Re: [ot][spam] log: trying to take control of my free government phone
it is so incredible how responsive this phone is now previously, i would tap or swipe part of the screen, and it would register touches elsewhere, and it was impossible to do anything it just does what i say to do now it is like having palsy and having it go away
Re: [ot][spam] log: trying to take control of my free government phone
none of the images with, like, an app store on them, fit on the partition given there is read/write access to the whole flash, it could be repartitioned. the userdata partition is much larger than the system partition, and with an open rom userdata could be moved entirely to a microsd card. the chipset is 64 bit, but the os is 32 bit. leaves one wondering what would be involved in changing that. that would mean changing more than just the system partition, though, i infer. i'm flashing back my userdata, since it seems to work ok with treble, and then planning on reflashing the system partition, installing f-droid manually, and falling asleep. the flash has 18-19 minutes left. might fall asleep first, uncertain.
Re: [ot][spam] log: trying to take control of my free government phone
b2sums 71ad9faaef18ceb973c527db29cb1fc3f27ab2286b49e7f4238645f4048815d6ad18773ed52455aecfae7d7221daaab183b9f55a92e545cc36601d1970dda26f v415-2022-07-19-system-squeak-arm32_binder64-ab-vanilla.img size=1308471296 boots=true my partitions from the image i took: f0676fef12a6fdc9074d939d7996c0a564fe4739bb6e31231ca38e4e05b4146345b7afabff97a54aacb39af11cb2fcf2df209abfdd17d24121eddb3d8f46d95c boot size=25165824 a834b19291e54808ba8367ca60e6abd9c744138541284b12bb6caa532fae419b063c26022121148fef68a7d8dc0fa83eb2f00454138c1c54753f7148f6911e0d boot_para size=1048576 a0710951ceaea9a341c0671ad163de6919e90791257c89e078f2bb953e37a8f8a795efe8e31e509e2e723a54b36f8e58b4a1b739e642a4b8affd88264545392b cache size=318767104 2c7497ff142e16092991cba2af39ffec51de988524eb9d05e10e16504e6b1b16fb22febade6755bef224de1cd9b4dc45b91987721f2b44dcc6c2852b416b7cf5 dtbo size=8388608 b01850bf6173db9f5f87f84eaa7d41a502857b93543239a2fcef81790514af222dc9f98aabefb104ff3cec0a3df2af6c71de526a0fb85401618a7654a173cf82 expdb size=20971520 9f28dc4bc3ca4a3ef6d860f6d44801de5d49f4c86bb2410c524c154d4a38de07d58f981837e5c90952f81b5be4294f498e57557203135f30d5bd6f09c7e2a7c3 flashinfo size=16777216 b02dd7288f71fe5b526980e19426527d85a6ef402af59e6a8d5f920ee80444a4454254bfb7a0059a22bdb128c63e254218bf12453bcf1d78c7a0026a2bee0cd3 frp size=1048576 adb7fdd3cee262e9cb5d9e331c5a0c9b79583294e07c0bf80ddfe7031291a6b85176567b13227cdb63a47d693a51b17f40aba27745809ffd11375f118b21e4e0 gpt_backup size=16896 286494ab0ffd66da42cd0440d34c2d4d8173252f826a432774dfdff147c708d8a8d4fd9a4d5d92c5b477f3794a23cfae2d7115ebfc692b375f2da70fe88d3b61 gpt_main size=17408 2293a7a4f497aa92964e1728a0bfca919f255c5b4f8528f1260adfe53248ef48fc1fba8266e7301cbfc2ae5cfe2794eded1571ed1ea1333c3c93585e0d5ba3d1 gz1 size=16777216 2293a7a4f497aa92964e1728a0bfca919f255c5b4f8528f1260adfe53248ef48fc1fba8266e7301cbfc2ae5cfe2794eded1571ed1ea1333c3c93585e0d5ba3d1 gz2 size=16777216 162c177df974a4b9c497150d0f7d952bd3cb8e9316e9ffd3b1d6dd420b89d9f849e48e289fbac79f7151e780e893bc9e8d8cf4749ed3bf6419cfe67a78fb63c6 lk2 size=1048576 162c177df974a4b9c497150d0f7d952bd3cb8e9316e9ffd3b1d6dd420b89d9f849e48e289fbac79f7151e780e893bc9e8d8cf4749ed3bf6419cfe67a78fb63c6 lk size=1048576 f2aa73345a55ea0959a1aa28cdb37997436ec5d36c3bdcc4332332ab0a97f74d16352ed2240dd4a7b487da377f298e8df8e039bae769441755c104d27b0ac19e loader_ext1 size=65536 f2aa73345a55ea0959a1aa28cdb37997436ec5d36c3bdcc4332332ab0a97f74d16352ed2240dd4a7b487da377f298e8df8e039bae769441755c104d27b0ac19e loader_ext2 size=65536 cf6a1eda8b68e6ef111e3e99554dc923d9301e541f6cda998ff1504480adb1c19ac31aa328d1b8c949f530bab34d4df51109da4f4f01d63eff2f18741a565c67 logo size=8388608 43ca91e6c647ce53b8bd238c8d1e66ff95e21a9205887ba084468743aa883cf5c2fad09db28d1ccdb96cab93646b167bd83c802fe508de7d93cb5249af187559 mcupmfw size=1048576 24f3515bafc49dc12c1457a06f503445ceaabac0b8efbdf3c03e048320316719016eac61b195b31085e790e96835fdceb8e4265bdb91abeb18c86e5d2f176356 md1dsp size=16777216 0be5fd2f65c602cfea474eda086b74f7ea5d8ccd7556098a38a02351438f4b1e38f2fded06410a86d3fb718fa41ae093aee3ddd992bf30cb51388baf59b76fe4 md1img size=67108864 1e86bd658db1fb52b3de5da58152c399aa2ff4e5438c733b4a33bfccc6a287e9cfc4021fd2e721939b862ab59f9617d64f5e5ee1dfe2dcc87d06c2797bc21a11 md_udc size=23699456 30643d30e8b6fe727a33b5737b8be4c15129b1e1de1d7d6a23f1aeaafbc1f81967a7fa4767525e87a403daee3c245fcdb8334cadf20ca96c47df17eecb19a950 metadata size=33554432 dbe4b0a0519da6139897ff019a0b38a202325c4718251ae07ff846fab539772683fa1c39dcf3496298f43afc10bb385a3b2a88b1f7b3a09278978384ce83ad51 nvcfg size=8388608 b6d842b010c5d78ee91846cb3d1c92b32543cf65f326abf778b6c981a372c58ae193062a3335addf50bfb06d91cc84d2888eda8b5846b9c1e79f141ffbbf797d nvdata size=33554432 7e39527db7bbf056c6b48a31c0cd1a56faf62ca3619df931713fc3b08d1f737743f80a1adc1f5f46fd112877f38e730cc84cf69bf2bc3f600b54e48399c9c54f nvram size=5242880 b15323a38433b97b0cfb5fa87ab0e52a8cd5a77afac37275223543a6bab3a39a68386b5cb5300202b7de2c7361a55b0fd22ae5d5e08d78694d295cfa978c8439 para size=524288 87dfbbe3b72af8fa0f38913959f3c5a66e69b3bfbeccfca925d1dcba7310f13ef566a4bb67c1d4040ff93820cdddb56841766362175549b9cb976f7c37869a92 persist size=50331648 6ece667ad916b39bdbf654ae502b094c0ae0e72581775d08fc6a349d64d6d14cfbcead928d85cf61c1888d8062f46fc7d0445381a7a95eb94df12cb5bfce6054 proinfo size=3145728 64f6709f93f9323b49f6dd5e60ea5f43d2ac7f65d6baa3124f2d79cd87179c7943cb568e6b1055c2730988a7cc092742c68d91daed10bdd105d1c143dc97422f protect1 size=8388608 7d4f79d8a2fd1f8ad760d758a6dd1ca866f1fad5c01396258b90bb7a0caecd9c131661dfa9672d633e211f8cd5b164e0bb7f585037d35cfff741751a689f010f protect2 size=11395072 bcc54767f957ec77c8a94151a4e5c4787763570d2acdada205a424fc1d892d2b4b0eb03fb1ae5fcfd28b685b11a66e30399a1428d36dd8873addbb4e2a6670d3 recovery size=25165824 5069f4e376673bbfd3eda944555ce956bc65458172934a798085066e627e22a25666704ad929e6875c03746c3dad2e42e7bc89c5a5ea7b8010098d552c45 sec1 size=2097152
Re: [ot][spam] log: trying to take control of my free government phone
this worked. the phone is now running the open source treble OS, android 12. i did not have to change the secure boot partition. - unlock the phone using mtkclient da seccfg unlock [link for details a couple posts back] - reboot into fastbootd, the graphical fastboot, and flash the system image with arm32_binder64-ab seems quite likely one could pull fastbootd out of the mix. and other things, some day.
Re: [ot][spam] log: trying to take control of my free government phone
ok, there are two different fastboots. the userspace fastboot, fastbootd, can look inside the super partition. when this one is running, there is a graphical menu on the phone saying "fastbootd" and `fastboot getvar is-userspace` returns "yes". the simpler one doesn't look inside super and returns "no". i got into fastbootd by booting into android then doing `adb reboot fastboot` . there are also tools to extract/repack the super partition off the phone.
Re: Assange's Case #FREEASSANGE
Mexican President Intervenes With Biden, Renews Asylum Offer For Julian Assange https://news.antiwar.com/2022/07/18/mexican-president-renews-offer-to-grant-asylum-to-julian-assange-in-letter-to-biden/ https://www.usnews.com/news/world/articles/2022-07-18/mexican-president-renewed-asylum-offer-for-assange-in-letter-to-biden https://tass.com/world/1475609 https://news.antiwar.com/2022/06/20/australian-pm-rejects-calls-to-intervene-in-assange-case/ https://news.antiwar.com/2022/07/01/julian-assange-appeals-uk-decision-to-extradite-him-to-the-us/ https://www.meaa.org/news/assange-extradition-decision-a-huge-relief-us-must-now-end-prosecution/ https://www.republik.ch/2020/01/31/nils-melzer-about-wikileaks-founder-julian-assange On Monday, Mexican President Andres Manuel Lopez Obrador said he delivered a letter to President Biden last week where he pleaded for the US not to prosecute Julian Assange and renewed an offer to grant asylum to the WikiLeaks founder. Lopez Obrador said he explained in the letter that Assange "did not cause anyone’s death, did not violate any human rights and that he exercised his freedom, and that arresting him would mean a permanent affront to freedom of expression." Image source: AP The Mexican leader said that he previously offered asylum to Assange in a letter to President Trump at the end of his term and again at the beginning of the Biden administration. Last month, Lopez Obrador called Assange "the best journalist of our time." Assange faces up to 175 years in prison for exposing US war crimes by publishing documents he received from whistleblower and former Army soldier Chelsea Manning. Lopez Obrador said earlier this month that if Assange is sentenced to life in prison, there should be a campaign to dismantle the statue of liberty. "If they bring him to the US and sentence to the ultimate penalty, to death in prison, then we will have to initiate a campaign for dismantling the Statue of Liberty, presented by the French, because it will no longer be a symbol of liberty," he said. While Lopez Obrador is outspoken in his support for Assange, who is an Australian citizen, Australian Prime Minister Anthony Albanese is not. Albanese has rejected calls for him to demand that Washington drop its extradition request. Assange is currently being held in London’s Belmarsh Prison. British Home Secretary Priti Patel has approved the extradition of Assange to the US, and the WikiLeaks founder’s legal team lodged an appeal to her ruling on July 1. President López Obrador of Mexico delivered letter on Assange to Biden at their presidential meeting last week https://t.co/PN66oVi28F — WikiLeaks (@wikileaks) July 19, 2022 Assange is indicted on 17 counts of espionage and one count of conspiracy to commit a computer crime for his role in obtaining and publishing the leaks provided by Manning. But Assange used standard journalistic practices to obtain the information, something many human rights groups, journalist organizations, and UN officials have pointed out.
Re: [ot][spam] log: trying to take control of my free government phone
fastboot is giving me 'this partition doesn't exist' even when updated to latest version :/ i can see 'system' listed in the header of super.bin
Re: USA 2020 Elections: Thread
> Democrats in trouble... not a good look... https://twitter.com/rncresearch https://twitter.com/libsoftiktok False Flag Crisis Actors, Pathetic Democrats... For real, caught on video, again, lol... AOC and Ilhan Omar Pretend To Be Handcuffed During Supreme Court Arrest https://www.dailymail.co.uk/news/article-11029247/AOC-Democrat-members-Congress-including-fellow-Squad-members-ARRESTED.html https://twitter.com/KatieDaviscourt/status/1549453598718771200 https://twitter.com/mattdizwhitlock/status/1549464571655643136 Rep. Ilhan Omar also pretended to be in handcuffs - and can be seen raising her right arm at the very end of the clip. What's more, her staff lied to reporter Esme Murphy and said she was handcuffed. Watch: Her staff is lying unless she's Superman and just broke the handcuffs at the end of the video. pic.twitter.com/BrToWoVsg9 — Matt Whitlock (@mattdizwhitlock) July 19, 2022 US Capitol Police said in a statement that they made "a total of 34 arrests for Crowding, Obstructing or Incommoding," which included "16 members of Congress." UPDATE: We made a total of 34 arrests for Crowding, Obstructing or Incommoding (DC Code § 22–1307). That arrest number includes 16 Members of Congress. — U.S. Capitol Police (@CapitolPolice) July 19, 2022 Rep. Alexandria Ocasio-Cortez appeared to pretend she was handcuffed on Tuesday as police escorted the Democratic socialist and several other lawmakers from a protest outside the Supreme Court. As the Daily Mail notes, "Ocasio-Cortez was seen walking escorted away by police with her hands crossed behind her back, as if she were in handcuffs, but she was not. At one point she uncrossed her hands and raised her fists to the other protesters." Why is @AOC pretending to be detained when she is escorted by police away from the Supreme Court? pic.twitter.com/a6ckzcONUD — Katie Daviscourt (@KatieDaviscourt) July 19, 2022 AOC and the other lawmakers joined pro-abortion protesters who have gathered outside the Supreme Court almost daily since Roe v. Wade was overturned in June. #BansOffOurBodies pic.twitter.com/CzDHJ5PM8o — Carolyn B. Maloney (@RepMaloney) July 19, 2022 Other members seen being detained by officers include include Rep. Cori Bush, D-Mo., Ayanna Pressley, D-Mass., Nydia Velazquez, D-N.Y., Jackie Speier, D-Calif., Sarah Jacobs, D-Calif., Katherine Clark, D-Mass., Andy Levin, D-Mich., Carolyn Maloney, D-N.Y., Madeleine Dean, D-Pa., Jan Schakowksy, D-Ill., and Bonnie Watson Coleman, D-Calif. -Daily Mail .@CoriBush, @AOC, @IlhanMN, @AyannaPressley & other Members of Congress arrested for civil disobedience in front of Supreme Court. #BansOffOurBodies pic.twitter.com/GxtxS4aMYb — Lynese Wallace (@lynesewallace) July 19, 2022 "I’ve just been arrested at the Supreme Court protesting the horrendous overturn of Roe v Wade. This is the time to stand up, speak out, and not shy away when seeking justice and equality," tweeted Rep. Maloney after what she called an 'arrest.' Statement on Congresswoman Maloney’s arrest while protesting for abortion rights in front of the Supreme Court: pic.twitter.com/286002CaVu — Carolyn B. Maloney (@RepMaloney) July 19, 2022
Re: [ot][spam] log: trying to take control of my free government phone
so unlocking bootloader: https://www.hovatek.com/forum/thread-40300.html flashing treble_experimentations: https://www.xda-developers.com/flash-generic-system-image-project-treble-device/ the system partition is inside the extended super partition it has secure boot enabled, so there are more hoops to navigate
Re: [ot][spam] log: trying to take control of my free government phone
the 'super' partition had about the same size and i tried to flash it. this made it bootloop into fastboot. it turns, websearching, that 'super' is an extended partition, that contains 'system' inside it as a logical partition. i reflashed my imaged super and the phone works again, AND ! it gives the boot message that my bootloader is unlocked :D it sounds like new versions of fastboot know to look inside the super partition, even if mtkclient doesn't immediately do that
Ukraine Has Experimental Mutant Troops Created in Secret Biolabs
Russia Says It’s Losing Because Ukraine Has Experimental Mutant Troops Created in Secret Biolabs https://www.yahoo.com/news/russia-says-losing-because-ukraine-104546288.html And no Russian-linked journalist has ever lied or distorted information, have they Jim? Besides - Ukraine will cave the minute they hear about the scathing Russian attack on Crypto.
Re: [ot][spam] log: trying to take control of my free government phone
i don't know what partition to flash it onto !
Re: [ot][spam] log: trying to take control of my free government phone
the dance of $ mtk e metadata,userdata,md_udc $ mtk da seccfg unlock ran without error and i'm trying out https://github.com/phhusson/treble_experimentations/releases/download/v415/system-squeak-arm32_binder64-ab-vanilla.img.xz i expect i have more to do, though, before a gsi image will just run
Russia Delivers a Scathing Setback to Crypto
Vladdy boy Pooter knows so much about scathing setbacks that - cryptoanarchists like Jim Bell - now resemble the Black Knight. But I'm sure if he ever comes back, Jim will bite his ankle. https://www.youtube.com/watch?v=ZmInkxbvlCs
A quantum homomorphic encryption scheme for polynomial-sized circuits
Quantum homomorphic encryption (QHE) is an encryption method that allows quantum computation to be performed on one party's private data with the program provided by another party, without revealing much information about the data nor about the program to the opposite party. https://arxiv.org/abs/1810.01166 The impossible science of quantum-decryption could start with recognition that much of our surrounding reality exists in a virtual homomorphic databank. You find that one-armed man.
Re: [ot][spam] log: trying to take control of my free government phone
this page appears to enumerate the commands to unlock mediatek phones: https://www.droidwin.com/unlock-bootloader-on-mediatek-devices-using-mtkclient there are 3 fastboot commands to try, and then some mtk downloadagent tricks
Russian State-Sponsored TV Network's Attempt To Dismiss Copyright Lawsuit On Fair Use Grounds Denied
https://www.mondaq.com/unitedstates/copyright/1174834/russian-state-sponsored-tv-network39s-attempt-to-dismiss-copyright-lawsuit-on-fair-use-grounds-denied?email_access=on
Re: [ot][spam] log: trying to take control of my free government phone
totally just imaged every partition in my phone with mtk rl
Re: [ot][spam] log: trying to take control of my free government phone
mtkclient actually works without the kernel patch ! $ mtk printgpt DA_handler - Device is unprotected. DA_handler - Device is in Preloader-Mode :( DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin xflashext - Patching da2 ... DAXFlash - Successfully uploaded stage 1, jumping .. Preloader - Jumping to 0x20 Preloader - Jumping to 0x20: ok. DAXFlash - Successfully received DA sync DAXFlash - Uploading stage 2... DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - Successfully uploaded stage 2 DAXFlash - EMMC FWVer: 0x0 DAXFlash - EMMC ID: QE13MB DAXFlash - EMMC CID:150100514531334d420da525d2998409 DAXFlash - EMMC Boot1 Size: 0x40 DAXFlash - EMMC Boot2 Size: 0x40 DAXFlash - EMMC GP1 Size: 0x0 DAXFlash - EMMC GP2 Size: 0x0 DAXFlash - EMMC GP3 Size: 0x0 DAXFlash - EMMC GP4 Size: 0x0 DAXFlash - EMMC RPMB Size: 0x40 DAXFlash - EMMC USER Size: 0x3a3e0 DAXFlash - HW-CODE : 0x699 DAXFlash - HWSUB-CODE : 0x8A00 DAXFlash - HW-VERSION : 0xCB00 DAXFlash - SW-VERSION : 0x2 DAXFlash - CHIP-EVOLUTION : 0x0 DAXFlash - DA-VERSION : 1.0 DAXFlash - Upload data was accepted. Jumping to stage 2... DAXFlash - DA Extensions successfully added GPT Table: - boot_para: Offset 0x8000, Length 0x0010, Flags 0x, UUID f57ad330-39c2-4488-b09b-00cb43c9ccd4, Type EFI_BASIC_DATA recovery:Offset 0x00108000, Length 0x0180, Flags 0x, UUID fe686d97-3544-4a41-21be-167e25b61b6f, Type EFI_BASIC_DATA para:Offset 0x01908000, Length 0x0008, Flags 0x, UUID 1cb143a8-b1a8-4b57-51b2-945c5119e8fe, Type EFI_BASIC_DATA expdb: Offset 0x01988000, Length 0x0140, Flags 0x, UUID 3b9e343b-cdc8-4d7f-a69f-b6812e50ab62, Type EFI_BASIC_DATA frp: Offset 0x02d88000, Length 0x0010, Flags 0x, UUID 5f6a2c79-6617-4b85-02ac-c2975a14d2d7, Type EFI_BASIC_DATA vbmeta: Offset 0x02e88000, Length 0x0080, Flags 0x, UUID 4ae2050b-5db5-4ff7-d3aa-5730534be63d, Type EFI_BASIC_DATA vbmeta_system: Offset 0x03688000, Length 0x0080, Flags 0x, UUID 1f9b0939-e16b-4bc9-bca5-dc2ee969d801, Type EFI_BASIC_DATA vbmeta_vendor: Offset 0x03e88000, Length 0x0080, Flags 0x, UUID d722c721-0dee-4cb8-838a-2c63cd1393c7, Type EFI_BASIC_DATA nvcfg: Offset 0x04688000, Length 0x0080, Flags 0x, UUID e02179a8-ceb5-48a9-3188-4f1c9c5a8695, Type EFI_BASIC_DATA nvdata: Offset 0x04e88000, Length 0x0200, Flags 0x, UUID 84b09a81-fad2-41ac-0e89-407c24975e74, Type EFI_BASIC_DATA md_udc: Offset 0x06e88000, Length 0x0169a000, Flags 0x, UUID e8f0a5ef-8d1b-42ea-2a9c-835cd77de363, Type EFI_BASIC_DATA metadata:Offset 0x08522000, Length 0x0200, Flags 0x, UUID d5f0e175-a6e1-4db7-c094-f82ad032950b, Type EFI_BASIC_DATA protect1:Offset 0x0a522000, Length 0x0080, Flags 0x, UUID 1d9056e1-e139-4fca-0b8c-b75fd74d81c6, Type EFI_BASIC_DATA protect2:Offset 0x0ad22000, Length 0x00ade000, Flags 0x, UUID 7792210b-b6a8-45d5-91ad-3361ed14c608, Type EFI_BASIC_DATA seccfg: Offset 0x0b80, Length 0x0080, Flags 0x, UUID 138a6db9-1032-451d-e991-0fa38ff94fbb, Type EFI_BASIC_DATA persist: Offset 0x0c00, Length 0x0300, Flags 0x, UUID 756d934c-50e3-4c91-46af-02d824169ca7, Type EFI_BASIC_DATA sec1:Offset 0x0f00, Length 0x0020, Flags 0x, UUID a3f3c267-5521-42dd-24a7-3bdec20c7c6f, Type EFI_BASIC_DATA proinfo: Offset 0x0f20, Length 0x0030, Flags 0x, UUID 8c68cd2a-ccc9-4c5d-578b-34ae9b2dd481, Type EFI_BASIC_DATA md1img: Offset 0x0f50, Length 0x0400, Flags 0x, UUID 6a5cebf8-54a7-4b89-1d8d-c5eb140b095b, Type EFI_BASIC_DATA md1dsp: Offset 0x1350, Length 0x0100, Flags 0x, UUID a0d65bf8-e8de-4107-3494-1d318c843d37, Type EFI_BASIC_DATA spmfw: Offset 0x1450, Length 0x0010, Flags 0x, UUID 46f0c0bb-f227-4eb6-2fb8-66408e13e36d, Type EFI_BASIC_DATA mcupmfw: Offset 0x1460, Length 0x0010, Flags 0x, UUID fbc2c131-6392-4217-1eb5-548a6edb03d0, Type EFI_BASIC_DATA gz1: Offset 0x1470, Length 0x0100, Flags 0x, UUID e195a981-e285-4734-2580-ec323e9589d9, Type EFI_BASIC_DATA gz2: Offset 0x1570, Length 0x0100, Flags 0x, UUID
Fwd: CITI Estimates The Metaverse at $8-13 Trillion.pdf
-- Forwarded message - From: Gunnar Larson Date: Fri, Jun 10, 2022, 7:38 PM Subject: CITI Estimates The Metaverse at $8-13 Trillion.pdf To: cypherpunks , , Chollet, Nicki Mark and VP, Russian President comment on IP and the Metaverse. https://drive.google.com/file/d/1REoa87GCmt2uhDp7ZYswbTRw4ygQgjsL/view?usp=drivesdk
Meta v. Meta: Immersive Tech Co. Sues Owner of Facebook, Instagram, Claiming Rights to 'Meta' Trademark
https://www.law.com/newyorklawjournal/2022/07/19/meta-v-meta-immersive-tech-co-sues-owner-of-facebook-instagram-claiming-rights-to-meta-trademark/?kw=Meta%20v.%20Meta:%20Immersive%20Tech%20Co.%20Sues%20Owner%20of%20Facebook%2C%20Instagram%2C%20Claiming%20Rights%20to%20%27Meta%27%20Trademark_source=email_medium=enl_campaign=afternoonalert_content=20220719_term=nylj
Re: [ot][spam] log: trying to take control of my free government phone
totally a unisoc-branded mediatek 6739 $ adb shell getprop [Build.BRAND]: [MTK] [camera.disable_zsl_mode]: [1] [dalvik.vm.appimageformat]: [lz4] [dalvik.vm.dex2oat-Xms]: [64m] [dalvik.vm.dex2oat-Xmx]: [512m] [dalvik.vm.dex2oat-max-image-block-size]: [524288] [dalvik.vm.dex2oat-minidebuginfo]: [true] [dalvik.vm.dex2oat-resolve-startup-strings]: [true] [dalvik.vm.dexopt.secondary]: [true] [dalvik.vm.heapgrowthlimit]: [256m] [dalvik.vm.heapsize]: [512m] [dalvik.vm.image-dex2oat-Xms]: [64m] [dalvik.vm.image-dex2oat-Xmx]: [64m] [dalvik.vm.isa.arm.features]: [default] [dalvik.vm.isa.arm.variant]: [cortex-a53] [dalvik.vm.minidebuginfo]: [true] [dalvik.vm.mtk-stack-trace-file]: [/data/anr/mtk_traces.txt] [dalvik.vm.usejit]: [true] [dalvik.vm.usejitprofiles]: [true] [debug.atrace.tags.enableflags]: [0] [debug.force_rtl]: [false] [debug.sf.disable_backpressure]: [1] [dev.bootcomplete]: [1] [dev.mnt.blk.product]: [dm-5] [dev.mnt.blk.root]: [dm-3] [dev.mnt.blk.vendor]: [dm-4] [drm.service.enabled]: [true] [gsm.current.phone-type]: [1] [gsm.network.type]: [Unknown] [gsm.operator.alpha]: [] [gsm.operator.iso-country]: [us] [gsm.operator.isroaming]: [false] [gsm.operator.numeric]: [] [gsm.sim.num.pin]: [] [gsm.sim.num.pin2]: [] [gsm.sim.num.puk]: [] [gsm.sim.num.puk2]: [] [gsm.sim.num.simlock]: [] [gsm.sim.preiccid_0]: [] [gsm.sim.state]: [ABSENT] [gsm.sim1.type]: [] [gsm.version.baseband]: [MOLY.LR12A.R3.MP.V140.8.P7] [gsm.version.ril-impl]: [android reference-ril 1.0] [hwservicemanager.ready]: [true] [init.svc.adbd]: [running] [init.svc.agpsd]: [running] [init.svc.apexd]: [running] [init.svc.apexd-bootstrap]: [stopped] [init.svc.ashmemd]: [running] [init.svc.audioserver]: [running] [init.svc.batterywarning]: [running] [init.svc.bluetooth-1-0]: [running] [init.svc.bootanim]: [stopped] [init.svc.bootlogoupdater]: [stopped] [init.svc.bpfloader]: [stopped] [init.svc.camerahalserver]: [running] [init.svc.cameraserver]: [running] [init.svc.ccci3_mdinit]: [stopped] [init.svc.ccci_mdinit]: [running] [init.svc.drm]: [running] [init.svc.flash_recovery]: [stopped] [init.svc.fuelgauged]: [running] [init.svc.fuelgauged_nvram]: [stopped] [init.svc.gatekeeperd]: [running] [init.svc.gnss_service]: [running] [init.svc.gpu]: [running] [init.svc.gpu-1-0]: [running] [init.svc.gsid]: [stopped] [init.svc.health-hal-2-0]: [running] [init.svc.hidl_memory]: [running] [init.svc.hwservicemanager]: [running] [init.svc.idmap2d]: [stopped] [init.svc.incidentd]: [running] [init.svc.installd]: [running] [init.svc.iorapd]: [stopped] [init.svc.ipsec_mon]: [running] [init.svc.keystore]: [running] [init.svc.lbs_dbg]: [running] [init.svc.lbs_hidl_service]: [running] [init.svc.light-hal-2-0]: [running] [init.svc.lmkd]: [running] [init.svc.logd]: [running] [init.svc.logd-auditctl]: [stopped] [init.svc.logd-reinit]: [stopped] [init.svc.media]: [running] [init.svc.media.swcodec]: [running] [init.svc.mediacodec]: [running] [init.svc.mediadrm]: [running] [init.svc.mediaextractor]: [running] [init.svc.mediametrics]: [running] [init.svc.mnld]: [running] [init.svc.mobile_log_d]: [running] [init.svc.mtk_secure_element_hal_service]: [running] [init.svc.mtkcodecservice-1-1]: [stopped] [init.svc.netd]: [running] [init.svc.netdagent]: [running] [init.svc.netdiag]: [running] [init.svc.nvram-hidl-1-1]: [running] [init.svc.nvram_daemon]: [stopped] [init.svc.power-hal-1-0]: [running] [init.svc.pq-2-2]: [running] [init.svc.rcs_volte_stack]: [running] [init.svc.servicemanager]: [running] [init.svc.statsd]: [running] [init.svc.storaged]: [running] [init.svc.surfaceflinger]: [running] [init.svc.system_suspend]: [running] [init.svc.tee_check_keybox]: [stopped] [init.svc.teed]: [running] [init.svc.terservice]: [stopped] [init.svc.thermal]: [running] [init.svc.thermal_manager]: [stopped] [init.svc.thermald]: [running] [init.svc.thermalloadalgod]: [running] [init.svc.tombstoned]: [running] [init.svc.ueventd]: [running] [init.svc.usbd]: [stopped] [init.svc.vendor.audio-hal-2-0]: [running] [init.svc.vendor.bip]: [running] [init.svc.vendor.cas-hal-1-1]: [running] [init.svc.vendor.ccci3_fsd]: [stopped] [init.svc.vendor.ccci_fsd]: [running] [init.svc.vendor.ccci_rpcd]: [running] [init.svc.vendor.configstore-hal]: [running] [init.svc.vendor.drm-clearkey-hal-1-2]: [running] [init.svc.vendor.drm-hal-1-0]: [running] [init.svc.vendor.drm-widevine-hal-1-2]: [running] [init.svc.vendor.epdg_wod]: [running] [init.svc.vendor.gatekeeper-1-0]: [running] [init.svc.vendor.gralloc-2-0]: [running] [init.svc.vendor.gsm0710muxd]: [running] [init.svc.vendor.hwcomposer-2-1]: [running] [init.svc.vendor.keymaster-4-0-trustkernel]: [running] [init.svc.vendor.memtrack-hal-1-0]: [running] [init.svc.vendor.ril-daemon-mtk]: [running] [init.svc.vendor.sensors-hal-2-0]: [running] [init.svc.vendor.thermal-hal-1-0]: [running] [init.svc.vendor.usb-hal-1-1]: [running] [init.svc.vendor.vibrator-1-0]: [running] [init.svc.vendor.volte_imcb]: [running] [init.svc.vendor.volte_stack]: [running] [init.svc.vendor.volte_ua]:
Re: [ot][wrong] Please let me sleep outdoors in the coldest winter. Was: Re: PLEASE LET ME SLEEP OUTDOORS
12/1:19.09 outd
Re: SATAn hack can steal data directly from your SATA cable
enticing rocking posts from jim bell via tracking links i looked for the quantum programming book in library genesis but it's not there yet. there are older books, though, you could just look up how to gain access to quantum computers to try things out the SATAn paper is https://arxiv.org/abs/2207.07413 . the attack is not very new as far as i know. This paper introduces a new type of attack on isolated, air-gapped workstations. Although air-gap computers have no wireless connectivity, we show that attackers can use the SATA cable as a wireless antenna to transfer radio signals at the 6 GHz frequency band. The Serial ATA (SATA) is a bus interface widely used in modern computers and connects the host bus to mass storage devices such as hard disk drives, optical drives, and solid-state drives. The prevalence of the SATA interface makes this attack highly available to attackers in a wide range of computer systems and IT environments. We discuss related work on this topic and provide technical background. We show the design of the transmitter and receiver and present the implementation of these components. We also demonstrate the attack on different computers and provide the evaluation. The results show that attackers can use the SATA cable to transfer a brief amount of sensitive information from highly secured, air-gap computers wirelessly to a nearby receiver. Furthermore, we show that the attack can operate from user mode, is effective even from inside a Virtual Machine (VM), and can successfully work with other running workloads in the background. Finally, we discuss defense and mitigation techniques for this new air-gap attack.
Re: [ot][spam] log: trying to take control of my free government phone
if you're using gcc 9 on a system designed for gcc 4, you'd better do PATH=/bin:/usr/bin:/sbin:/usr/sbin before building your 3.10 kernel sources.
Russia Delivers a Scathing Setback to Crypto
Russia Delivers a Scathing Setback to Crypto https://share.newsbreak.com/1gp0afkg Hardly a week goes by without the young crypto industry receiving some bad news. The industry is currently playing a guessing game which consists of trying to guess which crypto company or crypto platform is next to be impacted by the liquidity crisis affecting prominent crypto lenders like Celsius Network, Voyager Digital and BlockFi. This cash crunch crisis comes from the fall in cryptocurrency prices that led to a collapse of more than $2 trillion in the crypto market since November. The damages are substantial. Celsius and Voyager have filed for Chapter 11 bankruptcy and their customers don't even know if they will be able to get their money back. Other platforms like Babel Finance, CoinLoan or CoinFlex have suspended withdrawals, thus preventing their customers from having access to their funds. BlockFi was bailed out by cryptocurrency exchange FTX.com. Another difficulty for the sector is how to bring back retail investors, many of whom fled the crypto sector after suffering colossal losses? Some investors even lost everything following the crash of sister tokens Luna and UST in May. Three Arrows Capital, also known as 3AC, a crypto hedge fund was forced into liquidation. As if that were not enough, bad news has just arrived from Russia. Indeed, President Vladimir Putin has just signed a tougher law against cryptocurrencies after it was passed by the Russian National Assembly or Duma on July 8. This law banned any payment for assets, goods, products and services with digital means or any utility tokens. It is the latest legal arsenal adopted by Moscow to prevent cryptocurrencies from being used as a means of payment. Crypto and Sanctions The Minister of Finance Anton Siluanov had introduced a draft On Digital Currency in parliament for regulation of the sector in February. The Russian government, however, didn't follow the recommendation of the Central Bank of Russia, which called in March for an outright ban on cryptocurrencies and the entire crypto industry in the country. The institution recommended a ban on trading, mining, and paying for goods and services with cryptocurrencies. The Russian war in Ukraine may play a big role here. In the face of NATO sanctions, there has been a surge of interest in how Russia might use cryptocurrencies to sidestep sanctions. Selected Russian banks were disconnected from the SWIFT, a secure messaging system used by financial institutions, brokers, and investment firms. Russia's economy has suffered under the sanctions with the ruble's value plummeting. According to government figures,
SATAn hack can steal data directly from your SATA cable
SATAn hack can steal data directly from your SATA cable https://share.newsbreak.com/1gozsduo Researchers at the University of the Negev, Israel, have published a paper that demonstrates how a hacker could extract data from an otherwise secure system via its SATA cable. The attack uses the SATA cable itself as a form of wireless transmitter, and the data it carries can be intercepted as a form of radio signal in the 6GHz band. The attack is appropriately referred to as SATAn. The researchers published a paper here (opens in new tab) (via Tom’s Hardware (opens in new tab)). They successfully demonstrated the technique and showed it in a video that’s included above. It has to be said that this kind of attack is complicated and requires specific malware to be installed on the target machine. It requires specialized shellcode to modify file system activity that generates identifiable radio signals from SATA cables.The electromagnetic leakage of the cables can be intercepted by a wireless receiver and replicated on a second device. The researchers entered the word ‘secret’ on the target machine, which was picked up by a second machine. It’s just a simple demo but there’s no reason that targeted malware couldn’t be used to extract passwords or other sensitive text information. It’s a complicated method as it would require access to the target computer. An air gapped system without any network access would require malware to be directly installed. There’s also the problem that the SATA signal emission is weak and requires the receiving antenna to be around 1 meter away. It’s not easy to just walk up to a secure system and say hi.
The Entrapment Controversy
Faculty Publications UC Hastings College of the Law Library Author: Roger C. Park Title: The Entrapment Controversy Source: Minnesota Law Review Citation: 60 Minn. L. Rev. 163 (1976). Brody Larson has made 212 highlights: https://drive.google.com/file/d/1rhPWgd_OniZVLeJIlieDBx5VNC2chenn/view?usp=drivesdk
Re: [ot][spam] log: trying to take control of my free government phone
i added the patch to my specfile and am building a new rpm i canceled the unihertz titan build. the host had been running for 6 hours. i'm just a little confused.
A Beginner’s Guide to Quantum Programming
A Beginner’s Guide to Quantum Programming https://share.newsbreak.com/1govv8d9 A new guide on programming quantum algorithms leads programmers through every step, from theory to implementing the algorithms on IBM’s publicly accessible 5-qubit ibmqx4 quantum computer and others. The guide covers the fundamentals, along with a summary of the main quantum algorithms and instructions on how to implement them on publicly available quantum computers As quantum computers proliferate and become more widely available, would-be quantum programmers are left scratching their brains over how to get started in the field. A new beginner’s guide offers a complete introduction to quantum algorithms and their implementation on existing hardware.“Writing quantum algorithms is radically different from writing classical computing programs and requires some understanding of quantum principles and the mathematics behind them,” said Andrey Y. Lokhov, a scientist at Los Alamos National Laboratory and lead author of the recently published guide in ACM Transactions on QuantAnother section looks at the various types of quantum algorithms. From there, the guide dives into the 20 selected algorithms, with a problem definition, description, and steps for implementing each one on the IBM or, in a few cases, other computers. Extensive references at the end of the guide will help interested readers go deeper in their explorations of quantum algorithms. The study was funded by the Information Science and Technology Institute at Los Alamos National Laboratory through the Laboratory Directed Research and Development program. Reference: “Quantum Algorithm Implementations for Beginners” by Abhijith J., Adetokunbo Adedoyin, John Ambrosiano, Petr Anisimov, William Casper, Gopinath Chennupati, Carleton Coffrin, Hristo Djidjev, David Gunter, Satish Karra, Nathan Lemons, Shizeng Lin, Alexander Malyzhenkov, David Mascarenas, Susan Mniszewski, Balu Nadiga, Daniel O’malley, Diane Oyen, Scott Pakin, Lakshman Prasad, Randy Roberts, Phillip Romero, Nandakishore Santhi, Nikolai Sinitsyn, Pieter J. Swart, James G. Wendelberger, Boram Yoon, Richard Zamora, Wei Zhu, Stephan Eidenbenz, Andreas Bärtschi, Patrick J. Coles, Marc Vuffray and Andrey Y. Lokhov, 7 July 2022, ACM Transactions on Quantum Computing. DOI: 10.1145/351734 - - - -
Re: [ot][spam] log: trying to take control of my free government phone
haha the patches are for linux 5.x and i have linux 3.x might not be as big as it sounds since the versioning changed, but it sounds ridiculously big
Re: [ot][spam] log: trying to take control of my free government phone
successful reboot
Re: [ot][spam] log: trying to take control of my free government phone
i'm installing a free kernel from centos 7 to try it out. of course, this is probably a different kind of phone, it might be interesting, and at least might give me an error i can websearch for. my system may fail to reboot, in which case it could be a while ;p i'm thinking maybe for working aroudn i would start another redhat subscription, boot off some kind of boot media, and install a normative kernel
Re: [ot][spam] log: trying to take control of my free government phone
unfortunately i don't presently have access to my kernel sources to try any mtk exploits that come with mtkclient. mediatek wrote a linux kernel driver that engages the boot loader, and mtkclient patches it. i'm on a redhat enterprise linux system that has expired. mtkclient]$ python3 mtk gettargetconfig Preloader - CPU:MT6739/MT6731() Preloader - HW version: 0x0 Preloader - WDT:0x10007000 Preloader - Uart: 0x11002000 Preloader - Brom payload addr: 0x100a00 Preloader - DA payload addr:0x201000 Preloader - CQ_DMA addr:0x10212000 Preloader - Var1: 0xb4 Preloader - Disabling Watchdog... Preloader - HW code:0x699 Preloader - Target config: 0x0 Preloader - SBC enabled:False Preloader - SLA enabled:False Preloader - DAA enabled:False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False Preloader - Get Target info Preloader - HW subcode: 0x8a00 Preloader - HW Ver: 0xcb00 Preloader - SW Ver: 0x2 Main - Getting target info... Preloader - Target config: 0x0 Preloader - SBC enabled:False Preloader - SLA enabled:False Preloader - DAA enabled:False Preloader - SWJTAG enabled: False Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT: False Preloader - Root cert required: False Preloader - Mem read auth: False Preloader - Mem write auth: False Preloader - Cmd 0xC8 blocked: False
Re: [ot][spam] log: trying to take control of my free government phone
i'm thinking i could probably make this phone work by just treating it like a mediatek phone. i'm wondering if when spreadtrum rebranded to unisoc, they outsourced some of their stuff to mediatek or whatever mediatek uses, like other companies do as other companies grow bigger faster than they do. this chipset is the first chipset produced by unisoc, after they rebranded from spreadtrum. i'm wondering if the people who said that spreadtrum wasn't like mediatek, and was unreasonable to unlock, were talking about pre-unisoc stuff.
Re: [ot][spam] log: trying to take control of my free government phone
there are a lot more bootloader commands at https://github.com/bkerler/mtkclient/blob/main/mtkclient/Library/mtk_preloader.py#L48 i'm thinking it would make sense to dump the ram and look for OEM commands in it.
Re: [ot][spam] log: trying to take control of my free government phone
$ fastboot getvar all (bootloader) max-download-size: 0x800 (bootloader) variant: (bootloader) logical-block-size: 0x200 (bootloader) erase-block-size: 0x8 (bootloader) hw-revision: cb00 (bootloader) battery-soc-ok: yes (bootloader) battery-voltage: 3823mV (bootloader) partition-size:sgpt: 4200 (bootloader) partition-type:sgpt: raw data (bootloader) partition-size:flashinfo: 100 (bootloader) partition-type:flashinfo: raw data (bootloader) partition-size:userdata: 2aedfbe00 (bootloader) partition-type:userdata: f2fs (bootloader) partition-size:cache: 1300 (bootloader) partition-type:cache: ext4 (bootloader) partition-size:super: c680 (bootloader) partition-type:super: raw data (bootloader) partition-size:tee2: ce (bootloader) partition-type:tee2: raw data (bootloader) partition-size:tee1: 50 (bootloader) partition-type:tee1: raw data (bootloader) partition-size:dtbo: 80 (bootloader) partition-type:dtbo: raw data (bootloader) partition-size:logo: 80 (bootloader) partition-type:logo: raw data (bootloader) partition-size:boot: 180 (bootloader) partition-type:boot: raw data (bootloader) partition-size:loader_ext2: 1 (bootloader) partition-type:loader_ext2: raw data (bootloader) partition-size:loader_ext1: 1 (bootloader) partition-type:loader_ext1: raw data (bootloader) partition-size:lk2: 10 (bootloader) partition-type:lk2: raw data (bootloader) partition-size:lk: 10 (bootloader) partition-type:lk: raw data (bootloader) partition-size:nvram: 50 (bootloader) partition-type:nvram: raw data (bootloader) partition-size:gz2: 100 (bootloader) partition-type:gz2: raw data (bootloader) partition-size:gz1: 100 (bootloader) partition-type:gz1: raw data (bootloader) partition-size:mcupmfw: 10 (bootloader) partition-type:mcupmfw: raw data (bootloader) partition-size:spmfw: 10 (bootloader) partition-type:spmfw: raw data (bootloader) partition-size:md1dsp: 100 (bootloader) partition-type:md1dsp: raw data (bootloader) partition-size:md1img: 400 (bootloader) partition-type:md1img: raw data (bootloader) partition-size:proinfo: 30 (bootloader) partition-type:proinfo: raw data (bootloader) partition-size:sec1: 20 (bootloader) partition-type:sec1: raw data (bootloader) partition-size:persist: 300 (bootloader) partition-type:persist: ext4 (bootloader) partition-size:seccfg: 80 (bootloader) partition-type:seccfg: raw data (bootloader) partition-size:protect2: ade000 (bootloader) partition-type:protect2: ext4 (bootloader) partition-size:protect1: 80 (bootloader) partition-type:protect1: ext4 (bootloader) partition-size:metadata: 200 (bootloader) partition-type:metadata: raw data (bootloader) partition-size:md_udc: 169a000 (bootloader) partition-type:md_udc: ext4 (bootloader) partition-size:nvdata: 200 (bootloader) partition-type:nvdata: ext4 (bootloader) partition-size:nvcfg: 80 (bootloader) partition-type:nvcfg: ext4 (bootloader) partition-size:vbmeta_vendor: 80 (bootloader) partition-type:vbmeta_vendor: raw data (bootloader) partition-size:vbmeta_system: 80 (bootloader) partition-type:vbmeta_system: raw data (bootloader) partition-size:vbmeta: 80 (bootloader) partition-type:vbmeta: raw data (bootloader) partition-size:frp: 10 (bootloader) partition-type:frp: raw data (bootloader) partition-size:expdb: 140 (bootloader) partition-type:expdb: raw data (bootloader) partition-size:para: 8 (bootloader) partition-type:para: raw data (bootloader) partition-size:recovery: 180 (bootloader) partition-type:recovery: raw data (bootloader) partition-size:boot_para: 10 (bootloader) partition-type:boot_para: raw data (bootloader) partition-size:pgpt: 8000 (bootloader) partition-type:pgpt: raw data (bootloader) partition-size:preloader: 4 (bootloader) partition-type:preloader: raw data (bootloader) off-mode-charge: 1 (bootloader) warranty: yes (bootloader) unlocked: no (bootloader) secure: yes (bootloader) kernel: lk (bootloader) product: x038_k39tv1_bsp (bootloader) is-userspace: no (bootloader) slot-count: 0 (bootloader) version-baseband: MOLY.LR12A.R3.MP.V140.8.P7 (bootloader) version-bootloader: x038_k39tv1_bsp-ba63681-20220219163459- (bootloader) version-preloader: (bootloader) version: 0.5 all: Done!!
Re: [ot][spam] log: trying to take control of my free government phone
i'm realising that i can figure out the sizes and orders of partitions without needing root access the other phone used a gpt partition table i might be able to make a partition map by hand, to try the factory tools
Homeland Security Is Buying Its Way Around the Fourth Amendment
Homeland Security Is Buying Its Way Around the Fourth Amendment https://share.newsbreak.com/1goc7w5v American taxpayers pay to be spied upon. That's one takeaway from new documents obtained by the American Civil Liberties Union (ACLU), which has been examining how federal agents spent millions to purchase massive troves of cellphone location data and dodge Fourth Amendment requirements. As part of a lawsuit against the Department of Homeland Security (DHS), the ACLU obtained thousands of previously unreleased records showing how DHS agencies—including Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE)—are purchasing and accessing "huge volumes of people's cell phone location information quietly extracted from smartphone apps." These agencies are "sidestepping our Fourth Amendment right against unreasonable government searches and seizures," suggests the ACLU. In 2018, the U.S. Supreme Court held (in Carpenter v. United States) that under the Fourth Amendment, law enforcement must have a warrant before accessing a suspect's phone location data from cellular service providers. But federal authorities have been getting around this by purchasing aggregated cellphone location data from data broker firms like Venntel and Babel Street. And they're spending millions of taxpayer dollars doing it. This was first revealed by the Wall Street Journal back in 2020. The ACLU then set out to learn more, filing a Freedom of Information Act (FOIA) request and later suing to force DHS, ICE, and CBP to respond. "Although the litigation is ongoing, we are now making public the records that CBP, ICE, the U.S. Secret Service, the U.S. Coast Guard, and several offices within DHS Headquarters have provided us to date," the ACLU announced yesterday. Cellphone location data purchased by DHS is aggregated. It doesn't directly link the names or personal information of cellphone users to specific location data. But there's still a lot of privacy-infringing information that can be gleaned from such information, says the ACLU: In the documents we received over the past year, we found Venntel marketing materials sent to DHS explaining how the company collects more than 15 billion location points from over 250 million cell phones and other mobile devices every day. With this data, law enforcement can "identify devices observed at places of interest," and "identify repeat visitors, frequented locations, pinpoint known associates, and discover pattern of life," according to a Venntel marketing brochure. The documents belabor how precise and illuminating this data is, allowing "pattern of life analysis to identify persons of interest." By searching through this massive trove of location information at their whim, government investigators can identify and track specific individuals or everyone in a particular area, learning details of our private activities and associations.
Re: [ot][spam] log: trying to take control of my free government phone
i tried to search xda for mt6739 information and am getting this error: "The forums are currently offline while we are performing system maintenance. Be back soon!" google shows that there is indeed discussion around the mt6739 given the use of hw_code and separate use of platform, there is probably some underlying thing that both mediatek and unisoc share. it seems likely that bootloader stuff would work on both the same, although they might need different download agents. it could be interesting to compare the unisoc download agent with the mediatek download agent, if it uses one.
Re: [ot][spam] log: trying to take control of my free government phone
this hardware code is actually in the mediatek platform table 0x0699: 0x6739 this unisoc chipset might be an MT6739 i found you can try to compare the two chipsets at phonedb.net unisoc chipset: https://phonedb.net/index.php?m=processor=769=spreadtrum_sc9832e mediatek chipset: https://phonedb.net/index.php?m=processor=748=mediatek_mt6739 - they are both based on 4x ARM Cortex-A53 MPcore . - they are specified with different emmc revisions; the mediatek chipset is a newer emmc revision, despite being released a year prior - they have different embedded GPUs - they appear to support the same suites of cellular data protocols - they support the same display pixel dimensions and their modem featuresets have the same strings - the mediatek chipset supports opencl and vulkan (gpu driver features), which the unisoc chipset does not the unisoc page links to a datasheet. the link is broken. they seem similar enough for it to be worthwhile spending some time seeing if things that work on the mediatek chipset work on the unisoc one with the same bootloader hw code.
Re: [ot][spam] log: trying to take control of my free government phone
these lines explain a lot of how the mediatek exploit i was reviewing a session or two on these phones worked: CMD_READ16 0xa2Read data from the SoC memory (16 bit length parameter) CMD_WRITE16 0xd2Write data into SoC memory (16 bit length parameter) CMD_READ32 0xd1Read data from the SoC memory (32 bit length parameter) CMD_WRITE32 0xd4Write data into SoC memory (32 bit length parameter) it can read and write from SoC memory the commenting in the exploit talked about this, but i didn't know the commands
Re: [ot][spam] log: trying to take control of my free government phone
these commands are apparently documented for the mediatek preloader here: http://www.lieberbiber.de/2015/07/04/mediatek-details-partitions-and-preloader/ ! i'm not certain yet whether that means that this unisoc chipset is based on mediatek, or if it is some shared thing that both use.
Re: [ot][spam] log: trying to take control of my free government phone
so, i tried booting up the mediatek flasher, to see if it would do anytihng, and ran into the same issue i ran into with the unisoc flasher: it refuses to run unless you provide it with a partition map in advance, and i haven't found a factory image for this phone yet. _however_, i know from working with the protocol under the hood with the mediatek phone, that it doesn't actually use the partition map for anything for most of the protocol. it's a soft barrier. unfortunately i don't remember how the protocol works and didn't document what i found well.
Re: [ot][spam] log: trying to take control of my free government phone
left out: i could also look harder for ways to root the phone, or to access its flash storage internally [it would be great to pick up the flash reads with a near-field radio but i have separate inhibition around that goal, so it seems a separate thing]
Re: [ot][spam] log: trying to take control of my free government phone
the oem command does not work on this phone. i did find at https://www.xda-developers.com/how-to-discover-hidden-fastboot-commands/ that oem commands are likely sent as strings straight to the device, and can usually be enumerated by grepping for strings in the boot loader. the device has a vbmeta partition, i guess all devices with verified boot enabled likely do. i'm a little surprised the boot thing from russia didn't work. i could ask more at their forum, or ask the dev with the similar device; i think i'd like to learn a little more about it first. i'm a little curious about profiling the bootloader to see what it might be. i could also try to reverse engineer the factory flasher a little, and see if there are some useful codes or identifying information. when I connect the phone to the system, it behaves similar to the mediatek phone, offering a brief serial interface and relating commands via it. it actually responds to my 'backyard mediatek flasher''s handshake, with the same 'READY' exchange protocol. The output of test.py is this: Device preloader version: 0x3 hw_code=0x699 unk1=0x0 hw_subcode=0x8a00 hw_version=0xcb00 unk2=0x2 unk3=0x0 These are very similar values to the mediatek situation. It implies that the two are speaking the same protocol, whatever protocol it is. The chipsets are both based on arm.
Re: [ot][wrong] Please let me sleep outdoors in the coldest winter. Was: Re: PLEASE LET ME SLEEP OUTDOORS
10/0:58.03
Re: [ot][personal][spam] trying to make my unihertz titan boot
my build host has gone offline theoretically it is still running the build vast.ai says i won't be charged while it is offline i'm worried, however, that if i just let it do it's thing, i will forget it is there, and then when it comes back online i will be charged a lot.
Re: [ot][spam] log: trying to take control of my free government phone
On 7/19/22, Undiscussed Horrific Abuse, One Victim of Many wrote: > this link seems helpful, if untrustworthy: > https://romprovider.com/xiaomi-qin2-pro-unlock-bootloader/ it contains > a google drive link to android_device_unlock.rar i've uploaded the version of the .rar at that website to https://bafybeifgh34qlpdcsxfe42z3jysp3fzk66r577dbsylniggw5vjvn2yk5y.ipfs.dweb.link/Android_device_unlock.rar since it seems hard to access
Re: [ot][personal][spam] trying to make my unihertz titan boot
reminding myself that the build instructions page links to a telegram community to find the most up-to-date steps
Re: [ot][personal][spam] trying to make my unihertz titan boot
building the phh treble git tip failed with this error: [100% 250/250] out/soong/.bootstrap/bin/soong_build out/soong/build.ninja FAILED: out/soong/build.ninja cd "$(dirname "out/soong/.bootstrap/bin/soong_build")" && BUILDER="$PWD/$(basename "out/soong/.bootstrap/bin/soong_build")" && cd / && env -i "$BUILDER" --top "$TOP" --out "out/soong " -n "out" -d "out/soong/build.ninja.d" -t -l out/.module_paths/Android.bp.list -globFile out/soong/.bootstrap/build-globs.ninja -o out/soong/build.ninja --available_env out/soon g/soong.environment.available --used_env out/soong/soong.environment.used Android.bp Killed 17:22:32 soong bootstrap failed with: exit status 1 ninja: build stopped: subcommand failed. often when i see "Killed" it means the system ran out of RAM. the build system has 16G of ram. when you rent them you can specify how much ram to filter by.
Re: [ot][spam] log: trying to take control of my free government phone
after rebooting my system back to linux, it actually unhibernated! often it will just boot up again, fscking the disk to handle nothing having been cleanly closed. it is great to have the hibernation-resuming working this time.
Re: [ot][spam] log: trying to take control of my free government phone
this link seems helpful, if untrustworthy: https://romprovider.com/xiaomi-qin2-pro-unlock-bootloader/ it contains a google drive link to android_device_unlock.rar the original post seems helpful, but most of the primary material seems to be in russian, a language i have not myself learned yet. my browser isn't showing the automatic "translate" popup and i failed to find the search button on the russian site. the dev of the open source OS i got working with the unihertz titan uses a qin 2 pro: https://github.com/phhusson/treble_experimentations/issues/1602#issuecomment-735017739 hovatek has a lot of unisoc information. they link to a fastboot for unlocking that is on mega.nz: https://www.hovatek.com/forum/thread-32287.html the mega.nz link just loads a lot of ads for me. it's great to find a more normative set of information for this phone chipset.
Re: [ot][spam] log: trying to take control of my free government phone
it looks like there is a modified fastboot binary being used, that can extract a special code from the phone that can be used to unlock it it seems like it makes sense to try to get ahold of that binary, run it, and figure out what its secret protocol is
Re: [ot][spam] log: trying to take control of my free government phone
i websearched for some time. the chipset is SC9832E, and looking for that chipset i found similar experiences to mine, where oem unlocking can be enabled but fastboot still fails. there's some documentation of working around this for the qin 2 pro at https://en.typeblog.net/1c72/how-i-unlocked-xiaomi-qin-2-pro-and-installed-phh-gsi/
Re: [ot][spam] log: trying to take control of my free government phone
so, the windows flasher i tried needs a .pac file for the phone . it needs two partitions from it, and won't do much of anything without them, including apparently downloading data from the phone. i'm not sure where to find this factory image for this phone, but could look more places. another thing i found is that there are of course a handful of hardware dongles for working with this chipset and phones directly. this idea is inspiring. if the dongle approach works, then i might be able to bypass any lock restrictions on the device by simply treating it as a new device i am building. it looks like the partitions it needs, fd1 and fd2, may simply be the user and system partitions. i found a janky instruction guide for generating a .pac file from backup images of a rooted phone. they actually use the windows flasher tool, to pack the files into a .pac file.
Re: [ot][spam] log: trying to take control of my free government phone
but i'll at least reboot into windows and try a factory flasher out! there are at least 3 different factory flashers i'm imagining there's a good chance an exploit or opening the hardware would be needed to reflash the phone. this is likely increasing my dissociated discouragement.
Re: [ot][spam] log: trying to take control of my free government phone
the unisoc chipset is SC9832E not sure how long i'll be able to keep doing this atm
Re: [ot][spam] log: trying to take control of my free government phone
"Reboot to bootloader" places it into the same-looking system as the unihertz titan, where it is waiting for commands from fastboot. unfortunately, when i do "fastboot flashing unlock", it says "unlock failed" :( so flashing this phone may be a long-term adventure in learning the bootloaders and flashing protocols
Re: [ot][spam] log: trying to take control of my free government phone
i did an `adb reboot fastboot` and it completely worked. takes me to a fastbootd menu on the phone one of the entries says "Secure boot - yes", which could be discouraging options include "Enter recovery" and "Reboot to bootloader"
Re: [ot][spam] log: trying to take control of my free government phone
then with usb debugging enabled: [3974182.695809] usb 1-4: new high-speed USB device number 42 using xhci_hcd [3974182.819725] usb 1-4: New USB device found, idVendor=0e8d, idProduct=201c, bcdDevice= 2.23 [3974182.819732] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [3974182.819737] usb 1-4: Product: HPP-L55B [3974182.819741] usb 1-4: Manufacturer: Hot Pepper Inc
Re: [ot][spam] log: trying to take control of my free government phone
dmesg when running and plugged in: [3974073.464782] usb 1-4: New USB device found, idVendor=0e8d, idProduct=2008, bcdDevice= 2.23 [3974073.464790] usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [3974073.464795] usb 1-4: Product: HPP-L55B [3974073.464799] usb 1-4: Manufacturer: Hot Pepper Inc
[ot][spam] log: trying to take control of my free government phone
i have a serrano hot pepper l55b phone purportedly with a unisoc chipset, running android 10 based on treble. these phones can be gotten very cheaply, with a free plan, in the usa. although i think the phone you get from the program changes. i got mine because i got on foodstamps, at my family's request, and i wasn't set up with a working phone, and this worked out for me. it would be a good thing to make the phone run a custom rom so all the other people who use it could use a normal phone. it is not normal when bought. it is full of advertisements, very slow, and it wouldn't let me use it to tether. i think it has other limitations too. i searched earlier for OEM unlocking on the phone, but did not find it. now, with my experience just working on the unihertz titan, i found OEM unlocking. it is under system->advanced->developer options. although somebody told me this phone could not run a gsi, it looks pretty likely to me that it can. if the bootloader can be unlocked, and there is a public factory flasher, then we just need to put an appropriate treble system partition on it, and it might run like a thousand dollar phone from silicon valley, dunno
Re: [ot][wrong] Please let me sleep outdoors in the coldest winter. Was: Re: PLEASE LET ME SLEEP OUTDOORS
2:02.11 outd >
Re: [spam] [personal] information on the Unihertz Titan, a mobile phone
This phone just needs a normal treble A/B arm64 OS. Instructions for building from source at https://github.com/phhusson/treble_experimentations/wiki/How-to-build-a-GSI%3F Two posts earlier in this thread are some quick links to flashing information.
Re: [ot][personal][spam] trying to make my unihertz titan boot
the build instructions from the wiki are very simple. it's just one command. meanwhile, the phone i actually use is a free government phone, and i'd like to see what the barrier is around using it with an open source OS. the factory OS has more advertisement apps than normal apps, and it takes a few minutes to respond to a touch. additionally it has some issue going on where when i touch it it may register the touch in a different spot than where i touched, making typing and swiping very hard, and i'm not sure how i would diagnose this on a closed phone. this free government phone has a unisoc chipset. it looks like there's a factory flash tool at https://spdflashtool.com/download/spd-flash-tool-r26-21-2801 . i downloaded the 'treble info' app on it, and it is treble-based, so an open source OS would run. i've heard these phones are locked, and that trying this fruitless. i'd like to learn the detail myself.
Re: [ot][personal][spam] trying to make my unihertz titan boot
found finally the building instructions at https://github.com/phhusson/treble_experimentations/wiki/How-to-build-a-GSI%3F
Re: [spam] [personal] information on the Unihertz Titan, a mobile phone
The email immediately previously to this has information on flashing a binary android 10 system to this mediatek phone, focusing on Android 10. It turns out the Android 11 and Android 12 images also boot. Images beyond Android 10: d4b8ea9d3682bef57d176300ff3d0be7e7d4ab9d4b48e6680e2eadc94d667bb63ddc54112c853b48d14de22927a7dec87f0e3c53b762687df38c3181c52ffdbe v301-2022-07-19-system-roar-arm64-ab-vanilla.img size=1570042268 boots=true 1889bad614a8c47abcdde27b20ac969eb3c3a29499efe3189289f8bcc41f02ee27318b74547052da2f0a689815c66daf56cad28a7cf42aa03b3545b9315dd2c5 v310-2022-07-19-system-roar-arm64-ab-vanilla.img size=1574547868 boots=true d580538c7e67f049fbf198bb36c4c34169b6936f84ba05de19d79abf802ff067df02cdbd74eb29b151881de006065129ea1e65af560ae392ade2544c10520556 v313-2022-07-19-system-roar-arm64-ab-vanilla.img size=1577128348 boots=true 1941cdabb972b360600e1acd6edb6cca14897a5d50f22bd877d56e8347e6d1ca76946dc2ee94d6c0ec54940f5dd6625698a5ebefb787e944c6dace9bccb9ddd7 v401-2022-07-19-system-squeak-arm64-ab-vanilla.img size=1796673536 boots=true 0b036b42ff97ad59d7f410bdd8f8720beddec109d801ab388d259fa7ed927799b835e4ed3eb8f81f29eb617d464e4d02b48291f911c197b6ee7a615bab9ff8e5 v415-2022-07-19-system-squeak-arm64-ab-vanilla.img size=1814552576 boots=true LATEST RELEASE as of today boots: https://github.com/phhusson/treble_experimentations/releases/download/v415/system-squeak-arm64-ab-vanilla.img.xz Here is a draft for building from source. It does not work yet. Below is as far as I've gotten this morning. This was written during attempts to build Android 10. Since Android 12 boots, likely it is much simpler to build from the most recent, up-to-date sources, where old urls are fixed and there is active development. Total size: >110GB . # set up repo git config --global user.name 'John Doe' git config --global user.email john@example.com apt-get install -y zip repo python-is-python3 python3-virtualenv # if system is old: wget https://storage.googleapis.com/git-repo-downloads/repo-1; chmod 755 repo-1; mv repo-1 /usr/local/bin/repo # clone git clone --branch v222 https://github.com/phhusson/treble_experimentations mkdir treble_experimentations/build cd treble_experimentations/build # build using build-dakkar.sh (builds r40 rather than r41) python3 -m virtualenv .venv curl https://raw.githubusercontent.com/xloem/treble_experimentations/titan/build-dakkar.sh > ../build-dakkar.sh echo y | bash ../build-dakkar.sh -j $(grep -c ^processor /proc/cpuinfo) aosp10 arm64-ab-vanilla-su Should get as far as this unaddressed error: error: vendor/foss/SeedvaultOverlay/Android.bp:1:1: unrecognized module type "runtime_resource_overlay" 14:23:47 soong bootstrap failed with: exit status 1 # build with build-rom.sh bash ../build-rom.sh android-10.0 lineage # compare build-dakkar sources to find right parameters here # build manually repo init -u https://android.googlesource.com/platform/manifest.git -b android-10.0.0_r40 git clone https://github.com/phhusson/treble_manifest .repo/local_manifests -b android-10.0 repo sync -c -j 32 -f --force-sync --no-tag --no-clone-bundle --optimized-fetch --prune rm -rf vendor/*/packages/overlays/NoCutout* # fix kernel source missing (on quack/Q) sed 's;.*KERNEL_;//&;' -i vendor/*/build/soong/Android.bp 2>/dev/null || true mkdir -p device/sample/etc curl "https://raw.githubusercontent.com/LineageOS/android_vendor_lineage/lineage-17.1/prebuilt/common/etc/apns-conf.xml; > device/sample/etc/apns-conf.xml mkdir -p device/generic/common/nfc curl "https://android.googlesource.com/device/generic/common/+/refs/tags/android-10.0.0_r40/nfc/libnfc-nci.conf?format=TEXT;| base64 --decode > device/sample/etc/libnfc-nci.conf sed -i '/Copies the APN/,/include $(BUILD_PREBUILT)/{/include $(BUILD_PREBUILT)/ s/.*/ /; t; d}' vendor/*/prebuilt/common/Android.mk 2>/dev/null || true # patches pushd device/phh/treble git clean -fdx bash generate.sh popd repo manifest -r > output/manifest.xml bash ../list-patches.sh cp patches.zip output/patches.zip # build . build/envsetup.sh # b = ab partition layout; v = vanilla w/out apps ; S = su lunch treble_bvS-userdebug make installclean systemimage vndk-test-sepolicy cp "$OUT"/system.img output/system-arm64.img
Re: [ot][personal][spam] trying to make my unihertz titan boot
the latest release boots. i can switch to the tip sources, and look into other phones.
There Are Three Separate Cases in Federal Court Accusing JPMorgan Chase of a Culture of Fraud
-- Forwarded message - From: Pam Martens Date: Tue, Jul 19, 2022, 11:03 AM Subject: Once Daily Digest Email To: Wall Street On Parade has posted a new item: There Are Three Separate Cases in Federal Court Accusing JPMorgan Chase of a Culture of Fraud https://wallstreetonparade.com/2022/07/there-are-three-separate-cases-in-federal-court-accusing-jpmorgan-chase-of-a-culture-of-fraud/ By Pam Martens and Russ Martens: July 19, 2022 ~ Jamie Dimon, Chairman and CEO of JPMorgan Chase JPMorgan Chase is the largest federally-insured bank in the United States. It is also one of the largest trading houses on Wall Street. That’s the Faustian bargain the Clinton administration entered into with Wall Street when it repealed the Glass-Steagall [...] If the hyperlink above is not active, please paste it into your browser and press "Go" to read the full article. You received this e-mail because you asked to be notified when new updates are posted. If you ever wish to stop receiving these emails from us, just email me at pamk...@aol.com with the word "Unsubscribe" in the subject line. Best regards, Pam Martens, Editor, Wall Street On Parade
Re: [ot][personal][spam] trying to make my unihertz titan boot
oh it was their fancy splash image
Re: [ot][personal][spam] trying to make my unihertz titan boot
v310 worked fine v313 is just showing me a picture from a donald duck comic on boot ...
Re: [ot][personal][spam] trying to make my unihertz titan boot
so, i tried android 11, v301, and it actually booted !! maybe when i tried last time i just hadn't done the 'flashing unlock' command i can totally use newer git trees than i am. back to bisecting release versions ...
Libertarianism and high-tech creates a revenge of the nerds
As surely as power follows wealth, those who make money decide that society, having rewarded their random combination of brains and luck in one sphere, should pay attention to them in another. And so, high-technocrats are beginning to try to influence the world beyond VDTs. But what will result if the people who want to shape public policy know nothing about history or political science or, most importantly, how to interact with other humans? https://www.motherjones.com/politics/1996/07/cyberselfish/ Reposted for information purposes only
Re: [ot][personal][spam] trying to make my unihertz titan boot
it seems like it would make sense to build the tip release since i have little experience building android roms then of course i could bisect backward to see what changes are associated with what issues the builds are generic, not for a specific phone
Calling all geeks, nerds, crypto-anarchists, libertarians and cypherpunks
On one side are the geeks, nerds, crypto-anarchists, libertarians and cypherpunks -- mistrustful of government, suspicious of all attempts at regulation, believers in the ability of technology, in and of itself, to solve society's ills (maybe with a little marginally legal hacking on the side, just to keep the political pot boiling). Austin Hill, president of Zero-Knowledge, opened the conference like a true techno-believer, quoting John Gilmore as saying, "I want to guarantee [privacy] with physics and mathematics, not with laws." Opposing the technologists are the believers in law above all else . . . " https://www.salon.com/2000/04/13/libertarians/ 22 years ago and over a year before I called Mongo an ’ anarcho-phoney ’ to his face
Re: [ot][personal][spam] trying to make my unihertz titan boot
here's the next issue: out/soong/.bootstrap/bin/soong_build -t -l out/.module_paths/Android.bp.list -b out/soong -n out -d out/soong/build.ninja.d -globFile out/soong/.bootstrap/build-globs.ninja -o out/soong/build.ninja Android.bp error: vendor/foss/SeedvaultOverlay/Android.bp:1:1: unrecognized module type "runtime_resource_overlay" 14:23:47 soong bootstrap failed with: exit status 1
Re: [ot][personal][spam] trying to make my unihertz titan boot
i made a github repo with the same name and branch name as phhusson's and modified the build script to check my user before checking his it now proceeds past the repo sync
Re: [ot][personal][spam] trying to make my unihertz titan boot
the full repo sync is 97GB so far
Re: [ot][personal][spam] trying to make my unihertz titan boot
change submission at https://github.com/phhusson/treble_manifest/pull/18
Re: [ot][personal][spam] trying to make my unihertz titan boot
the sync is resuming if i manually change that file to reference that user i'll submit a pull request
Re: [ot][personal][spam] trying to make my unihertz titan boot
this is likely the analogous repo: https://gitlab.com/00p513-dev/gmsexpress
Re: [ot][personal][spam] trying to make my unihertz titan boot
this looks like the fix: https://github.com/phhusson/treble_manifest/pull/16/files
Re: [ot][personal][spam] trying to make my unihertz titan boot
total size of the build folder is presently 68GB gmexpress mentions: .repo/local_manifests/gmsexpress.xml: https://github.com/phhusson/treble_manifest i'm imagining that gmsexpress has moved and phhusson's xml file could use an update
Re: [ot][personal][spam] trying to make my unihertz titan boot
the problematic repository is https://gitlab.com/gms-mirror/gmsexpress.git/
Re: [ot][personal][spam] trying to make my unihertz titan boot
the repo sync has been stalled for some time because one of the gitlab repositories has apparently been renamed since whatever repository list it is using was made
Re: [ot][personal][spam] trying to make my unihertz titan boot
build-dakkar is almost done with repo init i've drafted manual building instructions i'm having a lot of dyskinesia, hard to continue. i'd like next to make build-rom.sh work, it wasn't for me before: https://github.com/phhusson/treble_experimentations/issues/2129
Re: [ot][personal][spam] trying to make my unihertz titan boot
the window in which i was editing the build instructions draft was logged out of gmail when i tried to save it. "we're sorry, but your account is temporarily unavailable."
Re: [ot][personal][spam] trying to make my unihertz titan boot
i've drafted a build script for the other thread. the repo init is going much faster on the remote system. it's cloned 6.8 gigabytes so far, which is more than my free space locally.
Re: [ot][personal][spam] trying to make my unihertz titan boot
repo needs git configure with user and email i'll start a draft to the other thread to put these things in
Re: [ot][personal][spam] trying to make my unihertz titan boot
this system is ubuntu 18; it looks like newer version of repo than the one from apt have more tolerance for quirks. found https://storage.googleapis.com/git-repo-downloads/repo-1 from stackoverflow, replaces /usr/bin/repo
Re: [ot][personal][spam] trying to make my unihertz titan boot
it looks like the build script is outdated. repo appears to now need python3, but the build script sets up a venv with python 2.
Re: [ot][personal][spam] trying to make my unihertz titan boot
`virtualenv2` is supposed to be `python2 -m virtualenv` i patched the build script to do the latter. installing repo.
Re: [ot][personal][spam] trying to make my unihertz titan boot
i'm on a machine and have cloned the repo the build-dakkar script is raising command not found around "virtualenv2" not familiar with this command, although i assume it's part of python venv.
Re: [ot][personal][spam] trying to make my unihertz titan boot
I made a python package for interface with https://vast.ai to quickly and briefly rent powerful shell servers. `pip3 install libvastai` may function, not certain. I don't know if my local version has import fixes. I've used it to create 3 instances with code like: import vast, logging logging.basicConfig(level=logging.INFO) instance = vast.Instance(GiB = 128) instance.create() instance.wait() the prices range from 9 to 13 cents an hour. if the build is slow, this may be expensive. the plan is to just use whichever one finishes setting itself up first, and destroy the others.
