Skip to content

#!/zitstif.no-ip.org/

Search
  • About
  • Backtrack 4 pages
  • Get Help
  • Home
  • Programs
  • Useful Websites

Daily Archives: May 7, 2011

Posts

Smart Phone Privacy and Steps Towards Anonymizing the Nokia N900

May 7, 2011 zitstif 2 Comments

Within current times a lot of people are now using and relying on smart phones. Part of what makes these devices so ‘smart’, is their ability to gather information on the user and use this information to better serve the user. Per contra, the problem with this is that a lot of private information is being gathered which can include longitude and latitude coordinates.

Even when you take pictures with some smart phones, longitude and latitude information can be tagged on as metadata. (See: http://icanstalku.com/ )

What is ironic, is that from my personal experience and information gathering locally, a lot of people seem to not care about this or privacy. I think this is where the government needs to step in and do something. (Which the US government appears to be making steps towards this: http://www.nationaljournal.com/tech/online-privacy-concerns-fuel-drive-for-do-not-track-legislation-20110506 )

My concern with this, is that if people will really care to opt out of tracking and if they do opt out of tracking, then are the services that they use going to be a lot less useful?

Pertaining to the iPhone, I think this video gives you really good technical insight into the tracking issue: http://www.securitytube.net/video/1774

Now onto my beloved Nokia N900. I have taken steps towards anonymizing the N900 and I will show you what I did.

1.) Go to settings and then look for ‘Location’

2.) Disable GPS and disable network positioning.

3.) Under internet connections set ‘Connect automatically’ to ‘Always ask’.

4.) If you’re planning on using the N900 as a tablet and do not want to be tracked via triangulation, to mitigate this you can do as follows:

a.) Pull up the terminal and make sure you are root. (sudo gainroot)

b.) You also want to make sure you have enabled the extra repositories

c.) Install this following application via: apt-get install cell-modem-ui -y

d.) Now to enable the tablet mode and mitigate the possibility of being tracked via triangulation, click the power button on the top of the N900 and a new button should be there that says, ‘Tablet’

e.) Simply tap on this, and your N900 is now just acting as an internet tablet.

5.) tor is available for the N900, you can install this simply via: apt-get install tor -y

6.) You can use proxychains but only under a chroot environment. To use it do as follows:

a.) ssh -D 9050 user@somehost

b.)debbie bash (This is to get into the chroot environment without having to start a GUI session. 🙂 )

c.) proxychains ssh user@someotherhost

7.) You can spoof the MAC address of the wlan0 interface via: (as root) ifconfig wlan0 hw ether 00:12:34:56:78:90

8.) To change MicroB’s user agent string have a look at: http://gerrymoth.co.uk/?p=108

9.) When you first open the lens cover to the camera, you can opt out of adding metadata to your pictures.

10.) Truecrypt is available, however full disk encryption is not available for the N900 or any phone I can think of. I have heard that DARPA is working on a project related to this for iPhones and Androids. ( http://www.infosecurity-us.com/view/17340/darpa-working-on-full-disk-encryption-for-iphone-and-android/ )

This concerns me a bit because I’m a resident of Michigan… ( http://www.thenewspaper.com/news/34/3458.asp )

I hope this information is helpful to you and if you have anymore ideas on anonymizing the Nokia N900 please feel free to send me an e-mail or leave a comment.

anonymizinganonymousaskbig brotherbigbrotherconnectionsdebbiedevicesdisablegeotaggovernmentGPSicanstalkuinternetlocationmetadatan900nokia n900privacysecuritysecuritytubesmart phonessudotaggngtrackingUS governmentuser agentuser agent stringweaponizing
May 2011
S M T W T F S
1234567
891011121314
15161718192021
22232425262728
293031  
« Apr   Jun »

