Skip to comments.
Secret Back Door in Some U.S. Phones Sent Data to China, Analysts Say
NY Slimes ^
| NOV 15, 2016
| MATT APUZZO and MICHAEL S. SCHMIDT
Posted on 11/16/2016 7:42:09 PM PST by null and void
WASHINGTON For about $50, you can get a smartphone with a high-definition display, fast data service and, according to security contractors, a secret feature: a backdoor that sends all your text messages to China every 72 hours.
Kryptowire, the security firm that discovered the vulnerability, said the Adups software transmitted the full contents of text messages, contact lists, call logs, location information and other data to a Chinese server. The code comes preinstalled on phones and the surveillance is not disclosed to users...
Security experts frequently discover vulnerabilities in consumer electronics, but this case is exceptional. It was not a bug. Rather, Adups intentionally designed the software to help a Chinese phone manufacturer monitor user behavior...
At the heart of the issue is a special type of software, known as firmware, that tells phones how to operate. Adups provides the code that lets companies remotely update their firmware, an important function that is largely unseen by users. Normally, when a phone manufacturer updates its firmware, it tells customers what it is doing and whether it will use any personal information. Even if that is disclosed in long legal disclosures that customers routinely ignore, it is at least disclosed. That did not happen with the Adups software, Kryptowire said.
The software was written at the request of an unidentified Chinese manufacturer that wanted the ability to store call logs, text messages and other data, according to the Adups document. Adups said the Chinese company used the data for customer support.
Because Adups has not published a list of affected phones...
Kryptowire discovered the problem through a combination of happenstance and curiosity. A researcher there bought an inexpensive phone, the BLU R1 HD, for a trip overseas. While setting up the phone, he noticed unusual network activity...
(Excerpt) Read more at nytimes.com ...
TOPICS: Business/Economy; Crime/Corruption; Foreign Affairs
KEYWORDS: cellphones; china; ispy; mobilephones; spyware
Navigation: use the links below to view more comments.
first 1-20, 21-27 next last
Android=google="Don't be evil"
To: null and void
I don't see how this has anything to do with Android or Google. Adups may be running inside of the Android sandbox but it is not part of Android nor is Android in any way responsible for its inclusion in the phone's software suite.
That being said... yep, Google is evil and Android IS Google's evil stepchild.
2
posted on
11/16/2016 8:02:21 PM PST
by
Garth Tater
(What's mine is mine. Don't like it? Come and take it.)
To: COUNTrecount; Nowhere Man; FightThePower!; C. Edmund Wright; jacob allen; Travis McGee; opentalk; ..
At no point in history has any government ever wanted its people to be defenseless for any good reason ~ nully's son
The biggest killer of mankind
Nut-job Conspiracy Theory Ping!
To get onto The Nut-job Conspiracy Theory Ping List you must threaten to report me to the Mods if I don't add you to the list...
3
posted on
11/16/2016 8:07:31 PM PST
by
null and void
( If you defy federal law, we deny federal funds.)
To: null and void
Your most honorable Nullness, please forgive me for not understanding this post. True or not? Can it be verified? As always, may a void never encompass the entirety of your humble nullness.
4
posted on
11/16/2016 8:09:03 PM PST
by
Fungi
To: null and void
They now have my top secret dry brine recipe for the turkey.
Everyone be very afraid.
5
posted on
11/16/2016 8:13:30 PM PST
by
Harmless Teddy Bear
(Not a Romantic, not a hero worshiper and stop trying to tug my heartstrings. It tickles!)
To: Fungi
AFAIK, absolutely true. The Chinese bugged the phones to report EVERYTHING back to the Mainland.
Found the story on a reputable trade journal web site.
And hey, I you can’t trust the NYT, who can you trust???
6
posted on
11/16/2016 8:18:25 PM PST
by
null and void
( If you defy federal law, we deny federal funds.)
To: null and void
Good thing the Chicoms don’t do that with the chips we use in our weapon systems......
