Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
it is so incredible how responsive this phone is now

previously, i would tap or swipe part of the screen, and it would
register touches elsewhere, and it was impossible to do anything

it just does what i say to do now

it is like having palsy and having it go away


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
none of the images with, like, an app store on them, fit on the partition

given there is read/write access to the whole flash, it could be
repartitioned. the userdata partition is much larger than the system
partition, and with an open rom userdata could be moved entirely to a
microsd card.

the chipset is 64 bit, but the os is 32 bit. leaves one wondering what
would be involved in changing that. that would mean changing more than
just the system partition, though, i infer.

i'm flashing back my userdata, since it seems to work ok with treble,
and then planning on reflashing the system partition, installing
f-droid manually, and falling asleep. the flash has 18-19 minutes
left. might fall asleep first, uncertain.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
b2sums

71ad9faaef18ceb973c527db29cb1fc3f27ab2286b49e7f4238645f4048815d6ad18773ed52455aecfae7d7221daaab183b9f55a92e545cc36601d1970dda26f
 v415-2022-07-19-system-squeak-arm32_binder64-ab-vanilla.img
size=1308471296 boots=true

my partitions from the image i took:

f0676fef12a6fdc9074d939d7996c0a564fe4739bb6e31231ca38e4e05b4146345b7afabff97a54aacb39af11cb2fcf2df209abfdd17d24121eddb3d8f46d95c
 boot size=25165824

a834b19291e54808ba8367ca60e6abd9c744138541284b12bb6caa532fae419b063c26022121148fef68a7d8dc0fa83eb2f00454138c1c54753f7148f6911e0d
 boot_para size=1048576

a0710951ceaea9a341c0671ad163de6919e90791257c89e078f2bb953e37a8f8a795efe8e31e509e2e723a54b36f8e58b4a1b739e642a4b8affd88264545392b
 cache size=318767104

2c7497ff142e16092991cba2af39ffec51de988524eb9d05e10e16504e6b1b16fb22febade6755bef224de1cd9b4dc45b91987721f2b44dcc6c2852b416b7cf5
 dtbo size=8388608

b01850bf6173db9f5f87f84eaa7d41a502857b93543239a2fcef81790514af222dc9f98aabefb104ff3cec0a3df2af6c71de526a0fb85401618a7654a173cf82
 expdb size=20971520

9f28dc4bc3ca4a3ef6d860f6d44801de5d49f4c86bb2410c524c154d4a38de07d58f981837e5c90952f81b5be4294f498e57557203135f30d5bd6f09c7e2a7c3
 flashinfo size=16777216

b02dd7288f71fe5b526980e19426527d85a6ef402af59e6a8d5f920ee80444a4454254bfb7a0059a22bdb128c63e254218bf12453bcf1d78c7a0026a2bee0cd3
 frp size=1048576

adb7fdd3cee262e9cb5d9e331c5a0c9b79583294e07c0bf80ddfe7031291a6b85176567b13227cdb63a47d693a51b17f40aba27745809ffd11375f118b21e4e0
 gpt_backup size=16896

286494ab0ffd66da42cd0440d34c2d4d8173252f826a432774dfdff147c708d8a8d4fd9a4d5d92c5b477f3794a23cfae2d7115ebfc692b375f2da70fe88d3b61
 gpt_main size=17408

2293a7a4f497aa92964e1728a0bfca919f255c5b4f8528f1260adfe53248ef48fc1fba8266e7301cbfc2ae5cfe2794eded1571ed1ea1333c3c93585e0d5ba3d1
 gz1 size=16777216

2293a7a4f497aa92964e1728a0bfca919f255c5b4f8528f1260adfe53248ef48fc1fba8266e7301cbfc2ae5cfe2794eded1571ed1ea1333c3c93585e0d5ba3d1
 gz2 size=16777216

162c177df974a4b9c497150d0f7d952bd3cb8e9316e9ffd3b1d6dd420b89d9f849e48e289fbac79f7151e780e893bc9e8d8cf4749ed3bf6419cfe67a78fb63c6
 lk2 size=1048576

162c177df974a4b9c497150d0f7d952bd3cb8e9316e9ffd3b1d6dd420b89d9f849e48e289fbac79f7151e780e893bc9e8d8cf4749ed3bf6419cfe67a78fb63c6
 lk size=1048576

f2aa73345a55ea0959a1aa28cdb37997436ec5d36c3bdcc4332332ab0a97f74d16352ed2240dd4a7b487da377f298e8df8e039bae769441755c104d27b0ac19e
 loader_ext1 size=65536

f2aa73345a55ea0959a1aa28cdb37997436ec5d36c3bdcc4332332ab0a97f74d16352ed2240dd4a7b487da377f298e8df8e039bae769441755c104d27b0ac19e
 loader_ext2 size=65536

cf6a1eda8b68e6ef111e3e99554dc923d9301e541f6cda998ff1504480adb1c19ac31aa328d1b8c949f530bab34d4df51109da4f4f01d63eff2f18741a565c67
 logo size=8388608

43ca91e6c647ce53b8bd238c8d1e66ff95e21a9205887ba084468743aa883cf5c2fad09db28d1ccdb96cab93646b167bd83c802fe508de7d93cb5249af187559
 mcupmfw size=1048576

24f3515bafc49dc12c1457a06f503445ceaabac0b8efbdf3c03e048320316719016eac61b195b31085e790e96835fdceb8e4265bdb91abeb18c86e5d2f176356
 md1dsp size=16777216

0be5fd2f65c602cfea474eda086b74f7ea5d8ccd7556098a38a02351438f4b1e38f2fded06410a86d3fb718fa41ae093aee3ddd992bf30cb51388baf59b76fe4
 md1img size=67108864

1e86bd658db1fb52b3de5da58152c399aa2ff4e5438c733b4a33bfccc6a287e9cfc4021fd2e721939b862ab59f9617d64f5e5ee1dfe2dcc87d06c2797bc21a11
 md_udc size=23699456

30643d30e8b6fe727a33b5737b8be4c15129b1e1de1d7d6a23f1aeaafbc1f81967a7fa4767525e87a403daee3c245fcdb8334cadf20ca96c47df17eecb19a950
 metadata size=33554432

dbe4b0a0519da6139897ff019a0b38a202325c4718251ae07ff846fab539772683fa1c39dcf3496298f43afc10bb385a3b2a88b1f7b3a09278978384ce83ad51
 nvcfg size=8388608

b6d842b010c5d78ee91846cb3d1c92b32543cf65f326abf778b6c981a372c58ae193062a3335addf50bfb06d91cc84d2888eda8b5846b9c1e79f141ffbbf797d
 nvdata size=33554432

7e39527db7bbf056c6b48a31c0cd1a56faf62ca3619df931713fc3b08d1f737743f80a1adc1f5f46fd112877f38e730cc84cf69bf2bc3f600b54e48399c9c54f
 nvram size=5242880

b15323a38433b97b0cfb5fa87ab0e52a8cd5a77afac37275223543a6bab3a39a68386b5cb5300202b7de2c7361a55b0fd22ae5d5e08d78694d295cfa978c8439
 para size=524288

87dfbbe3b72af8fa0f38913959f3c5a66e69b3bfbeccfca925d1dcba7310f13ef566a4bb67c1d4040ff93820cdddb56841766362175549b9cb976f7c37869a92
 persist size=50331648

6ece667ad916b39bdbf654ae502b094c0ae0e72581775d08fc6a349d64d6d14cfbcead928d85cf61c1888d8062f46fc7d0445381a7a95eb94df12cb5bfce6054
 proinfo size=3145728

64f6709f93f9323b49f6dd5e60ea5f43d2ac7f65d6baa3124f2d79cd87179c7943cb568e6b1055c2730988a7cc092742c68d91daed10bdd105d1c143dc97422f
 protect1 size=8388608

7d4f79d8a2fd1f8ad760d758a6dd1ca866f1fad5c01396258b90bb7a0caecd9c131661dfa9672d633e211f8cd5b164e0bb7f585037d35cfff741751a689f010f
 protect2 size=11395072

bcc54767f957ec77c8a94151a4e5c4787763570d2acdada205a424fc1d892d2b4b0eb03fb1ae5fcfd28b685b11a66e30399a1428d36dd8873addbb4e2a6670d3
 recovery size=25165824

5069f4e376673bbfd3eda944555ce956bc65458172934a798085066e627e22a25666704ad929e6875c03746c3dad2e42e7bc89c5a5ea7b8010098d552c45
 sec1 size=2097152


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this worked. the phone is now running the open source treble OS, android 12.

i did not have to change the secure boot partition.

- unlock the phone using mtkclient da seccfg unlock [link for details
a couple posts back]
- reboot into fastbootd, the graphical fastboot, and flash the system
image with arm32_binder64-ab

seems quite likely one could pull fastbootd out of the mix. and other
things, some day.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
ok, there are two different fastboots.
the userspace fastboot, fastbootd, can look inside the super
partition. when this one is running, there is a graphical menu on the
phone saying "fastbootd" and `fastboot getvar is-userspace` returns
"yes". the simpler one doesn't look inside super and returns "no".
i got into fastbootd by booting into android then doing `adb reboot fastboot` .

there are also tools to extract/repack the super partition off the phone.


Re: Assange's Case #FREEASSANGE

2022-07-19 Thread grarpamp
Mexican President Intervenes With Biden, Renews Asylum Offer For Julian Assange

https://news.antiwar.com/2022/07/18/mexican-president-renews-offer-to-grant-asylum-to-julian-assange-in-letter-to-biden/
https://www.usnews.com/news/world/articles/2022-07-18/mexican-president-renewed-asylum-offer-for-assange-in-letter-to-biden
https://tass.com/world/1475609
https://news.antiwar.com/2022/06/20/australian-pm-rejects-calls-to-intervene-in-assange-case/
https://news.antiwar.com/2022/07/01/julian-assange-appeals-uk-decision-to-extradite-him-to-the-us/
https://www.meaa.org/news/assange-extradition-decision-a-huge-relief-us-must-now-end-prosecution/
https://www.republik.ch/2020/01/31/nils-melzer-about-wikileaks-founder-julian-assange



On Monday, Mexican President Andres Manuel Lopez Obrador said he
delivered a letter to President Biden last week where he pleaded for
the US not to prosecute Julian Assange and renewed an offer to grant
asylum to the WikiLeaks founder.

Lopez Obrador said he explained in the letter that Assange "did not
cause anyone’s death, did not violate any human rights and that he
exercised his freedom, and that arresting him would mean a permanent
affront to freedom of expression."
Image source: AP

The Mexican leader said that he previously offered asylum to Assange
in a letter to President Trump at the end of his term and again at the
beginning of the Biden administration. Last month, Lopez Obrador
called Assange "the best journalist of our time."

Assange faces up to 175 years in prison for exposing US war crimes by
publishing documents he received from whistleblower and former Army
soldier Chelsea Manning. Lopez Obrador said earlier this month that if
Assange is sentenced to life in prison, there should be a campaign to
dismantle the statue of liberty.

"If they bring him to the US and sentence to the ultimate penalty, to
death in prison, then we will have to initiate a campaign for
dismantling the Statue of Liberty, presented by the French, because it
will no longer be a symbol of liberty," he said.

While Lopez Obrador is outspoken in his support for Assange, who is an
Australian citizen, Australian Prime Minister Anthony Albanese is not.
Albanese has rejected calls for him to demand that Washington drop its
extradition request.

Assange is currently being held in London’s Belmarsh Prison. British
Home Secretary Priti Patel has approved the extradition of Assange to
the US, and the WikiLeaks founder’s legal team lodged an appeal to her
ruling on July 1.

President López Obrador of Mexico delivered letter on Assange to
Biden at their presidential meeting last week https://t.co/PN66oVi28F
— WikiLeaks (@wikileaks) July 19, 2022

Assange is indicted on 17 counts of espionage and one count of
conspiracy to commit a computer crime for his role in obtaining and
publishing the leaks provided by Manning. But Assange used standard
journalistic practices to obtain the information, something many human
rights groups, journalist organizations, and UN officials have pointed
out.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
fastboot is giving me 'this partition doesn't exist' even when updated
to latest version :/
i can see 'system' listed in the header of super.bin


Re: USA 2020 Elections: Thread

2022-07-19 Thread grarpamp
> Democrats in trouble... not a good look...

https://twitter.com/rncresearch
https://twitter.com/libsoftiktok

False Flag Crisis Actors, Pathetic Democrats...
For real, caught on video, again, lol...


AOC and Ilhan Omar Pretend To Be Handcuffed During Supreme Court Arrest

https://www.dailymail.co.uk/news/article-11029247/AOC-Democrat-members-Congress-including-fellow-Squad-members-ARRESTED.html
https://twitter.com/KatieDaviscourt/status/1549453598718771200
https://twitter.com/mattdizwhitlock/status/1549464571655643136

Rep. Ilhan Omar also pretended to be in handcuffs - and can be seen
raising her right arm at the very end of the clip.

What's more, her staff lied to reporter Esme Murphy and said she was
handcuffed. Watch:

Her staff is lying unless she's Superman and just broke the
handcuffs at the end of the video. pic.twitter.com/BrToWoVsg9
— Matt Whitlock (@mattdizwhitlock) July 19, 2022

US Capitol Police said in a statement that they made "a total of 34
arrests for Crowding, Obstructing or Incommoding," which included "16
members of Congress."

UPDATE: We made a total of 34 arrests for Crowding, Obstructing or
Incommoding (DC Code § 22–1307).

That arrest number includes 16 Members of Congress.
— U.S. Capitol Police (@CapitolPolice) July 19, 2022

Rep. Alexandria Ocasio-Cortez appeared to pretend she was handcuffed
on Tuesday as police escorted the Democratic socialist and several
other lawmakers from a protest outside the Supreme Court.

As the Daily Mail notes, "Ocasio-Cortez was seen walking escorted away
by police with her hands crossed behind her back, as if she were in
handcuffs, but she was not. At one point she uncrossed her hands and
raised her fists to the other protesters."

Why is @AOC pretending to be detained when she is escorted by
police away from the Supreme Court? pic.twitter.com/a6ckzcONUD
— Katie Daviscourt (@KatieDaviscourt) July 19, 2022

AOC and the other lawmakers joined pro-abortion protesters who have
gathered outside the Supreme Court almost daily since Roe v. Wade was
overturned in June.

#BansOffOurBodies pic.twitter.com/CzDHJ5PM8o
— Carolyn B. Maloney (@RepMaloney) July 19, 2022

Other members seen being detained by officers include include Rep.
Cori Bush, D-Mo., Ayanna Pressley, D-Mass., Nydia Velazquez, D-N.Y.,
Jackie Speier, D-Calif., Sarah Jacobs, D-Calif.,  Katherine Clark,
D-Mass., Andy Levin, D-Mich., Carolyn Maloney, D-N.Y., Madeleine Dean,
D-Pa., Jan Schakowksy, D-Ill., and Bonnie Watson Coleman, D-Calif.
-Daily Mail

.@CoriBush, @AOC, @IlhanMN, @AyannaPressley & other Members of
Congress arrested for civil disobedience in front of Supreme Court.
#BansOffOurBodies pic.twitter.com/GxtxS4aMYb
— Lynese Wallace (@lynesewallace) July 19, 2022

"I’ve just been arrested at the Supreme Court protesting the
horrendous overturn of Roe v Wade. This is the time to stand up, speak
out, and not shy away when seeking justice and equality," tweeted Rep.
Maloney after what she called an 'arrest.'

Statement on Congresswoman Maloney’s arrest while protesting for
abortion rights in front of the Supreme Court:
pic.twitter.com/286002CaVu
— Carolyn B. Maloney (@RepMaloney) July 19, 2022


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
so
unlocking bootloader: https://www.hovatek.com/forum/thread-40300.html
flashing treble_experimentations:
https://www.xda-developers.com/flash-generic-system-image-project-treble-device/

the system partition is inside the extended super partition

it has secure boot enabled, so there are more hoops to navigate


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the 'super' partition had about the same size and i tried to flash it.
this made it bootloop into fastboot.

it turns, websearching, that 'super' is an extended partition, that
contains 'system' inside it as a logical partition.

i reflashed my imaged super and the phone works again, AND ! it gives
the boot message that my bootloader is unlocked :D

it sounds like new versions of fastboot know to look inside the super
partition, even if mtkclient doesn't immediately do that


Ukraine Has Experimental Mutant Troops Created in Secret Biolabs

2022-07-19 Thread professor rat
Russia Says It’s Losing Because Ukraine Has Experimental Mutant Troops Created 
in Secret Biolabs

https://www.yahoo.com/news/russia-says-losing-because-ukraine-104546288.html

And no Russian-linked journalist has ever lied or distorted information, have 
they Jim?

Besides - Ukraine will cave the minute they hear about the scathing Russian 
attack on Crypto.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i don't know what partition to flash it onto !


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the dance of
$ mtk e metadata,userdata,md_udc
$ mtk da seccfg unlock
ran without error

and i'm trying out
https://github.com/phhusson/treble_experimentations/releases/download/v415/system-squeak-arm32_binder64-ab-vanilla.img.xz

i expect i have more to do, though, before a gsi image will just run


Russia Delivers a Scathing Setback to Crypto

2022-07-19 Thread professor rat
Vladdy boy Pooter knows so much about scathing setbacks that  - 
cryptoanarchists like Jim Bell - now resemble the Black Knight.

But I'm sure if he ever comes back, Jim will bite his ankle. 

https://www.youtube.com/watch?v=ZmInkxbvlCs


A quantum homomorphic encryption scheme for polynomial-sized circuits

2022-07-19 Thread professor rat
Quantum homomorphic encryption (QHE) is an encryption method that allows 
quantum computation to be performed on one party's private data with the 
program provided by another party, without revealing much information about the 
data nor about the program to the opposite party.

https://arxiv.org/abs/1810.01166

The impossible science of quantum-decryption could start with recognition that 
much of our surrounding reality exists in a virtual homomorphic databank.

You find that one-armed man.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this page appears to enumerate the commands to unlock mediatek phones:
https://www.droidwin.com/unlock-bootloader-on-mediatek-devices-using-mtkclient
there are 3 fastboot commands to try, and then some mtk downloadagent tricks


Russian State-Sponsored TV Network's Attempt To Dismiss Copyright Lawsuit On Fair Use Grounds Denied

2022-07-19 Thread Gunnar Larson
https://www.mondaq.com/unitedstates/copyright/1174834/russian-state-sponsored-tv-network39s-attempt-to-dismiss-copyright-lawsuit-on-fair-use-grounds-denied?email_access=on


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
totally just imaged every partition in my phone with mtk rl


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
mtkclient actually works without the kernel patch !

$ mtk printgpt

DA_handler - Device is unprotected.
DA_handler - Device is in Preloader-Mode :(
DAXFlash - Uploading xflash stage 1 from MTK_AllInOne_DA_5.2152.bin
xflashext - Patching da2 ...
DAXFlash - Successfully uploaded stage 1, jumping ..
Preloader - Jumping to 0x20
Preloader - Jumping to 0x20: ok.
DAXFlash - Successfully received DA sync
DAXFlash - Uploading stage 2...
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - Successfully uploaded stage 2
DAXFlash - EMMC FWVer:  0x0
DAXFlash - EMMC ID: QE13MB
DAXFlash - EMMC CID:150100514531334d420da525d2998409
DAXFlash - EMMC Boot1 Size: 0x40
DAXFlash - EMMC Boot2 Size: 0x40
DAXFlash - EMMC GP1 Size:   0x0
DAXFlash - EMMC GP2 Size:   0x0
DAXFlash - EMMC GP3 Size:   0x0
DAXFlash - EMMC GP4 Size:   0x0
DAXFlash - EMMC RPMB Size:  0x40
DAXFlash - EMMC USER Size:  0x3a3e0
DAXFlash - HW-CODE : 0x699
DAXFlash - HWSUB-CODE  : 0x8A00
DAXFlash - HW-VERSION  : 0xCB00
DAXFlash - SW-VERSION  : 0x2
DAXFlash - CHIP-EVOLUTION  : 0x0
DAXFlash - DA-VERSION  : 1.0
DAXFlash - Upload data was accepted. Jumping to stage 2...
DAXFlash - DA Extensions successfully added

