[INFO][Who is Spying & Monitoring you] Google removes privacy feature from Android

Search This thread

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines
[INFO][Who is Spying & Monitoring you] Google removes privacy feature from Android

Index of posts:-

Google removes privacy feature from Android, says inclusion was an accident

US judge says NSA phone data snooping probably illegal

Secret contract tied NSA and security industry pioneer

NSA mass collection of phone data is legal, federal judge rules

Top Secret NSA catalog reveals US government has been secretly back dooring equipment from US companies including Dell, Cisco, Juniper, IBM, Western Digital, Seagate, Maxtor and more, risking enormous damage to US tech sector.

NSA can gain complete access to iPhones, but Apple denies it helped install spyware

Facebook faces lawsuit for allegedly scanning private messages

Officials: Obama Likely to OK Phone Record Changes

NSA able to target offline computers using radio-waves for surveillance, cyber-attacks

NSA 'collected 200m texts per day'

How intelligence is gathered

NSA spying through Angry Birds, Google Maps, leaked documents reportedly reveal

Quantumbot. & Facebook server



Other Referenced Articles
FBI Can Remotely Activate Your Android Phone Mic or Laptop Cameras: Report

WSJ: The FBI can remotely flip on Android phone mics to record conversations

can government really listen in on phones, even while off?

Why Google force all to sync the data/ why Google wants to enter in everybody's life?

FEMA Implements “Special Chip” In Cell Phones to Send Out Alerts


When you search Google,

Selling Secrets of Phone Users to Advertisers

Google Now figured out where I work

My Android Phone is Communicating with the DoD Network Information Center.

Google removes privacy feature from Android, says inclusion was an accident



Reuters, December 16, 2013 source

Google Inc has removed an experimental privacy feature from its Android mobile software that had allowed users to block apps from collecting personal information such as address book data and a user's location.The change means that owners of smartphones using Android 4.4.2, the latest version of the world's most popular operating system for mobile devices released this week, must provide access to their personal data in order to use certain apps.
A company spokesman said the feature had been included by accident in Android 4.3, the version released last summer.
"We are suspicious of this explanation, and do not think that it in any way justifies removing the feature rather than improving it," said Peter Eckersley, technology projects director at the Electronic Frontier Foundation. The digital rights website first publicized the change in a blog post on Friday.
<sniped> read full article from source link above

Privacy has become an increasingly important issue as smartphones, which are loaded with consumers' personal information, become the primary computing device for many consumers. In November Google agreed to pay a $17 million fine to settle allegations that it secretly tracked Web users by placing special digital files on the Web browsers of their smartphones.
© Thomson Reuters 2013
 
Last edited:

klau1

Senior Member
Jan 1, 2008
1,794
392
yes, this was featured on Reddit.

What is Google thinking? Is pulling this stunt amidst the largest NSA scandal really such a great idea?

Either Google isn't thinking, or Google knows we aren't thinking.
 

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines
Either Google isn't thinking, or Google knows we aren't thinking.
For me, its WE, who are not thinking, as I recall when Google was in its infancy, they were able to offer to every individual who took up their free email offer, so much space ( when NO one else would offer it) on their servers and tell us NOT to delete anything. ( they will manage it)

which makes one wonder why? They don't want you to delete and NOTHING gets truly deleted, as every aspect of your life is of some importance to them. So NSA, Google , seem to have the same or share the SAME objective IMHO.

Recently on the pretext of mapping they were collecting data from unencrypted Wi-Fi signals in 30 countries Read this

 

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines
US judge says NSA phone data snooping probably illegal

AFP SOURCE

By Guillaume DECAMME (AFP) – 50 minutes ago
Washington — A US judge struck a first blow against the National Security Agency's bulk collection of phone records Monday, ruling it breaches citizens' privacy to an "almost Orwellian" degree that is probably unconstitutional.
The scathing ruling by a federal judge in Washington was stayed pending appeal, but if upheld it could lead to the spy agency being barred from indiscriminately gathering metadata on millions of private calls.
 

klau1

Senior Member
Jan 1, 2008
1,794
392
They haven't made a ruling yet, it's just "PROBABLY" unconstitutional.
 

klau1

Senior Member
Jan 1, 2008
1,794
392
I'm getting quite tired of this. Apple apparently let's users choose the permission at the moment the program requests for it. So it's not all or nothing like Android.

Pathetic
 

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines
I'm getting quite tired of this. Apple apparently let's users choose the permission at the moment the program requests for it. So it's not all or nothing like Android. Pathetic

There's more to it, than just allowing or disallowing permissions ( are more false flags) , what has been embedded into the system is something that we will not know when it concerns apple or for that matter any smart phone. Read this

 

klau1

Senior Member
Jan 1, 2008
1,794
392
I'm aware that the baseband modem partition is basically an independent OS.

I think this will become less and less of a concern as users upgrade to DATA based texting solutions like BBM, What's App which is independent of the compromised GSM system.

Same with Voice, we are moving towards Data based solutions like Google Voice and the countless other VoIP solutions based on TCP/IP Data Packets, abandoning GSM reliance, we should no longer be compromised by the insecure GSM technology.

---------- Post added at 11:18 PM ---------- Previous post was at 11:10 PM ----------

I'm not really sure I understand this part:

and you can remotely turn on microphones, cameras, place rootkits, place calls/send SMS messages to expensive numbers, and so on. Yes, you can even brick phones permanently.
http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone

Isn't the baseband only incharge of the GSM modem? Why does it need access to Cameras and main storage partitions?
 