Blogroll

  • .:: Phrack Magazine ::.
  • @GelosSnake
  • @inversecos
  • 100-hacking-tools-and-resources [hackerone.com]
  • 2600: The Hacker Quarterly
  • 2600.network [idle]
  • Academic Torrents
  • AI Exploits
  • America's Digital Shield
  • Amneiza VPN. Your own self-hosted VPN
  • Amnesty Tech | Amnesty International
  • anderspitman / awesome-tunneling
  • Ansible is Simple IT Automation
  • Anti Fraud News Blog | AntiFraudNews.com
  • AppleExaminer Home
  • Arch Cloud Labs – Projects
  • Armis
  • ARPSyndicate / awesome-intelligence
  • Atek – An open source peer-to-peer Home Cloud | Atek.Cloud
  • Atlas of Surveillance
  • Attack-Defense Online Lab
  • Autonomous Red Teaming for Everyone | Prelude Operator
  • Awala: The computer network on which humankind can truly rely
  • Awesome SDN
  • awesome-incident-response
  • awesome-threat-intelligence
  • BackBox Linux | Flexible Penetration Testing Distribution
  • BackTrack Linux
  • Binary Revolution Forums
  • BIOS Master Password Generator for Laptops
  • BleepingComputer.com
  • Blog – Black Hills Information Security
  • Blog – NotSoSecure
  • Blog | GoSecure
  • BREAKDEV
  • Brute Ratel C4 | Badger doesn't care. It takes what it wants!
  • ByteXD – Practical Tutorials for Web Developers & Entrepreneurs
  • carnal0wnage.attackresearch.com
  • CCC | Startseite
  • cDc communications | CULT OF THE DEAD COW | Hackitvismo
  • Censored Planet
  • CIS Center for Internet Security
  • Cisco Talos Intelligence Group
  • Cloud Vulnerabilities and Security Issues Database
  • Cloud-Free-Tier-Comparison
  • Cloudflare
  • CloudSecDocs
  • Cockpit Project – Cockpit Project
  • Command Line Kung Fu
  • command-not-found.com
  • CommandLineFu
  • Computer Forensics World
  • Core Security Technologies (Blog)
  • Cribl: Take Control of Your Observability, Security, and Telemetry Data
  • CrowdSec: the next-gen open source, crowd-powered, & dynamic firewall
  • Cryptome
  • CS6038/CS5138 Malware Analysis, UC
  • CSI Linux
  • CVE security vulnerability database
  • Cyber Arch Blog
  • Dark Operator
  • Dark Reading
  • Darknet – The Darkside | Ethical Hacking
  • DeCloudUS – Privacy DNS Blocks Google, Ads, and More
  • Default Password List for Routers
  • Default passwords list
  • Digital Experience Monitoring | ThousandEyes
  • Digital Forensiscs, Computer Forensics, eDiscovery | ForensicFocus.com
  • DigitalMunition – Ethical Hacking & Computer Security
  • DiscMaster
  • Distributed Denial of Secrets
  • Diversion – the Router Ad-Blocker
  • DNS-based Content Filtering and Security (cleanbrowsing.org)
  • Docker.com
  • DSLReports Home Broadband ISP reviews, news, tools and forums
  • DZone Security
  • Electronic Frontier Foundation
  • Embrace The Red
  • Escape Big Tech
  • Exotic Liability
  • Exploit Education
  • Exploit Observer | ARPSyndicate
  • Exploits Database by Offensive Security
  • Felix Krause
  • FingerprintJS Blog | FingerprintJS
  • Firezone: Open-Source WireGuard VPN Server – firezone.dev
  • Fleet | Open-source device management (MDM)
  • Flipper Zero – Portable Multi-tool Device for Geeks
  • FOFA Search Engine
  • FOG Project
  • Forbidden Stories
  • Forensics Wiki
  • Free RMM Tools for MSP and Small Businesses (action1.com)
  • Free threat intelligence feeds – threatfeeds.io
  • FreeIPA – Open Source Identity Management Solution
  • Freenet
  • FTPrivacy.cloud
  • Ghetto Forensics
  • Ghidra
  • GNS3 | The software that empowers network professionals gns3.com
  • GNUCITIZEN
  • Golem Network
  • GPSJam GPS/GNSS Interference Map
  • Gramine – a Library OS for Unmodified Applications
  • GRAVITL
  • GTFOBins
  • Guadicore: Cloud and Data Center Security Simplified
  • Guardicore
  • Guillaume QuĂ©rĂ© Blog
  • Hack A Day
  • HackDojo
  • HackerOne – Bug Bounty program
  • HackerspaceWiki
  • Hacking-Printers
  • Hackread – Latest Cybersecurity News
  • Hackster.io – The community dedicated to learning hardware. hackster.io
  • HackTricks
  • Hak5
  • Handshake
  • Hash Generator
  • hdm.io
  • Hextree
  • HITB
  • HolisticInfoSec
  • Home – NetBlocks
  • Home – OpenDaylight
  • Home – Virtue Security
  • Home -InfluenceWatch – InfluenceWatch.org
  • Home | endoflife.date
