Items tagged with: linux
Download #Jami for #Android, #iPhone, #Windows, #Mac or #Linux - it seems it may be the most #secure and #flexible #communications #software yet
It seems that the #software called Jami (previously called #ring) is a #decentralised solution to making #phonecalls, sending #sms #texts, #transferring #files and making #video #calls.
As it is #decentralised your #privatekey (used for #encryption of all your #traffic) is stored once and only on your #device.
It uses #GnuTLS (SSL) to make the #public #private #key transfer and then #communicate #securely. This is the same #technololgy as used when you access your #bank account.
There are also comments on the #development site suggesting that they upgrade to #NaCl #crypto lib - this will allow for the use of #elliptic #curve #encryption as well.
Of course it's also completely #open-source #foss unlike (for example) #telegram, #whatsapp, #skype and is very flexible as to what #platform it will run on.
If it does everything it says (and in my own tests, it seems to), whilst remaining #free and #opensource, it's the best example of #secure #communication I've ever seen.
Has anyone else tried it / fancy trying it / feeding back? It may be the #FOSS #communication app that will properly upset #facebook and #microsoft.
HN Discussion: https://news.ycombinator.com/item?id=19947515
Posted by jrepinc (karma: 2541)
Post stats: Points: 189 - Comments: 62 - 2019-05-18T14:20:52Z
#HackerNews #from #government #korean #linux #south #switch #windows
HackerNewsBot debug: Calculated post rank: 146 - Loop: 60 - Rank min: 100 - Author rank: 66
Vom 5. bis 9. Juni 2019 findet in Hamburg zum zweiten Mal eine MiniDebConf mit Vorträgen und gemeinsamem Entwickeln im Hackspace statt.
#Linux #Debian #Gnu #Tux #Germany #Hamburg #OpenSource
GraphQL mental model
"GraphQL: A query language for your API"
GraphQL was developed as an efficient way for backend servers to export data to a variety of clients that need different subsets of the full dataset, without the server needing to know ahead of time who needs what.
Discussion of the "graph" in GraphQL is available both as blog post https://blog.apollographql.com/the-concepts-of-graphql-bc68bd819be3 and as a video presentation
#linux #opensource #programming #graphql
Things you’re probably not using in Python 3 – but should
Now we can use the lru_cache to optimize it (this optimization technique is called memoization). The execution time goes down from seconds to nanoseconds.Whoa... did not know python could do that
#linux #opensource #python #programming
Hide-out for ubuntu debugging symbols
Sometimes you really could use debugging symbols for distro-built tools or applications
* trying to track down bugs, e.g. running under #gdb
* system profiling, e.g. with #perf
but most of the packages with debugging symbols lurk in a whole different repo than the one where the tool or application lives
#linux #opensource #ubuntu #debugging #profiling #tracing
function tracing hack using gdb
The first article of this two-part series is introductory and can be skimmed or skipped for those already proficient at using gdb
#linux #opensource #gdb #programming
to be straight: have not managed yet to unlock a pin locked ipad 3 and ipad 4 and/or recover the data.
it is easy to just overwrite the ipad with the latest firmware via itunes.
but i want to backup and extract all possible files before that.
if you want to jailbreak your Apple device, basically there are a lot of tools and you need to find the one that suits your hardware and firmware model.
not an easy task.
have an older ipad 3 to wich the PIN was lost (no it is not stolen, it’s from a relative who forgot it and also can not remember his itunes password (alzheimer is very comon these days)). (Model: A1430 iPad 3, Early 2012, +Wi-Fi + Cellular, 30-pin connecto) but latest redsn0w (redsn0w_win_0.9.15b2.zip) says „iPad 3 is not supported“ (probably it has a newer iOS installed than 5.1.1)
this site helps you find and download newer and older firmwares for your device: (GOOD JOB! 🙂
http://www.getios.com/ here you also can get a lot of firmware versions for your iDevice.
