Categories
Android Apple control disobey experts faraday bags global command google Headline News Intelwars iPhone mass civil disobedience mass surveillance New World Order SLAVERY traced tracked tyranny USSA vaccinated

Tyranny In The USSA: Google & Apple Phones Include FULL CONTRACT TRACING

Google and Apple phones are now being modified by the companies complicit in fascism to include full contact tracing. Everything you do will be tracked, traced, and monitored to such an extent that privacy is no longer a word we should use because it does not exist in this New World Order of slavery and control.

We knew the ruling class as going to push the New World Order as fast and as hard as they could. And unless more people realize what’s going on, and quick, humanity will be in a pretty dire situation, one that will be almost impossible to fight our way out of.

Apple and Google power almost every smartphone on earth and now they have jointly agreed to build a full contact tracing app into their core operating systems. This means that an Android phone can ‘rat’ on an iPhone, and vice versa. The door is now wide open for a ubiquitous global command and control system for every person on earth. Activist Post

According to the Washinton Post:

First launched in May, coronavirus tracking software got off to a rocky start. Some public health agencies in the United States and around the world had wanted to build mobile apps that would help them track the spread of the virus, a process known as “contact tracing.” But the contact-tracing apps that initially launched did not function properly because of limitations the two tech giants place on mobile apps distributed through their stores. Citing privacy concerns and potential battery drain, Apple and Google declined to give public health agencies special access for the purpose of contact tracing.

There’s no voting our way out of it this time. Mass civil disobedience and non-compliance is the only way we will ever be free. It has gotten to the point that it literally doesn’t matter who is elected (we don’t have a choice anyway, it’s all an illusion).  They will force this New World Order on us until we stand together and say “No!” No human has any power or control over any other human. Anything less than total freedom is slavery and it’s time we figure this out.

For those of you who will not comply, your choices are few and sub-optimal. You should immediately investigate Faraday bags that block all incoming and outgoing signals from your phone. ? Technocracy News & Trends Editor Patrick Wood

Tyranny is officially here.

The post Tyranny In The USSA: Google & Apple Phones Include FULL CONTRACT TRACING first appeared on SHTF Plan – When It Hits The Fan, Don't Say We Didn't Warn You.

Share
Categories
Android Credentials Facebook google Intelwars Malware

Android Apps Stealing Facebook Credentials

Google has removed 25 Android apps from its store because they steal Facebook credentials:

Before being taken down, the 25 apps were collectively downloaded more than 2.34 million times.

The malicious apps were developed by the same threat group and despite offering different features, under the hood, all the apps worked the same.

According to a report from French cyber-security firm Evina shared with ZDNet today, the apps posed as step counters, image editors, video editors, wallpaper apps, flashlight applications, file managers, and mobile games.

The apps offered a legitimate functionality, but they also contained malicious code. Evina researchers say the apps contained code that detected what app a user recently opened and had in the phone’s foreground.

Share
Categories
Android Intelwars Phones Protocols

Wallpaper that Crashes Android Phones

This is interesting:

The image, a seemingly innocuous sunset (or dawn) sky above placid waters, may be viewed without harm. But if loaded as wallpaper, the phone will crash.

The fault does not appear to have been maliciously created. Rather, according to developers following Ice Universe’s Twitter thread, the problem lies in the way color space is handled by the Android OS.

The image was created using the RGB color space to display image hues, while Android 10 uses the sRGB color space protocol, according to 9to5Google contributor Dylan Roussel. When the Android phone cannot properly convert the Adobe RGB image, it crashes.

Share
Categories
academicpapers Android Apple google hacking Intelwars iPhone sidechannelattacks Smartphones Video

Hacking Voice Assistants with Ultrasonic Waves

I previously wrote about hacking voice assistants with lasers. Turns you can do much the same thing with ultrasonic waves:

Voice assistants — the demo targeted Siri, Google Assistant, and Bixby — are designed to respond when they detect the owner’s voice after noticing a trigger phrase such as ‘Ok, Google’.

Ultimately, commands are just sound waves, which other researchers have already shown can be emulated using ultrasonic waves which humans can’t hear, providing an attacker has a line of sight on the device and the distance is short.

What SurfingAttack adds to this is the ability to send the ultrasonic commands through a solid glass or wood table on which the smartphone was sitting using a circular piezoelectric disc connected to its underside.

Although the distance was only 43cm (17 inches), hiding the disc under a surface represents a more plausible, easier-to-conceal attack method than previous techniques.

Research paper. Demonstration video.

Share
Categories
academicpapers Android Blockchain Intelwars Voting vulnerabilities

Voatz Internet Voting App Is Insecure

This paper describes the flaws in the Voatz Internet voting app: “The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections.”

Abstract: In the 2018 midterm elections, West Virginia became the first state in the U.S. to allow select voters to cast their ballot on a mobile phone via a proprietary app called “Voatz.” Although there is no public formal description of Voatz’s security model, the company claims that election security and integrity are maintained through the use of a permissioned blockchain, biometrics, a mixnet, and hardware-backed key storage modules on the user’s device. In this work, we present the first public security analysis of Voatz, based on a reverse engineering of their Android application and the minimal available documentation of the system. We performed a clean-room reimplementation of Voatz’s server and present an analysis of the election process as visible from the app itself.

We find that Voatz has vulnerabilities that allow different kinds of adversaries to alter, stop, or expose a user’s vote,including a sidechannel attack in which a completely passive network adversary can potentially recover a user’s secret ballot. We additionally find that Voatz has a number of privacy issues stemming from their use of third party services for crucial app functionality. Our findings serve as a concrete illustration of the common wisdom against Internet voting,and of the importance of transparency to the legitimacy of elections.

News articles.

The company’s response is a perfect illustration of why non-computer non-security companies have no idea what they’re doing, and should not be trusted with any form of security.

Share