  • Home | OpenSCAP portal
  • Homepage | CISA
  • HoneyDB
  • How-To Geek
  • I2P Anonymous Network
  • Index page – KernelMode.info
  • Infisical | Open Source SecretOps
  • Infosec 101 for Activists
  • InfoSec Institute
  • Infosec Island
  • InfosecMatter
  • Inj3ct0r – exploit database
  • Innernet
  • Insecure Magazine
  • Inside Laura's Lab
  • Instructables – Technology
  • Invisible Things Lab
  • IPDetective
  • IPDS – Domain Name System for IPFS
  • IronGeek
  • iSecur1ty
  • IT Security – stackexchange.com
  • ITFlow
  • James Brine – Australian Cyber Threat Intelligence
  • Kali Linux
  • Kali Linux / Kali-purple
  • Katacoda – Interactive Learning Platform for Software Engineers
  • Keycloak
  • KitPloit – PenTest Tools for your Security Arsenal
  • Kon-boot
  • Krebs On Security
  • kv4p HTt – open source ham radio receiver for your smartphone
  • LaNMaSteR53.blog
  • Learn Pentesting Online
  • LibreNMS
  • Lifehack – Tips for Life
  • Lifehacker
  • Linux Kodachi 6.2 The Secure OS
  • Linux Security
  • LinuxGizmos.com: embedded Linux news & devices
  • Live Hacking
  • LiveOverflow – YouTube
  • LMG Security
  • LOLBAS – Living Off The Land Binaries, Scripts and Libraries
  • Mageni – Free and open-source vulnerability scanner
  • Malicious Group
  • MalwareTech
  • Malwr – Malware Analysis by Cuckoo Sandbox
  • Mandiant Blog
  • Martin Vigo PERSONAL HACKING PROJECTS, WRITEUPS AND TOOLS
  • MASS | Metal as a Service
  • Meshtastic
  • Metasploit Blog
  • Metasploit Unleashed – Mastering the Framework
  • MG
  • Mininet: An Instance Virtual Network on your Laptop (or other PC)
  • MITRE ATT&CK
  • Mobile Hacker
  • Mobile Verification Toolkit
  • MorningStar Security News
  • Moxie Marlinspike >> Thoughtcrime Labs
  • MSPGeek a free MSP Community for all Service Providers
  • Mutable.ai
  • Nagios – The Industry Standard in IT infrastructure monitoring
  • NetBird – Connect and Secure Your IT Infrastructure in Minutes
  • NetBox.dev
  • Netmaker: Wireguard® VPN & Software Defined Networking
  • NETSEC – Ramblings of a NetSec addict
  • Network Engineering Stack Exchange
  • Network World
  • news.ycombinator.com
  • nixCraft – (www.cyberciti.biz)
  • nrd-list.com
  • NTLM Decrypter
  • Objective-See
  • Offensive-Security
  • offsec.tools
  • OmniEdge | Unlimited Computers In Your Private Network
  • OnionScan: Investigating the Dark Web
  • Online – Reverse Shell Generator
  • Online LM hash cracking engine
  • Online Password Hash Crack
  • Open Network Operating System (ONOS)
  • Open Observatory of Network Interference
  • Open-AudIT
  • OpenBSD Router Guide
  • openITCOCKPIT | Open Source Monitoring
  • OpenNIC Project
  • OpenProject – Open Source Project Management Software
  • OpenSecrets
  • OpenSecurity
  • OpenSecurityTraining
  • OpenWISP: Open Source Network Management System
  • OpenZiti
  • Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora.
  • OSINT Framework
  • OSINT Tools for the Dark Web
  • osquery | Easily ask questions about your Linux, Windows, and macOS Infrastructure
  • osTicket | Support Ticketing system
  • Ostorlab: Blog
  • Outflank | Red Team Tools & Expert Services
  • OWASP
  • OXO vulnerability scanning for the modern age
  • Packet Life
  • PacketStorm Securtiy
  • Parrot Security
  • Passbolt | Open source password manager for teams
  • PassMark OSForensics – Digital investigation – osforensics.com
  • PaulDotCom
  • Penetration Testing and Vulnerability Analysis Polytechnic Insitute
  • Penetration Testing Lab
  • Pentester Academy TV – Youtube
  • Pentester Academy: Learn Pentesting Online
  • Pentester's Promiscuous Notebook
  • PenTestIT
  • PentHertz Blog
  • Peteris Krumins' Blog
  • phpIPAM IPAM IP address management software
  • Pi-hole
  • Pi-KVM – Open and cheap DIY IP-KVM on Raspberry Pi
  • polyswarm.io Blog
  • Pomerium
  • Portcullis Labs
  • Pritunl, Enterprise Distributed OpenVPN, IPsec and WireGuard Server
  • Privacy is sexy – Enforce privacy
  • PrivacyTools – Encryption Against Global Mass Surveillance
  • Project Honey Pot
  • Project Zero (Google)
  • Pwnagotchi – Deep Reinforcement Learning
  • qual – Internet Independent Wireless Mesh Communication App