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines
I'm not really sure I understand this part:http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone Isn't the baseband only incharge of the GSM modem? Why does it need access to Cameras and main storage partitions?

well basically the way I would conclude is , the modem acts only as the trigger to boot other aspects of the phone (even if its powered OFF), which can be retrieved / activated by and with such a tracking technology . So its just not a GSM loophole but an all inclusive tracking technology.

 

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines
Secret contract tied NSA and security industry pioneer



source


(Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.
sniped


Started by MIT professors in the 1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both named for the last initials of the three founders, who revolutionized cryptography. Little known to the public, RSA's encryption tools have been licensed by most large technology companies, which in turn use them to protect computers used by hundreds of millions of people.
At the core of RSA's products was a technology known as public key cryptography. Instead of using the same key for encoding and then decoding a message, there are two keys related to each other mathematically. The first, publicly available key is used to encode a message for someone, who then uses a second, private key to reveal it.
sniped



The Clinton administration embraced the Clipper Chip, envisioned as a mandatory component in phones and computers to enable officials to overcome encryption with a warrant.
 
Last edited:
  • Like
Reactions: klau1

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines

NSA mass collection of phone data is legal, federal judge rules



Source


A legal battle over the scope of US government surveillance took a turn in favour of the National Security Agency on Friday with a court opinion declaring that bulk collection of telephone data does not violate the constitution.
The judgement, in a case brought before a district court in New York by the American Civil Liberties Union, directly contradicts the result of a similar challenge in a Washington court last week which ruled the NSA's bulk collection program was likely to prove unconstitutional and was "almost Orwellian" in scale.
Friday's ruling makes it more likely that the issue will be settled by the US supreme court, although it may be overtaken by the decision of Barack Obama on whether to accept the recommendations of a White House review panel to ban the NSA from directly collecting such data.


 

klau1

Senior Member
Jan 1, 2008
1,794
392
Top Secret NSA catalog reveals US government has been secretly back dooring equipment from US companies including Dell, Cisco, Juniper, IBM, Western Digital, Seagate, Maxtor and more, risking enormous damage to US tech sector.

http://www.spiegel.de/international...back-doors-for-numerous-devices-a-940994.html

UZ7brvn.jpg
 
  • Like
Reactions: xsenman

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines
NSA can gain complete access to iPhones, but Apple denies it helped install spyware

Source



The National Security Agency can intercept the world’s Internet communications, tap Google’s and Yahoo’s corporate networks, collect revealing data on every phone call in America, and covertly divert new PC shipments to install monitoring software. And now, as newly revealed NSA documents show, we know it can take complete control over virtually anyone’s Apple iPhone.
Apple, for its part, says it knew nothing about the iPhone exploit, and has vowed to protect customers from any “malicious hackers.”
First revealed by security researcher Jacob Appelbaum and Germany’s Der Spiegel magazine, the NSA installs a piece of spyware called DROPOUTJEEP, which enables the agency to intercept SMS text messages; snag voicemail, geolocation data, cell tower location, and contact lists; capture conversations over the iPhone’s microphone; and snap pictures via the camera.


sniped


“Either [the NSA] have a huge collection of exploits that work against Apple products, meaning they are hoarding information about critical systems that American companies produce, and sabotaging them, or Apple sabotaged it themselves,” said Appelbaum (via the Daily Dot).
 

xsenman

Senior Member
Apr 9, 2012
3,914
2,369
Philippines
so, only hope is to keep the phone off?

sorry to inform you, that technolgy has already been developed that it can be powered on by the internal battery and topped up by a wireless source, by those whose intention is to spy on targeted individuals when necessary. So even if external battery is removed its internal clock battery is active to do the job.

and as for iphone , you cannot even remove the battery as already mentioned by klau1

 

Top Liked Posts

  • There are no posts matching your filters.
  • 1
    Secret contract tied NSA and security industry pioneer



    source


    (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.
    sniped


    Started by MIT professors in the 1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both named for the last initials of the three founders, who revolutionized cryptography. Little known to the public, RSA's encryption tools have been licensed by most large technology companies, which in turn use them to protect computers used by hundreds of millions of people.
    At the core of RSA's products was a technology known as public key cryptography. Instead of using the same key for encoding and then decoding a message, there are two keys related to each other mathematically. The first, publicly available key is used to encode a message for someone, who then uses a second, private key to reveal it.
    sniped



    The Clinton administration embraced the Clipper Chip, envisioned as a mandatory component in phones and computers to enable officials to overcome encryption with a warrant.
    1
    Top Secret NSA catalog reveals US government has been secretly back dooring equipment from US companies including Dell, Cisco, Juniper, IBM, Western Digital, Seagate, Maxtor and more, risking enormous damage to US tech sector.

    http://www.spiegel.de/international...back-doors-for-numerous-devices-a-940994.html

    UZ7brvn.jpg
    1
    NSA 'collected 200m texts per day'



    Source


    The programme, Dishfire, analyses SMS messages to extract information including contacts from missed call alerts, location from roaming and travel alerts, financial information from bank alerts and payments and names from electronic business cards, according to the report.
    Through the vast database, which was in use at least as late as 2012, the NSA gained information on those who were not specifically targeted or under suspicion, the report says.


    How intelligence is gathered

    Source
    1

    Good to know , you have been using it, I am sure you are one of the "protected" by this intelligent creation of yours. Thank you:laugh: