OS Developers Found Backdoor to AndroidAdded: Sunday, March 23rd, 2014
Category: Bit Torrent Freedom > The Industries Of Records, Gaming, Software, Movies
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
Developers working on the Replicant OS, a free and open-source spin of Google’s Android, have discovered a backdoor into the device’s filesystem.The backdoor is question works on a number of Samsung Galaxy mobile devices with the stock Android image, but the official announcement claimed that it was present in "most proprietary Android systems running on the affected Samsung Galaxy devices, including the ones that were shipped with the devices".
In other words, Samsung Galaxy devices which run proprietary Android versions have a backdoor allowing for remote access to the information stored on the mobile device.It was found in the proprietary software responsible for handling the communications with the modem. The security experts confirmed that via the Samsung IPC protocol, it implemented a class of requests called RFS commands. They allow the modem to perform remote I/O operations on the device’s storage.
Apparently, when the modem is running proprietary software, it offers over-the-air remote control, which could later be used to issue the incriminated RFS messages and obtain access to the file system of the affected device. In other words, anyone aware of the backdoor is able to walk directly into the Nexus S, Galaxy S, Galaxy S2, Galaxy S3, Galaxy Note,Galaxy Note 2, and Galaxy Tab 2. Actually, the Galaxy S appeared to be the most insecure, because the backdoor software is running there as root.
Replicant developers believe that the vulnerable software could possibly be added for legitimate purposes, without the intent of doing harm by providing a backdoor. The most interesting fact is that the problem in security was reported on the Replicant Wiki page weeks ago, but none of the software developers appear to have noticed it.
March 23rd,2014Posted by:
Sunday, March 23rd, 2014
|posted by (2014-03-24 09:30:00)|
|Glad i'm not an owner of a samusung phone.|
|All Devices have back doors, don't ever be foolish enough to think your phone isn't open to access, just because it hasn't been found don't mean it doesn't exist.|
|posted by (2014-03-25 04:55:03)|
|And that's why crypto phones run proprietary encryption software...|
|I hope you dont think it was an accident|
|A very old type hack one used in windows xp till patched and one which can be patched or shored up in Android OS no doubt as @2 stated most systems are built with access points/backdoors.Microsoft are still exploiting theirs which is why they have previously accessed 3 million pc`s in just one instance without the users permission and dropped a payload to supposedly prevent a viral spread of a new virus.(it did not stop the spread of the virus BTW)|
Impossible some might say, but it is on record as an ethical hack and allowed under Microsoft's Terms of Service/end user agreement since no one with a MS operating system owns it they just have licence to use it. (:^D)
|@3 even encrypted phones are not beyond compromise it just takes a little longer in most cases although the Blackphone shows promise at an affordable price as opposed its corporate rivals the moral is nothing is beyond cracking,the Nazi`s thought the enigma code would never be broken either and so as with what number 2 was saying one can never assume they are 100% safe since assumption is the mother of all mistakes.||
Most Popular Stories