So..since this isn"t really mobile relatd...but xda is full of insanely smart people regarding technology...so i figure this is a good point of reference
there is a non profit organization that i do a bit of light tech stuff for..and they have asked me if they can set up a sort of nfc card system
so what they want to do is have their 30-40-ish employees all have nfc cards (either actual cards or little keypass things like exxon fastpay thing) and store credits on it (like they would pay for 30 credits)...and then scan it somewhere and it would subtract one credit (one of the things they would use it for is they would purchase a credit for one meal...so when they get their meal, instead of paying at the cashier, they swipe/scan their card on something and it would take away one credit...
how would i go about it? are there somewhat cost efficient (not looking to spend thousands...) ways of doing this?
with my galaxy nexus, i saw for pre 4.0.3 roms, you can have a little device to program nfc tags..so i am assuming there is something similar to program nfc cards with just software and a computer...or can we even just program with nfc tasker?
all help is appreciated....thanks...
I have no clue how you would go about doing that, but I just came up with an awesome idea. I might get 'something' with an NFC chip in it, and when someone asks for a card from me, they just scan that something with their phone and it shows up on their phone...kind of like QR codes. But first the NFC technology has to catch up.
i'm pretty sure there is stuff you can do that with..i know of business cards that you can just scan via nfc and the information is sent away...so...that must be similar?
As far as my situation goes...i'll look around. I found a scanner on amazon that scans nfc cards...i guess it's a matter of finding if i can program it..
Related
I work for the government and for the next few weeks will not be able to have a phone that can take pictures with me. Is there a way I can either remove or disable the camera function so I can show that I can not take pictures with my phone.
I was gonig to say you can request a ROM, however I just took my laptop to Best Buy today to get it fixed so i can't cook. What i suggest is that you download XDA Live 2.0 and use it for the meantime since it doesn't come with a camera.
You can download a 20270 kaiser kitchen from ppckitchen.org. I think the camera OEM is optional in it, but if not, it's easy to identify which package is the camera and delete it. As an alternive, you can probably just reassign the camera button to a non-existent app and that will essentially disable it to the casual observer.
Most secure facilities don't want you to have the hardware, regardless of whether it is functional or not.
gguruusa said:
You can download a 20270 kaiser kitchen from ppckitchen.org. I think the camera OEM is optional in it, but if not, it's easy to identify which package is the camera and delete it. As an alternive, you can probably just reassign the camera button to a non-existent app and that will essentially disable it to the casual observer.
Most secure facilities don't want you to have the hardware, regardless of whether it is functional or not.
Click to expand...
Click to collapse
I will look at trying to disable the camera button. I will also look at the 2027 kitchen. I have not been able to get any kind of cooking to work though. I think the main problem is vista. I am not going to be in a very secure place, just a place that has made stupid rules haha.
kareem9nba
if that dosen't work or fly whit where I am going I will go your route thank you for the suggestions.
I also work for the government and if the phone has a camera on it period it is not allowed into secure sites period no matter if the "ROM" has it disabled. once they see that it has a camera its a security risk and the guards that do the intakes could careless that it doesn't work, as long as there is a camera there they will take it until you leave or worse take it for good. the best bet is leave it in the car when you go into secure areas that has always worked for me Also the kaiser can be used as a storage medium so it probably won't be allowed anyway. Since no type of storage media is allowed. Also it depends on how secure the site your going into is
I to Contract for the Goverment!
I agree with Austinsync since there is a Camera lens on it you will not get by Security. Also the fact that it can store data via internal memory and well as transmit via sms,mms and internet there is no way you will talk your way by Security. You could glue a piece of glass on a Sucrets can and they would take it away from you. In fact I had to sign a form stating that if I do bring in something like that in they have the right to take it. and you may not get it back. Where I am PDA's are not aloud ,Anything that can be used to transport data is a risk to them. So don't bother looking for a rom, leave the phone in the car besides most government facilities jam cell calls anyway so having a phone is of no use when your inside the building.
Ed...
I just have a "dumb" phone from back in the day. Just a basic as basic gets cellular. Still useless when im on site due to jaming
I don't work for the federal government. I work for the PA state Gov. I am being sent for training. The place I am going is not secure. No security. They say no cells because they don't want them going off during class. And since we have to stay over night they don't want people running around taking pictures of everything and everyone. We can have cells if we use them as alarms though. I think that if the camera is disabled or would say "no camera" if the button was hit that it would be sufficient for my situation. Even Kareem's suggestion probably would be enough to make the trainers happy if they would say anything. If not I will leave it in my car and go from there.
Also sorry about the post in the wrong area.
