to expand...
Click to collapse
You are COMPLETELY retarded. If I wanted to brick my phone, I'd flash a nasty spl or a nasty radio or Danger SPL before a compatible radio with an imcompatible recovery. IF you knew ANYTHING about rooting as you say you do, you would understand that. You'd also know you are considered an idiot if you brick your phone. I think you just earned a spot in my signature as "worlds dumbest quote."
Little kids need to get off the internet and go to bed, mommy would be very mad if she discovered the bad words you were using.
Now, how about you stop trying to start a flame war and just shut up? You already look VERY stupid along with a tad bit pathetic.
The RIAA and MPAA go after people who seed mainly.
Click to expand...
Click to collapse
Didn't they do a bust down on a lot of college students? Yea, THOSE are our "main seeders." ROFL. Moron. They go after anyone they can get a hand on if they consider it worthy of an actual lawsuit. You'd know this if you ever read news.
Point blank, please stop throwing up in threads like you even know something. EVERYTHING you've said so far is either WRONG or STUPID. The last thing we need at xda are more idiots. :/ Please, gtfo.
Ohhhh, your TLDR said EXACTLY what he said in layman's terms. He at least has the brains to explain what he's saying. You just copy what he said and tried to make it look like your own. Sorry, bro, just don't respond. You've already dug too deep.
I have no idea what he just said. He just typed up about 200 words of pointless garbage... and wasted a post in this thread.
Officially, just from reading the first 10 words, I got dumber.
And once again, thanx r3s-rt for translating my words into "retard-speak" for him. It seems even the "dumbed down" version of my posts are too complex for him to understand.
LOL @ your links. Maybe he'll learn something new today.
Guys please - we're getting to the stage of - stop the agro or it's close it time - and I've got enough guys on my watch list without adding more!
Mike
My apologies.
Ditto.
10 char. :X
Perhaps the MPAA and RIAA should give up their tirades--after all, the United States has the lowest piracy rate of any country in the world, at just 20 percent.
Click to expand...
Click to collapse
So it seems not so bad. Either the US really does have the lowest Piracy percentage in the world... or the US Pirates are just a tad more secure.
Read HERE.
r3s-rt said:
I just know I need protection.
Click to expand...
Click to collapse
Use a condom???
flyboyovyick said:
Use a condom???
Click to expand...
Click to collapse
Lame but funny
Agent Zach said:
So it seems not so bad. Either the US really does have the lowest Piracy percentage in the world... or the US Pirates are just a tad more secure.
Read HERE.
Click to expand...
Click to collapse
Wow. I would have figured it would have been the HIGHEST. If not, at least towards the top of the list. o.o
flyboyovyick said:
Use a condom???
Click to expand...
Click to collapse
I'm not a tory supporter (Voted Lib Dem for what it is worth) but we can hope this is true
Damn it, I'm not allowed to post any links but Techradar is reporting that the conservatives may well ditch the entire thing which we can hope is true
###
reading the story, within the first paragraph, i can see that 90% of the problem was this guy's fault, not apples. he had an entire year, of his daughters life, not backed up? being a father of 3, 99.9% of what i take pictures of are my kids. i have my phone instant upload to my google account, i also copy all pics weekly from my phone to my media server, which makes redundant copies, these copies are then imaged to a 3 resource. not sure why this guy went a year without backing anything up.
this guy also has no real idea as to what he's talking about. apple forcing you to use icoud? google already a cloud based os? you only have to use the cloud if you choose to. apple and google know that if they try to force people into cloud based operating, they would lose most of their business oriented users, and those without unlimited data plans.
You're right about the GPS on the SGS1, it sucks!
I know! Why would they even do something like that?
svtfmook said:
reading the story, within the first paragraph, i can see that 90% of the problem was this guy's fault, not apples. he had an entire year, of his daughters life, not backed up? being a father of 3, 99.9% of what i take pictures of are my kids. i have my phone instant upload to my google account, i also copy all pics weekly from my phone to my media server, which makes redundant copies, these copies are then imaged to a 3 resource. not sure why this guy went a year without backing anything up.
this guy also has no real idea as to what he's talking about. apple forcing you to use icoud? google already a cloud based os? you only have to use the cloud if you choose to. apple and google know that if they try to force people into cloud based operating, they would lose most of their business oriented users, and those without unlimited data plans.
Click to expand...
Click to collapse
I suppose you got a point.
Did you read the part about the internal policies? I suppose it's some of the employees fault, not entirely Apple. But still, not everyone has a media server, lol.
Screw you Clan vv3 and Phobia. Hope someone messes up your lives one day.