GPT Table:
-
boot_para:   Offset 0x8000, Length
0x0010, Flags 0x, UUID
f57ad330-39c2-4488-b09b-00cb43c9ccd4, Type EFI_BASIC_DATA
recovery:Offset 0x00108000, Length
0x0180, Flags 0x, UUID
fe686d97-3544-4a41-21be-167e25b61b6f, Type EFI_BASIC_DATA
para:Offset 0x01908000, Length
0x0008, Flags 0x, UUID
1cb143a8-b1a8-4b57-51b2-945c5119e8fe, Type EFI_BASIC_DATA
expdb:   Offset 0x01988000, Length
0x0140, Flags 0x, UUID
3b9e343b-cdc8-4d7f-a69f-b6812e50ab62, Type EFI_BASIC_DATA
frp: Offset 0x02d88000, Length
0x0010, Flags 0x, UUID
5f6a2c79-6617-4b85-02ac-c2975a14d2d7, Type EFI_BASIC_DATA
vbmeta:  Offset 0x02e88000, Length
0x0080, Flags 0x, UUID
4ae2050b-5db5-4ff7-d3aa-5730534be63d, Type EFI_BASIC_DATA
vbmeta_system:   Offset 0x03688000, Length
0x0080, Flags 0x, UUID
1f9b0939-e16b-4bc9-bca5-dc2ee969d801, Type EFI_BASIC_DATA
vbmeta_vendor:   Offset 0x03e88000, Length
0x0080, Flags 0x, UUID
d722c721-0dee-4cb8-838a-2c63cd1393c7, Type EFI_BASIC_DATA
nvcfg:   Offset 0x04688000, Length
0x0080, Flags 0x, UUID
e02179a8-ceb5-48a9-3188-4f1c9c5a8695, Type EFI_BASIC_DATA
nvdata:  Offset 0x04e88000, Length
0x0200, Flags 0x, UUID
84b09a81-fad2-41ac-0e89-407c24975e74, Type EFI_BASIC_DATA
md_udc:  Offset 0x06e88000, Length
0x0169a000, Flags 0x, UUID
e8f0a5ef-8d1b-42ea-2a9c-835cd77de363, Type EFI_BASIC_DATA
metadata:Offset 0x08522000, Length
0x0200, Flags 0x, UUID
d5f0e175-a6e1-4db7-c094-f82ad032950b, Type EFI_BASIC_DATA
protect1:Offset 0x0a522000, Length
0x0080, Flags 0x, UUID
1d9056e1-e139-4fca-0b8c-b75fd74d81c6, Type EFI_BASIC_DATA
protect2:Offset 0x0ad22000, Length
0x00ade000, Flags 0x, UUID
7792210b-b6a8-45d5-91ad-3361ed14c608, Type EFI_BASIC_DATA
seccfg:  Offset 0x0b80, Length
0x0080, Flags 0x, UUID
138a6db9-1032-451d-e991-0fa38ff94fbb, Type EFI_BASIC_DATA
persist: Offset 0x0c00, Length
0x0300, Flags 0x, UUID
756d934c-50e3-4c91-46af-02d824169ca7, Type EFI_BASIC_DATA
sec1:Offset 0x0f00, Length
0x0020, Flags 0x, UUID
a3f3c267-5521-42dd-24a7-3bdec20c7c6f, Type EFI_BASIC_DATA
proinfo: Offset 0x0f20, Length
0x0030, Flags 0x, UUID
8c68cd2a-ccc9-4c5d-578b-34ae9b2dd481, Type EFI_BASIC_DATA
md1img:  Offset 0x0f50, Length
0x0400, Flags 0x, UUID
6a5cebf8-54a7-4b89-1d8d-c5eb140b095b, Type EFI_BASIC_DATA
md1dsp:  Offset 0x1350, Length
0x0100, Flags 0x, UUID
a0d65bf8-e8de-4107-3494-1d318c843d37, Type EFI_BASIC_DATA
spmfw:   Offset 0x1450, Length
0x0010, Flags 0x, UUID
46f0c0bb-f227-4eb6-2fb8-66408e13e36d, Type EFI_BASIC_DATA
mcupmfw: Offset 0x1460, Length
0x0010, Flags 0x, UUID
fbc2c131-6392-4217-1eb5-548a6edb03d0, Type EFI_BASIC_DATA
gz1: Offset 0x1470, Length
0x0100, Flags 0x, UUID
e195a981-e285-4734-2580-ec323e9589d9, Type EFI_BASIC_DATA
gz2: Offset 0x1570, Length
0x0100, Flags 0x, UUID

Fwd: CITI Estimates The Metaverse at $8-13 Trillion.pdf

2022-07-19 Thread Gunnar Larson
-- Forwarded message -
From: Gunnar Larson 
Date: Fri, Jun 10, 2022, 7:38 PM
Subject: CITI Estimates The Metaverse at $8-13 Trillion.pdf
To: cypherpunks , , Chollet,
Nicki 


Mark and VP, Russian President comment on IP and the Metaverse.

https://drive.google.com/file/d/1REoa87GCmt2uhDp7ZYswbTRw4ygQgjsL/view?usp=drivesdk


Meta v. Meta: Immersive Tech Co. Sues Owner of Facebook, Instagram, Claiming Rights to 'Meta' Trademark

2022-07-19 Thread Gunnar Larson
https://www.law.com/newyorklawjournal/2022/07/19/meta-v-meta-immersive-tech-co-sues-owner-of-facebook-instagram-claiming-rights-to-meta-trademark/?kw=Meta%20v.%20Meta:%20Immersive%20Tech%20Co.%20Sues%20Owner%20of%20Facebook%2C%20Instagram%2C%20Claiming%20Rights%20to%20%27Meta%27%20Trademark_source=email_medium=enl_campaign=afternoonalert_content=20220719_term=nylj


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
totally a unisoc-branded mediatek 6739

$ adb shell getprop
[Build.BRAND]: [MTK]
[camera.disable_zsl_mode]: [1]
[dalvik.vm.appimageformat]: [lz4]
[dalvik.vm.dex2oat-Xms]: [64m]
[dalvik.vm.dex2oat-Xmx]: [512m]
[dalvik.vm.dex2oat-max-image-block-size]: [524288]
[dalvik.vm.dex2oat-minidebuginfo]: [true]
[dalvik.vm.dex2oat-resolve-startup-strings]: [true]
[dalvik.vm.dexopt.secondary]: [true]
[dalvik.vm.heapgrowthlimit]: [256m]
[dalvik.vm.heapsize]: [512m]
[dalvik.vm.image-dex2oat-Xms]: [64m]
[dalvik.vm.image-dex2oat-Xmx]: [64m]
[dalvik.vm.isa.arm.features]: [default]
[dalvik.vm.isa.arm.variant]: [cortex-a53]
[dalvik.vm.minidebuginfo]: [true]
[dalvik.vm.mtk-stack-trace-file]: [/data/anr/mtk_traces.txt]
[dalvik.vm.usejit]: [true]
[dalvik.vm.usejitprofiles]: [true]
[debug.atrace.tags.enableflags]: [0]
[debug.force_rtl]: [false]
[debug.sf.disable_backpressure]: [1]
[dev.bootcomplete]: [1]
[dev.mnt.blk.product]: [dm-5]
[dev.mnt.blk.root]: [dm-3]
[dev.mnt.blk.vendor]: [dm-4]
[drm.service.enabled]: [true]
[gsm.current.phone-type]: [1]
[gsm.network.type]: [Unknown]
[gsm.operator.alpha]: []
[gsm.operator.iso-country]: [us]
[gsm.operator.isroaming]: [false]
[gsm.operator.numeric]: []
[gsm.sim.num.pin]: []
[gsm.sim.num.pin2]: []
[gsm.sim.num.puk]: []
[gsm.sim.num.puk2]: []
[gsm.sim.num.simlock]: []
[gsm.sim.preiccid_0]: []
[gsm.sim.state]: [ABSENT]
[gsm.sim1.type]: []
[gsm.version.baseband]: [MOLY.LR12A.R3.MP.V140.8.P7]
[gsm.version.ril-impl]: [android reference-ril 1.0]
[hwservicemanager.ready]: [true]
[init.svc.adbd]: [running]
[init.svc.agpsd]: [running]
[init.svc.apexd]: [running]
[init.svc.apexd-bootstrap]: [stopped]
[init.svc.ashmemd]: [running]
[init.svc.audioserver]: [running]
[init.svc.batterywarning]: [running]
[init.svc.bluetooth-1-0]: [running]
[init.svc.bootanim]: [stopped]
[init.svc.bootlogoupdater]: [stopped]
[init.svc.bpfloader]: [stopped]
[init.svc.camerahalserver]: [running]
[init.svc.cameraserver]: [running]
[init.svc.ccci3_mdinit]: [stopped]
[init.svc.ccci_mdinit]: [running]
[init.svc.drm]: [running]
[init.svc.flash_recovery]: [stopped]
[init.svc.fuelgauged]: [running]
[init.svc.fuelgauged_nvram]: [stopped]
[init.svc.gatekeeperd]: [running]
[init.svc.gnss_service]: [running]
[init.svc.gpu]: [running]
[init.svc.gpu-1-0]: [running]
[init.svc.gsid]: [stopped]
[init.svc.health-hal-2-0]: [running]
[init.svc.hidl_memory]: [running]
[init.svc.hwservicemanager]: [running]
[init.svc.idmap2d]: [stopped]
[init.svc.incidentd]: [running]
[init.svc.installd]: [running]
[init.svc.iorapd]: [stopped]
[init.svc.ipsec_mon]: [running]
[init.svc.keystore]: [running]
[init.svc.lbs_dbg]: [running]
[init.svc.lbs_hidl_service]: [running]
[init.svc.light-hal-2-0]: [running]
[init.svc.lmkd]: [running]
[init.svc.logd]: [running]
[init.svc.logd-auditctl]: [stopped]
[init.svc.logd-reinit]: [stopped]
[init.svc.media]: [running]
[init.svc.media.swcodec]: [running]
[init.svc.mediacodec]: [running]
[init.svc.mediadrm]: [running]
[init.svc.mediaextractor]: [running]
[init.svc.mediametrics]: [running]
[init.svc.mnld]: [running]
[init.svc.mobile_log_d]: [running]
[init.svc.mtk_secure_element_hal_service]: [running]
[init.svc.mtkcodecservice-1-1]: [stopped]
[init.svc.netd]: [running]
[init.svc.netdagent]: [running]
[init.svc.netdiag]: [running]
[init.svc.nvram-hidl-1-1]: [running]
[init.svc.nvram_daemon]: [stopped]
[init.svc.power-hal-1-0]: [running]
[init.svc.pq-2-2]: [running]
[init.svc.rcs_volte_stack]: [running]
[init.svc.servicemanager]: [running]
[init.svc.statsd]: [running]
[init.svc.storaged]: [running]
[init.svc.surfaceflinger]: [running]
[init.svc.system_suspend]: [running]
[init.svc.tee_check_keybox]: [stopped]
[init.svc.teed]: [running]
[init.svc.terservice]: [stopped]
[init.svc.thermal]: [running]
[init.svc.thermal_manager]: [stopped]
[init.svc.thermald]: [running]
[init.svc.thermalloadalgod]: [running]
[init.svc.tombstoned]: [running]
[init.svc.ueventd]: [running]
[init.svc.usbd]: [stopped]
[init.svc.vendor.audio-hal-2-0]: [running]
[init.svc.vendor.bip]: [running]
[init.svc.vendor.cas-hal-1-1]: [running]
[init.svc.vendor.ccci3_fsd]: [stopped]
[init.svc.vendor.ccci_fsd]: [running]
[init.svc.vendor.ccci_rpcd]: [running]
[init.svc.vendor.configstore-hal]: [running]
[init.svc.vendor.drm-clearkey-hal-1-2]: [running]
[init.svc.vendor.drm-hal-1-0]: [running]
[init.svc.vendor.drm-widevine-hal-1-2]: [running]
[init.svc.vendor.epdg_wod]: [running]
[init.svc.vendor.gatekeeper-1-0]: [running]
[init.svc.vendor.gralloc-2-0]: [running]
[init.svc.vendor.gsm0710muxd]: [running]
[init.svc.vendor.hwcomposer-2-1]: [running]
[init.svc.vendor.keymaster-4-0-trustkernel]: [running]
[init.svc.vendor.memtrack-hal-1-0]: [running]
[init.svc.vendor.ril-daemon-mtk]: [running]
[init.svc.vendor.sensors-hal-2-0]: [running]
[init.svc.vendor.thermal-hal-1-0]: [running]
[init.svc.vendor.usb-hal-1-1]: [running]
[init.svc.vendor.vibrator-1-0]: [running]
[init.svc.vendor.volte_imcb]: [running]
[init.svc.vendor.volte_stack]: [running]
[init.svc.vendor.volte_ua]: 

Re: [ot][wrong] Please let me sleep outdoors in the coldest winter. Was: Re: PLEASE LET ME SLEEP OUTDOORS

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
12/1:19.09 outd


Re: SATAn hack can steal data directly from your SATA cable

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
enticing rocking posts from jim bell via tracking links

i looked for the quantum programming book in library genesis but it's
not there yet. there are older books, though, you could just look up
how to gain access to quantum computers to try things out

the SATAn paper is https://arxiv.org/abs/2207.07413 . the attack is
not very new as far as i know.

