TOT: Snooper's Charter

Discussion in 'Broadband' started by Java Jive, Oct 9, 2015.

  1. Java Jive

    Rod Speed Guest

    Trivially easy to ensure that they can't.
     
    Rod Speed, Oct 22, 2015
    1. Advertisements

  2. Java Jive

    Java Jive Guest

    So that's another ID of the resident idiot brat to plonk ...
    --
    ========================================================
    Please always reply to ng as the email in this post's
    header does not exist. Or use a contact address at:
    http://www.macfh.co.uk/JavaJive/JavaJive.html
    http://www.macfh.co.uk/Macfarlane/Macfarlane.html
     
    Java Jive, Oct 22, 2015
    1. Advertisements

  3. How?

    Remember they are likely to know about zero day exploits that nobody
    else knows about and most small internet connected devices have many
    known exploits anyway -- I know my Android phone has.
     
    Brian Gregory, Oct 23, 2015
  4. Java Jive

    Rod Speed Guest

    By using a hash of what is installed as frequently as you like
    so that you can see when something else has been installed.
    Sure, but its trivially easy to check if something has used
    one of those to install something you didn’t install yourself.

    If you are completely paranoid you can even do stuff like
    always run from CD/DVD so that nothing survives a reboot etc.
     
    Rod Speed, Oct 23, 2015
  5. Java Jive

    Roland Perry Guest

    An android phone with a DVD player - is that a new thing you are working
    one?
     
    Roland Perry, Oct 23, 2015
  6. Java Jive

    Rod Speed Guest

    The discussion wasn’t just about phones.
     
    Rod Speed, Oct 23, 2015
  7. Java Jive

    Roland Perry Guest

    But includes phones. What's your "trivially easy" solution for the
    latter?
     
    Roland Perry, Oct 23, 2015
  8. Java Jive

    Rod Speed Guest

    I told you. You deleted that from the quoting.
     
    Rod Speed, Oct 23, 2015
  9. Java Jive

    Roland Perry Guest

    Which app do you recommend to do the hashing with?
     
    Roland Perry, Oct 23, 2015
  10. Java Jive

    Rod Speed Guest

    Never said anything about an app.
     
    Rod Speed, Oct 23, 2015
  11. Exclusive knowledge of a software exploit could only be possessed by
    whoever is first to discover it, provided they subsequently decide not
    to tell anybody else. Does this really sound like a government?

    I don't suppose we can ever really know, but I'd expect most exploits
    to be discovered by amateurs, enthusasts, geeks and hackers.
    Governments lose memory drives and CDROMs and leave laptops in taxis.

    Rod.
     
    Roderick Stewart, Oct 23, 2015
  12. Java Jive

    Roland Perry Guest

    So say something about what you *would* use.
     
    Roland Perry, Oct 23, 2015
  13. Java Jive

    Rod Speed Guest

    I'd start with a much more intrinsically secure phone like
    and iphone with its sandboxing that doesn’t allow any
    app to look at anything it wants to data wise, and then
    jailbreak it to allow the hashing if I was that paranoid.

    You can also go the other route, back it up using itunes
    and do what you like hashing wise on the backup outside
    the phone.

    You can also restore it to factory as often as
    you like, trivially easy to do with an iphone.
     
    Rod Speed, Oct 23, 2015
  14. What would you use to identify file by file which one counted as
    software that shouldn't change and which one might be updated at any
    time when a new version of an app came out?

    In fact what's to stop the malware looking like an app which you expect
    to be updated from time to time?
     
    Brian Gregory, Oct 24, 2015
  15. Java Jive

    Rod Speed Guest

    You don’t need to identify anything. Just check when
    the hash has changed when you haven't updated any
    apps. Restore to the earlier backup if that ever happens.
    You don’t have to update any apps if you are that mindlessly
    paranoid, just keep using it as originally supplied.
     
    Rod Speed, Oct 24, 2015
  16. Java Jive

    Roland Perry Guest

    The hash will change every time a call is made or received, every time a
    contact is added (although if you are resetting the phone then you
    clearly don't want to keep any contacts), every time you change any of
    the settings, and very likely whenever the clock ticks by a second.
     
    Roland Perry, Oct 25, 2015
  17. Java Jive

    Rod Speed Guest

    Not when its done over the apps and not the data they own.
     
    Rod Speed, Oct 25, 2015
  18. Java Jive

    Roland Perry Guest

    Does the itunes backup facility you recommended have that feature?
     
    Roland Perry, Oct 25, 2015
  19. Java Jive

    Rod Speed Guest

    It isn't the itunes backup facility that has that, it’s the backup it
    creates that does.
     
    Rod Speed, Oct 25, 2015
  20. Java Jive

    Roland Perry Guest

    I see. So the backup that iTunes produces has separate sections for
    these different kinds of data?
     
    Roland Perry, Oct 25, 2015
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.