Monday 29 December 2014

Net Neutrality - The endangered Idea

Airtel Charging Additionally for VOIP Calls.

      This New Year as a Shocking surprise to subscribers, Airtel has changed its Terms of Service to not cover VoIP (voice over internet protocol) ie Skype, Viber etc traffic under its data plans.Although
Airtel has decided to not implement new pricing right now. They will wait for TRAI to form regulation for the same.




Certain things that Still matter....
  •  Airtel hasn’t withdrawn the VoIP packs because of consumer outrage. It’s withdrawn the pack because of the impending TRAI consultation.
  •  As Airtel points out, the consultation will not just cover VoIP, but also other OTT services. As per a COAI paper, these services include Instant Messaging (IM), Applications (Apps), Cloud Services, Internet Television, IPTV, M2M – Machine to Machine (M2M) communications, Social Networking, apart from VoIP.
  •  The TRAI, as we explained, appears predisposed towards a regulation of online services, and we’re not sure if we can expect a neutral consultation from the TRAI.
 How are we effected by this ?
  • Now you would not be able to call your friends for free using internet.
  • Now mere data pack is now sufficiant now you would need to pay as per the way you use it.
  • No matter what is the amount of data balance you have in your account you have to pay more to use the VOIP services like Viber, Skype etc.  
  • Now you should start looking for the call rates specified by the service provider even for the online calls. 

What is Net Neutrality?

    The 3 principles of net neutrality are [Source: Medianama]:

  1. All sites must be equally accessible: ISPs and telecom operators shouldn’t block certain sites or apps just because they don’t pay them.
  2. All sites must be accessible at the same speed (at an ISP level): This means no speeding up of certain sites because of business deals. More importantly, it means no slowing down some sites.
  3. The cost of access must be the same for all sites (per Kb/Mb or as per data plan): This means no “Zero Rating”. In countries like India, Net Neutrality is more about cost of access than speed of access, because, well, we don’t have fast and slow lanes: all lanes are slow.
Think Before Its Too Late !!!!

Friday 26 December 2014

Know the Foxy @ I-Cafe

Growth is always a combined effort !!!

Believing in the above saying this time I thought of interacting with the entrepreneurs in the city and invite them for the occasion of the MCR Anniversary event that is supposed to be organized on the 24th & 25th of the next month .
This is the first time MCR is interacting with the various software firm representatives in the city so that our volunteers can be benefited by the industrial experience to groom their skills in better way and today I had a meeting with Mr. Jitendra Jain the Managing Director of I-cafe Technology Pvt. Ltd and his entire team.



At this moment we had a word and I found them keenly interested in the Firefox OS thus decided to organize the small acknowledgement session for everyone on-board. Soon we started with a session of the architecture and how to contribute to its codebase and marketplace. All the developers shared great ideas and development plans.Then with a active contributor unleashed in everyone of us the event reached completion.


Had a amazing day hope to see more contributors from this firm.

Saturday 20 December 2014

Planning On !!!

As we all know great things have planning behind it!
 So today Ram, Trishul, Meghraj, Adit, Dipesh, Lavish and I gathered online to plan for the upcoming event " MCR ANNIVERSARY " one of the biggest event in history of Mozilla Community Rajasthan. The motto of this meeting was to discuss the distribution of the responsibilities and to create the to-do list. 

In this first of all Ram told us about the general things that need to kept in mind for the online meetings he  told us about the general format of online meetings. He also suggested the general format for the mega events. He was also a great helping hand for us in deciding the sessions that would be the part of that event.

Trishul acknowledged everyone about the various sessions that can be held regarding Firefox OS for the application development and codebase contribution for attendees.Ram gave add-on  information to us by his experience from the previous events.

Then everyone was given responsibilities about the various sessions to the voulenteers in which they were suppose to submit the matrices about the milestones achieved and the upcoming goals for their communities.

A specific form was created and shared for the attendees where they could specify the contributions done by them and why should they be invited to the event. These responses would be evaluated by the various group leads in MCR and then they selected contributors would be invited for the ceremony where they can individually interact with the knowledgeable people.
Finally meeting was summarized with a slightly clear idea of the entire event and responsibilities.

More Details to Be discussed soon !!!!

