maandag 6 augustus 2012

Ontgrendelde HUAWEI E160 3g dongel op TomTech Ultimate 10 Tablet


Inleiding.

Een aantal jaren geleden sloot ik bij KPN een overeenkomst voor een Internet verbinding af, waarbij ik een HUAWEI E160 dongel voor de introductieprijs van € 50,-- kon kopen, zodat ik onderweg Mobiel Internet toegang had.

Op een of andere manier heb ik hier nooit meer iets van gehoord en heb gelukkig sinds meer dan een jaar een aansluiting bij Ziggo.

Nadat de prepaid € 15,-- op de dongel opgebruikt waren, werd het ding min of meer waardeloos, maar iets vertelde me, dat ik de dongel niet moest weggooien, wellicht zou het later nog nuttig kunnen zijn, of kon ik er eventueel iemand anders een plezier mee doen.

En of hij nuttig is geworden!

Ontgrendelen (SIM-lock vrij maken).

Veel GSM's en 3g MODEM's zijn voorzien van een SIM-lock, waardoor deze slechts bruikbaar is bij een carrier (aanbieder). Een Vodafone pre-paid SIM in een KPN SIM-locked toestel is dus onmogelijk.

Om de monopoly positie te blokkeren heeft de mededingingsautoriteit gelukkig beslist dat na een jaar ieder apparaat ontgrendeld kan worden. Dit ontgrendelen, kun je tegen betaling in diverse telefoon-shops laten doen, of je kan het ook gratis zelf doen. Ik heb voor het laatste gekozen.

Het ontgrendelen heb ik via deze site gedaan, kosten: € 0,-- en gewoon lekker in mijn eigen huiskamer ;-)



GNU/Linux.

In de beschrijving op de site wordt er van uit gegaan dat je Windows als besturingssysteem gebruikt. Dit was op dat moment niet het geval in mijn situatie. Ik heb dit:
Or through program HyperTerminal (C: \Program Files \Windows NT). To unblock the modem. AT^CARDLOCK = " ".
opgelost door Minicom te installeren en van daaruit de Hayes (AT) commando's in te voeren.

AldiTalk.

Ik heb reeds jaren een prepaid SIM kaartje van AldiTalk in mijn ontgrendelde GSM en deze heb ik in de inmiddels ontgrendelde dongel gestopt, die ik vervolgens op mijn Ubuntu laptop heb aangesloten en tegen mijn verwachting in, werkte dit perfect.

Mobiel Internet.

Het voordeel van de dongel die hier in principe voor oud vuil lag, is dat hij nadat ik hem op mijn TomTech Ultimate 10 ICS Tablet had aangesloten en het Tablet opnieuw had opgestart, direct herkent werd en er zonder tussenkomst van mijzelf meteen een verbinding werd gemaakt.

Dit betekent, dat ik van nu af aan onderweg, in de bus gebruik kan maken van Mobiel Internet op mijn Tablet, dat ik vrijwel overal met me meesleep. In principe kan ik nu mijn mijn goedkope Bart Smit Tablet het zelfde als met de dubbel zo dure Samsung Galaxy Tab 10.1 :-D

donderdag 2 augustus 2012

Android Mallware clearly Hogwash!

Introduction.

 As a seasoned (12 years) GNU/Linux user I have my doubts about the Android Mallware FUD which journalists have been slinging around the past weeks, in the corporate controlled propaganda media.

From a advanced GNU/Linux user's point of view, the FUD is pretty laughable :-)

A few facts.

 Android is based on Linux and uses a similar file system hierarchy, including similar security control.

Now in essence, it is out of the question that apps have write access to the file system, other than FAT formatted media, like sdcards and USB Thumb drives.

There for mallware doesn't stand a chance on Android. Mallware needs to copy itself to another existing file to multiply, which is impossible if write access is denied by default.

The (mallware) app requires root access.