Good day all,
With all the hubub about airport security screening your phone I'm interested in an 'airport app'. Namely, as opposed to full encryption (meh good if needed, but I don't really want to trade battery life for security) or the hassle of backing up an image, flashing a virgin phone image for travel, and then restoring the image after travel..
Why not create a 'sandbox' app of sorts. Start it, it simulates virgin or near virgin status, have an advanced unlock sequence to close it. The only issue, I see, would be if the phone was restarted while in 'airport mode' could it be triggered to restart in said mode.
After typing out my whole idea, I'm thinking the backup and flash of virgin rom might be a lot simpler. But I'm interested if any other world travelers, or US travelers would be interested in something like this.
So I guess the question is, anyone else thought about this, anyone know of something similar out already? Anyone want to develop something like this?
~HattZ
Screening in X-rays? What does it have to do with anything?
Or some other screening (don't believe it's technically possible - too many phones)? Can you point to your info source?
I don't understand the point of this, it is not like they take your phone and play with it when you go through security. In fact, mine has never been removed from my carry on when passing through security.
Maybe you have some evidence to support your theory that our phones data is at risk when passing through security checkpoints... but I doubt it.
Are you in the US? 'cause 1) that never happened, and 2) that would be illegal (to search the content of your phone), unless they had reasonable suspicion that your phone contained data that showed evidence of criminal activity.
They might 'touch' some phones to make sure they are real (as in really work vs being a bomb or something), but they wouldn't search the content of your phone.
pconwell said:
Are you in the US? 'cause 1) that never happened, and 2) that would be illegal (to search the content of your phone), unless they had reasonable suspicion that your phone contained data that showed evidence of criminal activity.
They might 'touch' some phones to make sure they are real (as in really work vs being a bomb or something), but they wouldn't search the content of your phone.
Click to expand...
Click to collapse
Sorry, wrong answer, it is the US, most national travel is not submitted to this type of search. All international (incoming) travel can be.
Lots of interesting talk on it: http://yro.slashdot.org/story/10/11...r-Moxie-Marlinspikes-Laptop-Cellphones-Seized
Legal explanation: http://caselaw.lp.findlaw.com/data/constitution/amendment04/04.html
pertinent excerpt: "Border Searches .--''That searches made at the border, pursuant to the longstanding right of the sovereign to protect itself by stopping and examining persons and property crossing into this country, are reasonable simply by virtue of the fact that they occur at the border, should, by now, require no extended demonstration.'' 87 Authorized by the First Congress, 88 the customs search in these circumstances requires no warrant, no probable cause, not even the showing of some degree of suspicion that accompanies even investigatory stops."
A google search for "international travel us border checking laptops and phones" give about a million other examples, I'll throw a few below.
from Feb 12, 2008 (this isn't a new phenomenon, just getting more press)
http://www.pcworld.com/article/142429/five_things_to_know_about_us_border_laptop_searches.html
from 21 September 2009
http://www.mondaq.com/unitedstates/article.asp?articleid=86010
Don't like it? neither do I.
http://www.aclunc.org/issues/technology/blog/checking_your_privacy_at_the_border.shtml
ACLU excerpt (it's liberal, and slanted but a valid presentation of the worst case scenario): "Originally announced in July 2008, the current policy permits border agents to search electronic devices “absent individualized suspicion.” Agents may hold on to devices “for a reasonable period of time” to “review and analyze information.” In other words, border agents are legally able to take travelers’ information whenever they want at security checkpoints at airports or along the border, and hold on to it for as they long as they want. Agents may also copy information and send it off-site to be analyzed. The policy applies to all electronic devices, including computers, disks, hard drives, cell phones and cameras. Travelers have to be concerned about more than the possibility of security agents rifling through their belongings. Their private data might be compromised, erased, or kept indefinitely, and they don’t know how that data might be used."
Best I can say is nandroid + ext backup to your home computer, wipe phone before coming back into country, then recovery nandroid once you're back at home.
MaximReapage said:
Best I can say is nandroid + ext backup to your home computer, wipe phone before coming back into country, then recovery nandroid once you're back at home.
Click to expand...
Click to collapse
Yeah, sorta realized that or something similar would be the most efficient. I'm thinking even a step lazier, nandroid backup to SD, restore a stock rom / clear sim card, remove SD, maybe even backup to laptop (truecrypt FDE - custom error message at boot saying master boot record is corrupt)
walk out of security, pop in SD, start nandroid restore...
sigh.. a sandbox app would be sorta fun though.
If they have a right to detain your laptop, clone your HD and you have to submit all your passwords - it's kinda useless to try and protect the data somewhere on the computer, and it's better just to back it up on microSD hidden in the suitcase - no way it'll be detained.