Stay Tuned !! :)

Wednesday 17 December 2014

OEM Backdoor Detected !!



     A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users’ consent.

The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor’s control system.



Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user’s permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad.

The manufacturer has also taken steps via modifications to its version of Android to keep the backdoor hidden from users and security software that could be installed on the phone. For example, Olson said Coolpad has disabled the long-press system that allows a user to find out what application generated an pop-up advertisement or notification, for example.

“Because this is built so deep into the operating system, it can do lots of things, not just display pop-ups,” Olson said. “They can install anything they want without user consent, and push data onto the phone.”

For now it appears the manufacturer’s motivation is revenue generation, given that most users who complained about suspicious behavior in Coolpad user forums expressed concerns about pop-ups and unwanted ads.

“One thing is true of all backdoors,” Olson said. “When you create a backdoor, you might have good intentions, but any backdoor could be abused by an outsider against an individual user or against all users to install their own application.”

Coolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said.

Palo Alto researchers there looked at 77 ROMs for Coolpad Android devices, 64 of which contained the CoolReaper backdoor; 41 of the infected devices contained stock ROM files for eight Dazen models, while 23 were found in third-party ROMs for the remaining 16 Coolpad models, Palo Alto said. The 41 stock ROM files were signed with a certificate belonging to Coolpad, and the command and control domains, coolyun[.]com and 51Coolpad[.]com, are registered by Coolpad and used by the company’s cloud services.

With plans to expand distribution into the United States, Europe and Southeast Asia, the disclosure of CoolReaper, there is the potential for widespread abuse.

“We’ve never seen something with this much capability [from a manufacturer],” Olson said, pointing out that CoolReaper even exceeds Carrier IQ’s software that was found to be recording keystrokes in addition to gathering device and usage information. “This is way more than logging keystrokes. It is installing apps without consent and aggressively hiding from the OS and antivirus programs on the phone.”

Olson said users are reporting that the unwanted apps are games, hinting again that Coolpad may be seeking a separate revenue stream to supplement its sales of relatively inexpensive Android devices.

While sneakily pushing apps and updates onto the phone is bad enough, the independent discovery of the backdoor interface online and subsequent disclosure of a vulnerability means that anyone could access backdoored Coolpad devices and do serious damage.

The vulnerability in the backend control system was reported on Nov. 19 to WooYun.org, a vulnerability crowdsourcing website similar to Bugcrowd. The white-hat researcher was able to log into a Permission Management Platform where, and if he chose, would have been able to push apps through a phone OTA update, silently install and activate APK files, and more. Coolpad confirmed the vulnerability on the same day and gave it its highest severity ranking along with a promise to patch. Olson said Palo Alto has not been able to confirm whether the patch has been made available.

“The vulnerability allows unauthorized access; users are not properly authenticated and it’s on the open Internet,” Olson said. “You’d be able to install whatever you wanted on the phones through a backdoor that’s not necessarily secure.”

A technology publication in China quoting Coolpad public relations said the backdoor is used only for internal testing. However in the next upgrade from version 2.x to 3.0, the backdoor’s APK name was merely changed from CP_DMP.apk to GoogleGmsFramework.apk to hide it from users who had already found it, Palo Alto speculated.

“The fact that the CoolReaper management interface could be hijacked by malicious attackers through a vulnerability helps highlight the danger of pre-installing this type of backdoor program,” Palo Alto said in its report. “While this vulnerability may be already fixed, others may exist that could allow a malicious actor to take control Coolpad devices.”