Sounds like massive failures all around. Certainly foolish not to create backups, but also horrible policies and actions on the part of Amazon and Apple.
I agree with you. That many photos, the should of been backed up. At least he admitted beforehand that on his part most things were wrong. But then come Apple and Amazon, who clearly have more power over security, but simply failed to to stop this hacking. Doesn't really count that much of a "hacking" if Apple/Amazon let them get that info nice and easy. But and the end of the day, it was the criminals fault. Same goes for the scrib who stole my phone.
Dude obviously has issues if he didn't care that he destroyed all that just to hack someone's Twitter. Odds are they'll brag about it to the wrong person and get dimed out.
MissionImprobable said:
Dude obviously has issues if he didn't care that he destroyed all that just to hack someone's Twitter. Odds are they'll brag about it to the wrong person and get dimed out.
Click to expand...
Click to collapse
We totally understand where you're coming from, but the fact is, not EVERYONE has the knowledge of computers that some of us do, and not EVERYONE knows how to back-up their files. This could happen to the regular joe-schmo who just has a computer to communicate with their family relatives over facebook or twitter or whatever and also buy **** off amazon. BOOM and it just so happens that some person takes your information and takes everything you have and you really cant do anything.
this guy might've been a technology journalist but he was clearly dumb enough not to back up any of his stuff and to chain all your stuff together? come on...
Not sure what you're on about. I'm saying that the dbag who hacked him seems to have zero remorse that he helped wipe out all of that important info just so he and his friend could say they hacked a gizmodo twitter.
Heck, for all that effort they could be doing something in the real world worth getting notoriety for.
MissionImprobable said:
Not sure what you're on about. I'm saying that the dbag who hacked him seems to have zero remorse that he helped wipe out all of that important info just so he and his friend could say they hacked a gizmodo twitter.
Heck, for all that effort they could be doing something in the real world worth getting notoriety for.
Click to expand...
Click to collapse
Yep, sorry.. realized I replied to the wrong person lol.. you're right. Hackers aren't supposed to be doing this to the general public. REAL HACKERS are supposed to be trying to hack into company security systems under the companies employment to find security flaws for that specific company. those guys just wanted to **** with mr. honan
MissionImprobable said:
Not sure what you're on about. I'm saying that the dbag who hacked him seems to have zero remorse that he helped wipe out all of that important info just so he and his friend could say they hacked a gizmodo twitter.
Heck, for all that effort they could be doing something in the real world worth getting notoriety for.
Click to expand...
Click to collapse
Last page, he is sorry that his Mac was wiped
Sent from my Nexus 7 using Tapatalk 2
MissionImprobable said:
Not sure what you're on about. I'm saying that the dbag who hacked him seems to have zero remorse that he helped wipe out all of that important info just so he and his friend could say they hacked a gizmodo twitter.
Heck, for all that effort they could be doing something in the real world worth getting notoriety for.
Click to expand...
Click to collapse
The thing about hackers is that they've got potential, but they just don't want to use it.
Hi guys. I'm starting this thread in hopes of sparking a conversation and a concerted effort to rid ourselves as users from the clutches of Google and other big tech companies. I am sick and tired of Google tracking me and attempting to force feed me ads on a daily send constant basis. Then selling my info to other companies such as Facebook. So, I have started down the path of decluttering (De-Google-ing) my device(s). I am primarily interested in securing my device as much as possible and protecting my privacy.
So far, I have reformatted my entire device to factory default settings installed and using F-Droid (FOSS) for all my apps. I use Yandex as my search engine (I am often to suggestions and recommendations) in the "private browser" app. I use Aurora instead of Google Play store, New Pipe for YouTube-ing, Frost for Facebookingand SlimSocial for Twitter. I have stopped using Google keyboard and any other Google apps. I have abandoned gmail and replaced it with proton mail instead. So far, no ads and as far as I can tell, no tracking. I have also installed a VPN and am using it religiously—Cyber Ghost, a $99 for 3 years subscription with support up to 8 devices.
However, I am still very much connected to Samsung for I am not privy as to whether or not Samsung is as sinister as Google and Facebook.