  • Qubes OS: A reasonably secure operating system
  • RANCID – Really Awesome New Cisco confIg Differ
  • rConfig – Network Configuration Management!
  • reptile[.]haus[/]blog/
  • RiskIQ Community Edition
  • Risky Business
  • Ronin
  • ROOter by Modems and Men
  • Routerpwn
  • SaltStack: Home
  • samy kamkar – home
  • Sanesecurity signatures: improve ClamAV detection rate
  • SANS Digital Forensics Blog
  • SANS Penetration Testing Blog
  • Schneier on Security
  • SDF Public Access UNIX System – Free Shell Account and Shell Access Est. 1987
  • SecLists
  • SecLists
  • secret club | Blog about reverse-engineering, hacking, and breaking your software in ever way
  • Secure Data Recovery Services
  • SecureDrop.org – Share and accept documents securely
  • Securelist | Kaspersky's threat research and reports
  • Security Awareness Training | KnowBe4
  • Security Database Tools Watch
  • Security Insights | AdaptiveMobile
  • Security Onion Solutions
  • Security Research | mr.d0x
  • Security Watch
  • SecurityFocus
  • SecurityTube.net
  • SecurityTube.net Hack of the Day
  • SentinelLabs – Intelligence Redefined
  • Server Fault
  • ServeTheHome: Server, Storage, and Software Reviews
  • Sevro Security | SS
  • Shell is coming …
  • Shell.Systems – WE POP SHELLS
  • Shelter Project
  • shieldwall – secure your most private servers – shieldwall.me
  • SHODAN – Computer Search Engine
  • Signal >> Home
  • Silent Break Security Blog
  • SkullSecurity
  • Slashdot
  • Snipe-It Free open source IT asset management
  • Snort Blog
  • SNOsoft Research Team
  • Social Engineering – Security Through Education
  • Social Networking / WireHub
  • SpiderFoot
  • SpiderFoot HX – SpiderFoot
  • Spork: Peer-to-peer socket magic in the air | Spork.sh
  • Spy Culture | Intelligence Agencies and Popular Culture
  • Stack Exchange
  • Stop Ransomware | CISA
  • Sucuri Blog
  • Sunny Valley Networks – Agile Service Edge Security
  • Super User
  • Synacktiv Publications
  • T E X T F I L E S
  • Tails OS
  • Tailscale – private networks made easy
  • Tales from a Security Professional
  • Technitium | Push The Limits
  • The Art of Mac Malware
  • The Black Vault
  • The C2 Matrix
  • The Citizen Lab – University of Toronto
  • THE DFIR REPORT – Real Intrusions by Real Attackers, The Truth Behind the Intrusion
  • The Ethical Hacker Network
  • The Exploit Database
  • The Free Thought Project – Your online news and discussion platform
  • The No More Ransom Project
  • The Pragmatic Bookshelf
  • The Shadowserver Foundation
  • the world.according to koto
  • the-infosec
  • TheHive Project
  • ThirdCloud
  • THN: The Hacker News
  • threatpost | The First Stop for Security News
  • TinyPilot
  • Tools to explore BGP
  • Top 100 Network Security Tools
  • Tor Project | Anonymity Online
  • TorBox – TorBox is an easy to use, anonymizing router based on Raspberry Pi.
  • Troy Hunt: Troy Hunt
  • TrustedSec News and Events (Blog)
  • tssci security
  • TWP – Tech Watch Project
  • Unimus by NetCore j.s.a
  • Unmask Parasites. Blog.
  • UrBackup – Client/Server Open Source Network Backup
  • Veil – AV Evasion
  • Ventoy – A New Bootable USB Solution
  • VIPER VAST
  • virtuallyGhetto
  • VoidSec
  • Volatile Systems Blog
  • Vulners – Vulnerability Data Base
  • Vuls – Agentless Vulnerability Scanner for Linux/FreeBSD
  • w3af – Open Source Web Application Security Scanner w3af.org
  • War Room
  • Wazuh – The Open Source Security Platform
  • Welcome | authentik
  • Welcome to Enable Sysadmin | Enable Sysadmin
  • What is this? Red Teaming Experiments
  • What's My Pass?
  • Whistleblower Aid
  • WhoTracks.me – Bringing Transparency to Online Tracking
  • WikiLeaks
  • Will Hack For SUSHI
  • Windows Command Line -CMD commands, command prompt, batch files, Powershell
  • Wireskip.
  • Wiz: Cloud infrastructure security reimagined
  • Word List Downloads
  • xorl
  • Yggdrasil Network | End-to-end encrypted IPv6 networking to connect worlds
  • ZeroTier – Global Area Networking

(zitstif.com)

  • Blacklists
  • Code
  • Exploits
  • Lock Picking
  • Meterpreter Scripts
  • Posts
  • Site Updates
  • Tools
  • Uncategorized
  • Videos
Proudly powered by WordPress