1. I'm tweeting a lot these last days, let make a quick recap
2. @Gioneeglobal, a Chinese phone maker who sell his phone in the US under the name @BLU_Product, made a phone for #NorthKorea. Afaik, they didn't make a public statement.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
3. @OnePlus removed the #angela backdoor I found last November from his products
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
4. I published the decompiled source code of the #DPRK's RedFlag #android app.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
6. @makemytrip is tracking his users without their consent. 8 days after this tweet, they didn't make a public statement or contact me.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
7. The password of local database in the official #Aadhaar#android app is always the same. 7 days after, @UIDAI didn't make a public statement or contact me.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
8. @UIDAI don't know how to sign an app correctly. They didn't make a public statement or contact me.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
9. I found 2 "test apps" on the official @UIDAI#playstore account. They didn't contact me but removed the apps few minutes after my tweets.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
10. Found 2 ways to bypass the password protection in the official #Aadhaar#android app. @UIDAI didn't make a public statement or contact me.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
11. After caught a basic Git error made by @aadhaar_bridge (@KhoslaLabs). They removed their entire aadhaar-bridge repo on #Github. We had a discussion but they didn't explain why they removed it.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
12. Found a security issue in the @aadhaarapi's website. They contact me and fixed the issue. I will disclose the details soon.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
13. Another bug in the #Aadhaar app. @UIDAI didn't make a public statement or contact me.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
14. I found 100 malwares signed with the private key of @lorensiuswlt. He contacted me and denied to be the author. He said he uploaded his private key on the web few years ago.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
15. I found a #coinhive script on the @lorensiuswlt's website. He contacted me and took his website offline.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
16. @safelyfiled which keep sensitive docs, records, assets and directives digitally #secure is vulnerable to a basic #XSS. They didn't make a public statement or contact me.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
17. @NewIndianXpress, an #Indian newspaper is vulnerable to a basic #XSS. They did not make a public statement or contact me.
External Tweet loading...
If nothing shows, it may have been deleted
by @fs0c131y view original on Twitter
All this work had been done for free (am I stupid 🤔?), if you want to support my research and pay me the coffee, feel free to send me BTC to this address 382rGcim5vDpztHyy9EDnvtLuAAasJHrEi
• • •
Missing some Tweet in this thread? You can try to
force a refresh
First thing first, we are talking about this app "Bolo Messenger - Secure Chat, Voice & Video Calls" which is the new version of the #Kimbho app play.google.com/store/apps/det…
When you send a message with the #Bolo app, it is checking if your contact is online with this request. The endpoint is taking the "contact userId" (the 1st black rectangle in the picture)
Time for a new thread. The #android#application called @moinsbete is one of the most downloaded applications in France. This app is sending without your consent your personal data to @mopub:
- location
- operator
- mcc
- mnc
- country
- screen size
Yes, all these requests to @mopub are HTTP requests... Welcome to 2018...
This is a very good example of data abuse. Every time you open the @moinsbete#android#app with location on, your location is send without your consent to an US based server owned by @mopub
The samples are available on @koodous_project and @virusbay_io
28c69801929f0472cef346880a295cdf4956023cd3d72a1b6e72238f5b033aca
679d6ad1dd6d1078300e24cf5dbd17efea1141b0a619ff08b6cc8ff94cfbb27e
990d278761f87274a427b348f09475f5da4f924aa80023bf8d2320d981fb3209