As some of you might have heard, there is a security issue on some Android phones (including the SII) that enables someone to create a link which will wipe the data of your device when you click on that link from an Android device like the SII.
I have discovered a very cool App that prevents that from happening. All this App does is to recognize everytime you click on a link which wants to execute some code on your device through the dialer.
It then automatically tells you if it`s a dangerous code and if it`s harmful for your device. If it`s a normal phone number then you can dial it straight from the App.
Simple but very effective App that closes the security issue until Google/Samsung etc. decide to do something about it.
Here`s the link for the App:
https://play.google.com/store/apps/details?id=com.voss.notelurl
I haven`t developed this App so all credit goes to the Developer: Joerg Voss
Thank you so much for this info. Even though I'm using Firefox as my basic android browser. I have to use android's native one from time to time. Now can do that we less worries :good:
Related
My hero seems to be a bit slower than usual. I stared up astro file manager and used their process tool to show that com.smithmicro.DM is running at around 70%. Why would this process be using so much CPU and is there any way to alleviate the cpu processing being done?
what does com.smithmicro.DM do anyways? I mean, if it's nothing too important, you could always remove it.
i dont know, but i thought i read this was to be on the ignore list as it manages the data between your phone and your SD card.
I pulled the battery on my phone, and so far it looks a bit better.
it's causing my update PRL/Profile to crash and cause weird bugs (i.e. PRL showing 26762 or something random until a profile update/crash).
damage r3
mrinehart93 said:
what does com.smithmicro.DM do anyways? I mean, if it's nothing too important, you could always remove it.
Click to expand...
Click to collapse
Here is some info you may want to read.
The DM Suite makes it easy for you to:
Activate, configure, and provision new devices for consumers and enterprises
Manage mobile applications
Secure devices and sensitive data
Personalize the customer experience
Diagnose problems
Update firmware
Offer a customer self-care web portal
Control device capabilities
Manage GSM and WiMAX devices
Automate custom device activation workflows
Extend Mobile Device Management (MDM) with web services
animal7296 said:
Here is some info you may want to read.
The DM Suite makes it easy for you to:
Activate, configure, and provision new devices for consumers and enterprises
Manage mobile applications
Secure devices and sensitive data
Personalize the customer experience
Diagnose problems
Update firmware
Offer a customer self-care web portal
Control device capabilities
Manage GSM and WiMAX devices
Automate custom device activation workflows
Extend Mobile Device Management (MDM) with web services
Click to expand...
Click to collapse
hope i dont get slammed, bump!
this description was the best ive seen!
what is the name of the actual .apk file? did anybody try removing this apk? did it have any adverse effects?
thanks!
From the sound of this info, it seems that the app probably isn't totally necessary. App name coming soon. Do a nandroid, remove the apk, and reboot. If nothing is wrong, then we know we can remove it safely. Do some testing, like download a file from the internet to your SD card. That would be the only thing that concerns me about this app. App name coming soon, again.
what does com.smithmicro.DM do anyways? I mean, if it's nothing too important, you could always remove it.
Click to expand...
Click to collapse
Here is some info you may want to read.
The DM Suite makes it easy for you to:
Activate, configure, and provision new devices for consumers and enterprises
Manage mobile applications
Secure devices and sensitive data
Personalize the customer experience
Diagnose problems
Update firmware
Offer a customer self-care web portal
Control device capabilities
Manage GSM and WiMAX devices
Automate custom device activation workflows
Extend Mobile Device Management (MDM) with web services
Click to expand...
Click to collapse
-------------------------------------
Sent via the XDA Tapatalk App
Try dmservice.apk
I wouldn't remove the dmportread.apk
-------------------------------------
Sent via the XDA Tapatalk App
I guess no one experimented with this?
Shouldn't there be a process website that describes what these processes do?
If you kill the process "com.smithmicro.DM" you will no longer receive over the air firmwear updates. The "DM" stands for device management, and I know for a fact that HTC uses smith micro for their FOTA updating.
This free security app already picked up an app trying to access my contacts! I just installed it, didnt have too but rebooted my phone and it picked an app up trying to access my contacts!
Description
This application requires a ROOTed phone, please make sure your phone has been unlocked and ROOTed.
Welcome to use LBE Privacy Guard, the most powerful privacy protection software for Android platform.
With the state-of-the-art API interception technology, LBE Privacy Guard provides great enhancement to Android permission system, now the first time you are able to:
- Protect your privacy by controlling the permission of each application to access your sensitive data.
- Block malicious operation from Mal-wares and Trojans.
- Block unwanted network traffic if you don’t have a unlimited data plan.
- Find out which application is trying to steal your privacy by checking the security log.
- And even more...
LBE Privacy Guard - free
https://market.android.com/details?id=com.lbe.security&feature=search_result
Enjoy
Out of curiosity what was the app that was looking at your contacts?
rstuckmaier said:
Out of curiosity what was the app that was looking at your contacts?
Click to expand...
Click to collapse
+1.
It would be very useful to know.
phone.apk ?
I've already used LBE privacy on my A501 and SGS2, but on A501, it crash randomly.
This app is very useful but have battery consumption on my SGS2.
I've unistalled on all devices .... for the moment
Access to contacts does not mean the app is trying to "steal" your privacy data. You're not mentioning the app's name anyway but it would be nice to do so - there might be an explanation. Let me give you an example of completely harmless app behavior that requires access to your contacts.
Keyboard - some keyboards might offer a contact as a word suggestion when typing an email.
Nanny - a babyphone app, designed to call a predefined number in case your baby starts crying. The app offers to pick a contact instead of entering it manually - that's why it requires an access to your contacts.
Photo app - contact access is required if the program offers an option to share a photo with your friends
I can think of more but need to get back to work
but how do we know
How do we know this app is not stealing the information we install it to do.buyer beware.they give for free.with nothing in return.
Conspiracy. Giggles.
Its probably OK but well do we ever really know.
Im personally a fan of the webroot free app.
I used the beta the moment it came out and have ran it on my desire ever since and now run it on my iconia.
it doesnt touch the battery or give me slow downs, thats why i like it... because it doesnt bug me or drain the phone of power or speed. (the only noticeable thing it does is scan on sd card file operations like copy/delete)
http://www.ubergizmo.com/2012/09/new-naval-app-secretly-recreates-environments-from-your-phone/
The Naval Warfare Surface Center in Crane, Indiana today revealed a smartphone app that puts the capability of modern smartphones to observe areas in sharp relief and shows the power of malware to tap into those capabilities. The app, PlaceRaider, is capable of running in the background of any smartphone running Android 2.3. While running in the background, it takes photos at random while recording the orientation and location of the phone. Those photos get sent back to a central server, where they can be used to reconstruct a pretty good idea of where the phone has physically been.
Click to expand...
Click to collapse
What do you guys think?
I'm gonna do it to my every single one of my friends and creep on them.
At least with Android it will eventually be found and will be a fix or a way to prevent it, who knows what Apple is doing with iOS and even if the problem is founded, one would have to wait for Apple to patch a bug, but only if they choose to.
http://news.cnet.com/8301-13579_3-20014356-37.html
In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identities of authorized users of the electronic device. For example, a photograph of the current user can be taken, a recording of the current user's voice can be recorded, the heartbeat of the current user can be recorded, or any combination of the above. The photograph, recording, or heartbeat can be compared, respectively, to a photograph, recording, or heartbeat of authorized users of the electronic device to determine whether they match. If they do not match, the current user can be detected as an unauthorized user.
Click to expand...
