Security Concerns

Mar 27, 2012 at 1:18 PM
Edited Mar 27, 2012 at 7:53 PM

Since NFC, Bluetooth and WiFi are already so readily available it seems that we only start to begin the public conversation(s) on how a person would utilize these libraries maliciously.

I feel the various Network Information applications which appear on the Android Market will allow the users of this library to utilize the code under a malicious intent. Weather the device is on a APN, VPN or otherwise it must utilize Radio Signals to communicate.

The smart phone is literally a inspector gadget pocket knife. It is one of the most dangerous weapons freely available.

Because of this intrinsic relationship we must determine ways to secure the communications channels directly along the existing interfaces to protect against ALL interference not just  harmful or allowed interference. See the FCC Website or the FCC Regulations Summary for further information.

There are various chip-sets which are utilized to enable as well as protect against cipher attacks inter alia, we can simply add some additional logic to detect and protect against such interference as well as a call home feature when we detect enigmatic behavior.

With this feature the onus will reside on each operator at every level of the Internet to properly review and alert the appropriate authorities so that further action may be taken if deemed necessary by all parties involved.

No action should be taken until the totality of the situation is recognized and there are public tutorials and patches which enable the security features stated above.

Furthermore it is obvious to be that with the perfect combination of hardware and software that this capability is already within our reach. It is unnecessary for the call home feature because the device should be smart enough to stop the attacker; if there is a call home feature that would technically be invading the privacy of the user unless they signed a document indicating they agreed to utilize the device with said feature.

Please discuss knowingly, intelligently and voluntarily.

Apr 28, 2012 at 3:26 PM

I have made a post at the Neowin Forums @ which outlines how one may complete these attacks and then help assist the manufactures patch these holes.