Hi All,
To anyone out there who may require this information I wrote 2 decent length posts in the Chromecast Reddit around region locked country access and setting up source based routing on DDWRT for VPN of the chromecast device.
***mod edit
I'm unsure if linking to something I've written in a different medium violates any rules so if it does I'm sorry and I'll remove anything as needed.
if anyone has any questions about anything I wrote please feel free to ask - I spent a long time going through different services and networking configurations to set up a number of chromecast devices.
(P.S. as some of you are smarter than myself in areas if you believe I'm mistaken in any knowledge or should add anything please let me know!)
Why not post that information here instead of driving people to reddit?
You may find existing threads for it.
Related
Hello everyone,
This is my first post, but I have been lurking in the shadows. Thank you for everything you guys have done for the Android community.
I am running CM 4.2.1, and after loading some silly SPL from some guide, messed things up, wiped and reflashed. Having done that I installed only a few programs. SAM (SlideMe Application Manager) gives me the following warning.
"WeatherFirst App warning!"
If you have installed WeatherFirst application, there has been a security warning issued. Recommended to remove
The notification remains there all the time. From the limited info available I have concluded it is a botnet, or some variation used for this website: "wunderground.com," which is where I get my weather on my PC and accessed once on Android. The information I found, and the first result on Google is the following:
hxxp://mobilecomputingauthority.com/?p=111 (sorry I cannot post links, so you'll have to copy/paste and change the x's)
I would like to know how to remove it.
Any help is appreciated.
Funkz
WeatherFirst clarification
Hi Funkz. As the author of your referenced blog post at MobileComputingAuthority,I thought I might chime in and help to clarify the post, this app, and ease your fears a bit; at least as far as I understand it.
In the post I said that the WeatherFirst app was a proof-of-concept application demonstrating how users might be tricked into downloading and installing an application that might be malicious. The app uses the GPS receiver to get your current location, then transmits that information to a server. The server then converts the coordinates into a zip code and submits the weather request to wunderground on your behalf. This interaction is itself harmless, but demonstrates that there is an opportunity to do something malicious on the server or to transmit data (GPS coordinates in this example) without your knowledge or consent. I'm unclear about whether the use of the GPS was disclosed or not.
So the gist of this is that the WeatherFirst application is not a malicious application (ie botnet client). The researchers that made it, DID make a malicious version, but that version was never released to the public according to their statements and I don't have any reason to question that.
Hope that helps clarify things and thanks for reading MCA!
Bill
TheManii said:
Like topic title, streakdroid.com is having issues with it's DNS entries.
Anyone that hasnt recently connected to streakdroid wont be able to connect, if you have recently then it will work.
The server itself is fine, it's merely being able to reach it that's the issue.
One workaround is to add this to your hosts file for the time being:
Code:
174.122.149.190 mirror2.streakdroid.com
174.122.149.190 streakdroid.com
I will also be remirroring everything on dev host, but I will be doing it slowly.
Currently there are only a couple things mirrored, but I will slowly add them as requested.
The folder structure will be mostly identical.
DevHost Public URL.
Feel free to list a specific file you need and I'll upload it immediately/sooner.
I would prefer that files not be mirrored elsewhere, and ask that they be taken down and repointed to either my devhost account or streakdroid.com
But I will not ask anyone specifically or force them to remove it, it is merely a request.
Click to expand...
Click to collapse
Repost from S5 general subforum, I will not be monitoring this thread, any comments should be left on the original thread.
To jump to the original thread, press the ">" in the header of the quote box.
Greetings everyone, I had no luck in getting an answer to my doubts on Stack Exchange, so I thought I'd ask here, considered the amount of Android expertise that is on this forum .
Recently I've worked with Wi-Fi Peer-to-Peer on Android. I wondered how many apps used this technology, and was surprised when I couldn't find many. Since the technology is not brand new, I expected to find many apps leveraging it for the most various purposes on Google Play, with queries like "wifi direct", "wifi p2p", etc.
Not only I couldn't find many, I also noticed many are unmaintained/broken, and a lot of apps are just PoCs for Wi-Fi Peer-to-Peer use, or all related to the same use case (P2P file sharing). The set of working and "popular" apps with Wi-Fi Peer-to-Peer that I could find is in the order of a dozen.
Questions: do you agree with my considerations on the limited diffusion of the technology, or am I mistaken? If you know/worked with a lot of apps that employ Wi-Fi Peer-to-Peer, could you share some hints on how to find them? If on the other hand I'm right, could you please provide some explanation for this phenomenon? I couldn't find any explanation, the technology seems useful.
Thanks in advance.
Best regards.
Hello everyone!
So today something that could potentially let users flash/unbrick their phones using the current MSM Download tool came to my mind.
I'm also very sorry if this is the wrong place for this, i'm new to xda.
So as you might know for Realme phones there are people who have authorized account out there and once you pay them they will connect to yoprur computer and then start flashing ocess, online with no verification. I even tried getting my phone flashed but due to them not flashing twice if one package doesn't work my device was bricked (I have A.xx variant and i tried getting B.xx flashed) and i had to send to service center to wait for unbricking process which took over a month, yes you heard it right! They couldn't even repair it with software flashing so they had to replace the whole motherboard.... At least i'm grateful i didn't have to pay for motherboard replacement and it was considered in-warranty.
