![]() Chris on Review: LibrePCB Hits Version 1.0.The Commenter Formerly Known As Ren on Now ChatGPT Can Make Breakfast For Me.The Commenter Formerly Known As Ren on 2023 Halloween Hackfest: Flickering Pumpkin Pin Is Solidly Built.Clemmitt M Sigler on Why Walking Tanks Never Became A Thing.Pretty rare cases these days, but it does still happen. Though there are still some programs I use that are paid for – great as open source stuff is there are a few niches where it is less direct of a replacement, and times you go with the crowd for file compatibility. I am however entirely with you on IoT, Cloud, and subscriptions for software. It is still just too useful when away from a more real computer to go without but it doesn’t really get to feed any data to anybody that wouldn’t be trivial to find in other ways. But de-googled is the preference, and I don’t really use it much, it gets off the desk pretty rarely. Now I still have a smartphone, as a way to stay in touch with folks is in the modern world rather required, and the web based messaging and calls are massive cheaper than SMS etc. Not as modern devices (including computers if you run Windoze) that want to phone home, shove ads at you and spy for good measure! The OS on those things was rather more truly just an OS, and everything works offline perfectly. All great stuff as a supplement to doing real work/learning (and with games if you wanted them too, which is great for those times the train gets delayed). ![]() When I was a kid I had some of the earliest pocket computers with phones in second hand and they were great, both a useful phone, handy calculator, camera that while not great was useful, the office type suit of programs that lets you look at (and edit if you are desperate) your files, web browsing when you need it. Posted in Security Hacks Tagged china, security, surveillance Post navigation In addition to leaking your personal info, the BM2 app seems to be also good at running constantly in the background, which ironically drains your phone’s battery at an alarming rate.Ĭases like these should be both a warning to not just install any app on your smartphone, as well as a wake-up call to Google and others to prevent such blatant privacy violations. The personal information includes the latitude and longitude, as well as GPS, cell phone tower cell IDs and WiFi beacon data, which understandably has people rather upset. In part 2 of this series, the BM2 app is reverse-engineered, decompiling the Java code. ![]() Although the app’s information page claims that no personal information is collected, the data intercepted with Wireshark would beg to differ. It integrates a library called AMap which is “a leading provider of digital map in China” and part of Alibaba. Where things get unpleasant is with the Battery Monitor 2 (BM2) mobile app that accompanies the device. The device in question is a Bluetooth 4.0 Battery Monitor that is resold under many brands, and which by itself would seem to do just what it is said to do, from monitoring a battery to running crank tests. Yet as discovered during an analysis, many of these devices will happily pass your location and other information along to remote servers. After connecting them up to the battery, you download the accompanying app on your smartphone, open it up and like magic you can keep tabs on your precious pile of chemistry that keeps things ticking along. These days Bluetooth-based gadgets are everywhere, including for car and solar batteries.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |