« Posts tagged Privacy

How to PPTPD (PopTop)

Below is a way to connect your clients like smartphone, laptop, etc to the Internets while you are out and about connecting to random WiFi networks etc like Mac Donalds, and to help protect yourself while on them unknown networks with unknown users

Install mppe kernel support

# modprobe ppp-compress-18

Install PPTPD

# apt-get install pptpd

Configure IP Address Range
Edit the file /etc/pptpd.conf for the IP address range


restart pptpd to activate changes

# invoke-rc.d pptpd restart

Adding users accounts
Edit the file /etc/ppp/chap-secrets

test_user * lamepassword *

The above will give you a working PPTPD where your able to connect to securely but you’ll most probably can’t connect to the outside network.

To allow you PPTP clients access to the big bad internet

Enable IPv4 forwarding

echo 1 > /proc/sys/net/ipv4/ip_forward

Finally configure your iptables

iptables -A INPUT -i ppp+ -j ACCEPT
iptables -A OUTPUT -o ppp+ -j ACCEPT
iptables -A POSTROUTING -t nat -o eth0 -j MASQUERADE
iptables -A POSTROUTING -t nat -o ppp+ -j MASQUERADE

If you want all traffic to go through the PPTP connection
Edit the file /etc/ppp/pptpd-options and change

# Debian: do not replace the default route


# Debian: do not replace the default route

and don’t forget to restart pptpd 😉

Debian pptpd HOWTO
IP Chicken

[How to] Prey 0.5.3 under Debian

Today I setup Prey 0.5.3 on my netbook running Debian testing.

# apt-get install prey

Here is what I modified in my ‘/etc/prey/config


# autoconnect feature, disabled by default until we are 200% sure it
# works flawlessly in all platforms. feel free to try it out though.


# you can get both of these from Prey's web service


# if you're having trouble getting requests across your firewall or proxy,
# you can try adding '-0' to make curl perform HTTP 1.0 requests
curl_options='-0 --compress'

# this option prepends a random number as a subdomain to the check URL on http mode
# makes it harder for other programs to block Prey so its a good idea to be on

Also I added to my root crontab for updates

# crontab -e

*/10 * * * * /usr/share/prey/prey.sh > /var/log/prey.log
now is

*/10 * * * * /usr/lib/prey/prey.sh > /var/log/prey.log

[LINK] Bully Block – Take a Stand Against Bullying

It finally nice to see an application that is trying to help against bullying in the workplace, school etc. I have not tried this application out but it looks to be a worthwhile application to try out if your children are being bullied, or you have an abusive spouse.

The Bully Block app allows users to covertly record verbal threats and harassment, block inappropriate texts and pictures (e.g. sexting), and utilize auto respond features. Unlike other apps on the market, Bully Block blocks bullies that utilize private or unknown numbers to engage in cyberbullying. Bully Block also has instant reporting features that allow the user to email or text abusive behavior to parents, teachers, HR departments, and law enforcement. All audio, messages, and calls are stored on the phone SD card.

Normally this is a paid application but for now it is free on XDA.

[LINK] A Trojan spying on your conversations

Here is another example to why one should check the permission(s) of an application(s) before installing on ones Android device.

In one of our earlier blogs, we have demonstrated how a Trojan logs all the details of incoming/outgoing calls and call duration in a text file. This Trojan is more advanced as it records the conversation itself in “amr” format. Also it has got many other malicious activities that we have seen in many of the earlier malware incidents targeted for Android platform.

Read full story

Android Application Permissions in part Explained

When you install an application from the Android market or from else where it will tell you the permission(s) it needs to function. While some legitimate applications often ask for more permissions than they need, it should at least raise some concern when deciding if an application is safe and of good quality.

To see permission(s) of a given application after installation, go to the Market, press menu > My apps, then select the application, press menu > more, then press security. There is an application called ‘permissions‘ to help explain the permissions of the applications you have installed on your smartphone.

Below is a list that was initially prepared by Lost Packet who talks about android security in much greater detail.

»Read More

Google removal script for Android

This is an update on my Google removal script I use on updates of the OxygeN ROM as I don’t use or like most the Google stuff installed so it easier to remove on the first boot after ROM update and before unlocking SIM. This will probably work on other ROM but I hold no guarantee that it will, as per usual use at your own risk.