Again, I am open to all suggestions, corrections and recommendations. Thank you and I hope to engage with you all.
leave it up to them yandex russians to protect your privacy.
but seriously. the most dangerous thing you can do is acctualy think that the steps you take are really making your life private.
vpns just channel the traffic to an other end point and does the queries for you then sends the data encrypted to you.
the queries are still made on the www. account info and all things you store or access online is still accessible by the www. vpn companies just fool you into thinking that the data being relayed to you is the only weak link. plus the free ones mine your data.
best thing you can do is not use social media. its made to invade your privacy. its designed to fool you into giving as much of your personal life info as possible and sell your habits to add companies so they can in turn send you quatered adds.
the minute you use the internet you void your privacy regardless of how you think the measures you take are working or effective. and what are you going to do about the 100 and 1000's of companies being hacked and their data mined and sold every month? you cant do anything about that. plus its much better for hackers to get their info from a big company because you get much more than just 1 dude that does his banking online and chat every now and then.there is no money to be made from 1 individual.
if you think people are specifically after you, you are gravely being fooled by the vpn ad campaigns that have been poping up everywhere about "privacy".( they must hide the fact that they also get hacked very well.its just that the media hasint picked up on it yet)
anyways who want to waste time on an end user/device?
when again you just need to hack equifax like a few years back and you get the motherload instead.
all in all I've abandoned the thought of real privacy. its futile.( even abstinents dosen't work because companies and governments don't secure customer data correctly. and unfortunately if you are born, you must be branded and labeled and filed away.)
live your life. just know that what ever you do you can't escape big brother and your data from being leaked by the big companies that say that it is secured with them.
the whole infrastructure relies on them companies and the habits we have been embraining ourselves and our children with is the problem.. we live our lives intertwined with the services and devices that we take for granted and have clicked next next next through polices and consent forms for over 25 years now whithout even giving it a second though. we're in over our heads now and it is a little late to back out. this was al dine by design and all voluntarily. its crazy how marketing is evil.
a cabin in the woods is the easiest and most secure thing one can do. anything shy of that is a waste of time and a false feeling of privacy.
anyways I'm going around in circles now.
one thing for sure is that the criminals we think that we need cover from are not who we think they are.
they are the FCC dealing with big telcos, they are the big media giants spewing false information and fabricates facts. they are in our governments in the highest ranks pushing hidden agendas and most of all they are the big social media platforms remodeling our society each day under our noses at our expense.
but hey this is not new. the internet police is just tring to make you think it is and spend 9.99$ a month for a vpn lol
good luck.
I just stopped using as many Google apps as I can and switched over to MS Office apps and use Samsung services where I can too...
bober10113 said:
leave it up to them yandex russians to protect your privacy.
but seriously. the most dangerous thing you can do is acctualy think that the steps you take are really making your life private.
vpns just channel the traffic to an other end point and does the queries for you then sends the data encrypted to you.
the queries are still made on the www. account info and all things you store or access online is still accessible by the www. vpn companies just fool you into thinking that the data being relayed to you is the only weak link. plus the free ones mine your data.
best thing you can do is not use social media. its made to invade your privacy. its designed to fool you into giving as much of your personal life info as possible and sell your habits to add companies so they can in turn send you quatered adds.
the minute you use the internet you void your privacy regardless of how you think the measures you take are working or effective. and what are you going to do about the 100 and 1000's of companies being hacked and their data mined and sold every month? you cant do anything about that. plus its much better for hackers to get their info from a big company because you get much more than just 1 dude that does his banking online and chat every now and then.there is no money to be made from 1 individual.
if you think people are specifically after you, you are gravely being fooled by the vpn ad campaigns that have been poping up everywhere about "privacy".( they must hide the fact that they also get hacked very well.its just that the media hasint picked up on it yet)
anyways who want to waste time on an end user/device?
when again you just need to hack equifax like a few years back and you get the motherload instead.
all in all I've abandoned the thought of real privacy. its futile.( even abstinents dosen't work because companies and governments don't secure customer data correctly. and unfortunately if you are born, you must be branded and labeled and filed away.)
live your life. just know that what ever you do you can't escape big brother and your data from being leaked by the big companies that say that it is secured with them.
the whole infrascturuce relies on them companies and the habits we have been embraining ourselves and our children with is the problem.. we live our lives intertwined with the services and devices that we take for granted and have clicked next next next through polices and consent forms for over 25 years now whithout even giving it a second though. we're in over our heads now and it is a little late to back out. this was al dine by design and all voluntarily. its crazy how marketing is evil.
a cabin in the woods is the easiest and most secure thing one can do. anything shy of that is a waste of time and a false feeling of privacy.
anyways I'm going around in circles now.
one thing for sure is that the criminals we think that we need cover from are not who we think they are.
they are the FCC dealing with big telcos, they are the big media giants spewing false information and fabricates facts. they are in our governments in the highest ranks pushing hidden agendas and most of all they are the big social media platforms remodeling our society each day under our noses at our expense.
but hey this is not new. the internet police is just tring to make you think it is and spend 9.99$ a month for a vpn lol
good luck.
Click to expand...