Click to collapse
The linux kernel have the iptables as firewall, if you are rooted, you can use DroidWall to manage it, not even that spying app can get any internet. Personally, I always manage which app gets internet access on my device.
eksasol said:
At least with Android it will eventually be found and will be a fix or a way to prevent it, who knows what Apple is doing with iOS and even if the problem is founded, one would have to wait for Apple to patch a bug, but only if they choose to.
http://news.cnet.com/8301-13579_3-20014356-37.html
The linux kernel have the iptables as firewall, if you are rooted, you can use DroidWall to manage it, not even that spying app can get any internet. Personally, I always manage which app gets internet access on my device.
Click to expand...
Click to collapse
Very nice tip! I downloaded DroidWall and it does exactly as you say!
Thanx!
However, with DroidWall you need to enable all the system apps and services, otherwise you'll start finding things like PlayStore not working.
If using DroidWall gets confusing LBE Security Manager also have internet firewall, but it doesn't utilize the same method, DroidWall works at the kernel level and will override LBE. Although LBE is also a very essential app. It can monitor how much data each app uses as well and set the permission for each app. Although if you flash roms all the time it gets tiresome to configure after each flash, also you have to know which permission to enable for some apps to not interfere with its normal functions.
Dear hacker guy,
Good luck reconstructing the images and dimensions of my butt pocket.
-signed dgaf user
Sent from my SGH-T959
suchavibrantthang said:
Dear hacker guy,
Good luck reconstructing the images and dimensions of my butt pocket.
-signed dgaf user
Sent from my SGH-T959
Click to expand...
Click to collapse
?????
I hope that this is not the wrong place for my post.
I am trying to protect an apk from being copied/extracted/backed up off the phone and installed later, on another phone.
I have to mention that the app is not (and will not be) for sale on PlayStore or on any web store, being sold along with the phone. This is why I can not use apk protection offered by GooglePlay, which is anyway cracked at his time.
But I want to take advantages on this situation: every single phone will pass trough my hands (I will install myself the app) before hitting users. How can I use this advantage in order to protect my app?
At this time my app is not visible in Running Apps drawer, is having a default Android icon and the name is disguised in something pretty innocent. GUI access by dialing a code. No worries, is not malware but only a security app regarding GSM connection security.
Also, is running as a system app, which make it invisible for apps like Astro file manager, thus impossible to copy/back up by such file manager apps. Unfortunately there are a bunch of system app managers, that can convert a system app on user app, and then copying the apk file is easy.
I know that security sucks big time when it comes about Android OS, but I am determined to find a way to protect my app.
I know also that even a licensing scheme based on IMEI, WiFi MAC or Bluetooth MAC addresses can be bypassed by some skilled crackers. This values can be spoofed or even null.
I have tried apk encryption. Doesn't work: some apps supposed to encrypt other Android apps are actually encrypting only app libraries, not the apk file itself. By encrypting apk file, the app obviously will not work.
Code obfuscation is not an option as long the app can be duplicated off the phone and installed later on another phone.
The last idea that I had: pulling some app resources (like drawables) from a server. What do you think?
At this time I'm in a dead end. I have no more ideas how to protect my app. That's why I need your help. Can you give me please some feasible ideas, based on your huge experience?
Thank you very much for your time.
theres a thread
http://forum.xda-developers.com/showthread.php?t=2279813
where we're discussing about methods to protect apps from piracy u can post it there
Sent from my GT-S5302 using Tapatalk 2
Thanks
Thx a lot sak-venom1997.
We're building an app that will be installed on smartphones and displayed on a desk. The user need to be able to close the app and use the device, but when he does not use the device the app should move to the front automatically after X minutes.
Here is the catch: we need to support new devices for the coming 3 years and the user should not be able to close/kill the process.
Android: We found that we could use the permission BIND_DEVICE_ADMIN to make the process unkillable. However it will be deprecated soon and we have no idea how long it will remain functional.
iOS: We found no solution
Does anybody have a workaround/solution or does somebody know how much longer they will support the BIND_DEVICE_ADMIN permission?
I know it seems like something fishy, but it's actually intended for distribution internally via our company MDM and it makes sense in the context we are using it for.