So yes, again let's go back to our topic and my idea.
What came to my mind is, what happens if i create a virtual machine using VMWare, get an authorized account to login to the application then cut connection of that TeamViewer connection and immediately "Save current state of VM" after someone logs in. Would that account be still logged in? This VM can also be shared with it's own folder as far as I know too! Is there a verification after you login to the app? As far as i know there's only a verification while you login to the app and there isn't anything afterwards which i think is also illogical to do so.
I know and i'm aware Realme can patch this possible "vulnerability" overnight because on the server side, literally everything depends on them (I really hope they don't) but thanks to their habit of not caring about development, releasing broken kernel sources and not even providing official bootloader unlock (even after nearly a year in my case) has come to a point where it's irresistably annoying for me so i decided to think of possible ways to maybe bypass the verification part of the application so that they can flash a firmware as their liking.
It's Android! It had to be free! It had to be allowed to do these type of stuffs to your Android phone! Why? Why? Why Realme?!
Edit: This is the exact same post of my post on Android General. After posting i saw there were nearly no replies and activity so i decided to post the same text as well.
daeMysterious said:
Edit: This is the exact same post of my post on Android General. After posting i saw there were nearly no replies and activity so i decided to post the same text as well.
Click to expand...
Click to collapse
THREAD CLOSED as duplicate of https://forum.xda-developers.com/t/...-of-msm-download-tool-of-realme-oppo.4209135/
XDA Forum Rules (excerpt):
...
5. Create a thread topic or post a message only once, this includes external links & streaming media.
As a large forum, we don't need unnecessary clutter. You're free to edit your message as you like, so if you do not receive an answer, revisit your message and see if you can describe your problem better. Not everyone is online at the same time so it might take a while before you receive an answer.
You can bump your unanswered question once every 24 hours
Duplicate threads and posts will be removed
Always post in an existing thread if a topic already exists, before creating a new thread.
Use our search function to find the best forum for your device.
Links to an external source are only allowed if relevant to the topic in hand. A description must be included, no copy & pasting from the original source.
Self-promotion is forbidden, this includes blogs, social media and video channels etc. Random links will be removed.
...
Click to expand...
Click to collapse
All,
I need help immediately..I'm not a developer or tech savvy type beyond corp correspondence and general reporting for project management. I've been hacked in the worst way by criminals I caught doing some very nasty things in my name and on my property. They used Bluetooth and Wifi/Wifi Direct to pair with everything but the toaster in my house. They are using OMADM protocol to send APKs and other apps directly into my devices with what appears to be permanent USB tethering embedded that I cannot breaK and every new device get the same data dump from some cloud or text or email and renders my devices slaves. They've used everything from remote desktop services to ALL legitimate apps DL from playstore Github and other places. These are not detected by malware spyware or antivirus. They install them in the system side via OTA root. It's taken me 9 months to learn this reading bits and pieces like reading 10 books at a time two pages from each book every tem minutes then trying to understand it and apply. Law enforcement is useless. Can YOU help me??! It's cost me my house my patience and nearly my life. If you can and are willing let me know how to contact you on secure platform. I even need your help to do this securely and safely. I'll PAY. I need help. Please. These are Linux and Java code writers and app writers. They KNOW how to attack. Who out there will help? I can provide phone number, email add etc and will contact you in anyway you prefer.
Victimized23322 said:
All,
I need help immediately..I'm not a developer or tech savvy type beyond corp correspondence and general reporting for project management. I've been hacked in the worst way by criminals I caught doing some very nasty things in my name and on my property. They used Bluetooth and Wifi/Wifi Direct to pair with everything but the toaster in my house. They are using OMADM protocol to send APKs and other apps directly into my devices with what appears to be permanent USB tethering embedded that I cannot breaK and every new device get the same data dump from some cloud or text or email and renders my devices slaves. They've used everything from remote desktop services to ALL legitimate apps DL from playstore Github and other places. These are not detected by malware spyware or antivirus. They install them in the system side via OTA root. It's taken me 9 months to learn this reading bits and pieces like reading 10 books at a time two pages from each book every tem minutes then trying to understand it and apply. Law enforcement is useless. Can YOU help me??! It's cost me my house my patience and nearly my life. If you can and are willing let me know how to contact you on secure platform. I even need your help to do this securely and safely. I'll PAY. I need help. Please. These are Linux and Java code writers and app writers. They KNOW how to attack. Who out there will help? I can provide phone number, email add etc and will contact you in anyway you prefer.
Click to expand...
Click to collapse
Hi Victimized23322
XDA is not the right platform for such request and I'm compelled to warn our members that your request may be malicious in itself. Playing the victim is a very common practice used by phishers and con artists.
Therefore I recommend all members not to engage with @Victimized23322 about his/her problem. Any damages and/or losses resulting from engaging are entirely your own responsibility.
Thank you for understanding my concern, we have to take this into account. If what you explained is true, you need a specialized security firm that deals with these type of attacks.