Installed on my Galaxy s2 with no problems, have you changed the s2's DPI? If you have, that's your problem.
I did change it, and now I put it back to 240, rebooted and I'm still not compatible it says. You sure thats my issue?
Installed on my Galaxy s2 with no problems, have you changed the s2's DPI? If you have, that's your problem.
That usually is the problem when people have changed the default DPI and try to get stuff off the market, but get the error message.I did change it, and now I put it back to 240, rebooted and I'm still not compatible it says. You sure thats my issue?
Why would you make this application? It's unethical. I can't believe XDA put this on their main blog, either. This is the same ARP flooding technique used by man-in-the-middle attackers for the last 10-20+ years. I don't think it's a good idea to encourage this. All someone has to do is just do the exact same application but turn on iptables to forward instead of drop and now you have stolen everyone's unencrypted traffic/facebook logins/email/google accounts/etc on the network. To any IT professional this will look like a MIIM attack and is very illegal in more than one way: not only are you actively disabling people's devices you are wiretapping.
Of course, on a big network since everyone thinks you're the router, every device starts hammering your wifi. So you might have Internet bandwidth to yourself but certainly not wifi as they are hammering on you, which also uses battery and CPU to handle the oncoming packet floods.
That usually is the problem when people have changed the default DPI and try to get stuff off the market, but get the error message.
Why would you make this application? It's unethical. I can't believe XDA put this on their main blog, either. This is the same ARP flooding technique used by man-in-the-middle attackers for the last 10-20+ years. I don't think it's a good idea to encourage this. All someone has to do is just do the exact same application but turn on iptables to forward instead of drop and now you have stolen everyone's unencrypted traffic/facebook logins/email/google accounts/etc on the network. To any IT professional this will look like a MIIM attack and is very illegal in more than one way: not only are you actively disabling people's devices you are wiretapping.
well, it's truly a great app, but now im really happy that i rarely use wlan networks..
i mean, WTF, it's so easy to steal logins, even if its a secure connection.. >.<
i downloaded droidsheep too. those apps are deadly man :3 but it seems droidsheep has been taken off the market now too... >.<!
While I'd love to download and play with this app, I am not comfortable with the "Phone calls - Read phone state and identity". Why does your app need these capabilities if it's only working with the WiFi connection?
I'd even go so far as to download the paid (donate) version if you can remove that permission.
Thanks!
- Mike
In theory any ARP-spoofing-based technique can be detected. Unless the application developer took pains to mask your device's real MAC address, it CAN be traced back to your device's real MAC address. This would not automatically be traceable back to "you", only to your device's MAC address. If, for example, you went to Main Town, USA on vacation and went hog-wild with this app, no one would ever see your device again, so.....!!
If, however, you ARP-spoof your school, there is a very real chance that someone with enough technical smarts could track down your actual device when you came back onto that same network later.
Market says WifiKill isn't compatible with my device. I have a Samsung Galaxy S running Gingerbread w/ DPI set at 190/240 and it still won't let me install. Any help would be great. Thanks!
Sounds interesting. I'm curious, from a technical side what method does it use to accomplish this, and how long does it keep them off for?
Sent from my SPH-D710 using XDA App