This paper introduces a new type of attack on isolated, air-gapped
workstations. Although air-gap computers have no wireless
connectivity, we show that attackers can use the SATA cable as a
wireless antenna to transfer radio signals at the 6 GHz frequency
band. The Serial ATA (SATA) is a bus interface widely used in modern
computers and connects the host bus to mass storage devices such as
hard disk drives, optical drives, and solid-state drives. The
prevalence of the SATA interface makes this attack highly available to
attackers in a wide range of computer systems and IT environments. We
discuss related work on this topic and provide technical background.
We show the design of the transmitter and receiver and present the
implementation of these components. We also demonstrate the attack on
different computers and provide the evaluation. The results show that
attackers can use the SATA cable to transfer a brief amount of
sensitive information from highly secured, air-gap computers
wirelessly to a nearby receiver. Furthermore, we show that the attack
can operate from user mode, is effective even from inside a Virtual
Machine (VM), and can successfully work with other running workloads
in the background. Finally, we discuss defense and mitigation
techniques for this new air-gap attack.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
if you're using gcc 9 on a system designed for gcc 4, you'd better do
PATH=/bin:/usr/bin:/sbin:/usr/sbin before building your 3.10 kernel
sources.


Russia Delivers a Scathing Setback to Crypto

2022-07-19 Thread jim bell
 Russia Delivers a Scathing Setback to Crypto 
https://share.newsbreak.com/1gp0afkg

Hardly a week goes by without the young crypto industry receiving some bad news.

The industry is currently playing a guessing game which consists of trying to 
guess which crypto company or crypto platform is next to be impacted by the 
liquidity crisis affecting prominent crypto lenders like Celsius Network, 
Voyager Digital and BlockFi.

This cash crunch crisis comes from the fall in cryptocurrency prices that led 
to a collapse of more than $2 trillion in the crypto market since November. The 
damages are substantial. Celsius and Voyager have filed for Chapter 11 
bankruptcy and their customers don't even know if they will be able to get 
their money back.

Other platforms like Babel Finance, CoinLoan or CoinFlex have suspended 
withdrawals, thus preventing their customers from having access to their funds. 
BlockFi was bailed out by cryptocurrency exchange FTX.com.

Another difficulty for the sector is how to bring back retail investors, many 
of whom fled the crypto sector after suffering colossal losses? Some investors 
even lost everything following the crash of sister tokens Luna and UST in May. 
Three Arrows Capital, also known as 3AC, a crypto hedge fund was forced into 
liquidation.

As if that were not enough, bad news has just arrived from Russia. Indeed, 
President Vladimir Putin has just signed a tougher law against cryptocurrencies 
after it was passed by the Russian National Assembly or Duma on July 8.

This law banned any payment for assets, goods, products and services with 
digital means or any utility tokens. It is the latest legal arsenal adopted by 
Moscow to prevent cryptocurrencies from being used as a means of payment.

Crypto and Sanctions

The Minister of Finance Anton Siluanov had introduced a draft On Digital 
Currency in parliament for regulation of the sector in February.

The Russian government, however, didn't follow the recommendation of the 
Central Bank of Russia, which called in March for an outright ban on 
cryptocurrencies and the entire crypto industry in the country. The institution 
recommended a ban on trading, mining, and paying for goods and services with 
cryptocurrencies.

The Russian war in Ukraine may play a big role here. In the face of NATO 
sanctions, there has been a surge of interest in how Russia might use 
cryptocurrencies to sidestep sanctions. Selected Russian banks were 
disconnected from the SWIFT, a secure messaging system used by financial 
institutions, brokers, and investment firms.

Russia's economy has suffered under the sanctions with the ruble's value 
plummeting.

According to government figures, 


SATAn hack can steal data directly from your SATA cable

2022-07-19 Thread jim bell
 SATAn hack can steal data directly from your SATA cable 
https://share.newsbreak.com/1gozsduo

Researchers at the University of the Negev, Israel, have published a paper that 
demonstrates how a hacker could extract data from an otherwise secure system 
via its SATA cable. The attack uses the SATA cable itself as a form of wireless 
transmitter, and the data it carries can be intercepted as a form of radio 
signal in the 6GHz band. The attack is appropriately referred to as SATAn.

The researchers published a paper here (opens in new tab) (via Tom’s Hardware 
(opens in new tab)). They successfully demonstrated the technique and showed it 
in a video that’s included above. It has to be said that this kind of attack is 
complicated and requires specific malware to be installed on the target 
machine. It requires specialized shellcode to modify file system activity that 
generates identifiable radio signals from SATA cables.The electromagnetic 
leakage of the cables can be intercepted by a wireless receiver and replicated 
on a second device. The researchers entered the word ‘secret’ on the target 
machine, which was picked up by a second machine. It’s just a simple demo but 
there’s no reason that targeted malware couldn’t be used to extract passwords 
or other sensitive text information.

It’s a complicated method as it would require access to the target computer. An 
air gapped system without any network access would require malware to be 
directly installed. There’s also the problem that the SATA signal emission is 
weak and requires the receiving antenna to be around 1 meter away. It’s not 
easy to just walk up to a secure system and say hi.


The Entrapment Controversy

2022-07-19 Thread Gunnar Larson
Faculty Publications
UC Hastings College of the Law Library
Author: Roger C. Park
Title: The Entrapment Controversy
Source: Minnesota Law Review
Citation: 60 Minn. L. Rev. 163 (1976).

Brody Larson has made 212 highlights:
https://drive.google.com/file/d/1rhPWgd_OniZVLeJIlieDBx5VNC2chenn/view?usp=drivesdk


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i added the patch to my specfile and am building a new rpm

i canceled the unihertz titan build. the host had been running for 6
hours. i'm just a little confused.


A Beginner’s Guide to Quantum Programming

2022-07-19 Thread jim bell
A Beginner’s Guide to Quantum Programming 
https://share.newsbreak.com/1govv8d9

A new guide on programming quantum algorithms leads programmers through every 
step, from theory to implementing the algorithms on IBM’s publicly accessible 
5-qubit ibmqx4 quantum computer and others.

The guide covers the fundamentals, along with a summary of the main quantum 
algorithms and instructions on how to implement them on publicly available 
quantum computers


As quantum computers proliferate and become more widely available, would-be 
quantum programmers are left scratching their brains over how to get started in 
the field. A new beginner’s guide offers a complete introduction to quantum 
algorithms and their implementation on existing hardware.“Writing quantum 
algorithms is radically different from writing classical computing programs and 
requires some understanding of quantum principles and the mathematics behind 
them,” said Andrey Y. Lokhov, a scientist at Los Alamos National Laboratory and 
lead author of the recently published guide in ACM Transactions on QuantAnother 
section looks at the various types of quantum algorithms. From there, the guide 
dives into the 20 selected algorithms, with a problem definition, description, 
and steps for implementing each one on the IBM or, in a few cases, other 
computers.




Extensive references at the end of the guide will help interested readers go 
deeper in their explorations of quantum algorithms.

The study was funded by the Information Science and Technology Institute at Los 
Alamos National Laboratory through the Laboratory Directed Research and 
Development program.

Reference: “Quantum Algorithm Implementations for Beginners” by Abhijith J., 
Adetokunbo Adedoyin, John Ambrosiano, Petr Anisimov, William Casper, Gopinath 
Chennupati, Carleton Coffrin, Hristo Djidjev, David Gunter, Satish Karra, 
Nathan Lemons, Shizeng Lin, Alexander Malyzhenkov, David Mascarenas, Susan 
Mniszewski, Balu Nadiga, Daniel O’malley, Diane Oyen, Scott Pakin, Lakshman 
Prasad, Randy Roberts, Phillip Romero, Nandakishore Santhi, Nikolai Sinitsyn, 
Pieter J. Swart, James G. Wendelberger, Boram Yoon, Richard Zamora, Wei Zhu, 
Stephan Eidenbenz, Andreas Bärtschi, Patrick J. Coles, Marc Vuffray and Andrey 
Y. Lokhov, 7 July 2022, ACM Transactions on Quantum Computing.
DOI: 10.1145/351734
   
   - 
   - 
   - 
   - 


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
haha the patches are for linux 5.x and i have linux 3.x

might not be as big as it sounds since the versioning changed, but it
sounds ridiculously big


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
successful reboot


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i'm installing a free kernel from centos 7 to try it out.

of course, this is probably a different kind of phone, it might be
interesting, and at least might give me an error i can websearch for.

my system may fail to reboot, in which case it could be a while ;p i'm
thinking maybe for working aroudn i would start another redhat
subscription, boot off some kind of boot media, and install a
normative kernel


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
unfortunately i don't presently have access to my kernel sources to
try any mtk exploits that come with mtkclient. mediatek wrote a linux
kernel driver that engages the boot loader, and mtkclient patches it.
i'm on a redhat enterprise linux system that has expired.

mtkclient]$ python3 mtk gettargetconfig
Preloader - CPU:MT6739/MT6731()
Preloader - HW version: 0x0
Preloader - WDT:0x10007000
Preloader - Uart:   0x11002000
Preloader - Brom payload addr:  0x100a00
Preloader - DA payload addr:0x201000
Preloader - CQ_DMA addr:0x10212000
Preloader - Var1:   0xb4
Preloader - Disabling Watchdog...
Preloader - HW code:0x699
Preloader - Target config:  0x0
Preloader - SBC enabled:False
Preloader - SLA enabled:False
Preloader - DAA enabled:False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader - Root cert required: False
Preloader - Mem read auth:  False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked:   False
Preloader - Get Target info
Preloader - HW subcode: 0x8a00
Preloader - HW Ver: 0xcb00
Preloader - SW Ver: 0x2
Main - Getting target info...
Preloader - Target config:  0x0
Preloader - SBC enabled:False
Preloader - SLA enabled:False
Preloader - DAA enabled:False
Preloader - SWJTAG enabled: False
Preloader - EPP_PARAM at 0x600 after EMMC_BOOT/SDMMC_BOOT:  False
Preloader - Root cert required: False
Preloader - Mem read auth:  False
Preloader - Mem write auth: False
Preloader - Cmd 0xC8 blocked:   False


