Crypto mechanics in ios8 and android L

Cathal (Phone) cathalgarvey at cathalgarvey.me
Tue Oct 14 23:29:23 PDT 2014


Control the phone by installing Android Scripting Layer on it and exposing the API control port. Simples.

On 15 October 2014 06:55:27 GMT+01:00, coderman <coderman at gmail.com> wrote:
>On 10/14/14, bluelotus at openmailbox.org <bluelotus at openmailbox.org>
>wrote:
>> How would tethering a tablet or laptop to a smartphone be more
>private
>> than directly using the smartphone?
>
>
>it is more private because you are separating domains of
>communication. the less trustworthy smartphone is used as a network
>link (cell or other uplink) and not trusted with the content of the
>encrypted communications it carries.
>
>likewise, the cryptographic sessions live off device, on the tethered
>tablet or laptop, where presumably it is beyond reach of a suspect
>smartphone.
>
>there are many attack methods which can escalate beyond the vulnerable
>device, however, so this approach must be considered in the context of
>threat model, and likely insufficient alone.
>
>
>
>> Do tablets have a secret baseband?
>
>yes, however they are fewer, and if limited to 802.11, easier to
>isolate / verify with external tools.
>
>
>
>> How to drive a phone's sms over it's usb port?
>
>"instrumenting and automating" device behavior through remote or
>programmatic means is a black art unto itself.  :P
>
>
>best regards,

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 2163 bytes
Desc: not available
URL: <http://lists.cpunks.org/pipermail/cypherpunks/attachments/20141015/9e23bb40/attachment-0001.txt>


More information about the cypherpunks mailing list