FORUMS
Post Reply Subscribe to Thread Email Thread

What belongs in this forum

7th June 2014, 05:46 PM |#1  
jcase's Avatar
OP Forum Moderator / Senior Recognized Developer - Taco Vendor
Flag Sequim WA
Thanks Meter: 10,376
 
Donate to Me
More
In light of the seriousness of security, I want to keep this forum as clean as possible. I will be working harder in the future to do so.

What belongs:
Discussions of
~ of vulnerabilities & potential vulnerabilities, with detail.
~ of vulnerability research
~ of exploit development
~ of reverse engineering
~ of application security
~ of physical device security
~ of theoretical attacks/vulnerabilities, with detail.
~ any serious security matter
detailed guides on security matters
etc

What does NOT belong:
Copy pasted articles, with no linked source or citation
promotion of apps
promotion of services
simple how to guides (like how to use a VPN on Android)
Questions on how to unlock a device
etc

Absolutely no FUD, nor conspiracy theory posts will be allowed. Please include citations, or strong evidence when making a post that may appear to be FUD or a conspiracy theory type post.

If you have questions as to if a post is appropriate, please either ask in reply to this post, or PM me.
The Following User Says Thank You to jcase For This Useful Post: [ View ]
 
 
25th September 2014, 09:01 AM |#2  
LiviuTM's Avatar
Junior Member
Flag București
Thanks Meter: 8
 
More
Bash bug
Hello, I just read this article on The Verge: http://www.theverge.com/2014/9/24/68...g-security-for

What could be the implications for Android users?

For example, my phone appears to be vulnerable, according to the test from the article.
I'm using a Samsung Galaxy Express GT-I8730 running latest CyanogenMod 11 (September 21) from http://forum.xda-developers.com/show...2#post53616202
20th October 2014, 04:43 PM |#3  
Senior Member
Thanks Meter: 139
 
More
Hope this one transcends the conspiracy level as I've not done any background research. Just wanted to share as it seems legitimate. Somewhat older but I guess still valid. Shouldn't all developers move to Replicant or at least close the backdoor mentioned in this article?

https://www.fsf.org/blogs/community/...alaxy-backdoor
3rd November 2014, 08:28 PM |#4  
Member
Thanks Meter: 14
 
More
Would it be okay to cross-post an "I'm a dumbass, what do I do now" question here from http://forum.xda-developers.com/htc-...ivs-s-t2927813 ?

tl;dr- I ran something as root that smells of malware, how do I recover from this? (Good news is that only my system and recovery were unlocked, not the other firmware parts.)
Post Reply Subscribe to Thread
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes


Top Threads in Security Discussion by ThreadRank