Unless the gadget is "rooted". And a stock Android ROM is *never* rooted and thus root access will never be granted to the (mallware) app. Game Over!

Update: Homer contributed in comp.os.linux.advocacy:

It's not just FUD, it's an outright lie. The so-called "viruses" for
Android have to be voluntarily downloaded, installed and run by the
users, which classifies them as malware for dummies, not "viruses".

One might as well describe "rm -fr /" as a "virus" too.

None of it has any bearing on Linux security. At all. It certainly has
no bearing on Free Software security, since every single example of this
malware has been proprietary. Naturally. That's what you get for running
mystery binary blobs from untrusted sources.

Of course, the anti-virus companies, who are the self-interested source
of this propaganda, would like us to believe otherwise.

 Update: Bob Hauck contributed in comp.os.linux.advocacy:

It is actually tighter than that. For example, /system is mounted 
read-only and each app runs as a different user.
Update: Homer also contributed in comp.os.linux.advocacy:
It also utilises a mandatory access control mechanism similar to
SELinux contexts, and sandboxes apps into their own address spaces.

http://developer.android.com/guide/topics/security/permissions.html
I was too generous in the previous version of this post, because Homer added this to the discussion on comp.os.linux.advocacy:
Just out of curiosity I tried several antivirus apps for Android.
The first few found nothing. Kaspersky didn't do anything at all,
it must only check newly created files, since there's no scanner.
Finally I tried "Dr. Web Lite", which found something called "not
a Virus Adware.Startapp.origin.0" in the file "hyperspacelite_10"
(a screensaver). It turns out this "malware" is nothing more than
the perfectly legitimate advertising code built into ad-supported
freeware, and not exactly clandestine either given that it places
a rather conspicuous "search" button on the launcher, which links
to an affiliate search sponsor. I'm sure the antivirus profiteers
simply "forgot" to mention that their sensationalist "statistics"
are based on utter bullshit like this, though.

This is on a two year-old, heavily used, rooted SGS with a couple
of hundred apps, many of which are "hacker" oriented and obtained
outside the market.

Android is "doomed".
 I can confirm this. Used the UBEROiD custom ROM on my TomTech WM8650 7" Tablet and never had mallware on this rooted device. And yeah, Android is clearly "doomed" with 1 million activations per day! (Notice that Homer is parodying the insane DFS Microsoft Astroturfer, with this laughable statement :-)


Exploiting Windows User's Incompetence.


I never understood why adoption of Desktop GNU/Linux didn't took off that well, but that's out of the scope of this post. On the other hand Android is clearly adopted by the masses.

What we see is that the majority of Android users are long term Windows users as well, who struggle to some extend with Android on a technological merit.

They have been deceived in the way how Anti-Everything-Ware will grand them (the illusion of) a secure system. Not realising that all this overpriced Anti-Everything-Junk is nothing but a placebo. Since Android enjoys mass adoption, providers of Anti-Everything-Ware are trying to sell their products to Android users.

In case you've missed it: you are paying for your own placebo-effect! Purchasing Anti-Virus software.

The solution.

You as a Android user and certainly in case you are a Chef* can educate yourself by installing GNU/Linux on your desktop or laptop and learn about Linux, the file hierarchy and its security control.

After you have educated yourself, you will understand how laughable and pathetic the claims of the Android Mallware FUDsters are. Have a good laugh and a lot of Fun, educating yourself ;-)

Installing GNU/Linux in a virtual machine.


If you are scared to install GNU/Linux on your Windows machine as a dual boot system, you can always install your preferred GNU/Linux distribution on Top of Windows, as a Virtual Machine. What you'll need is a VM application like VirtualBox and a ISO image of your preferred GNU/Linux distribution.

It is out of the scope of this post, to teach you how to install a virtual machine, yet there are 100's of tutorials and even instruction videos on the World Wide Web for free!

* Chef is Android Hacker Slang for a person who creates (Cooks) custom Android ROM's.