Just upload encrypted filesystem containers and go about your business.
Another article on this, I agree with Dan's assessment - http://arstechnica.com/securit...
"Never attribute to malice that which can be attributed to stupidity."
My guess, after years of working with Samsung's poor-quality platform software and multiple runins with their utterly piss-poor configuration management processes (as in, the Korean divisions at Samsung Mobile don't seem to have any, as evidenced by numerous situations during the Superbrick fiasco):
Samsung probably put this into the RIL library to facilitate modem debugging. e.g. the modem can read/write to
Keep in mind that, based on the reverse engineering effort, Samsung *intended* this feature to only access files within
So at some point, Samsung probably removed the corresponding components on the baseband firmware side (no one has yet to confirm anything on the modem side that sends these commands, nor has anyone caught any of these commands being issued - the behavior of the library was verified by injecting extra commands with a kernel patch in the driver between the modem and the library), but someone forgot to remove them from the RIL library on the applications processor side. Forgetting to remove dead code and/or leaving epic security holes in place (remember that in late 2012, someone realized that Samsung left a world readable/writable device node that effectively mapped all system memory to that device file - allowing anyone to read or write any part of memory. For more, do a Google search for "exynos-abuse" ) is pretty typical for Samsung.
As to my experience here - I was one of the Cyanogenmod maintainers for the Exynos 4210 (I9100, I777, N7000) handset family, and also did some work on 4412 devices (primarily the Note 10.1 - GT-N8013) throughout 2012 and the first half of 2013. I'm 90% retired from working with Haxxinos these days and was (along with the majority of the rest of the Exynos maintainers) one of the people who left the project to start Omni after the Focal relicensing attempt fiasco.
An interesting question is - what architecture is the XMM626x's baseband processor? Is it custom or an ARM variant making it easier to analyze the baseband firmware itself? More than two years of working with that family of devices and I never personally looked in detail at what was running on the baseband side.
So used to typing "user" in various contexts. I meant "/usr".
...and dodging the self-employment tax
Well you could have just pulled a John Edwards or Newt Gingrich and funneled 98% of your income through an LLC with S-corp tax rules to avoid that pesky self employment tax. Get with the times man.
A lightweight one with X and xfce. Put
I wonder how hard it is to hack the bootloader?
Your "outdated socio-economic system" is someone else's "reality".
The reality is that as worker productivity has increased by orders of magnitude, worker pay adjusted for inflation has decreased sharply. There's no defense for that.
Once you have "an ecosystem of roads" as you suggest which is maintained by road fees and requires public access so you can get to all places you want to go, you have just reimplemented government owned public infrastructure under a different name
Nonsense. In the libertarian utopia, the network of roads is a monopoly owned by someone else with no accountability or democratic input. Hooray!
I believe all Galaxy devices are capable of connecting to 2G towers. So assuming the message can be transmitted via 2GSM, the sophisticated hacker (I assume) would need to spoof such a tower at a time when the targetted phone would need to avoid 3G for some reason (say, lack of signal or too poor a signal)
How common? On the other hand, perhaps there is a profitable niche there, sort of like how space tourist lies somewhere in between commoner and astronaut. There's a bunch of money involved and a lot of it covers training.
Typical NASA waste.
In any case, the trouble with TV facial recognition portrayals is less the software itself (because I can handle a dramatization of a computer search like that), I'm more offended by the portrayol of the results. There are no false positives (finding the wrong people) and false negatives, (failing to find people who ARE in the system), or multiple results. No its always either... face goes in and perp comes out... or face goes in and computer declares the person doesn't exist.
Statistically nobody would even understand what they were on about unless they devoted an entire episode to the concept. Which might be reasonable, of course.