Text
exe to apk converter
Edward “whistelblower” Snowden, currently in exile in Russia has just released a privacy protection app that turns your aging exe to apk smartphone to produce spy tool. The app is called Haven: Keep Watch and is still in beta. The purpose behind the app will be give you a “way to protect your personal space and possessions” without compromising on solitude. The app essentially leverages all the sensors in your device (camera, accelerometer, microphone, etc.) to explain to you of any intruders entering your personal space. This personal space could be your hotel room for women bedroom or also a safe or desk drawer. The app is made to prevent the so-called “Evil Maid” attack that targets unattended computers. This could be in a hotel room, an office space or even your bedroom. This "evil maid" might infect your PC with spyware, rifle by your files and more. The app will apparently give journalists, activists and the paranoid a cheap tool for keeping watches. The cameras can be used to detect motion, capture images and video, other people. All of this could be sent directly to a device of option. The mic could be used to detect sudden noises and yes, it can, in turn, be used to trigger the camera to capture supply of the racket. The same applies into the ambient light sensor, which can detect, say, the lights being turned as well as off or a flashlight passing the actual phone. Even the accelerometer can be repurposed as a vibration sensor for detecting any unexpected movement. In fact, anything can supply as a trigger, even the air pressure sensor captured in some phones. It can even be triggered when the phone is plugged in or power is turned on and off. Unlike a regular security camera the Nest Cam, hypothesis that Haven communicates directly with a tool of your deciding which is. Better yet, you can use Signal (a secure messaging service) and Tor (a secure form of internet) to send info only to you in a secure fashion. Other services like WhatsApp and Google Drive also are used, if you so desire. The device also keeps an on-device log of all events. Researchers say a recently patched vulnerability in Android’s exe to apk converter could leave users vulnerable to attack from signed applications. "An attacker can replace a trusted application with high privileges (a system app, for instance) by a modified update to abuse its permissions. According to the targeted application, problem . enable the hacker to access sensitive information stored by the device or even take over unit fitted completely," GuardSquare says. "Alternatively, an attacker can pass an improved clone of a sensitive application to be a legitimate update, one example is in the context of banking or communications. The cloned application can as well as behave like the original application but inject malicious behavior." The vulnerability, CVE-2017-13156, was addressed in patch level hands down the December Android update, so those who get their patches directly from Google should be discussed. Unfortunately, due to the nature with the Android ecosystem, many vendors and carriers are slow to release fixes. There are, however, some mitigating factors that can keep vulnerable machines included. For starters, GuardSquare notes, the attack could not be performed through the Play Store, so apps obtained from that service should be secure. Additionally, version 2 of the Android APK performs a more thorough check of the signature that would catch the combat. "Older versions of applications and newer applications running on older devices remain susceptible," the company said. "Developers should at the minimum always apply signature scheme v2." The vulnerability, dubbed Janus, would allow a malicious application to add bytes of code to the APK or DEX formats used by Android applications without affecting the application's unsecured personal. In other words, a scumbag could pack an app with malicious instructions, and still contain it read by Android as a trusted piece of app. The problem, say researchers with mobile security firm GuardSquare, lies in during Android 5.0 with exe to apk and later handles the APK and DEX files for some applications. By only checking for certain bytes in an application's signature, the devices could read an altered signature as authentic and support malicious instructions with regard to inserted an APK or DEX file without being observed. The entire project is available on GitHub and is open-source. Anyone can examine the code and modify it to their loving. The app is the result of a collaboration between The Guardian Project — a project that aims creates secure apps, services and devices for secure communications — and also the Freedom of the Press Foundation — which protects and defends “adversarial blogging. Snowden is the president of however. Initial reports suggest the app is hypersensitive with Wired reporting that the app triggered “hundreds of alerts” as soon as the phone was added to a PC along with a running fan. Clearly, there’s a legitimate reason why the app is still in beta. The app is available on the Google Play Store only and is offred from here and can examine its code or download the Android APK on GitHub here.
5 notes
·
View notes