#       This program is free software; you can redistribute it and/or modify
#       it under the terms of the GNU General Public License as published by
#       the Free Software Foundation; either version 2 of the License, or
#       (at your option) any later version.
#       This program is distributed in the hope that it will be useful,
#       but WITHOUT ANY WARRANTY; without even the implied warranty of
#       GNU General Public License for more details.
#       You should have received a copy of the GNU General Public License
#       along with this program; if not, write to the Free Software
#       Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
#       MA 02110-1301, USA.
## Author:
## Dale http://dale.id.au

## edit path to adb

$PATH/adb remount

echo "Removing Genie News and Weather Widget..."
$PATH/adb shell rm -f /system/app/GenieWidget.apk
$PATH/adb uninstall com.google.android.apps.genie.geniewidget

echo "Removing Gmail..."
$PATH/adb shell rm -f /system/app/Gmail.apk
$PATH/adb uninstall com.google.android.gm

echo "Removing Google Backup Transport..."
$PATH/adb shell rm -f /system/app/GoogleBackupTransport.apk
$PATH/adb uninstall com.google.android.backup

echo "Removing Google Calendar Sync..."
$PATH/adb shell rm -f /system/app/GoogleCalendarSyncAdapter.apk
$PATH/adb uninstall com.google.android.syncadapters.calendar

echo "Removing Google Contact Sync..."
$PATH/adb shell rm -f /system/app/GoogleContactsSyncAdapter.apk
$PATH/adb uninstall com.google.android.syncadapters.contacts

echo "Removing Google Partener Setup..."
$PATH/adb shell rm -f /system/app/GooglePartnerSetup.apk
$PATH/adb uninstall com.google.android.partnersetup

echo "Removing Google Talk..."
$PATH/adb shell rm -f /system/app/Talk2.apk
$PATH/adb uninstall com.google.android.talk

wait 1

echo "All Done, rebooting now"
$PATH/adb reboot

[LINK] Telstra, Optus to start censoring the web next month

I wonder how long it will take till they are going to push this censoring and legitimate sites they deem inappropriate and get filtered. I guess they think if no one complains, they can add more to it at a later date and block more sites and stuff till someone does complain about the filtering. And this filter in my honest opinion is for the computer illiterate and the parents that are to lazy to keep an eye on there children whilst on the computer or to have the computer in a family area to better keep an eye on the children’s doings on the computer and the internet.

MOST Australian internet users will have their web access censored next month after the country’s two largest internet providers agreed to voluntarily block more than 500 websites from view. Telstra and Optus confirmed they would block access to a list of child abuse websites provided by the Australian Communications and Media Authority and more compiled by unnamed international organisations from mid-year.

But internet experts have warned that the scheme is merely a “feel-good policy” that will not stop criminals from accessing obscene material online and could block websites unfairly.

Read the full story

Ad blocking for Android

If you are wanting to block Ads on your Android to help make web surfing faster and to help not waste valuable on adverts I recommend flashing the zip file from dnlgee.me.uk as it is kept up more regularly than the AdFree app by bigtincan.com

Android (Google) Collecting Your Data

Apparently Android (Google) are gathering location information as part of their race to build massive databases capable of pinpointing people’s locations via their cellphones. Android devices keep a record of the locations and unique IDs of the last 50 mobile masts that it has communicated with, and the last 200 Wi-Fi networks that it has “seen”.

This post is more a of a guide to help limit the leakage of data.

This is a scripted I knocked up a while ago and have been using for fresh installs of OxygeN ROM to remove the Google stuff I not use before I enter SIM unlock code and log into the phone. All that is left is enough Google stuff to keep market happy, along with Droidwall and allowing apps you want access to the Internet my 3G signal status never goes green ie mean my phone logged into Google.

With doing this I have also noticed that my location information is not being logged to cache.wifi and cache.cell under /data/data/com.google.android.location/files


## edit path to adb

$PATH/adb remount
$PATH/adb shell rm -f /system/app/GenieWidget.apk
$PATH/adb uninstall com.google.android.apps.genie.geniewidget

$PATH/adb shell rm -f /system/app/Gmail.apk
$PATH/adb uninstall com.google.android.gm

$PATH/adb shell rm -f /system/app/GoogleBackupTransport.apk
$PATH/adb uninstall com.google.android.backup

$PATH/adb shell rm -f /system/app/GoogleCalendarSyncAdapter.apk
$PATH/adb uninstall com.google.android.syncadapters.calendar

$PATH/adb shell rm -f /system/app/GoogleContactsSyncAdapter.apk
$PATH/adb uninstall com.google.android.syncadapters.contacts

$PATH/adb shell rm -f /system/app/GooglePartnerSetup.apk
$PATH/adb uninstall com.google.android.partnersetup

$PATH/adb shell rm -f /system/app/Talk.apk
$PATH/adb uninstall com.google.android.talk

wait 1

echo "All Done, rebooting now"
$PATH/adb reboot

You can also block the following using DroidWall, to try and keep all bases covered:

  • Settings > Location & security and unchecked the “Use wireless networks” box
  • Network Location, Google Calendar Sync, Google Services Framework, Google Contacts Sync
  • (Kernel) – Linux kernel
  • Maps


[How to] Change default search engine in Iceweasel (Firefox)

Type in the URL bar ‘about:config‘ and search for ‘keyword.url‘ and modify the ‘Value‘ from


to your preferred search engine, for me I changed it to Duck Duck Go


You can find a full list of available parameters here to have a more custom search string


Now all there is left to do is restart Iceweasel (Firefox) and enjoy the new default search engine you can use from the URL bar