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i'm thinking i could probably make this phone work by just treating it
like a mediatek phone.

i'm wondering if when spreadtrum rebranded to unisoc, they outsourced
some of their stuff to mediatek or whatever mediatek uses, like other
companies do as other companies grow bigger faster than they do.

this chipset is the first chipset produced by unisoc, after they
rebranded from spreadtrum.

i'm wondering if the people who said that spreadtrum wasn't like
mediatek, and was unreasonable to unlock, were talking about
pre-unisoc stuff.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
there are a lot more bootloader commands at
https://github.com/bkerler/mtkclient/blob/main/mtkclient/Library/mtk_preloader.py#L48

i'm thinking it would make sense to dump the ram and look for OEM
commands in it.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
$ fastboot getvar all
(bootloader) max-download-size: 0x800
(bootloader) variant:
(bootloader) logical-block-size: 0x200
(bootloader) erase-block-size: 0x8
(bootloader) hw-revision: cb00
(bootloader) battery-soc-ok: yes
(bootloader) battery-voltage: 3823mV
(bootloader) partition-size:sgpt: 4200
(bootloader) partition-type:sgpt: raw data
(bootloader) partition-size:flashinfo: 100
(bootloader) partition-type:flashinfo: raw data
(bootloader) partition-size:userdata: 2aedfbe00
(bootloader) partition-type:userdata: f2fs
(bootloader) partition-size:cache: 1300
(bootloader) partition-type:cache: ext4
(bootloader) partition-size:super: c680
(bootloader) partition-type:super: raw data
(bootloader) partition-size:tee2: ce
(bootloader) partition-type:tee2: raw data
(bootloader) partition-size:tee1: 50
(bootloader) partition-type:tee1: raw data
(bootloader) partition-size:dtbo: 80
(bootloader) partition-type:dtbo: raw data
(bootloader) partition-size:logo: 80
(bootloader) partition-type:logo: raw data
(bootloader) partition-size:boot: 180
(bootloader) partition-type:boot: raw data
(bootloader) partition-size:loader_ext2: 1
(bootloader) partition-type:loader_ext2: raw data
(bootloader) partition-size:loader_ext1: 1
(bootloader) partition-type:loader_ext1: raw data
(bootloader) partition-size:lk2: 10
(bootloader) partition-type:lk2: raw data
(bootloader) partition-size:lk: 10
(bootloader) partition-type:lk: raw data
(bootloader) partition-size:nvram: 50
(bootloader) partition-type:nvram: raw data
(bootloader) partition-size:gz2: 100
(bootloader) partition-type:gz2: raw data
(bootloader) partition-size:gz1: 100
(bootloader) partition-type:gz1: raw data
(bootloader) partition-size:mcupmfw: 10
(bootloader) partition-type:mcupmfw: raw data
(bootloader) partition-size:spmfw: 10
(bootloader) partition-type:spmfw: raw data
(bootloader) partition-size:md1dsp: 100
(bootloader) partition-type:md1dsp: raw data
(bootloader) partition-size:md1img: 400
(bootloader) partition-type:md1img: raw data
(bootloader) partition-size:proinfo: 30
(bootloader) partition-type:proinfo: raw data
(bootloader) partition-size:sec1: 20
(bootloader) partition-type:sec1: raw data
(bootloader) partition-size:persist: 300
(bootloader) partition-type:persist: ext4
(bootloader) partition-size:seccfg: 80
(bootloader) partition-type:seccfg: raw data
(bootloader) partition-size:protect2: ade000
(bootloader) partition-type:protect2: ext4
(bootloader) partition-size:protect1: 80
(bootloader) partition-type:protect1: ext4
(bootloader) partition-size:metadata: 200
(bootloader) partition-type:metadata: raw data
(bootloader) partition-size:md_udc: 169a000
(bootloader) partition-type:md_udc: ext4
(bootloader) partition-size:nvdata: 200
(bootloader) partition-type:nvdata: ext4
(bootloader) partition-size:nvcfg: 80
(bootloader) partition-type:nvcfg: ext4
(bootloader) partition-size:vbmeta_vendor: 80
(bootloader) partition-type:vbmeta_vendor: raw data
(bootloader) partition-size:vbmeta_system: 80
(bootloader) partition-type:vbmeta_system: raw data
(bootloader) partition-size:vbmeta: 80
(bootloader) partition-type:vbmeta: raw data
(bootloader) partition-size:frp: 10
(bootloader) partition-type:frp: raw data
(bootloader) partition-size:expdb: 140
(bootloader) partition-type:expdb: raw data
(bootloader) partition-size:para: 8
(bootloader) partition-type:para: raw data
(bootloader) partition-size:recovery: 180
(bootloader) partition-type:recovery: raw data
(bootloader) partition-size:boot_para: 10
(bootloader) partition-type:boot_para: raw data
(bootloader) partition-size:pgpt: 8000
(bootloader) partition-type:pgpt: raw data
(bootloader) partition-size:preloader: 4
(bootloader) partition-type:preloader: raw data
(bootloader) off-mode-charge: 1
(bootloader) warranty: yes
(bootloader) unlocked: no
(bootloader) secure: yes
(bootloader) kernel: lk
(bootloader) product: x038_k39tv1_bsp
(bootloader) is-userspace: no
(bootloader) slot-count: 0
(bootloader) version-baseband: MOLY.LR12A.R3.MP.V140.8.P7
(bootloader) version-bootloader: x038_k39tv1_bsp-ba63681-20220219163459-
(bootloader) version-preloader:
(bootloader) version: 0.5
all: Done!!


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i'm realising that i can figure out the sizes and orders of partitions
without needing root access
the other phone used a gpt partition table
i might be able to make a partition map by hand, to try the factory tools


Homeland Security Is Buying Its Way Around the Fourth Amendment

2022-07-19 Thread jim bell
 Homeland Security Is Buying Its Way Around the Fourth Amendment 
https://share.newsbreak.com/1goc7w5v

American taxpayers pay to be spied upon. That's one takeaway from new documents 
obtained by the American Civil Liberties Union (ACLU), which has been examining 
how federal agents spent millions to purchase massive troves of cellphone 
location data and dodge Fourth Amendment requirements.

As part of a lawsuit against the Department of Homeland Security (DHS), the 
ACLU obtained thousands of previously unreleased records showing how DHS 
agencies—including Customs and Border Protection (CBP) and Immigration and 
Customs Enforcement (ICE)—are purchasing and accessing "huge volumes of 
people's cell phone location information quietly extracted from smartphone 
apps."

These agencies are "sidestepping our Fourth Amendment right against 
unreasonable government searches and seizures," suggests the ACLU.

In 2018, the U.S. Supreme Court held (in Carpenter v. United States) that under 
the Fourth Amendment, law enforcement must have a warrant before accessing a 
suspect's phone location data from cellular service providers. But federal 
authorities have been getting around this by purchasing aggregated cellphone 
location data from data broker firms like Venntel and Babel Street. And they're 
spending millions of taxpayer dollars doing it.

This was first revealed by the Wall Street Journal back in 2020. The ACLU then 
set out to learn more, filing a Freedom of Information Act (FOIA) request and 
later suing to force DHS, ICE, and CBP to respond.

"Although the litigation is ongoing, we are now making public the records that 
CBP, ICE, the U.S. Secret Service, the U.S. Coast Guard, and several offices 
within DHS Headquarters have provided us to date," the ACLU announced yesterday.

Cellphone location data purchased by DHS is aggregated. It doesn't directly 
link the names or personal information of cellphone users to specific location 
data. But there's still a lot of privacy-infringing information that can be 
gleaned from such information, says the ACLU:


In the documents we received over the past year, we found Venntel marketing 
materials sent to DHS explaining how the company collects more than 15 billion 
location points from over 250 million cell phones and other mobile devices 
every day.

With this data, law enforcement can "identify devices observed at places of 
interest," and "identify repeat visitors, frequented locations, pinpoint known 
associates, and discover pattern of life," according to a Venntel marketing 
brochure. The documents belabor how precise and illuminating this data is, 
allowing "pattern of life analysis to identify persons of interest." By 
searching through this massive trove of location information at their whim, 
government investigators can identify and track specific individuals or 
everyone in a particular area, learning details of our private activities and 
associations.



Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i tried to search xda for mt6739 information and am getting this
error: "The forums are currently offline while we are performing
system maintenance. Be back soon!"
google shows that there is indeed discussion around the mt6739

given the use of hw_code and separate use of platform, there is
probably some underlying thing that both mediatek and unisoc share. it
seems likely that bootloader stuff would work on both the same,
although they might need different download agents.

it could be interesting to compare the unisoc download agent with the
mediatek download agent, if it uses one.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this hardware code is actually in the mediatek platform table

0x0699: 0x6739

this unisoc chipset might be an MT6739

i found you can try to compare the two chipsets at phonedb.net
unisoc chipset:
https://phonedb.net/index.php?m=processor=769=spreadtrum_sc9832e
mediatek chipset:
https://phonedb.net/index.php?m=processor=748=mediatek_mt6739

- they are both based on 4x ARM Cortex-A53 MPcore .
- they are specified with different emmc revisions; the mediatek
chipset is a newer emmc revision, despite being released a year prior
- they have different embedded GPUs
- they appear to support the same suites of cellular data protocols
- they support the same display pixel dimensions and their modem
featuresets have the same strings
- the mediatek chipset supports opencl and vulkan (gpu driver
features), which the unisoc chipset does not

the unisoc page links to a datasheet. the link is broken.

they seem similar enough for it to be worthwhile spending some time
seeing if things that work on the mediatek chipset work on the unisoc
one with the same bootloader hw code.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
these lines explain a lot of how the mediatek exploit i was reviewing
a session or two on these phones worked:
CMD_READ16  0xa2Read data from the SoC memory (16 bit length parameter)
CMD_WRITE16 0xd2Write data into SoC memory (16 bit length parameter)
CMD_READ32  0xd1Read data from the SoC memory (32 bit length parameter)
CMD_WRITE32 0xd4Write data into SoC memory (32 bit length parameter)
it can read and write from SoC memory
the commenting in the exploit talked about this, but i didn't know the commands


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
these commands are apparently documented for the mediatek preloader
here: 
http://www.lieberbiber.de/2015/07/04/mediatek-details-partitions-and-preloader/
!
i'm not certain yet whether that means that this unisoc chipset is
based on mediatek, or if it is some shared thing that both use.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
so, i tried booting up the mediatek flasher, to see if it would do
anytihng, and ran into the same issue i ran into with the unisoc
flasher: it refuses to run unless you provide it with a partition map
in advance, and i haven't found a factory image for this phone yet.

