Post Reply Subscribe to Thread Email Thread

What belongs in this forum

7th June 2014, 05:46 PM   |  #1  
jcase's Avatar
OP Forum Moderator / Senior Recognized Developer - Taco Vendor
Flag Sequim WA
Thanks Meter: 9,744
4,296 posts
Join Date:Joined: Feb 2010
Donate to Me
In light of the seriousness of security, I want to keep this forum as clean as possible. I will be working harder in the future to do so.

What belongs:
Discussions of
~ of vulnerabilities & potential vulnerabilities, with detail.
~ of vulnerability research
~ of exploit development
~ of reverse engineering
~ of application security
~ of physical device security
~ of theoretical attacks/vulnerabilities, with detail.
~ any serious security matter
detailed guides on security matters

What does NOT belong:
Copy pasted articles, with no linked source or citation
promotion of apps
promotion of services
simple how to guides (like how to use a VPN on Android)
Questions on how to unlock a device

Absolutely no FUD, nor conspiracy theory posts will be allowed. Please include citations, or strong evidence when making a post that may appear to be FUD or a conspiracy theory type post.

If you have questions as to if a post is appropriate, please either ask in reply to this post, or PM me.
The Following User Says Thank You to jcase For This Useful Post: [ View ]
25th September 2014, 09:01 AM   |  #2  
LiviuTM's Avatar
Junior Member
Flag București
Thanks Meter: 2
18 posts
Join Date:Joined: Aug 2014
Bash bug
Hello, I just read this article on The Verge:

What could be the implications for Android users?

For example, my phone appears to be vulnerable, according to the test from the article.
I'm using a Samsung Galaxy Express GT-I8730 running latest CyanogenMod 11 (September 21) from
20th October 2014, 04:43 PM   |  #3  
Senior Member
Thanks Meter: 135
658 posts
Join Date:Joined: Feb 2006
Hope this one transcends the conspiracy level as I've not done any background research. Just wanted to share as it seems legitimate. Somewhat older but I guess still valid. Shouldn't all developers move to Replicant or at least close the backdoor mentioned in this article?
3rd November 2014, 08:28 PM   |  #4  
Thanks Meter: 14
63 posts
Join Date:Joined: May 2013
Would it be okay to cross-post an "I'm a dumbass, what do I do now" question here from ?

tl;dr- I ran something as root that smells of malware, how do I recover from this? (Good news is that only my system and recovery were unlocked, not the other firmware parts.)
Post Reply Subscribe to Thread
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes