We introduce a new forensic technique that allows to collect users' past locations on most current Android phones, within a few seconds. It becomes possible to tell where the user was at a given time, or where a phone call took place over the last few hours or days.
The x.com mobile phone is designed for use in hazardous industrial environments. It has three explosion-proof versions for different hazard zones and includes safety features like a GPS tracker and acceleration sensor for emergency detection. The phone is robust with an IP64 rating and has a long battery life. Accessories allow for charging, carrying, and connecting the phone for communication needs in demanding industrial settings.
The x.com mobile phone is designed for use in hazardous industrial environments. It has three explosion-proof versions for different hazard zones and includes safety features like a GPS tracker and acceleration sensor for emergency detection. The phone is robust with an IP64 rating and has a dual-band network, large color display, Bluetooth, and integrated work functions. Accessories include additional batteries, chargers, carrying cases, and mounting accessories to provide reliable communication for workers in demanding industrial settings.
This document describes a company that has developed various wireless technologies including antennas, radios, sensors and networks. Specifically it mentions:
- Developing antenna and radio configurations for government and military applications.
- Creating a disaster recovery network for DHS and solutions for first responders.
- Implementing domestic and international wireless infrastructure projects.
- Developing wideband antennas, wireless mesh networks, camera sensors, cellular repeaters, and backhaul capabilities.
NXP Semiconductors is a global semiconductor company with a focus on identification technologies including RFID. They are a leader in various RFID markets including transportation, banking, eGovernment, and tagging. The document discusses NXP's product portfolio, the HF and UHF RFID technologies, important markets and applications, success stories with various customers, and future developments in areas like sensor interfaces and cryptographic processors.
CIVINTEC Global is leading manufacturer specialized in ISO18092 NFC market with its fully range of best-in-class NFC devices from NFC OEM Reader Module, NFC desktop reader, NFC Access Door Reader, NFC portable system to NFC Android / Linux System with Sof.
MTXM2M offers a portfolio of M2M and IoT devices and software, including cellular modems, embedded modules, gateways, and routers. Their products are designed for applications such as fleet management, smart cities, industrial telemetry, and more. Key features include support for 2G, 3G, and 4G cellular connectivity, GPS, Bluetooth, WiFi, serial interfaces, analog/digital I/O, and Linux/Java programmability. MTXM2M focuses on flexibility, customization, and technical support.
The W.E.N.S. 51-P System is a wireless emergency notification system that uses an 8x 30 watt speaker array with a 240 watt amplifier mounted on a 6m mast. It has a radio range of 6km for transmission and reception, adjustable coverage from 45 to 360 degrees, and can reach sound pressure levels of 122dB at 1w/m with audio coverage over 250m at 360 degrees. The system includes 16 channel radio communication, 4 channels for prerecorded messages, a local paging microphone, solar power with batteries, and is designed for industrial and event applications.
New solar wireless home and business security systems shop online at https://vedardalarm.com/hb-solar-beams-m-3 Easy DIY home security including outdoor garage, carp parking lot, garden, courtyard intrusion alert and app alarm. Free technical support for DIY home security, free security solution.
The x.com mobile phone is designed for use in hazardous industrial environments. It has three explosion-proof versions for different hazard zones and includes safety features like a GPS tracker and acceleration sensor for emergency detection. The phone is robust with an IP64 rating and has a long battery life. Accessories allow for charging, carrying, and connecting the phone for communication needs in demanding industrial settings.
The x.com mobile phone is designed for use in hazardous industrial environments. It has three explosion-proof versions for different hazard zones and includes safety features like a GPS tracker and acceleration sensor for emergency detection. The phone is robust with an IP64 rating and has a dual-band network, large color display, Bluetooth, and integrated work functions. Accessories include additional batteries, chargers, carrying cases, and mounting accessories to provide reliable communication for workers in demanding industrial settings.
This document describes a company that has developed various wireless technologies including antennas, radios, sensors and networks. Specifically it mentions:
- Developing antenna and radio configurations for government and military applications.
- Creating a disaster recovery network for DHS and solutions for first responders.
- Implementing domestic and international wireless infrastructure projects.
- Developing wideband antennas, wireless mesh networks, camera sensors, cellular repeaters, and backhaul capabilities.
NXP Semiconductors is a global semiconductor company with a focus on identification technologies including RFID. They are a leader in various RFID markets including transportation, banking, eGovernment, and tagging. The document discusses NXP's product portfolio, the HF and UHF RFID technologies, important markets and applications, success stories with various customers, and future developments in areas like sensor interfaces and cryptographic processors.
CIVINTEC Global is leading manufacturer specialized in ISO18092 NFC market with its fully range of best-in-class NFC devices from NFC OEM Reader Module, NFC desktop reader, NFC Access Door Reader, NFC portable system to NFC Android / Linux System with Sof.
MTXM2M offers a portfolio of M2M and IoT devices and software, including cellular modems, embedded modules, gateways, and routers. Their products are designed for applications such as fleet management, smart cities, industrial telemetry, and more. Key features include support for 2G, 3G, and 4G cellular connectivity, GPS, Bluetooth, WiFi, serial interfaces, analog/digital I/O, and Linux/Java programmability. MTXM2M focuses on flexibility, customization, and technical support.
The W.E.N.S. 51-P System is a wireless emergency notification system that uses an 8x 30 watt speaker array with a 240 watt amplifier mounted on a 6m mast. It has a radio range of 6km for transmission and reception, adjustable coverage from 45 to 360 degrees, and can reach sound pressure levels of 122dB at 1w/m with audio coverage over 250m at 360 degrees. The system includes 16 channel radio communication, 4 channels for prerecorded messages, a local paging microphone, solar power with batteries, and is designed for industrial and event applications.
New solar wireless home and business security systems shop online at https://vedardalarm.com/hb-solar-beams-m-3 Easy DIY home security including outdoor garage, carp parking lot, garden, courtyard intrusion alert and app alarm. Free technical support for DIY home security, free security solution.
This document summarizes the features of a mini travel microphone for use with multimedia PCs and notebooks. The microphone filters out background noise, attaches to notebooks or monitors, and has an adjustable boom that pivots for ideal positioning. It has a frequency range of 20-16,000Hz and plugs into devices via a 3.5mm jack.
The document defines several key networking concepts: NVT refers to a virtual device defined in RFC854 to standardize terminal interfaces; VT-100 was a common terminal emulation introduced by DEC that functioned as a video display terminal; routers are networking devices that direct and forward information between different paths on a network; and an IP address is a unique numerical identifier assigned to devices on a network using the Internet Protocol to enable communication.
This document lists two networking devices - the Tenda F3 Wireless Router+Extender+Access Point WIFI REPEATER NEW FH303, which is a 3-in-1 device that functions as a wireless router, extender, and access point, and the Mikrotik RB750r2 Routerboard, which is a standalone routerboard.
Here, an active RFID tag is used in place of voter id where the system can scan the tag and matches with the fingerprints collected in the Aadhar database.
The voter has to scan the RFID tag for the identification and further the voter has to confirm the identity with the fingerprints.
When fingerprints get matched then voters can cast their votes as the data gets matched.
A LCD is applicable in the process of displaying the corresponding information of the voter from the database, thus illegal voting or impersonating can be avoided since the finger prints is not the same for every individual
The document describes the Nanhui Datacenter located in Shanghai, China. It provides details about the infrastructure including its location, building specifications, tier 3 and 4 standards, redundant power systems, HVAC, security systems, and networking. The datacenter has over 200,000 square feet of space across three floors, with the first floor for power and the upper floors for hosting. It offers 24/7 administration and support services.
Wireless pen hidden (spy) camera(buy or rent)dplsurve
The document advertises covert surveillance equipment for sale or rent, including a wireless hidden camera pen and a portable digital video recorder. It provides details on their specifications, features, accessories, and how to contact the seller. The seller claims to offer state-of-the-art surveillance gear used by law enforcement and intelligence agencies.
The document describes a universal Software Defined Radio hardware platform consisting of PCI expansion cards with analog front ends, ADCs, FPGAs, and DSP resources. The SDR cards support multichannel and phased array applications through a programmable cross-connect switch and include high-speed converters with up to 80MHz sampling and 270MHz bandwidth. The platform is intended as a prototyping tool and can operate in slot cards or standalone with control via PCI or an on-board microcontroller.
This document provides specifications for a 720P megapixel WiFi security camera. The camera has a 720P image sensor, two-way audio, micro SD card storage, PTZ and night vision capabilities, motion detection and push notifications. It connects via WiFi and can be monitored through iOS and Android apps. Key specs include 1280x720 pixel resolution, 3.6mm lens, and support for H.264 video compression.
The Repeatit Infinity BS322 is a dual-radio, point-to-multipoint base station that supports up to 2 external antennas for short to long distance wireless connections. It has a dual radio design operating in the 5.150-5.845GHz frequency band with a combined throughput of 380Mbps, supports common encryption and authentication protocols, and has an IP67-rated weatherproof casing measuring 284 x 174 x 81mm.
The 5881ENHC RF Receiver is designed to work with 345 MHz transmitters for commercial fire and burglary systems. It features a spatial diversity system to eliminate signal "nulls" and features front and back tamper protection for installations. The receiver connects to control panels via the keypad bus and is compatible with Honeywell 5800 series wireless devices and control panels.
Sierra Wireless Developer Day 2013 - 06 - AirPrime goes multicoreThibault Cantegrel
The document describes Sierra Wireless' new AirPrime multicore wireless module. It has a quad-band 2G modem and supports future 4G migration. It also has integrated GPS, GLONASS, eCall and ERA-GLONASS. The module runs Linux and has an open application framework. It has extensive interfaces and runs on a multicore architecture with dedicated application and real-time low-power cores. Sierra Wireless introduces the world's first M2M system-on-a-chip called AirPrime AR6xx0.
Cofdm video transmitter ip mesh wifi product presentation from Shenzhen Safe ...Erin Qiu
cofdm wireless transmitter
cofdm wireless receiver
COFDM IP MESH
wireless mesh
wifi mesh
for long range tactical mobile application
such as man pack, bodyworn, UAV UGV
Digital signal processors (DSPs) are specialized microprocessors optimized for digital signal processing. The first DSP was developed by Texas Instruments in 1978. DSP technology has since advanced through several generations with improved instructions and speeds. The DSP market is large and growing due to increasing demand for electronic solutions. DSPs are used in a wide range of applications including communications, consumer electronics, healthcare, industrial, and automotive due to their ability to perform real-time signal processing.
Indoor Location - Globally and in 3D - by Combain CPS geolocation servicesCombain Mobile AB
Combain is a world leading geolocation service provider for connected devices. Combain has one of the world largest databases of cell-id and wifi that is used for accurate indoor and outdoor geopositioning of connected devices. The database includes more than 70 million cell-ids and 870 million wifis from more than 200 countries. Combain’s customers are leading mobile network operators, cyber security companies, mobile device manufacturers. The positioning service is provided as a cloud-based API, Combain CPS API, and as a cloud-based device management platform, Combain Thinxmate.
Combain is located in Lund, Sweden and Palo Alto, USA and serves customers world-wide.
This document discusses Philippe Coval, a software engineer working on digital twins and privacy by design for Samsung. It provides information on digital twins, including how they connect physical components to digital counterparts in real-time. An example is given of implementing a digital twin proof of concept with a robot arm using JavaScript on a microcontroller and exposing it through a WebThings API. Challenges discussed include scalability, persistence and supporting augmented reality.
The latest version of Android, Nougat (v7.x), was released in late 2016, and offers access to raw GNSS measurements. Google demonstrated functionality to obtain Pseudoranges, Dopplers and Carrier Phase from a phone or tablet last September at the Institute of Navigation’s conference.
This seminar will explain the current API, hardware limitations and possible future advantages of this exciting new development. We will discuss data collection, raw measurements and demo processing example in Matlab and Python.
L'iBeacon, introduit lors de la WWDC en 2013 est en cours de standardisation, grâce au projet open-source Eddystone. Associé à cette technologie, le projet "The physical Web" lancé par Google, promet lui aussi de grandes innovations dans le monde de l'IoT. En effet, il a pour but de pouvoir relier un smartphone à un beacon sans passer par une application. Ceci offre un large panel d'utilisation, pour relier des lieux physiques avec le monde virtuel. Nous ferons le point sur le projet et les technologies sous-jacentes, avant de se plonger dans les cas d'utilisation concrets, existants ou à venir.
This document introduces GNSS raw measurements that are available on Android smartphones through the android.location API. It discusses two main GNSS APIs - android.gms.location which simplifies positioning for applications but focuses on battery life, and android.location which gives access to more detailed GNSS observations at the cost of increased battery usage. Applications that could make use of raw GNSS measurements on smartphones include crowdsourcing, low-cost reference networks, and improving positioning in urban areas. Sample code is provided showing how to access raw observations and calculate a position from them.
This document provides an overview of Android application development. It defines Android as an open source operating system based on Linux and Java. It discusses the history and versions of Android, its features and architecture. It also outlines the advantages of the Android platform and application development, technical aspects of app development, use of the SDK, and types of Android applications.
Safecast developed devices and a mapping system to measure radiation and built a community of citizen scientists. They created an open-source, open hardware Geiger counter kit called bGeigie Nano that can upload over 25 million data points to their mapping website. Safecast holds workshops to share their enthusiasm for citizen science and encourage volunteer involvement in collecting and sharing radiation readings.
This document summarizes the features of a mini travel microphone for use with multimedia PCs and notebooks. The microphone filters out background noise, attaches to notebooks or monitors, and has an adjustable boom that pivots for ideal positioning. It has a frequency range of 20-16,000Hz and plugs into devices via a 3.5mm jack.
The document defines several key networking concepts: NVT refers to a virtual device defined in RFC854 to standardize terminal interfaces; VT-100 was a common terminal emulation introduced by DEC that functioned as a video display terminal; routers are networking devices that direct and forward information between different paths on a network; and an IP address is a unique numerical identifier assigned to devices on a network using the Internet Protocol to enable communication.
This document lists two networking devices - the Tenda F3 Wireless Router+Extender+Access Point WIFI REPEATER NEW FH303, which is a 3-in-1 device that functions as a wireless router, extender, and access point, and the Mikrotik RB750r2 Routerboard, which is a standalone routerboard.
Here, an active RFID tag is used in place of voter id where the system can scan the tag and matches with the fingerprints collected in the Aadhar database.
The voter has to scan the RFID tag for the identification and further the voter has to confirm the identity with the fingerprints.
When fingerprints get matched then voters can cast their votes as the data gets matched.
A LCD is applicable in the process of displaying the corresponding information of the voter from the database, thus illegal voting or impersonating can be avoided since the finger prints is not the same for every individual
The document describes the Nanhui Datacenter located in Shanghai, China. It provides details about the infrastructure including its location, building specifications, tier 3 and 4 standards, redundant power systems, HVAC, security systems, and networking. The datacenter has over 200,000 square feet of space across three floors, with the first floor for power and the upper floors for hosting. It offers 24/7 administration and support services.
Wireless pen hidden (spy) camera(buy or rent)dplsurve
The document advertises covert surveillance equipment for sale or rent, including a wireless hidden camera pen and a portable digital video recorder. It provides details on their specifications, features, accessories, and how to contact the seller. The seller claims to offer state-of-the-art surveillance gear used by law enforcement and intelligence agencies.
The document describes a universal Software Defined Radio hardware platform consisting of PCI expansion cards with analog front ends, ADCs, FPGAs, and DSP resources. The SDR cards support multichannel and phased array applications through a programmable cross-connect switch and include high-speed converters with up to 80MHz sampling and 270MHz bandwidth. The platform is intended as a prototyping tool and can operate in slot cards or standalone with control via PCI or an on-board microcontroller.
This document provides specifications for a 720P megapixel WiFi security camera. The camera has a 720P image sensor, two-way audio, micro SD card storage, PTZ and night vision capabilities, motion detection and push notifications. It connects via WiFi and can be monitored through iOS and Android apps. Key specs include 1280x720 pixel resolution, 3.6mm lens, and support for H.264 video compression.
The Repeatit Infinity BS322 is a dual-radio, point-to-multipoint base station that supports up to 2 external antennas for short to long distance wireless connections. It has a dual radio design operating in the 5.150-5.845GHz frequency band with a combined throughput of 380Mbps, supports common encryption and authentication protocols, and has an IP67-rated weatherproof casing measuring 284 x 174 x 81mm.
The 5881ENHC RF Receiver is designed to work with 345 MHz transmitters for commercial fire and burglary systems. It features a spatial diversity system to eliminate signal "nulls" and features front and back tamper protection for installations. The receiver connects to control panels via the keypad bus and is compatible with Honeywell 5800 series wireless devices and control panels.
Sierra Wireless Developer Day 2013 - 06 - AirPrime goes multicoreThibault Cantegrel
The document describes Sierra Wireless' new AirPrime multicore wireless module. It has a quad-band 2G modem and supports future 4G migration. It also has integrated GPS, GLONASS, eCall and ERA-GLONASS. The module runs Linux and has an open application framework. It has extensive interfaces and runs on a multicore architecture with dedicated application and real-time low-power cores. Sierra Wireless introduces the world's first M2M system-on-a-chip called AirPrime AR6xx0.
Cofdm video transmitter ip mesh wifi product presentation from Shenzhen Safe ...Erin Qiu
cofdm wireless transmitter
cofdm wireless receiver
COFDM IP MESH
wireless mesh
wifi mesh
for long range tactical mobile application
such as man pack, bodyworn, UAV UGV
Digital signal processors (DSPs) are specialized microprocessors optimized for digital signal processing. The first DSP was developed by Texas Instruments in 1978. DSP technology has since advanced through several generations with improved instructions and speeds. The DSP market is large and growing due to increasing demand for electronic solutions. DSPs are used in a wide range of applications including communications, consumer electronics, healthcare, industrial, and automotive due to their ability to perform real-time signal processing.
Indoor Location - Globally and in 3D - by Combain CPS geolocation servicesCombain Mobile AB
Combain is a world leading geolocation service provider for connected devices. Combain has one of the world largest databases of cell-id and wifi that is used for accurate indoor and outdoor geopositioning of connected devices. The database includes more than 70 million cell-ids and 870 million wifis from more than 200 countries. Combain’s customers are leading mobile network operators, cyber security companies, mobile device manufacturers. The positioning service is provided as a cloud-based API, Combain CPS API, and as a cloud-based device management platform, Combain Thinxmate.
Combain is located in Lund, Sweden and Palo Alto, USA and serves customers world-wide.
This document discusses Philippe Coval, a software engineer working on digital twins and privacy by design for Samsung. It provides information on digital twins, including how they connect physical components to digital counterparts in real-time. An example is given of implementing a digital twin proof of concept with a robot arm using JavaScript on a microcontroller and exposing it through a WebThings API. Challenges discussed include scalability, persistence and supporting augmented reality.
The latest version of Android, Nougat (v7.x), was released in late 2016, and offers access to raw GNSS measurements. Google demonstrated functionality to obtain Pseudoranges, Dopplers and Carrier Phase from a phone or tablet last September at the Institute of Navigation’s conference.
This seminar will explain the current API, hardware limitations and possible future advantages of this exciting new development. We will discuss data collection, raw measurements and demo processing example in Matlab and Python.
L'iBeacon, introduit lors de la WWDC en 2013 est en cours de standardisation, grâce au projet open-source Eddystone. Associé à cette technologie, le projet "The physical Web" lancé par Google, promet lui aussi de grandes innovations dans le monde de l'IoT. En effet, il a pour but de pouvoir relier un smartphone à un beacon sans passer par une application. Ceci offre un large panel d'utilisation, pour relier des lieux physiques avec le monde virtuel. Nous ferons le point sur le projet et les technologies sous-jacentes, avant de se plonger dans les cas d'utilisation concrets, existants ou à venir.
This document introduces GNSS raw measurements that are available on Android smartphones through the android.location API. It discusses two main GNSS APIs - android.gms.location which simplifies positioning for applications but focuses on battery life, and android.location which gives access to more detailed GNSS observations at the cost of increased battery usage. Applications that could make use of raw GNSS measurements on smartphones include crowdsourcing, low-cost reference networks, and improving positioning in urban areas. Sample code is provided showing how to access raw observations and calculate a position from them.
This document provides an overview of Android application development. It defines Android as an open source operating system based on Linux and Java. It discusses the history and versions of Android, its features and architecture. It also outlines the advantages of the Android platform and application development, technical aspects of app development, use of the SDK, and types of Android applications.
Safecast developed devices and a mapping system to measure radiation and built a community of citizen scientists. They created an open-source, open hardware Geiger counter kit called bGeigie Nano that can upload over 25 million data points to their mapping website. Safecast holds workshops to share their enthusiasm for citizen science and encourage volunteer involvement in collecting and sharing radiation readings.
Internet of Things is moving away from the hype. Low power technologies like LPWAN have the capabilities to transform the way to transform industry and logistics.
The document outlines several IT projects presented at an IT Cluster Skolkovo event. It summarizes several projects including:
Speaktoit, a voice assistant with over 6 million downloads that answers questions and performs tasks. Mobly, a service that allows roaming calls and access to communication apps using one account and number. Altergeo provides hybrid location technology that combines multiple positioning methods with accuracy of 20-30 meters.
It also briefly describes projects like Askeroid, a mobile vertical search app, iBuildApp which allows creating Android and iPhone apps in 5 minutes, Indoorgo for indoor navigation, BoardMaps for issue management, and MobiVita's video optimization solution for 4G networks.
This document introduces RAW GNSS measurements provided by the Android Nougat API. It discusses how the new API allows access to pseudoranges and carrier phase measurements directly from GNSS chips. This level of access was previously only available to GNSS experts and provides opportunities to improve positioning accuracy through sensor fusion and external corrections. The document also addresses challenges in working with the new API and limited hardware support currently from mobile chipset vendors.