_however_, i know from working with the protocol under the hood with
the mediatek phone, that it doesn't actually use the partition map for
anything for most of the protocol. it's a soft barrier.

unfortunately i don't remember how the protocol works and didn't
document what i found well.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
left out: i could also look harder for ways to root the phone, or to
access its flash storage internally [it would be great to pick up the
flash reads with a near-field radio but i have separate inhibition
around that goal, so it seems a separate thing]


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the oem command does not work on this phone. i did find at
https://www.xda-developers.com/how-to-discover-hidden-fastboot-commands/
that oem commands are likely sent as strings straight to the device,
and can usually be enumerated by grepping for strings in the boot
loader.

the device has a vbmeta partition, i guess all devices with verified
boot enabled likely do.

i'm a little surprised the boot thing from russia didn't work. i could
ask more at their forum, or ask the dev with the similar device; i
think i'd like to learn a little more about it first. i'm a little
curious about profiling the bootloader to see what it might be.

i could also try to reverse engineer the factory flasher a little, and
see if there are some useful codes or identifying information.

when I connect the phone to the system, it behaves similar to the
mediatek phone, offering a brief serial interface and relating
commands via it. it actually responds to my 'backyard mediatek
flasher''s handshake, with the same 'READY' exchange protocol. The
output of test.py is this:

Device preloader version: 0x3
hw_code=0x699 unk1=0x0 hw_subcode=0x8a00 hw_version=0xcb00 unk2=0x2 unk3=0x0

These are very similar values to the mediatek situation. It implies
that the two are speaking the same protocol, whatever protocol it is.
The chipsets are both based on arm.


Re: [ot][wrong] Please let me sleep outdoors in the coldest winter. Was: Re: PLEASE LET ME SLEEP OUTDOORS

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
10/0:58.03


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
my build host has gone offline
theoretically it is still running the build
vast.ai says i won't be charged while it is offline
i'm worried, however, that if i just let it do it's thing, i will
forget it is there, and then when it comes back online i will be
charged a lot.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
On 7/19/22, Undiscussed Horrific Abuse, One Victim of Many
 wrote:
> this link seems helpful, if untrustworthy:
> https://romprovider.com/xiaomi-qin2-pro-unlock-bootloader/ it contains
> a google drive link to android_device_unlock.rar

i've uploaded the version of the .rar at that website to
https://bafybeifgh34qlpdcsxfe42z3jysp3fzk66r577dbsylniggw5vjvn2yk5y.ipfs.dweb.link/Android_device_unlock.rar
since it seems hard to access


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
reminding myself that the build instructions page links to a telegram
community to find the most up-to-date steps


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
building the phh treble git tip failed with this error:

[100% 250/250] out/soong/.bootstrap/bin/soong_build
out/soong/build.ninja
FAILED: out/soong/build.ninja
cd "$(dirname "out/soong/.bootstrap/bin/soong_build")" &&
BUILDER="$PWD/$(basename "out/soong/.bootstrap/bin/soong_build")" &&
cd / && env -i "$BUILDER" --top "$TOP" --out "out/soong
" -n "out" -d "out/soong/build.ninja.d" -t -l
out/.module_paths/Android.bp.list -globFile
out/soong/.bootstrap/build-globs.ninja -o out/soong/build.ninja
--available_env out/soon
g/soong.environment.available --used_env
out/soong/soong.environment.used Android.bp
Killed
17:22:32 soong bootstrap failed with: exit status 1
ninja: build stopped: subcommand failed.


often when i see "Killed" it means the system ran out of RAM. the
build system has 16G of ram. when you rent them you can specify how
much ram to filter by.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
after rebooting my system back to linux, it actually unhibernated!
often it will just boot up again, fscking the disk to handle nothing
having been cleanly closed. it is great to have the
hibernation-resuming working this time.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this link seems helpful, if untrustworthy:
https://romprovider.com/xiaomi-qin2-pro-unlock-bootloader/ it contains
a google drive link to android_device_unlock.rar

the original post seems helpful, but most of the primary material
seems to be in russian, a language i have not myself learned yet. my
browser isn't showing the automatic "translate" popup and i failed to
find the search button on the russian site.

the dev of the open source OS i got working with the unihertz titan
uses a qin 2 pro:
https://github.com/phhusson/treble_experimentations/issues/1602#issuecomment-735017739

hovatek has a lot of unisoc information. they link to a fastboot for
unlocking that is on mega.nz:
https://www.hovatek.com/forum/thread-32287.html
the mega.nz link just loads a lot of ads for me.

it's great to find a more normative set of information for this phone chipset.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
it looks like there is a modified fastboot binary being used, that can
extract a special code from the phone that can be used to unlock it

it seems like it makes sense to try to get ahold of that binary, run
it, and figure out what its secret protocol is


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i websearched for some time. the chipset is SC9832E, and looking for
that chipset i found similar experiences to mine, where oem unlocking
can be enabled but fastboot still fails.

there's some documentation of working around this for the qin 2 pro at
https://en.typeblog.net/1c72/how-i-unlocked-xiaomi-qin-2-pro-and-installed-phh-gsi/


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
so, the windows flasher i tried needs a .pac file for the phone . it
needs two partitions from it, and won't do much of anything without
them, including apparently downloading data from the phone. i'm not
sure where to find this factory image for this phone, but could look
more places.

another thing i found is that there are of course a handful of
hardware dongles for working with this chipset and phones directly.
this idea is inspiring. if the dongle approach works, then i might be
able to bypass any lock restrictions on the device by simply treating
it as a new device i am building.

it looks like the partitions it needs, fd1 and fd2, may simply be the
user and system partitions. i found a janky instruction guide for
generating a .pac file from backup images of a rooted phone. they
actually use the windows flasher tool, to pack the files into a .pac
file.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
but i'll at least reboot into windows and try a factory flasher out!
there are at least 3 different factory flashers

i'm imagining there's a good chance an exploit or opening the hardware
would be needed to reflash the phone. this is likely increasing my
dissociated discouragement.


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the unisoc chipset is SC9832E

not sure how long i'll be able to keep doing this atm


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
"Reboot to bootloader" places it into the same-looking system as the
unihertz titan, where it is waiting for commands from fastboot.

unfortunately, when i do "fastboot flashing unlock", it says "unlock failed" :(

so flashing this phone may be a long-term adventure in learning the
bootloaders and flashing protocols


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i did an `adb reboot fastboot` and it completely worked.
takes me to a fastbootd menu on the phone
one of the entries says "Secure boot - yes", which could be discouraging

options include "Enter recovery" and "Reboot to bootloader"


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
then with usb debugging enabled:
[3974182.695809] usb 1-4: new high-speed USB device number 42 using xhci_hcd
[3974182.819725] usb 1-4: New USB device found, idVendor=0e8d,
idProduct=201c, bcdDevice= 2.23
[3974182.819732] usb 1-4: New USB device strings: Mfr=1, Product=2,
SerialNumber=3
[3974182.819737] usb 1-4: Product: HPP-L55B
[3974182.819741] usb 1-4: Manufacturer: Hot Pepper Inc


Re: [ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
dmesg when running and plugged in:
[3974073.464782] usb 1-4: New USB device found, idVendor=0e8d,
idProduct=2008, bcdDevice= 2.23
[3974073.464790] usb 1-4: New USB device strings: Mfr=1, Product=2,
SerialNumber=3
[3974073.464795] usb 1-4: Product: HPP-L55B
[3974073.464799] usb 1-4: Manufacturer: Hot Pepper Inc


[ot][spam] log: trying to take control of my free government phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i have a serrano hot pepper l55b phone purportedly with a unisoc
chipset, running android 10 based on treble.

these phones can be gotten very cheaply, with a free plan, in the usa.
although i think the phone you get from the program changes. i got
mine because i got on foodstamps, at my family's request, and i wasn't
set up with a working phone, and this worked out for me.

it would be a good thing to make the phone run a custom rom so all the
other people who use it could use a normal phone. it is not normal
when bought. it is full of advertisements, very slow, and it wouldn't
let me use it to tether. i think it has other limitations too.

i searched earlier for OEM unlocking on the phone, but did not find
it. now, with my experience just working on the unihertz titan, i
found OEM unlocking. it is under system->advanced->developer options.

although somebody told me this phone could not run a gsi, it looks
pretty likely to me that it can. if the bootloader can be unlocked,
and there is a public factory flasher, then we just need to put an
appropriate treble system partition on it, and it might run like a
thousand dollar phone from silicon valley, dunno


Re: [ot][wrong] Please let me sleep outdoors in the coldest winter. Was: Re: PLEASE LET ME SLEEP OUTDOORS

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
2:02.11 outd

>


Re: [spam] [personal] information on the Unihertz Titan, a mobile phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
This phone just needs a normal treble A/B arm64 OS.

Instructions for building from source at
https://github.com/phhusson/treble_experimentations/wiki/How-to-build-a-GSI%3F

Two posts earlier in this thread are some quick links to flashing information.


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the build instructions from the wiki are very simple. it's just one command.

meanwhile, the phone i actually use is a free government phone, and
i'd like to see what the barrier is around using it with an open
source OS.

the factory OS has more advertisement apps than normal apps, and it
takes a few minutes to respond to a touch. additionally it has some
issue going on where when i touch it it may register the touch in a
different spot than where i touched, making typing and swiping very
hard, and i'm not sure how i would diagnose this on a closed phone.

this free government phone has a unisoc chipset. it looks like there's
a factory flash tool at
https://spdflashtool.com/download/spd-flash-tool-r26-21-2801 .

i downloaded the 'treble info' app on it, and it is treble-based, so
an open source OS would run.

i've heard these phones are locked, and that trying this fruitless.
i'd like to learn the detail myself.


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
found finally the building instructions at
https://github.com/phhusson/treble_experimentations/wiki/How-to-build-a-GSI%3F


Re: [spam] [personal] information on the Unihertz Titan, a mobile phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
The email immediately previously to this has information on flashing a
binary android 10 system to this mediatek phone, focusing on Android
10. It turns out the Android 11 and Android 12 images also boot.