Re: [ot][personal][spam] trying to make my unihertz titan boot
I never figured out mtkclient, unfortunately. I never even got in communication with one of the devs or users. However, I've got all the v2xx phhusson treble builds booting on the device using fastboot, which is great stability on that front. Even running a rooted phone at all would be a step up for me. I'm spending some time trying to build the treble releases from source. This likely means finding a system with more storage space to do the build on.
Re: [spam] [personal] information on the Unihertz Titan, a mobile phone
One way to flash and backup this phone is by using the FACTORY FLASHER. I downloaded SP Flash Tool from https://androidmtk.com/smart-phone-flash-tool and expanded it to ~/pkg . NOTE: New versions of SP Flash Tool will upgrade the boot download agent (a boot software package with an extensive rpc interface), which may make it much harder to install 3rd party flashing tools. I have already performed this mistake on my own device, however. The flasher uses a scatter file which I believe is just a list of partition mappings. The FACTORY IMAGE can be found at https://drive.google.com/drive/u/0/folders/1fpO65z2_r9zT8UImuV8-5JCRBy33yZcV . This is in the UnihertzTitan folder on my Windows partition. I do not recommend using Unihert'z rebranded mediatek flasher, because it only runs on Windows. The official generic mediatek flashers work fine and are made for linux, where it is easy to log syscalls etc. There are b2sums and sha256sums of many of these images in this thread. The device can also be flashed with FASTBOOT, although this does not provide for imaging in the other direction. One way to boot to fastboot is by holding volume-up during boot, then rebooting to bootloader mode. First unlock the bootloader: $ fastboot flashing unlock And confirm unlocking on the phone by pressing volume-up. Then flash: $ fastboot flash system system-quack-arm64-ab-vanilla.img TREBLE SYSTEM IMAGE b2sums are in the "making my unihertz titan boot" spam thread at https://lists.cpunks.org/pipermail/cypherpunks/2022-May/099255.html . The urls for downloading them are like https://github.com/phhusson/treble_experimentations/releases/download/TAG/system-quack-arm64-ab-vanilla.img.xz where TAG is something like v207 . I may have tested these images before, but I haven't quite found where my work was if so. I recall they stop running after a major change in the repository. I have tested these images today: - v207 runs fine - v208 runs fine - v210 runs fine - v214 runs fine - v220 runs fine - v222 runs fine LATEST KNOWN WORKING URL for the latest image I've booted successfully: https://github.com/phhusson/treble_experimentations/releases/download/v222/system-quack-arm64-ab-vanilla.img.xz I have not tested any variants other than "vanilla" at this time. I got a DIFFERENT CHECKSUM for v208 today. I have only checked the images listed below. I am assuming that my differing checksum was due to an incomplete download previously, and including the size here. b2sum Differing: 03dc88f81ee58051ffc75ddc8ed5c43c3c73a1dbc598d109b54ad03aaa424b12fb09235da757fa636e97c9fb315752ac5362d72f27c4d5358a66e22814ca1661 v208-2022-07-19-system-quack-arm64-ab-vanilla.img size=1740550424 New: 055aa5fa084a09e4fed0a5dbb5c8007a29848cf2841dc65b939d0247c246286450172d76951cfef89fa8ae1dcea5d6511fc665219e72a8cfe671b55f5a5d7d60 v210-2022-07-19-system-quack-arm64-ab-vanilla.img size=1740718336 8131a0411824ffad0ba5d381513820770bdff3b22e412161f4b5c0827027e18b0e040f691f7af2995c98b203049b096646d08463af4fa01b8588e0e172ceea54 v220-2022-07-19-system-quack-arm64-ab-vanilla.img size=1736143104 Same: aa80d380ac31502dfc548da57414cd6e56ccd12e21be647f82508bec59ae3f36e4d3eee6d3047c73c03075b5d54c15f7bd6bba90a1bf5f73c26bbd33056e3c1e v207-2022-07-19-system-quack-arm64-ab-vanilla.img size=1740189976 503324691350107f945a1e81c89438eb6d4dde120167eede2d35aee20fb20429949a94da50c457304c009a46ad1ff7d1691158dd19368b1ab44546e8ffea102e v218-2022-07-19-system-quack-arm64-ab-vanilla.img size=1735053568 486e3ec3184b203bf87b5a2211d33edd07b0667df57660eca42e386e6f6e0201aba49ec0c25fb30fa22dfada6435d9eda618eadfe276bba62f5bde9dfae7a129 v222-2022-07-19-system-quack-arm64-ab-vanilla.img size=1738010904 BUILDING FROM SOURCE I haven't done this successfully yet. It likely involves cloning and building huge trees of android code for a long time. git clone https://github.com/phhusson/treble_experimentations cd treble_experimentations git checkout v222 mkdir build cd build # note: this likely builds r40; the v222 releases on github appear to be r41 . graphene10 is the same android ver as aosp10, could try it too. the build-dakkar script does more of the repo stuff automatically. bash ../build-dakkar.sh aosp10 arm64-ab-vanilla-su # when it asks to sync, hit Y the first time so as to build the directory structure I guess TROUBLESHOOTING PROBLEMS I ran into: - at first after flashing treble with fastboot, the phone would BOOTLOOP. I'm wondering if this is because I didn't do `fastboot flashing unlock` before flashing with fastboot, or maybe because I was flashing a partial download. I resolved it by reflashing the factory image and using fastboot again. I did not need to perform OEM unlocking after resetting to the factory image; it still had OEM unlocking enabled. I may not have needed to reflash with the factory image at all. INCOMPLETE data for accessing the phone directly may be found near https://github.com/bkerler/mtkclient which is one of the open source flashers. I also started a python
Doug Mastriano a threat to democracy & good-taste
@letsgomathias · Jul 15 New: Gab was key to the Tree of Life synagogue massacre. The site’s owner is a raging anti-Semite. The GOP nominee for PA gov, @dougmastriano, paid Gab $5k for “campaign consulting.” Now every new account on Gab automatically follows Mastriano. https://huffpost.com/entry/doug-mastriano-gab-andrew-torba_n_62d08787e4b02d3ecf3184b9… Show this thread <<< Reposts not etc
Re: Homeland Security records show 'shocking' use of phone data, ACLU says
60 per person per day, in the article, its docs may offer other rates, hardly matters, cellco's have plenty more they give away top-secret, FISA was never really stopped, just transfigured. https://www.aclu.org/news/privacy-technology/new-records-detail-dhs-purchase-and-use-of-vast-quantities-of-cell-phone-location-data https://www.aclu.org/cases/aclu-v-department-homeland-security-commercial-location-data-foia https://www.politico.com/f/?id=0182-10fd-d06c-afbb-95fdce93 https://www.politico.com/f/?id=0182-10ff-d914-a1af-78ff7081 https://docs.house.gov/meetings/IF/IF17/20220623/114958/BILLS-117-8152-P34-Amdt-1.pdf https://legislation.politicopro.com/bill/US_117_HR_8152 https://legislation.politicopro.com/bill/US_117_S_1265 https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking/ https://themarkup.org/privacy/2021/09/30/theres-a-multibillion-dollar-market-for-your-phones-location-data https://www.wsj.com/articles/federal-agencies-use-cellphone-location-data-for-immigration-enforcement-11581078600 https://www.aclu.org/news/immigrants-rights/the-u-s-government-is-secretly-using-cell-phone-location-data-to-track-us-were-suing https://www.politico.com/story/2018/06/22/supreme-court-warrants-cell-phone-location-664484 https://www.buzzfeednews.com/article/hamedaleaziz/ice-dhs-cell-phone-data-tracking-geolocation New Records Detail DHS Purchase and Use of Vast Quantities of Cell Phone Location Data Thousands of previously unreleased records illustrate how government agencies sidestep our Fourth Amendment rights. A photo of three cell phone towers in front of a sunset. July 18, 2022 Shreya Tewari, Brennan Fellow, ACLU Speech, Privacy, and Technology Project Fikayo Walter-Johnson, Paralegal, ACLU's Speech, Privacy, and Technology Project Today, the ACLU published thousands of pages of previously unreleased records about how Customs and Border Protection, Immigration and Customs Enforcement, and other parts of the Department of Homeland Security are sidestepping our Fourth Amendment right against unreasonable government searches and seizures by buying access to, and using, huge volumes of people’s cell phone location information quietly extracted from smartphone apps. The records, which the ACLU obtained over the course of the last year through a Freedom of Information Act (FOIA) lawsuit, shed new light on the government’s ability to obtain our most private information by simply opening the federal wallet. These documents are further proof that Congress needs to pass the Fourth Amendment Is Not For Sale Act, which would end law enforcement agencies’ practice of buying their way around the Fourth Amendment’s warrant requirement. ICE’s and CBP’s warrantless purchase of access to people’s sensitive location information was first reported by The Wall Street Journal in early 2020. After the news broke, we submitted a FOIA request to DHS, ICE, and CBP, and we sued to force the agencies to respond to the request in December 2020. Although the litigation is ongoing, we are now making public the records that CBP, ICE, the U.S. Secret Service, the U.S. Coast Guard, and several offices within DHS Headquarters have provided us to date. The released records shine a light on the millions of taxpayer dollars DHS used to buy access to cell phone location information being aggregated and sold by two shadowy data brokers, Venntel and Babel Street. The documents expose those companies’ — and the government’s — attempts to rationalize this unfettered sale of massive quantities of data in the face of U.S. Supreme Court precedent protecting similar cell phone location data against warrantless government access. Four years ago, in Carpenter v. United States, the Supreme Court ruled that the government needs a warrant to access a person’s cellphone location history from cellular service providers because of the “privacies of life” those records can reveal. That case hinged on a request for one suspect’s historical location information over a several-month period. In the documents we received over the past year, we found Venntel marketing materials sent to DHS explaining how the company collects more than 15 billion location points from over 250 million cell phones and other mobile devices every day. With this data, law enforcement can “identify devices observed at places of interest,” and “identify repeat visitors, frequented locations, pinpoint known associates, and discover pattern of life,” according to a Venntel marketing brochure. The documents belabor how precise and illuminating this data is, allowing “pattern of life analysis to identify persons of interest.” By searching through this massive trove of location information at their whim, government investigators can identify and track specific individuals or everyone in a particular area, learning details of our private activities and associations. The government should not be allowed to purchase its way around bedrock
Re: Juan, who calls himself 'punk' but is really just little internet troll bitch
Yeah, look at the wannabe big-baller swinging his little 20-sat sac around too dumb to know that won't even pay for the tx-fee, and too cowardly to operate the game he talks himself. Boring. Next.