This document discusses fog computing as an extension of cloud computing that processes data closer to where it is generated. Fog computing provides low-latency services through edge devices that request compute and storage resources from nearby fog nodes. This helps support applications that require real-time interaction by processing data locally instead of sending all data to distant cloud servers. The document uses Netflix and Google Maps as examples of applications that have evolved to take advantage of fog computing characteristics like geographical distribution and low latency by placing content and processing closer to end users. Architectural requirements for fog computing include handling a large and dynamic number of nodes, mobility, and diverse failure modes across heterogeneous edge devices.
This document discusses fog computing as an extension of cloud computing that processes data closer to where it is generated. Fog computing provides computing services at the edge of the network between end devices and cloud servers to enable low-latency applications. Examples where fog computing is useful include real-time applications like video streaming, gaming, augmented reality, and applications with large numbers of distributed nodes like sensor networks. The document outlines characteristics of fog computing like low latency, location awareness, mobility, and heterogeneity. It also discusses architectural drivers and provides examples of companies like Netflix that use fog computing through content delivery networks to provide fast, localized content distribution.
Safecast developed devices and a mapping system to measure radiation and build a community of citizen scientists. They created an open-source, open hardware Geiger counter kit called bGeigie Nano that can upload data to their site, which has collected over 25 million data points. Safecast aims to share their enthusiasm for citizen science through workshops, presentations, and media to encourage more people to get involved in measuring radiation levels.
Build "Privacy by design" Webthings
With IoT.js on TizenRT and more
#MozFest, Privacy and Security track
Ravensbourne University, London UK <2018-10-27>
This document discusses 3D data management and visualization of places. It addresses the definition of realistic digital representations and the potential uses of a national 3D dataset for decision making. Key applications discussed include information management, conservation, urban planning, and public consultation. Different levels of detail are examined from block models to detailed interiors. Standards like CityGML are also summarized. The importance of 3D GIS for easier analysis and communication by users is highlighted.
From Embedded to IoT and From Cloud to Edge & AIoT -- A computer technology t...William Liang
In this talk, we will review the evolution of the computer technologies after the PC Era, including embedded systems, smart devices and smartphones, cloud computing, IoT, AI, and then AIoT & Edge Computing that are happening today, and discuss how the trends were developed.
Presentation with Sreda Software Solutions company information and software development capabilities including Automotive electronics, telematics, V2x/C-ITS, Wireless communication, LTE Advanced Pro, Mobile applications, Back end services and data analytics
Met Geo Info at The British Cartographic Society 20100611Rollo Home
This document discusses 3D data management and visualization of places. It describes challenges in defining accuracy for 3D digital representations. It also discusses the potential benefits of a national 3D dataset for decision making through improved information management, conservation, urban planning, and public consultation. Different levels of detail are described for 3D models from block models to detailed interiors. Standards like CityGML are mentioned. Integrating 3D GIS with BIM is also briefly discussed. Quotes provide perspectives on making 3D GIS easier to use for analyzing and visualizing spatial information.
Similar to Android geolocation using GSM network (20)
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
GraphRAG for Life Science to increase LLM accuracy
Android geolocation using GSM network
1. Android geolocation using
GSM network
« Where was Waldroid? »
Renaud Lifchitz
renaud.lifchitz+27c3@gmail.com
#27c3
27-30 December 2010, Berlin
2. Speaker's bio
● French computer security engineer
● Main activities:
– Penetration testing&security audits
– Security trainings
– Security research
● Main interests:
– Security of protocols (authentication,
cryptography, information leakage, zero-
knowledge proofs...)
– Number theory (integer factorization,
primality tests, elliptic curves)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 2
Renaud Lifchitz
3. Why Android?
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 3
Renaud Lifchitz
4. Why Android?
● Why not?
● In just 2 years, 300,000 Android phones
activated each day
(Andy Rubin, Google, 2010/12/09)
