PPCGeeks

PPCGeeks (http://forum.ppcgeeks.com/index.php)
-   Android On TP2 (http://forum.ppcgeeks.com/forumdisplay.php?f=179)
-   -   [CAB] GSM&CDMA Project Android Port and Startup Utility [01/23] FRX04 Reference! (http://forum.ppcgeeks.com/showthread.php?t=114400)

arrrghhh 11-30-2010 08:03 PM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by tacotoy (Post 2004913)
eh i use mac addresses to make it more entertaining..... all the appearances of an open network with nothing for the devices to worry about. let the router act as god.... so much easier

Unfortunately MACs can easily be spoofed, and if you are running open it'd be very easy to inject some packets and figure out what MAC addresses are in use... Just to let ya know, and sorry for continuing this OT discussion ;)

fishingmedic 11-30-2010 08:09 PM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by arrrghhh (Post 2004939)
Unfortunately MACs can easily be spoofed, and if you are running open it'd be very easy to inject some packets and figure out what MAC addresses are in use... Just to let ya know, and sorry for continuing this OT discussion ;)

You guys all scare me... I'm gonna break out my aluminum foil hat so you can't steal my brainwaves...

arrrghhh 11-30-2010 08:58 PM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by fishingmedic (Post 2004943)
You guys all scare me... I'm gonna break out my aluminum foil hat so you can't steal my brainwaves...

LOL sorry I just like doing penetration testing stuff... it's interesting, and helps me in my job ;)

fishingmedic 11-30-2010 09:04 PM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by arrrghhh (Post 2004973)
LOL sorry I just like doing penetration testing stuff... it's interesting, and helps me in my job ;)

It's quite alright, as I sit here resembling the freaking tinman from the Wizard of Oz cuz I don't want anyone stealing my thoughts... lmao

tk76 11-30-2010 09:06 PM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
arrrghhh: Thanks. The reformatting using a different (non-window) utility did the trick.

The internal memory is now recognized as a 4GB SD, and flash and skyfire work. They also appear in marketplace.

Thanks for your help. Now the Diamond works in every way except camera. So a very usable android solution.

manekineko 12-01-2010 12:28 AM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by arrrghhh (Post 2004873)
The TP2 is a good solid phone, but performance-wise it's identical to the DIAM and RAPH - they all share the same processor & RAM specs, believe it or not...

Actually, while they have the same processor and RAM, the TP2 has always performed better in WinMo than DIAM and RAPH. Maybe it's driver differences, or something else like chipset differences, but you would actually think it would run slower with increased resolution, but benchmarks suggest otherwise. Also, in my own experience, the TP2 was definitely smoother in WinMo than my old DIAM.

Benchmark:
HTC Touch Pro2 - Review

InvincibleLiving 12-01-2010 01:48 AM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by tk76 (Post 2004980)
arrrghhh: Thanks. The reformatting using a different (non-window) utility did the trick.

The internal memory is now recognized as a 4GB SD, and flash and skyfire work. They also appear in marketplace.

Thanks for your help. Now the Diamond works in every way except camera. So a very usable android solution.

Congrats and i hate you all at the same time lol! I really want flash and skyfire working on our TP2's and youre here telling me it's running on your Diamond! :(

tacotoy 12-01-2010 01:48 AM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by arrrghhh (Post 2004939)
Unfortunately MACs can easily be spoofed, and if you are running open it'd be very easy to inject some packets and figure out what MAC addresses are in use... Just to let ya know, and sorry for continuing this OT discussion ;)

if someone is that determined to get in they are going to anyways.... im just saying. it is easy enough to spoof just about anything if you are able to catch a few packets

that and i already hacked my neighbors networks to make sure none of them were geeks that could hack me lol

natemcnutty 12-01-2010 05:23 AM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by fishingmedic (Post 2004943)
You guys all scare me... I'm gonna break out my aluminum foil hat so you can't steal my brainwaves...

I bet you'd be surprised to know that aluminum foil hats actually amplify the signals used for GPS and Cellular Data. MIT students are hilarious: http://berkeley.intel-research.net/arahimi/helmet/

As Arrrghhh has said, MAC address spoofing is extremely simple, and technically one could grab the MAC address of your router, then deauth all clients, and re-route all clients to their machine by spoofing the MAC/IP of the wireless router. Now they have access to all of your sessions as a man in the middle attack ;)

I wouldn't even bother setting up MAC address filtering as its a waste of your time. The only viable solution is WPA2, and always run Firefox with the Blacksheep addon if you really have to connect to a public use Wifi.

OK, sorry for the OT. Time for bed :)

fishingmedic 12-01-2010 11:24 AM

Re: [CAB] GSM&CDMA Project Android Port and Startup Utility [11/221] FRX03 Reference!
 
Quote:

Originally Posted by natemcnutty (Post 2005174)
I bet you'd be surprised to know that aluminum foil hats actually amplify the signals used for GPS and Cellular Data. MIT students are hilarious: http://berkeley.intel-research.net/arahimi/helmet/

As Arrrghhh has said, MAC address spoofing is extremely simple, and technically one could grab the MAC address of your router, then deauth all clients, and re-route all clients to their machine by spoofing the MAC/IP of the wireless router. Now they have access to all of your sessions as a man in the middle attack ;)

I wouldn't even bother setting up MAC address filtering as its a waste of your time. The only viable solution is WPA2, and always run Firefox with the Blacksheep addon if you really have to connect to a public use Wifi.

OK, sorry for the OT. Time for bed :)

I repeat... you guys scare me... I just beg, please don't steal my pron!!! lol (And yes, I use WPA2 at home...)


All times are GMT -4. The time now is 02:36 PM.

Powered by vBulletin® ©2000 - 2025, Jelsoft Enterprises Ltd.
©2012 - PPCGeeks.com


Content Relevant URLs by vBSEO 3.6.0