Click to collapse
Oy vey! Thank you very much for yor contribution. It is very much appreciated and I see what you are saying.
AndroidUser00110001 said:
I just stopped using as many Google apps as I can and switched over to MS Office apps and use Samsung services where I can too...
Click to expand...
Click to collapse
How has this been working out for you? What are your thoughts on Samsung's and Microsoft privacy policies etc?
Nonetheless, what are some good and viable alternatives to Google and optimally "securing" one's device (taking everything bober10113 has said).
michel5891 said:
How has this been working out for you? What are your thoughts on Samsung's and Microsoft privacy policies etc?
Click to expand...
Click to collapse
Like the other poster said, I gave up on worrying about privacy. I made the switch for other reasons and privacy was down on the list...
I just do not like what Goolge has been doing lately, especially blocking ad blockers soon in Chrome so I switched to MS Edge on Android and the Chromium version of Edge for desktop and the rest of the apps just followed through. I am seeing how the switch works for myself and if all goes well I will switch back to MS for the small company I work for.
I gave up on Gmail, Google Drive and all their office apps so far and I stopped using Nexus/Pixel phones for the first time in 10 years. I started with the S9+ which I enjoyed for a couple of months and then got a Note9 during a holiday special and now I cannot wait for the Note10.
Privacy is what it is nowadays... We should all own our data and if we choose to let be used as companies are doing now then we should get a slice of all the money being made but I doubt it will ever get to be something like that.
michel5891 said:
How has this been working out for you? What are your thoughts on Samsung's and Microsoft privacy policies etc?
Click to expand...
Click to collapse
I wouldn't think that they are any better than Google's. Majority of the companies out there that are international had to adhere to the EU rules of privacy, so a lot of them have adopted those standards. NOT ALL OF THEM. That's why all of a sudden you are getting new agreements from all the major companies that touch each section of land on the world.
I still don't trust any of them even to that point.
This is morbid. I have been thinking a lot more about death, debt, privacy and such, and I have come to the conclusion that I honestly don't care about my own anymore because it has been stolen, including my wife's. Future children though, I worry about them because you don't even have to mention their name on the internet and somehow every major company knows about them.
Ever had a conversation with someone without actually looking something up on the web, and then a day or two later Google and other ads start showing things concerning what you were talking about to someone in person? Yeah, it has happened to me numerous times now I can't even count anymore.
Jammol said:
Ever had a conversation with someone without actually looking something up on the web, and then a day or two later Google and other ads start showing things concerning what you were talking about to someone in person? Yeah, it has happened to me numerous times now I can't even count anymore.
Click to expand...
Click to collapse
YES!!! I noticed this a few months ago. My wife and I were talking about some random subject and BAM there it was in my Google discovery feed.
I mentioned that to her and she thought I was crazy until it happened again.
My friend was over last week, he mentioned something about a car he is fixing up and once again in my Google feed...
*EDIT*
I am not going to go as far as saying they are listening because my wife did say she looked up what we were talking about later on that day on her phone so I am guessing it is more GPS based then Google listening to give them the benefit of doubt for now. I need to ask my friend if he searched anything while here...
You want to De-Google your phone? Sell it and don't get an Android phone. Don't get an iPhone, either. In fact, get one of those huge car phones from the 80s. I can't add really anything that hasn't been said, other than some slight humor, but again, if you want privacy, stay off the internet.
AndroidUser00110001 said:
YES!!! I noticed this a few months ago. My wife and I were talking about some random subject and BAM there it was in my Google discovery feed.
I mentioned that to her and she thought I was crazy until it happened again.
My friend was over last week, he mentioned something about a car he is fixing up and once again in my Google feed...
*EDIT*
I am not going to go as far as saying they are listening because my wife did say she looked up what we were talking about later on that day on her phone so I am guessing it is more GPS based then Google listening to give them the benefit of doubt for now. I need to ask my friend if he searched anything while here...
Click to expand...
Click to collapse
This is what I'm trying to prevent. Exactly the same thing had happened to me. We were simply discussing an AC unit; never looked it up or mentioned the name of it and the exact make and model in the room we were in showed up.
michel5891 said:
This is what I'm trying to prevent. Exactly the same thing had happened to me. We were simply discussing an AC unit; never looked it up or mentioned the name of it and the exact make and model in the room we were in showed up.
Click to expand...
Click to collapse
Yeah it's super duper creepy. Funny thing is since I refreshed my Note 9 up to PIE, I haven't given assistant or google search any permission to use my microphone and I don't even have them setup!
this might help:
https://support.google.com/websearch/answer/6030020?co=GENIE.Platform=Android&hl=en
turn voice activity off. also check your history to see if it has any recording...