● Android sales overtake iPhone in the
U.S. since summer
● Because hacking on Android is sooooo
cool (Linux kernel ☺)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 4
Renaud Lifchitz
5. Why Android?
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 5
Renaud Lifchitz
7. GPS
● Pros:
– Very accurate
● Cons:
– Phone needs a built-in GPS
– User must switch it on
– Doesn't work inside buildings nor
underground
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 7
Renaud Lifchitz
8. Wi-Fi
● Pros:
– Works inside buildings
● Cons:
– Phone needs built-in Wi-Fi
– User must switch it on
– Less accurate than GPS
– Needs access points
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 8
Renaud Lifchitz
9. GSM location
● Pros:
– No need for built-in GPS or Wi-Fi
– Can be done from the network side
● Cons:
– Medium accuracy
– Needs GSM coverage
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 9
Renaud Lifchitz
10. Cell location resolution
● Every GSM cell (BTS) is identified
by 4 numbers:
– MCC: Mobile Country Code
– MNC: Mobile Network Code
– LAC: Location Area Code
– CID: Cell ID
(MCC: 262, MNC: 01) = T-Mobile ®
Deutschland
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 10
Renaud Lifchitz
11. Cell location resolution
● There have been several attempts
to build databases of GSM cells:
Source: Wikipedia (http://en.wikipedia.org/wiki/Cell_ID)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 11
Renaud Lifchitz
12. Cell location resolution
● Why not use Google fantastic
indexing power?
● Huge and continuously updated database
thanks to:
Google cars
Licensed under theCC Attribution-Share
Flickr photo by PhyreWorX
Alike 2.0 Generic license
&
Android phones
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 12
Renaud Lifchitz
13. Cell location resolution
● Google API? Quite confidential...
● Reverse-engineer:
– What is used when you run Android Google
Maps without GPS nor Wi-Fi
– What is used by Google Gears plugin when
you do a Google local search in your
browser
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 13
Renaud Lifchitz
14. Cell location resolution
● Android Google Maps internals:
– tcpdump ARM compilation
– Proprietary binary protocol
– HTTP POSTed to
http://www.google.com/glm/mmap
– See “Poor Man's GPS” by Dhaval Motghare
for reference:
http://www.orangeapple.org/?p=82
– Buggy...
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 14
Renaud Lifchitz
15. Cell location resolution
● Google Gears internals:
– Sniff Firefox plugin network traffic
– See it's simple JSON!
– Some (confidential!) reference here:
http://code.google.com/p/gears/wiki/GeolocationAPI
– “Officially deprecated” but updated and
works a lot better than previous binary
protocol
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 15
Renaud Lifchitz
17. Cell location resolution
{"location":
{"latitude":48.886363,"longitude":2.246213,"address":
{"country":"France","country_code":"FR","region":"Ilede
France","county":"Hautsde
Seine","city":"Puteaux","street":"Rue Paul
Lafargue","street_number":"16","postal_code":"92800"},"acc
uracy":500.0},"access_token":"2:1dxrwvFk6ejLzSpv:BDHb9oizx
wm0bwsb"}
Google Gears GSM Geolocation API response body
● Interesting details:
– Latitude&longitude
– Full human-readable address (including street number,
street name, zip code, city, region and country!)
– Accuracy (in meters) → cell coverage?
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 17
Renaud Lifchitz
18. Cell location resolution
● Going further: mapping the GSM network
using sniffing with a SDR (Software Defined
Radio) or an old phone (Nokia 3310)
● USRP 1 from Ettus Research LLC:
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 18
Renaud Lifchitz
19. Cell location resolution
● Use excellent AirProbe project:
https://svn.berlin.ccc.de/projects/airprobe/
1 Scan with GnuRadio
2 Demodulate with AirProbe
3 Decode with Wireshark
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 19
Renaud Lifchitz
21. Cell location resolution
● Result!:
GSM mapping 1 square kilometre of Paris from my bed ☺
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 21
Renaud Lifchitz
22. Attack vectors
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 22
Renaud Lifchitz
23. Attack basics
● Android uses a specific logging facility
● Enabled by default
● 3 or 4 different logs
● Circular memory buffers
● Handled by character device files
● Built-in logcat tool to manipulate
the logs
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 23
Renaud Lifchitz
27. Attack basics
● Attack scenario:
– Collect history of visited GSM cells on
the victim's side (no prior access
needed)
– Send them to the attacker
– Resolve them into latitude&longitude
● Attack range:
– Local (i.e. physical attack)
– Remote (here remote means using a
local vulnerability!)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 27
Renaud Lifchitz
28. Physical attack
● Connect the victim's phone to
the attacker computer via USB
● Requires:
– Physical access to the victim's phone
for a few seconds
● Works even if the victim's phone is
locked! (using USB debugging function)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 28
Renaud Lifchitz
29. Remote attack
● Remotely spy the victim
● Malware application who abuse
either:
– User trust
– Android security model
● Requires:
– A bit of social engineering
(or not ☺)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 29
Renaud Lifchitz
30. Remote attack
● Android permissions model:
Dalvik (java) sandbox
● Permissions: android.permission.*
● What can a user fear?