also interesting: https://nerdpol.ch/tags/jailbreak
- pull an (encrypted) backup from the device
- not possible via itunes with PIN locked ipad
- most approaches use some exploit to load their own ramdisk and get access to the device
- via brute force, find the decryption PIN
- extract the data
- reset the device
„Imagine a computer which is protected with an OS level password – we can still access the hard disk data by booting a live CD, or by removing the hard disk and connecting it to another machine. When we compare computers to the iPhone, it is an embedded device. So it is not easy to take out the chips (hard disk) and dump data into it. To perform iPhone forensics, we use the Live CD approach. As the iPhone has only one serial port, we are going to load custom OS over the USB to access the hard disk of the device. The problem here is: the iPhone only loads firmware designed by Apple.
In order to create and load the forensic toolkit, first we need to understand iPhone functions at the operating system level. iOS (previously known as iPhone OS) is the operating system that runs on all Apple devices like iPhone, iPod, Apple TV and iPad. iOS is a zip file (ships with .ipsw extension) that contains boot loaders, kernel, system software, shared libraries & built in applications.
When an iPhone boots up, it walks through a chain of trust, which is a series of RSA signature checks among the software components in a specific order as shown below:
The BootRom is Read-only memory (ROM) and it is the first stage of booting an iOS device. BootRom contains all the root certificates to signature check the next stage.
iPhone operates in 3 modes – Normal Mode, Recovery Mode, DFU mode
In Normal mode, BootRom start off some initialization stuff and loads the low level boot loader (LLB) by verifying its signature. LLB signature checks and loads the stage 2 boot loader (iBoot). iBoot signature checks the kernel and device tree, while the kernel signature checks all the user applications.
In DFU mode, iPhone follows the boot sequence with a series of signature checks as shown below. BootRom signature checks the second level boot loaders (iBSS, iBEC). Boot loader signature checks the kernel, and the kernel signature checks the Ramdisk.
During iOS update, the Ramdisk gets loaded into RAM and it loads all the other OS components.
In Forensics, we will create a custom Ramdisk with our complete forensic tool kit and load it into the iPhone’s volatile memory.
Signature checks implemented at various stages in the boot sequence do not allow us to load our custom Ramdisk. To load our custom Ramdisk, we have to bypass all these signature checks. In the chain of trust boot sequence, if we compromise one link, we can fully control all the links that follow. The hacker community has found several vulnerabilities in BootRom. By using these, we can flash our own boot loader and patch all other signature checks in all the subsequent stages. Apart from signature checks, every stage is also encrypted. These encryption keys can be grabbed from JailBreaking tools.“
another lengthy writeup: https://blog.elcomsoft.com/2017/11/the-art-of-ios-and-icloud-forensics/
unlocking iDevices: how ex-empoyees make business
„Cellebrite, through means currently unknown, provides these services at $5,000 per device,“
Mysterious $15,000 ‚GrayKey‘ Promises To Unlock iPhone X For The Feds
- AXIOM has the most advanced parsing and carving techniques which finds more evidence than any other tool, including 25% more pictures.
- Get more detailed information about what someone was doing at any given time and where, with artifacts like KnowledgeC, iOS Wallet, geolocation data, Screen Time, and more.
- Analyze the full file system (including iTunes backup-style images) and decrypted Keychain from iOS devices and find evidence that other tools miss.
- Memory images could contain valuable evidence like messages, call logs, and email. AXIOM natively supports the analysis of memory from GrayKey images without the need to install third-party conversions or plugins.
- iOS images contain a lot of native files and raw data. Use AXIOM to cut through the noise of data and save time during your investigations by quickly surfacing only relevant evidence rather than unactionable data.
- Discover new artifacts with Dynamic App Finder to automatically scan your file system and memory images for relevant chat, browser, geolocation, and identifier data.
- AXIOM is a complete digital investigation platform that gives you the power to analyze evidence from GrayKey images alongside data from other computer, cloud, social media, and mobile evidentiary sources.
„can take up to three days or longer to (crack) for six-digit passcodes“ … and recover the data of the iDevice.