Information From : www.threatpost.com
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users’ consent.
The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor’s control system.
Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user’s permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad.
The manufacturer has also taken steps via modifications to its version of Android to keep the backdoor hidden from users and security software that could be installed on the phone. For example, Olson said Coolpad has disabled the long-press system that allows a user to find out what application generated an pop-up advertisement or notification, for example.
“Because this is built so deep into the operating system, it can do lots of things, not just display pop-ups,” Olson said. “They can install anything they want without user consent, and push data onto the phone.”
For now it appears the manufacturer’s motivation is revenue generation, given that most users who complained about suspicious behavior in Coolpad user forums expressed concerns about pop-ups and unwanted ads.
“One thing is true of all backdoors,” Olson said. “When you create a backdoor, you might have good intentions, but any backdoor could be abused by an outsider against an individual user or against all users to install their own application.”
Coolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said.
Palo Alto researchers there looked at 77 ROMs for Coolpad Android devices, 64 of which contained the CoolReaper backdoor; 41 of the infected devices contained stock ROM files for eight Dazen models, while 23 were found in third-party ROMs for the remaining 16 Coolpad models, Palo Alto said. The 41 stock ROM files were signed with a certificate belonging to Coolpad, and the command and control domains, coolyun[.]com and 51Coolpad[.]com, are registered by Coolpad and used by the company’s cloud services.
With plans to expand distribution into the United States, Europe and Southeast Asia, the disclosure of CoolReaper, there is the potential for widespread abuse.
“We’ve never seen something with this much capability [from a manufacturer],” Olson said, pointing out that CoolReaper even exceeds Carrier IQ’s software that was found to be recording keystrokes in addition to gathering device and usage information. “This is way more than logging keystrokes. It is installing apps without consent and aggressively hiding from the OS and antivirus programs on the phone.”
Olson said users are reporting that the unwanted apps are games, hinting again that Coolpad may be seeking a separate revenue stream to supplement its sales of relatively inexpensive Android devices.
While sneakily pushing apps and updates onto the phone is bad enough, the independent discovery of the backdoor interface online and subsequent disclosure of a vulnerability means that anyone could access backdoored Coolpad devices and do serious damage.
The vulnerability in the backend control system was reported on Nov. 19 to WooYun.org, a vulnerability crowdsourcing website similar to Bugcrowd. The white-hat researcher was able to log into a Permission Management Platform where, and if he chose, would have been able to push apps through a phone OTA update, silently install and activate APK files, and more. Coolpad confirmed the vulnerability on the same day and gave it its highest severity ranking along with a promise to patch. Olson said Palo Alto has not been able to confirm whether the patch has been made available.
“The vulnerability allows unauthorized access; users are not properly authenticated and it’s on the open Internet,” Olson said. “You’d be able to install whatever you wanted on the phones through a backdoor that’s not necessarily secure.”
A technology publication in China quoting Coolpad public relations said the backdoor is used only for internal testing. However in the next upgrade from version 2.x to 3.0, the backdoor’s APK name was merely changed from CP_DMP.apk to GoogleGmsFramework.apk to hide it from users who had already found it, Palo Alto speculated.
“The fact that the CoolReaper management interface could be hijacked by malicious attackers through a vulnerability helps highlight the danger of pre-installing this type of backdoor program,” Palo Alto said in its report. “While this vulnerability may be already fixed, others may exist that could allow a malicious actor to take control Coolpad devices.”
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users’ consent.
The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor’s control system.
Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user’s permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad.
The manufacturer has also taken steps via modifications to its version of Android to keep the backdoor hidden from users and security software that could be installed on the phone. For example, Olson said Coolpad has disabled the long-press system that allows a user to find out what application generated an pop-up advertisement or notification, for example.
“Because this is built so deep into the operating system, it can do lots of things, not just display pop-ups,” Olson said. “They can install anything they want without user consent, and push data onto the phone.”
For now it appears the manufacturer’s motivation is revenue generation, given that most users who complained about suspicious behavior in Coolpad user forums expressed concerns about pop-ups and unwanted ads.
“One thing is true of all backdoors,” Olson said. “When you create a backdoor, you might have good intentions, but any backdoor could be abused by an outsider against an individual user or against all users to install their own application.”
Coolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said.
Palo Alto researchers there looked at 77 ROMs for Coolpad Android devices, 64 of which contained the CoolReaper backdoor; 41 of the infected devices contained stock ROM files for eight Dazen models, while 23 were found in third-party ROMs for the remaining 16 Coolpad models, Palo Alto said. The 41 stock ROM files were signed with a certificate belonging to Coolpad, and the command and control domains, coolyun[.]com and 51Coolpad[.]com, are registered by Coolpad and used by the company’s cloud services.
With plans to expand distribution into the United States, Europe and Southeast Asia, the disclosure of CoolReaper, there is the potential for widespread abuse.
“We’ve never seen something with this much capability [from a manufacturer],” Olson said, pointing out that CoolReaper even exceeds Carrier IQ’s software that was found to be recording keystrokes in addition to gathering device and usage information. “This is way more than logging keystrokes. It is installing apps without consent and aggressively hiding from the OS and antivirus programs on the phone.”
Olson said users are reporting that the unwanted apps are games, hinting again that Coolpad may be seeking a separate revenue stream to supplement its sales of relatively inexpensive Android devices.
While sneakily pushing apps and updates onto the phone is bad enough, the independent discovery of the backdoor interface online and subsequent disclosure of a vulnerability means that anyone could access backdoored Coolpad devices and do serious damage.
The vulnerability in the backend control system was reported on Nov. 19 to WooYun.org, a vulnerability crowdsourcing website similar to Bugcrowd. The white-hat researcher was able to log into a Permission Management Platform where, and if he chose, would have been able to push apps through a phone OTA update, silently install and activate APK files, and more. Coolpad confirmed the vulnerability on the same day and gave it its highest severity ranking along with a promise to patch. Olson said Palo Alto has not been able to confirm whether the patch has been made available.
“The vulnerability allows unauthorized access; users are not properly authenticated and it’s on the open Internet,” Olson said. “You’d be able to install whatever you wanted on the phones through a backdoor that’s not necessarily secure.”
A technology publication in China quoting Coolpad public relations said the backdoor is used only for internal testing. However in the next upgrade from version 2.x to 3.0, the backdoor’s APK name was merely changed from CP_DMP.apk to GoogleGmsFramework.apk to hide it from users who had already found it, Palo Alto speculated.
“The fact that the CoolReaper management interface could be hijacked by malicious attackers through a vulnerability helps highlight the danger of pre-installing this type of backdoor program,” Palo Alto said in its report. “While this vulnerability may be already fixed, others may exist that could allow a malicious actor to take control Coolpad devices.”
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf
A popular Android smartphone sold primarily in China and Taiwan but also available worldwide, contains a backdoor from the manufacturer that is being used to push pop-up advertisements and install apps without users’ consent.
The Coolpad devices, however, are ripe for much more malicious abuse, researchers at Palo Alto Networks said today, especially after the discovery of a vulnerability in the backend management interface that exposed the backdoor’s control system.
Ryan Olson, intelligence director at Palo Alto, said the CoolReaper backdoor not only connects to a number of command and control servers, but is also capable of downloading, installing and activating any Android application without the user’s permission. It also sends phony over-the-air updates to devices that instead install applications without notifying the user. The backdoor can also be used to dial phone numbers, send SMS and MMS messages, and upload device and usage information to Coolpad.
The manufacturer has also taken steps via modifications to its version of Android to keep the backdoor hidden from users and security software that could be installed on the phone. For example, Olson said Coolpad has disabled the long-press system that allows a user to find out what application generated an pop-up advertisement or notification, for example.
“Because this is built so deep into the operating system, it can do lots of things, not just display pop-ups,” Olson said. “They can install anything they want without user consent, and push data onto the phone.”
For now it appears the manufacturer’s motivation is revenue generation, given that most users who complained about suspicious behavior in Coolpad user forums expressed concerns about pop-ups and unwanted ads.
“One thing is true of all backdoors,” Olson said. “When you create a backdoor, you might have good intentions, but any backdoor could be abused by an outsider against an individual user or against all users to install their own application.”
Coolpad is the third largest smartphone builder in China, and ranks sixth worldwide with 3.7 percent global market share. It trails only Lenovo and Xiaomi in China and is the leader of China’s 4G market with 16 percent market share. Coolpad outsells Samsung and Apple in China, and has said it plans to expand globally with a goal of 60 million phones worldwide. For now, its high-end Halo Dazen phones are the only ones containing the backdoor, Palo Alto said.
Palo Alto researchers there looked at 77 ROMs for Coolpad Android devices, 64 of which contained the CoolReaper backdoor; 41 of the infected devices contained stock ROM files for eight Dazen models, while 23 were found in third-party ROMs for the remaining 16 Coolpad models, Palo Alto said. The 41 stock ROM files were signed with a certificate belonging to Coolpad, and the command and control domains, coolyun[.]com and 51Coolpad[.]com, are registered by Coolpad and used by the company’s cloud services.
With plans to expand distribution into the United States, Europe and Southeast Asia, the disclosure of CoolReaper, there is the potential for widespread abuse.
“We’ve never seen something with this much capability [from a manufacturer],” Olson said, pointing out that CoolReaper even exceeds Carrier IQ’s software that was found to be recording keystrokes in addition to gathering device and usage information. “This is way more than logging keystrokes. It is installing apps without consent and aggressively hiding from the OS and antivirus programs on the phone.”
Olson said users are reporting that the unwanted apps are games, hinting again that Coolpad may be seeking a separate revenue stream to supplement its sales of relatively inexpensive Android devices.
While sneakily pushing apps and updates onto the phone is bad enough, the independent discovery of the backdoor interface online and subsequent disclosure of a vulnerability means that anyone could access backdoored Coolpad devices and do serious damage.
The vulnerability in the backend control system was reported on Nov. 19 to WooYun.org, a vulnerability crowdsourcing website similar to Bugcrowd. The white-hat researcher was able to log into a Permission Management Platform where, and if he chose, would have been able to push apps through a phone OTA update, silently install and activate APK files, and more. Coolpad confirmed the vulnerability on the same day and gave it its highest severity ranking along with a promise to patch. Olson said Palo Alto has not been able to confirm whether the patch has been made available.
“The vulnerability allows unauthorized access; users are not properly authenticated and it’s on the open Internet,” Olson said. “You’d be able to install whatever you wanted on the phones through a backdoor that’s not necessarily secure.”
A technology publication in China quoting Coolpad public relations said the backdoor is used only for internal testing. However in the next upgrade from version 2.x to 3.0, the backdoor’s APK name was merely changed from CP_DMP.apk to GoogleGmsFramework.apk to hide it from users who had already found it, Palo Alto speculated.
“The fact that the CoolReaper management interface could be hijacked by malicious attackers through a vulnerability helps highlight the danger of pre-installing this type of backdoor program,” Palo Alto said in its report. “While this vulnerability may be already fixed, others may exist that could allow a malicious actor to take control Coolpad devices.”
- See more at: http://threatpost.com/manufacturers-backdoor-found-on-popular-chinese-android-smartphone/109929#sthash.yAULg7zC.dpuf

Saturday 6 December 2014

Know The Foxy - I

The first workshop of ' Know The Foxy Campaign ' was held at Carrier Point University Kota. The day started with an expression of joy on everyone's face. We reached the venue and were warmly welcomed by the Parth Sir (HOD Comp-science Dept). Event started with our introduction by the college authorities and Sonu (Club Lead Firefox Club-CPU).



Mr.Ram Dayal initiated the workshop by a brief overview about the various topics that would be discussed throughout the workshop along with the introduction to Mozilla mission and the enlightened everyone with the Mozilla manifesto. He also showed videos about the 'Open Web Idea' and 'Mozilla Community' thus increasing the curiosity of students about open-source. 
 Followed by a session on introduction to open-source and its power was delivered by Osho Parth.  During which he acknowledged everyone about the various interesting features of open source he also discussed the various verticals of contribution for Mozilla Community  helping everyone to know their area-of interest. With this we started with the practical session for everyone.

Next session was the most interesting session for everyone in which Mr.Shahbaz acknowledged everyone about webmaker tools. Everyone was surprised to see him changing the content of web-page as if it was a plain text. Then came Thimble and Popcorn which gave wings to everyone's imagination. Then came App-maker that enabled students to make their own mobile applications.

Then Came the most awaited session about the Firefox OS architecture and App Development for it by Ram Dayal and Osho Parth. In this session audiences were acknowledged about the multiple layers of FxOS and the application development procedure for it.

Now it was time for some doubt solving sessions this was more a kind of one to one session in which all the speakers and volunteers interacted with the audiences for solving their doubts. There were many great suggestions and queries from the students, it was an immense pleasure to see the interest of students in the workshop.


Then came the moment of appraisals for the students who interacted the most and this prize distribution was just a token of thanks to the students for being such a great support.We requested the college representatives to come and give away prizes to the students.

With this we reached the end of workshop thus was the time for fun activity which was 'Ali baba & 40 thieves' .


Group Picture.

Doing good is a part of our code.