Definitely keep a copy of it on your computer at home, though.
airplanemode anyone?
Or turn of your phone.
I know what will make it a quick transition through airport security when flying international..
Put some heavy encryption on my phone, obfuscate my data, and then pass it off with a flimsy cover program to make it look like there is nothing there. That way if they do find it, it's GITMO TIME.
Jack_R1 said:
If they have a right to detain your laptop, clone your HD and you have to submit all your passwords - it's kinda useless to try and protect the data somewhere on the computer, and it's better just to back it up on microSD hidden in the suitcase - no way it'll be detained.
Click to expand...
Click to collapse
meh, at the lower tier of airport security a custom boot message from a full disk encrypted truecrypt volume. "please insert windows disk" "cannot find master boot record" or similar.. and a sob story about how your laptop stopped working on vacation and when you get home you have a friend that you hope can fix it..
gets by most, it's not NSA at every checkpoint. it's just over min wage, uneducated, folks..
so backing it up to laptop, and tossing micro SD card in the bottom of a bag or in a jacket pocket.. will work just fine.
Has anyone seen in the news the electronic readers the government is using which is capable of illegally stealing all private information from any type of smart phone?
Can anybody create a mod that will block a device like this from being used on the Nexus one?
http://www.prisonplanet.com/cops-us...l-cellphone-data-from-innocent-americans.html
Do you really believe what you read?
Say, 16GB of photos&data on iPhone, 1.5 minutes, count required transfer rate - quite simple - and then tell me, what kind of wireless connectivity does this "device" use to "steal data from unsuspecting people"?
Then ask yourself the first question again.
Now, if you look up the stated device's manufacturer site, http://www.cellebrite.com/forensic-products.html, you'll see that even in their photos it's perfectly clear this device has to be connected by wire to the phone. Does anyone in their right mind willingly connect the phone by USB to some device with unknown functionality? In that case, no, the data can't be protected.
Now, if you go even one more step further, and open the "supported devices" catalog on the site, you'll see that the only thing that can be done wireless to the iPhone is extracting phonebook - and I'm not sure about the requirement to allow the BT connection - but if you look up Nexus One, you'll see that it definitely has to be attached by wire to do anything with it.
And now back to the first question: do you believe everything you read?
Jack_R1 said:
Do you really believe what you read?
Say, 16GB of photos&data on iPhone, 1.5 minutes, count required transfer rate - quite simple - and then tell me, what kind of wireless connectivity does this "device" use to "steal data from unsuspecting people"?
Then ask yourself the first question again.
Now, if you look up the stated device's manufacturer site, http://www.cellebrite.com/forensic-products.html, you'll see that even in their photos it's perfectly clear this device has to be connected by wire to the phone. Does anyone in their right mind willingly connect the phone by USB to some device with unknown functionality? In that case, no, the data can't be protected.
Now, if you go even one more step further, and open the "supported devices" catalog on the site, you'll see that the only thing that can be done wireless to the iPhone is extracting phonebook - and I'm not sure about the requirement to allow the BT connection - but if you look up Nexus One, you'll see that it definitely has to be attached by wire to do anything with it.
And now back to the first question: do you believe everything you read?
Click to expand...
Click to collapse
But, it's on the internet, why would the internet lie? Are you calling the internet a liar?
I believe that if you soak your phone in warm, salty water overnight it will block this device - haven't tried though, so I can't confirm...
Umm... those Cellebrite devices are very real, and Michigan police are/were using them. The have the ability to pull the data off of thousands of different types of phones, over USB. I've never see Android specifically listed on their site, but I'd be willing to bet their devices can pull data from Android too.
That being said, I can't believe people are handing over their phones. This whole thing stinks of illegal search and seizure. But, they're getting away with it by saying the person willingly handed over their phone (even though I'd bet they're being coerced), There would be absolutely no way I'd hand my phone over to any LEO with out seeing a warrant first.
I was just mulling this over in my head... and I think the only way to block something like this would be to disable the data port on the phone. What that would involve from a software stand-point, I have no idea, and may not even be possible with how the hardware/software is designed... but that is basically the only way I'd see it to be possible.
Removing the USB driver (device functions) from the kernel would be enough, I believe.
In order for adb to work, you have to enable usb debugging. Wouldn't that be a requirement with this device, also?
ok just because I pulled this from prison planet doesn't mean its not true, it was the most convenient link at the time and hours later it was on front page of yahoo and all the major news sites. it would be easy for a police man to take your phone from you and hook it up to whatever they want.
Yep, saw it tonight on NBC Nightly News with Brian Williams. Looks scary with some cops not using warrants to get your phone on a traffic stop...
This is my first phone with NFC, and I was assuming I could read RFID tags with it. So far, I haven't had much luck. I used the "NFC TagInfo" app and was able to scan my touch-to-pay bus pass, but it didn't recognize any of my other proximity-based cards. That is, when tapping the cards to the phone, the app didn't even respond.
Next, I went around the house looking for items with RFID stickers (I could have sworn I had them all over, but found surprisingly few). I found a book that had one of those flat stickers with the metallic coil antenna and the phone didn't recognize that either. I also tried it on one of those security stickers that are slightly "bumped" out rectangles . I even tried scanning my cat who has one of those RFID capsules implanted for identification, and no luck there either.
Clearly I misunderstood the concepts of NFC and RFID. What types of devices/tags can the NFC on the Moto X interact with?
(PS: I tried attaching images of examples of the different tags I was talking about, but xda won't let me since I'm new)
droible said:
This is my first phone with NFC, and I was assuming I could read RFID tags with it. So far, I haven't had much luck. I used the "NFC TagInfo" app and was able to scan my touch-to-pay bus pass, but it didn't recognize any of my other proximity-based cards. That is, when tapping the cards to the phone, the app didn't even respond.
Next, I went around the house looking for items with RFID stickers (I could have sworn I had them all over, but found surprisingly few). I found a book that had one of those flat stickers with the metallic coil antenna and the phone didn't recognize that either. I also tried it on one of those security stickers that are slightly "bumped" out rectangles . I even tried scanning my cat who has one of those RFID capsules implanted for identification, and no luck there either.
Clearly I misunderstood the concepts of NFC and RFID. What types of devices/tags can the NFC on the Moto X interact with?
(PS: I tried attaching images of examples of the different tags I was talking about, but xda won't let me since I'm new)
Click to expand...
Click to collapse
NFC is Near-Field Communication. RFID is Radio Frequency Identification. In theory they are similar, but the technology behind them are quite different. RFID requires a power source whereas NFC does not it one major difference. I've looked into this a lot (I wanted to digitize my work badge into my phone) and found these two cannot be combined in any fashion unless one of them incorporates the other. As in, the RFID scanner at your work also has an NFC chip in it basically.
What you can do with NFC is device to device communication linking and sending of data. Also NFC tags can be used to execute tasks. In its nature it is a very very simple type of technology that is essentially IFTT (If This Then That).
MKBHD has a pretty good video about it thats quick. http://www.youtube.com/watch?v=qp5il7yhM4Y
Also, install this app if you have any NFC tags to mess with. https://play.google.com/store/apps/details?id=com.jwsoft.nfcactionlauncher&hl=en
You can get some tags here: http://www.tagstand.com/
I've been playing around with VRidge a lot lately, and it's really cool - being able to play VR games on my computer and stream them to my phone is nice. I'm using the 5ghz wifi streaming method for now and it works great, but... My phone heats up a lot after 10-15 minutes. Through some testing of various non-streaming GearVR games and apps, I can say with some certainty that it's the fact I'm streaming over wifi that's causing my phone to heat up.
So knowing that, I've been trying to get tethering to work. Of course the first thing I did was just try to turn it on in my settings - but Verizon wants another $30/month for the honor, which is just absurd since I'm already paying that for 2 whole gb of bandwidth a month. So with that out the window, I've tried a few other options:
Cyanogenmod Tether
PdaNet+
A method I found here involving Network Signal Refresher
Pulling my sim card (Won't even let me try without a sim card in)
Rooting methods... Obviously can't do any of these because as far as I know, the Verizon Note 5 has yet to be rooted. (Please correct me if I'm wrong)
Needless to say, none of these worked... For RiftCat at least. I've submitted a feature request to utilize a tether app instead of the native tether, but some brief googling makes me think this may not be possible (The developer of a competing project mentioned something along those lines last year).
So, I have a few ideas that I wanted XDA's opinions on:
A "test sim card" - I can pick a few up for a few dollars. Will this allow me to enable usb tethering, or will it check to see if the SIM card is valid / has 5g first?
A usb-to-ethernet cable, plugged into an ethernet card on my computer and hopefully finding a way to make my phone think it's just a wifi connection. Is this even possible? I had the idea an hour ago and haven't had much time to research it.
Drilling holes into my GearVR phone cover, attaching a fan to it, and hoping it can cool my phone's CPU down.
New idea: Get a sim card from a "pay for what you use" service like Ting and turn off mobile data when I use USB tethering... Can this iteration of the Note 5 do that?
...?
On a related note, is there a more active place I can post this to? I picked this forum because it's specific to my device, but I feel like it's an issue a lot of people have.