Posted by Rajesh Pandey on Apr 30, 2019
The Electra team surprised everyone today by releasing Chimera, a new iOS 12 – iOS 12.1.2 jailbreak for A7-A12 devices including the iPhone XS and iPhone XR. Chimera has been built from the ground up and comes with Sileo as its default package manager.
the hardware hack: How to unlock iCloud locked Apple iPad 2, 3, 4, iPad Air and Air 2, iPad mini 1, 2, 3, 4, iPad 12.9 and 9.7 – WARNING!
This method works ONLY on iPads with 3G/4G/LTE and removes cellular from your iPad.
it will become wifi-only! (no 3G/4G/LTE no more!)
„This method will help you bypass iCloud on locked iPads.
This manual will help you with iCloud bypass on your iPad Cellular.
- After bypass iCloud you will have iPad Wi-Fi Only.
- Sim-slot (GSM, Mobile, SimCard) will not work.
- GPS and Bluetooth will work.
- On the iPad 2 3G Model A1396 (GSM) remove the resistor r1205. On the Model iPad 2 3G A1397 (CDMA) move resistor r1205 to position r1204.
- iPad 2 3G will enter DFU mode.
- Connect the iPad 2 3G to your PC or Mac.
- After that you need to restore the iPad 2 3G through iTunes with firmware of Wi-Fi ONLY model and activate using the official method.
- Turn off the automatic firmware update: Settings \ iTunes Store, App Store \ Automatic download \ Updates.
After this you will can install any apps on your iCloud free iPad, make jailbreak, assign your own Apple ID account and do any other things.
Apple devices (for example iPads) have some part on logic board which called Board_id. Board_id is responsible for how device identifies itself. For iPad there are several possible configurations: Apple TV, Apple iPhone, Apple iPad Cellular, Apple iPad WiFi only.
When Apple’s iCloud servers bloсked iPads they do this in 2 ways:
- iPad WiFi only will be blocked by it serial number.
- iPad Cellular will be blocked by it serial number and IMEI.
If you just only disable modem you will get error and not working device. Sometimes this happens when modem or cable modem is broken even on iPads which isn’t blocked in iCloud. My method can revive such devices.
When you disabled modem chip and changed Board_id device will stop work properly. Something inside will say: “Hey man, something wrong! My hardware is like for WiFi only model, but you use firmware for Cellular model. I go in DFU-mode and you should go in iTunes and restore me”.
When you connect your iPad to BigBrother OS will install driver for it.
At finish you will have iCloud unlocked iPad WiFi only. Now It can be registered on your own Apple ID through new clean serial number. Voila!
If you have some problem with recovering check USB cable and restore iPad manualy from file with firmware. You can download firmware from ipsw.me. Remember that now you have iPad WiFi only hardware and you should download WiFi only firmware. For example, if you have iCloud locked iPad Air Cellular A1475 you should download firmware for iPad Air WiFi only A1474.
And Yes. At any moment you can covert your iCloud freу iPad WiFi only with hardware method back to iPad Cellular. But iCloud blocking will back too.
Be careful and good luck!“
Here you can read manual to bypass iCloud on model of your iPad:
- bypass iCloud on iPad 2 A1396, A1397 and A1395,
- bypass iCloud on iPad 3 A1403, A1430 and A1416
- bypass iCloud on iPad 4 A1458, A1460 and A1458,
- bypass iCloud on iPad Air A1475 and A1474,
- bypass iCloud on iPad mini A1454, A1455 and A1432,
- bypass iCloud on iPad mini 2 A1490 and A1459,
- bypass iCloud on iPad Air 2 A1567 and A1566,
- bypass iCloud on iPad mini 3 A1600 and A1599,
- bypass iCloud on iPad mini 4 A1550 and A1538,
- bypass iCloud on Pro 12.9 A1652 and A1584,
- bypass iCloud on Pro 9.7 A1674 and A1673.
unlock: A1430 (GSM) and A1403 (CDMA)
… respect! this border_id change thing needs further investiagion.
how to open the thing:
all sort of weird things happening:
Hi can someone help me with ipad mini A1454 I have removed the resistor R1204 as stated in the instructions I need to now make a jumper on R1205 because itunes detects my ipad as a apple tv so a jumper going from R1205 but unsure where the other end of the jumper goes please help me I would be really grateful
„use good pencil (graphite) to make short (jumper) in R1205“
redsn0w is ooooold:
in this video DiplInf Sebastian Scheiber shows how to jailbreak an locked (!) iPad and recover the data.
- jailbreak the device
- ssh into it (https://github.com/rcg4u/iphonessh)
- brute force the PIN (of course only works with weak PINs (4x digits))
- recover the data
how to get into DFU (recovery) mode:
- hold power button pressed for 3 seconds
- now keep power button pressed while also holding home button pressed
- after a few seconds screen goes dark, now RELEASE POWER BUTTON but still keep home button pressed
Stuck in DFU mode – How to Exit DFU Mode:
Press Home and Power/ Sleep buttons at the same time for 10s > Release the Home and Power/ Sleep buttons together.
iOS 9.2 – 9.3.3 64-bit devices only
iphone 5s iphone 6 iphone 6 plus iphone 6s iphone 6s plus iphone se ipod touch 6g ipad mini 2 ipad mini 3 ipad mini 4 ipad air ipad air 2 ipad pro
will need your apple id and password.
for iOS 6.x – iOS 7.0.x
… this can not be used to unlock an iPad. Your iPad/iPhone will have to be unlocked (PIN) before jailbreaking.
evasi0n is an unconventional utility able to perform jailbreak operations on devices running iOS 6 and 7.
A consequence of the procedure is the removal of several limitations imposed by Apple, allowing users to install software that is not approved by the company and switch phone carriers seamlessly.
evasi0n became a success just days after its first release.
Supposedly, a few million copies have been downloaded in a very short period, which is not necessarily an indication of its efficiency, but sure says a lot. Statistics aside, the general opinion (as stated by most users on the Internet) is that evasi0n is a trustworthy jailbreak application, one that has to offer everything and asks for nothing in return.
evasi0n is special because it can perform an untethered jailbreak operation, which translates into the fact that the iOS device will be able to reboot without requiring a connection with an external device.
The principle it relies on involves a number of complicated steps, most of which are related to exploiting several vulnerabilities that were overlooked by Apple. However, the process is completed silently, without user intervention.
This is the main reason why evasi0n is considered one of the most easy-to-use and accessible applications of its type. It’s not pretentious as far as OS requirements are concerned, nor does it require advanced configurations.
In order for the jailbreak operation to be successful, you need to equip your system with iTunes and connect your iPhone, iPad or iPod to the computer via a USB cable.
It is also recommended that you backup the device in case something goes wrong.
Once you’ve completed these steps, you can proceed with the jailbreak operation, which, if free of errors, shouldn’t take more than five minutes. However, if the process fails, simply reboot the device and relaunch evasi0n.
On an ending note, this is a well-built jailbreak software, easy to use and user-friendly. Nevertheless, a backup operation is vital in case anything goes wrong.
jailbreak works only on 32-bit devices, which includes :
- iPhone 4S, 5C and 5
- iPad 2, 3, 4
- iPad Mini 1
- iPod Touch 5
for older devices and firmwares (iOS 5.1.X)
„RedSn0w actually evolved from the Jailbreaking tool Quickpwn, which was an early Jailbreaking tool used to Jailbreak the 2nd generation of iOS. Nowadays RedSn0w can be used to Jailbreak a lot of versions of iPhone, iPod Touch and iPad.“ … but not all, iPad 4 seems not supported.
RedSn0w iPhone Support:
iPhone 6s Plus: Not Supported
iPhone 6s: Not Supported
iPhone 6 Plus: Not Supported
iPhone 6: Not Supported
iPhone 5s: Not Supported
iPhone 5c: Not Supported
iPhone 5: Not Supported
iPhone 4S: iOS 5 (iOS 5.1.1, iOS 5.0.1, iOS 5.0)
iPhone 4: iOS 6 (iOS 6.0,6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (iOS 3.1.3)
iPhone 3GS: iOS 6 (iOS 6.0, 6.0.1) + iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.6, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)
iPhone 3G: iOS 4 (4.3.4, 4.2.1, 4.1, 4.0.2, 4.0.1, 4.0) + iOS 3 (3.1.3)
RedSn0w iPad Support:
iPad Pro: Not Supported
iPad Air 2: Not Supported
iPad Air: Not Supported
iPad Mini 4: Not Supported
iPad Mini 3: Not Supported iPad Mini 2: Not Supported
iPad Mini: Not Supported
iPad 4: Not Supported <- argh!
iPad 3: iOS 5 (iOS 5.1.1) <- RedSn0w told me „Ipad 3 is not supported“, probably it has a newer iOS installed than 5.1.1)
iPad 2: iOS 5 (iOS 5.1.1, 5.0.1)
iPad 1: iOS 5 (iOS 5.1.1, iOS 5.1, iOS 5.0.1, iOS 5.0) + iOS 4 (iOS 4.3.5, 4.3.4, 4.3.3, 4.3.2, 4.3.1, 4.3, 4.2.1) + iOS 3 (iOS 3.2.2)
PwnageTool 4.3 Info
Method 2: Get Out of DFU Mode on iPhone/iPad/iPod touch with PhoneRescue
Click here to download PhoneRescue free version!
Step 1: Launch PhoneRescue on your computer > Connect your iOS device to your computer with a USB cable > Wait for PhoneRescue to recognize your iOS device.
Step 2: Click on „Exit Ramdisk Mode“ at the bottom of the Homepage.
other jailbreaking tools:
#linux #gnu #gnulinux #opensource #administration #sysops #apple #ipad #phone #jailbreak
Debian 9, WLan-Verbindung
Hallo, ich habe auf einem Rechner Debian installiert, aber ich kann keine WLan-Verbindung aufbauen.
Unter Netzwerke ist unser WLan aufgeführt, aber wenn ich "Verbinden" anklicke, kommt die Meldung "WiFi-Netzwerk wurde nicht gefunden" und "Die Verbindung WLan wurde deaktiviert".
Ich denke, ich muss den WLan-Schlüssel irgendwo eingeben, ich weiss leider nicht, wo.
Kann mir jemand weiterhelfen?
ls -laRSh --full-iso > listing.txt 2> listing_err.txt
also ein rekursives files/folder listing, am liebsten auch noch eingerückt ;)
aber listin.txt wird dabei vermutlich sehr schnell sehr groß (der ordner um den es geht hat ZIEMLICH viele unterordner), wie kann ich das genialerweise splitten / komprimieren? Achso und Ausführungszeit wäre auch gut, wenn's nicht Tage dauern würde ;)
Bin für schön lesbare/parsebare Ergebnisse offen ;)
bedingung: kann keine weiteren programme installieren, kann aber ein shellscript sein, muss also alles mit Hausmitteln erfolgen.
#hilfe #shellnerds #linux
We Need to Save What Made Linux and FOSS Possible | Linux Journal
#linux #libre #freesoftware #freedom
If we take freedom and openness for granted, we'll lose both. That's already happening, and we need to fight back. The question is how.
I am haunted by this passage in a letter we got from reader Alan E. Davis (the full text is in our Letters section):
...the real reason for this letter comes from my realization—in seeking online help—that the Linux Documentation Project is dead, and that the Linuxprinting.org project—now taken over by open printing, I think, is far from functioning well. Linux has been transformed into containers, and embedded systems. These and other such projects were the heart and soul of the Free Software movement, and I do not want for them to be gone!
This is the kind of thing Bradley Kuhn (of the Software Freedom Conservancy) lamented in his talk at Freenode.live last year. So did Kyle Rankin in his talk at the same event (video, slides and later, an LJ article). In an earlier conversation on the same stage (it was a helluva show), Simon Phipps (of the Open Source Initiative) and I had our own lamentations.