Images beyond Android 10:
d4b8ea9d3682bef57d176300ff3d0be7e7d4ab9d4b48e6680e2eadc94d667bb63ddc54112c853b48d14de22927a7dec87f0e3c53b762687df38c3181c52ffdbe
 v301-2022-07-19-system-roar-arm64-ab-vanilla.img size=1570042268
boots=true
1889bad614a8c47abcdde27b20ac969eb3c3a29499efe3189289f8bcc41f02ee27318b74547052da2f0a689815c66daf56cad28a7cf42aa03b3545b9315dd2c5
 v310-2022-07-19-system-roar-arm64-ab-vanilla.img size=1574547868
boots=true
d580538c7e67f049fbf198bb36c4c34169b6936f84ba05de19d79abf802ff067df02cdbd74eb29b151881de006065129ea1e65af560ae392ade2544c10520556
 v313-2022-07-19-system-roar-arm64-ab-vanilla.img size=1577128348
boots=true
1941cdabb972b360600e1acd6edb6cca14897a5d50f22bd877d56e8347e6d1ca76946dc2ee94d6c0ec54940f5dd6625698a5ebefb787e944c6dace9bccb9ddd7
 v401-2022-07-19-system-squeak-arm64-ab-vanilla.img size=1796673536
boots=true
0b036b42ff97ad59d7f410bdd8f8720beddec109d801ab388d259fa7ed927799b835e4ed3eb8f81f29eb617d464e4d02b48291f911c197b6ee7a615bab9ff8e5
 v415-2022-07-19-system-squeak-arm64-ab-vanilla.img size=1814552576
boots=true

LATEST RELEASE as of today boots:
https://github.com/phhusson/treble_experimentations/releases/download/v415/system-squeak-arm64-ab-vanilla.img.xz

Here is a draft for building from source. It does not work yet. Below
is as far as I've gotten this morning. This was written during
attempts to build Android 10. Since Android 12 boots, likely it is
much simpler to build from the most recent, up-to-date sources, where
old urls are fixed and there is active development.

Total size: >110GB .

# set up repo
git config --global user.name 'John Doe'
git config --global user.email john@example.com
apt-get install -y zip repo python-is-python3 python3-virtualenv
# if system is old: wget
https://storage.googleapis.com/git-repo-downloads/repo-1; chmod 755
repo-1; mv repo-1 /usr/local/bin/repo

# clone
git clone --branch v222 https://github.com/phhusson/treble_experimentations
mkdir treble_experimentations/build
cd treble_experimentations/build

# build using build-dakkar.sh (builds r40 rather than r41)
python3 -m virtualenv .venv
curl 
https://raw.githubusercontent.com/xloem/treble_experimentations/titan/build-dakkar.sh
> ../build-dakkar.sh
echo y | bash ../build-dakkar.sh -j $(grep -c ^processor
/proc/cpuinfo) aosp10 arm64-ab-vanilla-su

Should get as far as this unaddressed error:
error: vendor/foss/SeedvaultOverlay/Android.bp:1:1: unrecognized
module type "runtime_resource_overlay"
14:23:47 soong bootstrap failed with: exit status 1

# build with build-rom.sh
bash ../build-rom.sh android-10.0 lineage # compare build-dakkar
sources to find right parameters here

# build manually
repo init -u https://android.googlesource.com/platform/manifest.git -b
android-10.0.0_r40
git clone https://github.com/phhusson/treble_manifest
.repo/local_manifests -b android-10.0
repo sync -c -j 32 -f --force-sync --no-tag --no-clone-bundle
--optimized-fetch --prune

rm -rf vendor/*/packages/overlays/NoCutout*
# fix kernel source missing (on quack/Q)
sed 's;.*KERNEL_;//&;' -i vendor/*/build/soong/Android.bp 2>/dev/null || true
mkdir -p device/sample/etc
curl 
"https://raw.githubusercontent.com/LineageOS/android_vendor_lineage/lineage-17.1/prebuilt/common/etc/apns-conf.xml;
> device/sample/etc/apns-conf.xml
mkdir -p device/generic/common/nfc
curl 
"https://android.googlesource.com/device/generic/common/+/refs/tags/android-10.0.0_r40/nfc/libnfc-nci.conf?format=TEXT;|
base64 --decode > device/sample/etc/libnfc-nci.conf
sed -i '/Copies the APN/,/include $(BUILD_PREBUILT)/{/include
$(BUILD_PREBUILT)/ s/.*/ /; t; d}' vendor/*/prebuilt/common/Android.mk
2>/dev/null || true

# patches
pushd device/phh/treble
git clean -fdx
bash generate.sh
popd
repo manifest -r > output/manifest.xml
bash ../list-patches.sh
cp patches.zip output/patches.zip

# build
. build/envsetup.sh
# b = ab partition layout; v = vanilla w/out apps ; S = su
lunch treble_bvS-userdebug
make installclean systemimage vndk-test-sepolicy
cp "$OUT"/system.img output/system-arm64.img


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the latest release boots. i can switch to the tip sources, and look
into other phones.


There Are Three Separate Cases in Federal Court Accusing JPMorgan Chase of a Culture of Fraud

2022-07-19 Thread Gunnar Larson
-- Forwarded message -
From: Pam Martens 
Date: Tue, Jul 19, 2022, 11:03 AM
Subject: Once Daily Digest Email
To: 


Wall Street On Parade has posted a new item:

There Are Three Separate Cases in Federal Court Accusing JPMorgan Chase of a
Culture of Fraud
https://wallstreetonparade.com/2022/07/there-are-three-separate-cases-in-federal-court-accusing-jpmorgan-chase-of-a-culture-of-fraud/

By Pam Martens and Russ Martens: July 19, 2022 ~
Jamie Dimon, Chairman and CEO of JPMorgan Chase
JPMorgan Chase is the largest federally-insured bank in the United States.
It
is also one of the largest trading houses on Wall Street. That’s the
Faustian bargain the Clinton administration entered into with Wall Street
when
it repealed the Glass-Steagall [...]

If the hyperlink above is not active, please paste it into your browser and
press "Go" to read the full article.

You received this e-mail because you asked to be notified when new updates
are
posted.

If you ever wish to stop receiving these emails from us, just email me at
pamk...@aol.com with the word "Unsubscribe" in the subject line.

Best regards,
Pam Martens, Editor, Wall Street On Parade


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
oh it was their fancy splash image


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
v310 worked fine
v313 is just showing me a picture from a donald duck comic on boot ...


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
so, i tried android 11, v301, and it actually booted !!

maybe when i tried last time i just hadn't done the 'flashing unlock' command

i can totally use newer git trees than i am.

back to bisecting release versions ...


Libertarianism and high-tech creates a revenge of the nerds

2022-07-19 Thread professor rat
As surely as power follows wealth, those who make money decide that society, 
having rewarded their random combination of brains and luck in one sphere, 
should pay attention to them in another. And so, high-technocrats are beginning 
to try to influence the world beyond VDTs.

But what will result if the people who want to shape public policy know nothing 
about history or political science or, most importantly, how to interact with 
other humans?

https://www.motherjones.com/politics/1996/07/cyberselfish/

Reposted for information purposes only


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
it seems like it would make sense to build the tip release
since i have little experience building android roms
then of course i could bisect backward to see what changes are
associated with what issues

the builds are generic, not for a specific phone


Calling all geeks, nerds, crypto-anarchists, libertarians and cypherpunks

2022-07-19 Thread professor rat
On one side are the geeks, nerds, crypto-anarchists, libertarians and 
cypherpunks -- mistrustful of government, suspicious of all attempts at 
regulation, believers in the ability of technology, in and of itself, to solve 
society's ills (maybe with a little marginally legal hacking on the side, just 
to keep the political pot boiling). Austin Hill, president of Zero-Knowledge, 
opened the conference like a true techno-believer, quoting John Gilmore as 
saying, "I want to guarantee [privacy] with physics and mathematics, not with 
laws."

Opposing the technologists are the believers in law above all else . . . "

https://www.salon.com/2000/04/13/libertarians/

22 years ago and over a year before I called Mongo an ’ anarcho-phoney ’ to his 
face


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
here's the next issue:

out/soong/.bootstrap/bin/soong_build -t -l
out/.module_paths/Android.bp.list -b out/soong -n out -d
out/soong/build.ninja.d -globFile
out/soong/.bootstrap/build-globs.ninja -o out/soong/build.ninja
Android.bp
error: vendor/foss/SeedvaultOverlay/Android.bp:1:1: unrecognized
module type "runtime_resource_overlay"
14:23:47 soong bootstrap failed with: exit status 1


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i made a github repo with the same name and branch name as phhusson's
and modified the build script to check my user before checking his
it now proceeds past the repo sync


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the full repo sync is 97GB so far


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
change submission at https://github.com/phhusson/treble_manifest/pull/18


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the sync is resuming if i manually change that file to reference that user

i'll submit a pull request


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this is likely the analogous repo: https://gitlab.com/00p513-dev/gmsexpress


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this looks like the fix:
https://github.com/phhusson/treble_manifest/pull/16/files


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
total size of the build folder is presently 68GB

gmexpress mentions:
.repo/local_manifests/gmsexpress.xml:
https://github.com/phhusson/treble_manifest

i'm imagining that gmsexpress has moved and phhusson's xml file could
use an update


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the problematic repository is https://gitlab.com/gms-mirror/gmsexpress.git/


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the repo sync has been stalled for some time because one of the gitlab
repositories has apparently been renamed since whatever repository
list it is using was made


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
build-dakkar is almost done with repo init
i've drafted manual building instructions

i'm having a lot of dyskinesia, hard to continue. i'd like next to
make build-rom.sh work, it wasn't for me before:
https://github.com/phhusson/treble_experimentations/issues/2129


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
the window in which i was editing the build instructions draft was
logged out of gmail when i tried to save it. "we're sorry, but your
account is temporarily unavailable."


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i've drafted a build script for the other thread.
the repo init is going much faster on the remote system. it's cloned
6.8 gigabytes so far, which is more than my free space locally.


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
repo needs git configure with user and email
i'll start a draft to the other thread to put these things in


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
this system is ubuntu 18; it looks like newer version of repo than the
one from apt have more tolerance for quirks. found
https://storage.googleapis.com/git-repo-downloads/repo-1 from
stackoverflow, replaces /usr/bin/repo


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
it looks like the build script is outdated. repo appears to now need
python3, but the build script sets up a venv with python 2.


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
`virtualenv2` is supposed to be `python2 -m virtualenv`

i patched the build script to do the latter.

installing repo.


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
i'm on a machine and have cloned the repo
the build-dakkar script is raising command not found around "virtualenv2"
not familiar with this command, although i assume it's part of python venv.


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
I made a python package for interface with https://vast.ai to quickly
and briefly rent powerful shell servers. `pip3 install libvastai` may
function, not certain. I don't know if my local version has import
fixes.

I've used it to create 3 instances with code like:
import vast, logging
logging.basicConfig(level=logging.INFO)
instance = vast.Instance(GiB = 128)
instance.create()
instance.wait()

the prices range from 9 to 13 cents an hour. if the build is slow,
this may be expensive.
the plan is to just use whichever one finishes setting itself up
first, and destroy the others.


Re: [ot][personal][spam] trying to make my unihertz titan boot

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
I never figured out mtkclient, unfortunately. I never even got in
communication with one of the devs or users.

However, I've got all the v2xx phhusson treble builds booting on the
device using fastboot, which is great stability on that front. Even
running a rooted phone at all would be a step up for me.

I'm spending some time trying to build the treble releases from
source. This likely means finding a system with more storage space to
do the build on.


Re: [spam] [personal] information on the Unihertz Titan, a mobile phone

2022-07-19 Thread Undiscussed Horrific Abuse, One Victim of Many
One way to flash and backup this phone is by using the FACTORY
FLASHER. I downloaded SP Flash Tool from
https://androidmtk.com/smart-phone-flash-tool and expanded it to ~/pkg
.

NOTE: New versions of SP Flash Tool will upgrade the boot download
agent (a boot software package with an extensive rpc interface), which
may make it much harder to install 3rd party flashing tools. I have
already performed this mistake on my own device, however.

The flasher uses a scatter file which I believe is just a list of
partition mappings.

The FACTORY IMAGE can be found at
https://drive.google.com/drive/u/0/folders/1fpO65z2_r9zT8UImuV8-5JCRBy33yZcV
. This is in the UnihertzTitan folder on my Windows partition. I do
not recommend using Unihert'z rebranded mediatek flasher, because it
only runs on Windows. The official generic mediatek flashers work fine
and are made for linux, where it is easy to log syscalls etc. There
are b2sums and sha256sums of many of these images in this thread.

The device can also be flashed with FASTBOOT, although this does not
provide for imaging in the other direction. One way to boot to
fastboot is by holding volume-up during boot, then rebooting to
bootloader mode.

First unlock the bootloader:
$ fastboot flashing unlock
And confirm unlocking on the phone by pressing volume-up.

Then flash:
$ fastboot flash system system-quack-arm64-ab-vanilla.img

TREBLE SYSTEM IMAGE b2sums are in the "making my unihertz titan boot"
spam thread at 
https://lists.cpunks.org/pipermail/cypherpunks/2022-May/099255.html
. The urls for downloading them are like
https://github.com/phhusson/treble_experimentations/releases/download/TAG/system-quack-arm64-ab-vanilla.img.xz
where TAG is something like v207 .

I may have tested these images before, but I haven't quite found where
my work was if so. I recall they stop running after a major change in
the repository.
I have tested these images today:
- v207 runs fine
- v208 runs fine
- v210 runs fine
- v214 runs fine
- v220 runs fine
- v222 runs fine LATEST KNOWN WORKING

URL for the latest image I've booted successfully:
https://github.com/phhusson/treble_experimentations/releases/download/v222/system-quack-arm64-ab-vanilla.img.xz

I have not tested any variants other than "vanilla" at this time.

I got a DIFFERENT CHECKSUM for v208 today. I have only checked the
images listed below. I am assuming that my differing checksum was due
to an incomplete download previously, and including the size here.

b2sum

Differing:
03dc88f81ee58051ffc75ddc8ed5c43c3c73a1dbc598d109b54ad03aaa424b12fb09235da757fa636e97c9fb315752ac5362d72f27c4d5358a66e22814ca1661
 v208-2022-07-19-system-quack-arm64-ab-vanilla.img size=1740550424

New:
055aa5fa084a09e4fed0a5dbb5c8007a29848cf2841dc65b939d0247c246286450172d76951cfef89fa8ae1dcea5d6511fc665219e72a8cfe671b55f5a5d7d60
 v210-2022-07-19-system-quack-arm64-ab-vanilla.img size=1740718336
8131a0411824ffad0ba5d381513820770bdff3b22e412161f4b5c0827027e18b0e040f691f7af2995c98b203049b096646d08463af4fa01b8588e0e172ceea54
v220-2022-07-19-system-quack-arm64-ab-vanilla.img size=1736143104

Same:
aa80d380ac31502dfc548da57414cd6e56ccd12e21be647f82508bec59ae3f36e4d3eee6d3047c73c03075b5d54c15f7bd6bba90a1bf5f73c26bbd33056e3c1e
v207-2022-07-19-system-quack-arm64-ab-vanilla.img size=1740189976
503324691350107f945a1e81c89438eb6d4dde120167eede2d35aee20fb20429949a94da50c457304c009a46ad1ff7d1691158dd19368b1ab44546e8ffea102e
v218-2022-07-19-system-quack-arm64-ab-vanilla.img size=1735053568
486e3ec3184b203bf87b5a2211d33edd07b0667df57660eca42e386e6f6e0201aba49ec0c25fb30fa22dfada6435d9eda618eadfe276bba62f5bde9dfae7a129
 v222-2022-07-19-system-quack-arm64-ab-vanilla.img size=1738010904

BUILDING FROM SOURCE
I haven't done this successfully yet. It likely involves cloning and
building huge trees of android code for a long time.
git clone https://github.com/phhusson/treble_experimentations
cd treble_experimentations
git checkout v222
mkdir build
cd build
# note: this likely builds r40; the v222 releases on github appear to
be r41 . graphene10 is the same android ver as aosp10, could try it
too. the build-dakkar script does more of the repo stuff
automatically.
bash ../build-dakkar.sh aosp10 arm64-ab-vanilla-su
# when it asks to sync, hit Y the first time so as to build the
directory structure I guess

TROUBLESHOOTING PROBLEMS I ran into:
- at first after flashing treble with fastboot, the phone would
BOOTLOOP. I'm wondering if this is because I didn't do `fastboot
flashing unlock` before flashing with fastboot, or maybe because I was
flashing a partial download. I resolved it by reflashing the factory
image and using fastboot again. I did not need to perform OEM
unlocking after resetting to the factory image; it still had OEM
unlocking enabled. I may not have needed to reflash with the factory
image at all.

INCOMPLETE data for accessing the phone directly may be found near
https://github.com/bkerler/mtkclient which is one of the open source
flashers. I also started a python 

Doug Mastriano a threat to democracy & good-taste

2022-07-19 Thread professor rat
@letsgomathias
· Jul 15
New:  Gab was key to the Tree of Life synagogue massacre. The site’s owner is a 
raging anti-Semite. The GOP nominee for PA gov, @dougmastriano, paid Gab $5k 
for “campaign consulting.” Now every new account on Gab automatically follows 
Mastriano. 
https://huffpost.com/entry/doug-mastriano-gab-andrew-torba_n_62d08787e4b02d3ecf3184b9…
Show this thread  <<<

Reposts not etc


Re: Homeland Security records show 'shocking' use of phone data, ACLU says

2022-07-19 Thread grarpamp
60 per person per day, in the article, its docs may offer other rates,
hardly matters, cellco's have plenty more they give away top-secret,
FISA was never really stopped, just transfigured.

https://www.aclu.org/news/privacy-technology/new-records-detail-dhs-purchase-and-use-of-vast-quantities-of-cell-phone-location-data
https://www.aclu.org/cases/aclu-v-department-homeland-security-commercial-location-data-foia
https://www.politico.com/f/?id=0182-10fd-d06c-afbb-95fdce93
https://www.politico.com/f/?id=0182-10ff-d914-a1af-78ff7081
https://docs.house.gov/meetings/IF/IF17/20220623/114958/BILLS-117-8152-P34-Amdt-1.pdf
https://legislation.politicopro.com/bill/US_117_HR_8152
https://legislation.politicopro.com/bill/US_117_S_1265

https://techcrunch.com/2022/07/18/homeland-security-cell-phone-tracking/
https://themarkup.org/privacy/2021/09/30/theres-a-multibillion-dollar-market-for-your-phones-location-data
https://www.wsj.com/articles/federal-agencies-use-cellphone-location-data-for-immigration-enforcement-11581078600
https://www.aclu.org/news/immigrants-rights/the-u-s-government-is-secretly-using-cell-phone-location-data-to-track-us-were-suing
https://www.politico.com/story/2018/06/22/supreme-court-warrants-cell-phone-location-664484
https://www.buzzfeednews.com/article/hamedaleaziz/ice-dhs-cell-phone-data-tracking-geolocation


New Records Detail DHS Purchase and Use of Vast Quantities of Cell
Phone Location Data
Thousands of previously unreleased records illustrate how government
agencies sidestep our Fourth Amendment rights.
A photo of three cell phone towers in front of a sunset.
July 18, 2022
Shreya Tewari, Brennan Fellow, ACLU Speech, Privacy, and Technology Project 
Fikayo Walter-Johnson, Paralegal, ACLU's Speech, Privacy, and
Technology Project

Today, the ACLU published thousands of pages of previously unreleased
records about how Customs and Border Protection, Immigration and
Customs Enforcement, and other parts of the Department of Homeland
Security are sidestepping our Fourth Amendment right against
unreasonable government searches and seizures by buying access to, and
using, huge volumes of people’s cell phone location information
quietly extracted from smartphone apps.

The records, which the ACLU obtained over the course of the last year
through a Freedom of Information Act (FOIA) lawsuit, shed new light on
the government’s ability to obtain our most private information by
simply opening the federal wallet. These documents are further proof
that Congress needs to pass the Fourth Amendment Is Not For Sale Act,
which would end law enforcement agencies’ practice of buying their way
around the Fourth Amendment’s warrant requirement.

ICE’s and CBP’s warrantless purchase of access to people’s sensitive
location information was first reported by The Wall Street Journal in
early 2020. After the news broke, we submitted a FOIA request to DHS,
ICE, and CBP, and we sued to force the agencies to respond to the
request in December 2020. Although the litigation is ongoing, we are
now making public the records that CBP, ICE, the U.S. Secret Service,
the U.S. Coast Guard, and several offices within DHS Headquarters have
provided us to date.

The released records shine a light on the millions of taxpayer dollars
DHS used to buy access to cell phone location information being
aggregated and sold by two shadowy data brokers, Venntel and Babel
Street. The documents expose those companies’ — and the government’s —
attempts to rationalize this unfettered sale of massive quantities of
data in the face of U.S. Supreme Court precedent protecting similar
cell phone location data against warrantless government access.

Four years ago, in Carpenter v. United States, the Supreme Court ruled
that the government needs a warrant to access a person’s cellphone
location history from cellular service providers because of the
“privacies of life” those records can reveal. That case hinged on a
request for one suspect’s historical location information over a
several-month period. In the documents we received over the past year,
we found Venntel marketing materials sent to DHS explaining how the
company collects more than 15 billion location points from over 250
million cell phones and other mobile devices every day.

With this data, law enforcement can “identify devices observed at
places of interest,” and “identify repeat visitors, frequented
locations, pinpoint known associates, and discover pattern of life,”
according to a Venntel marketing brochure. The documents belabor how
precise and illuminating this data is, allowing “pattern of life
analysis to identify persons of interest.” By searching through this
massive trove of location information at their whim, government
investigators can identify and track specific individuals or everyone
in a particular area, learning details of our private activities and
associations.

The government should not be allowed to purchase its way around
bedrock 

Re: Juan, who calls himself 'punk' but is really just little internet troll bitch

2022-07-19 Thread grarpamp
Yeah, look at the wannabe big-baller swinging his little
20-sat sac around too dumb to know that won't
even pay for the tx-fee, and too cowardly to operate
the game he talks himself. Boring. Next.


  1   2   >