– Dangerous combination of 2
permissions:
ACCESS_COARSE_LOCATION
or ACCESS_FINE_LOCATION
+ INTERNET
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 30
Renaud Lifchitz
31. Remote attack
st
●
1 attack - Use both permissions:
– Internet permission is needed for free
ad-sponsored applications
– Official geolocation permission is
needed for location-aware
applications
most users won't care!
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 31
Renaud Lifchitz
32. Remote attack
● 2nd attack – Use the radio logs:
– Instead of using Android geolocation
API, read radio logs (READ_LOGS
permission) to collect Cell Ids
– Write results into the system log
(no permission needed!)
– Voluntarily crash the application when
needed (no permission needed!)
– If the user reports the crash, system log
is sent to the developer using the
integrated Google Feedback client ☺
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 32
Renaud Lifchitz
33. Remote attack
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 33
Renaud Lifchitz
34. Remote attack
Google Feedback
client
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 34
Renaud Lifchitz
35. Remote attack
User reports
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 35
Renaud Lifchitz
36. Remote attack
rd
●
3 attack - Use Android NDK to
completely bypass permissions model:
– Native Development Kit allows
developer to call native functions
(C/C++ code) from their applications
(similar to JNI)
– Works outside the Dalvik sandbox...
● Arbitrary file access, code execution,
network access... ☺
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 36
Renaud Lifchitz
37. La
Remote attack
st
m
ide inu
a! te
● 4th attack – Man-in-The-Middle
attack during application download
over Wi-Fi:
– The new Android Market&Android
Download Manager send application
name, description, permissions then
content in plaintext HTTP
– It should be possible to change
application description, permissions
and/or content using active MiTM and
install any malware application! ☺
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 37
Renaud Lifchitz
38. Remote attack
GET /market/download/Download?
assetId=9177147809749553200&userId=XXXXXXXXXXXXXX&deviceId=YYYYYYYYYYYYYYYYYYY
HTTP/1.1
Cookie: MarketDA=ZZZZZZZZZZZZZZZZZZZZZZ
Host: android.clients.google.com
Connection: KeepAlive
UserAgent: AndroidDownloadManager
HTTP/1.0 200 OK
ETag: 1625044586
ContentType: application/vnd.android.packagearchive
ContentLength: 498162
ContentDisposition: inline
Date: Sun, 28 Dec 2010 17:50:13 GMT
Expires: Sun, 28 Dec 2010 17:50:13 GMT
CacheControl: private, maxage=0
XContentTypeOptions: nosniff
XFrameOptions: SAMEORIGIN
XXSSProtection: 1; mode=block
Server: GSE
XCache: MISS from proxy
Via: 1.0 proxy (proxy)
Connection: keepalive
PK.........N.<...............res/anim/animation_none.xml....].;n.1.E.q.IG."
An Android market download
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 38
Renaud Lifchitz
39. Spying users...
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 39
Renaud Lifchitz
40. Getting more than location
● Much more interesting information in
the different logs:
– Phone calls (numbers&duration)
– SMS (PDU format)
● Combination of information:
– Where did phone calls take place?
– Where were SMS sent/received?
– Recovery of deleted SMS, call history...
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 40
Renaud Lifchitz
41. Getting more than location
● History length?
– It depends on log filling
● If user has moved quickly: a few hours
● If not: nearly a whole day
● Logs size can be changed...
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 41
Renaud Lifchitz
42. Getting more than location
Complete geolocation, calls and SMS
history tracking!
(nearly or no permission needed...)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 42
Renaud Lifchitz
43. How to protect yourself?
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 43
Renaud Lifchitz
44. How to protect yourself?
● Carefully look at applications using NDK
(apk archives embedding .so files)
● Don't install any application requiring READ_LOGS
permission
● Don't submit bug reports (or at least choose not to
include system logs with submission)
● Reduce logcat buffer size
(seems tricky: logcat r / logcat n)
● Often clear your logcat
(logcat b radio c)
● Disable radio logs (seems tricky too!)
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 44
Renaud Lifchitz
45. Tool demo
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 45
Renaud Lifchitz
46. Tool demo
Dumping and viewing a user's past location history
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 46
Renaud Lifchitz
47. Licensed under the CC Attribution-NonCommercial 2.5 Generic license
Comic by http://xkcd.com
That's all folks!
Hope you enjoyed the talk!
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 47
Renaud Lifchitz
48. Any questions?
Many thanks for attending!
#27c3 – 27-30 December 2010 – Berlin
“Android geolocation using GSM network” 48
Renaud Lifchitz