Full Disclosure mailing list archives
Re: CDMA and 4G Android hacking
From: coderman <coderman () gmail com>
Date: Wed, 10 Aug 2011 16:51:21 -0700
On Wed, Aug 10, 2011 at 4:25 PM, coderman <coderman () gmail com> wrote:
... the attackers were able to use non-privileged apps to continually invoke voice search, possibly other services. as you know, voice search sends voice data to google servers... over the 3G or 4G connection, which in this situation provided the attackers with an open mic. (and they can intercept, so you won't see anything on your end.) why isn't voice search always over HTTPS? why can it be invoked continuously?
yes, more recent Android versions improve the HTTP vs. HTTPS situation greatly... for stock Android. why is non-HTTPS voice search supported? (using http:// should error.) sorry all, too much time spent on this discussion already. this really deserves a full write up but that isn't for me to do. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- CDMA and 4G Android hacking coderman (Aug 10)
- Re: CDMA and 4G Android hacking coderman (Aug 10)