![]() ![]() Unfortunately, that doesn't remove any code that's already been backdoored in. In the time I've proofed this post, they've already checked the apps and are planning on pulling them from the Market, as well as remotely removing them from user's devices. Justin pinged a contact at Google to bring the issue to their attention. If Kingo or iRoot really work and mean business, then just put it on Play store for some price and people would buy it for sure. In other words, there's no way to know what the app does after it's installed, and the possibilities are nearly endless. No one has done a real audit and their business model is incoherent (either you're OpenSource and free or you're an app on Google Store audited and pay for it) The released source code has a lot of missing parts. But that's all child's play the true pièce de résistance is that it has the ability to download more code. John Julius Norwich-called a true master of narrative history by Simon Sebag Montefiore-returns with the book he has spent his distinguished career wanting. ![]() There's another APK hidden inside the code, and it steals nearly everything it can: product ID, model, partner (provider?), language, country, and userID. Back up the Kingo Root app and uplod the apk and Ill try installing it on the Fire. I think thats why it cant reboot which it needs to do during the process. ![]() The box would at least have a chance of working. But that's just the tip of the iceberg: it does more than just yank IMEI and IMSI. In the kingo app on tv it says 'rooting.' but on the pc it just repeats the same loop as last time. I asked our resident hacker to take a look at the code himself, and he's verified it does indeed root the user's device via rageagainstthecage or exploid. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |