have a weird legal theory about all these corpo spy devices like turning an employee's microphone on when they work from home.

even if you put in the computer user agreement that you can spy all day (which is legal) other people in the house didn't consent. so technically if i have a conversation with someone and its recorded by an employee laptop that is still wiretapping :blobcatpolice:

Todays objective;

Doing something fun with $(adb shell input keyevents && ./some-fun-shell-scripts.sh) Lets see how this turns out ^_^

Hi all, I'm new so here's my #introduction/ #introductions.

I'm a 26 year old #artist who specializes in digital #art and #illustration. I like drawing weird plants and environments. I tend to spend hours painting the same details over and over again with tiny brushes.

The creative world can be pretty tough so I'm looking forward to hanging out with you all and helping each other survive/grow.

Sorry about the redraft, I noticed a sentence error and it bothered me.

Stumbled upon this;

"When 2 application are signed by the same key, they can specify an identical user identifier in their respective manifests. In this case, both applications execute under the same UID. This subsequently allows these apps access to the same file system data store, and potentially other resources."

Then I realized, I used the same key across all my custom apps {•.•}

Guess it's time to recompile and use different keys for each app. {^.^}

jmtpfs a pretty handy tool for mounting android devices from the shell. It uses fusermount as backend. To mount your android to a directory named "phone", you'd have to type in;

`jmtpfs /path/to/phone/`

Unmounting is pretty simple;

`fusermount -u /path/to/phone`

Wrote a script to make things easier for myself ^_^

Kinda wish $(arptables) were baked into Android kernels.

Imagine writing a protocol where the secret header would be like;

-> Well hello there Mr.ISP! Trying to snoop into what's going on over here aye? Why don't you have a cup of coffee and rethink your life decisions?
<-

When isp's try to sneak in, they get this message :ac_laughter: :ac_laughter:

*that's not how headers work tho*

If you're prone to frequent typos while working on your terminal, there's a python program called "thefuck" which could come to be handy ^_^ The gif below shows it in action.

Take a look: github.com/nvbn/thefuck

Mcq;

EOF in C represents

Fun stuff;

There's a python package for measuring typing speeds! Pretty cool stuff ^_^

Install with pip3;

pip3 install wpm

Happy typing!

An interesting read on captive portals;

radavis.github.io/captive-port

TL;DR Captive portals are a man in the middle to route/authenticate users to a different web page/local webpage. This applies to http pages only. For a better security on wireless network, it is advised to use a authentication server like Radius(aka a wifi certificate implementation).

Also, if you're wondering if my phone has google services(play store and such), nope ^_^ No google apps, even got rid of some GoogleFota binaries from /system/bin/ I'll have to find out what's making the requests though.

Apparently blocking connectivitycheck*android*com doesn't seem to be causing any issues. Will have to look more into that i guess.

connectivitycheck•android•com seems to be the first address my android tries to connect to when online. That's a bit strange, because none of the apps I have has any google stuff(except for fenix, but it's not fenix that's making requests) given that all apps were force stopped and administrative apps were devoid of internet connections because of iptables uid block. Could it be that the kernel is making requests to that address? Wireshark analysis says it's a dns request and a successful one.

> 28 malicious extensions disguised traffic as Google Analytics data.

I hope all of that analytics shit (not just Google's) dies
Show older
Fosstodon

Fosstodon is an English speaking Mastodon instance that is open to anyone who is interested in technology; particularly free & open source software.