7
posted on
11/16/2016 8:18:54 PM PST
by
VanShuyten
("a shadow...draped nobly in the folds of a gorgeous eloquence.")
To: Harmless Teddy Bear
Well, your enemies have it.
How’s about sharing it with your FRiends?
8
posted on
11/16/2016 8:19:54 PM PST
by
null and void
( If you defy federal law, we deny federal funds.)
To: null and void
Will this hurt or help my chances of securing a mail-order bride?
9
posted on
11/16/2016 8:28:45 PM PST
by
Veggie Todd
(The tree of liberty must be refreshed from time to time with the blood of patriots and tyrants. TJ)
To: Veggie Todd
That depends entirely on what’s in your texts...
10
posted on
11/16/2016 8:29:47 PM PST
by
null and void
( If you defy federal law, we deny federal funds.)
To: null and void
“That depends entirely on whats in your texts...”
Well, I’m being coached by Carlos Danger.
11
posted on
11/16/2016 8:33:16 PM PST
by
Veggie Todd
(The tree of liberty must be refreshed from time to time with the blood of patriots and tyrants. TJ)
To: Veggie Todd
12
posted on
11/16/2016 8:40:23 PM PST
by
null and void
( If you defy federal law, we deny federal funds.)
To: null and void
Guess I just sent China a whole bunch of really stupid memes.
13
posted on
11/16/2016 8:43:14 PM PST
by
pax_et_bonum
(Never Forget the Seals of Extortion 17 - and God Bless America)
To: null and void
Your most honorable Nullness, the void has engulfed me. What the hell does AFAIK mean?
14
posted on
11/16/2016 8:50:37 PM PST
by
Fungi
To: Fungi
15
posted on
11/16/2016 9:01:55 PM PST
by
null and void
( If you defy federal law, we deny federal funds.)
To: null and void
Merci beaucoup. The void has lifted, the stars show through, the whales sing, dolphins jump, fungi shed their spores, asci explode through their operculum, flowers effloresce, trilobite beetles find their mate, and the angels sing. All is well your most honorable Nullness.
16
posted on
11/16/2016 9:13:11 PM PST
by
Fungi
To: null and void
17
posted on
11/16/2016 11:08:06 PM PST
by
Swordmaker
(This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
To: Garth Tater
Nothing in this article assures users that this firmware based spyware could not send your passwords, electronic banking info, etc. to unknown third parties.
I also find it hard to believe that Android does not have protections to examine itself against a Google master copy and automatically delete any changes third parties have made to it.
18
posted on
11/16/2016 11:09:24 PM PST
by
Kellis91789
(We hope for a bloodless revolution, but revolution is still the goal.)
To: Kellis91789
Nothing in this article assures users that this firmware based spyware could not send your passwords, electronic banking info, etc. to unknown third parties.
I think this article makes it pretty clear that this spyware DOES send your passwords, electronic banking info, etc to third parties.
I also find it hard to believe that Android does not have protections to examine itself against a Google master copy and automatically delete any changes third parties have made to it.
Android is an open source software project.
Android Open Souce Project There are many, many modifications made to it by many, many people and firms. There is absolutely no way that Google can keep a "master copy" and automatically delete any changes third parties have made to it. That would kind of defeat the idea of open source software, if you know what I mean. Further more, Adups is not a modification made to Android, it is a piece of spyware that runs inside Android and possibly inside the firmware of the phone that was placed on the phone by the phone's manufacturer.
19
posted on
11/16/2016 11:26:55 PM PST
by
Garth Tater
(What's mine is mine.)
To: Garth Tater
That is scary. I didn’t realize Android was open source. I guess I will never own an Android phone. What about the Windows phones ?
20
posted on
11/16/2016 11:31:54 PM PST
by
Kellis91789
(We hope for a bloodless revolution, but revolution is still the goal.)
Navigation: use the links below to view more comments.
first 1-20, 21-27 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson