SlideShare a Scribd company logo
Mobile Miner
Installation
● The app is not (yet) in the
Google Play store.
● Android allows installation
of apps from unofficial
sources.
● To begin, swipe down
from the top of the screen
to reveal the quick
settings icon. (It looks like
a portrait.)
● Tap it, then access full
settings by tapping the
icon that looks like a gear
wheel.
Mobile Miner
Installation
● Tap the “security” option.
● Select “unknown sources”.
● Whilst in “settings”, make sure
wifi is enabled.
● Vist the app's Github page
using the phone's browser.
http://kingsbsd.github.io/MobileMiner/
● Tap the QR code to download
the app's .apk package file.
Mobile Miner
Installation
● Swipe down from the top.
● Select the downloaded
“MobileMiner.apk” file.
● Accept the app's requested
permissions to install it.
What it does.
Can we capture the data-trails that smartphones transmit
to third parties and make them available?
No.
This would require rooting the 'phones. An Android phone
is a Linux system, where the end user typically doesn't
have admin rights.
If the app reaches a mass audience, we cannot expect
users to root their phones. Some rooting software
contains malware, we cannot ensure that users root their
devices safely.
For a technical description of the Android permissions
system and Android malware, watch:
http://tinyurl.com/weidmandroid
What can we do, then?
Use the “Start” button to start
collecting data.
Detect when apps access the
internet:
1) Use the Android API to log Txed /
Rxed bytes on a per-app basis.
2) Examine the Linux filesystem to
find the TCP port of network
sockets. (e.g: port 80 is http, port
443 is secure https.)
Log cell-tower ids.
Log wireless networks.
Full description of the app:
http://tinyurl.com/miningmobileyouth
Recording app notifications.
If you authorize the app as an
“accessibility service”, we can log
when network enabled apps send
notifications to the user.
We don't log the contents of the
notifications.
We don't know which websites
you've accessed.
What happens to the data?
Every 10 minutes, if you are on a
wireless network, the 'phone
transmits data to a CKAN server.
http://ckan.org/
The “My Data” button gives some
ability to explore data on the
device.
A list of apps ordered by activity
is provided.
Heats-maps of cell-tower usage
can be generated.
http://opencellid.org/
Anonymity?
Your 'phone is assigned a
random string of digits as an ID
by the CKAN server.
You can access this via the apps'
menu.
You can also set the app to start
recording a soon as the 'phone is
switched on. -The app consumes
quite a lot of power.
Anonymity?
Your 'phone is assigned a
random string of digits as an ID
by the CKAN server.
You can access this via the apps'
menu.
You can also set the app to start
recording as soon as the 'phone
is switched on. -The app
consumes quite a lot of power.
Other ways to access your data.
The “Export” button in the “My Data” screen copies the app's
SQLite database to where you and other apps can find it.
Apps like”SQLite Master”. Look for .sqlite files in
/storage/sdcard0.
Don't. Make. An. App.

More Related Content

What's hot

How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyx
devsteam
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
iFixScreens
 
BuzzBox SDK
BuzzBox SDKBuzzBox SDK
BuzzBox SDK
BuzzBox Inc
 
Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]
Angelo Rüggeberg
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
n|u - The Open Security Community
 
Counter Display_Grellner OMS (1)
Counter Display_Grellner OMS (1)Counter Display_Grellner OMS (1)
Counter Display_Grellner OMS (1)
Jennifer Bouler
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
NoNameCon
 
Apteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App PerformanceApteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent
 
Malware | spyware removal
Malware | spyware removalMalware | spyware removal
Malware | spyware removal
Virus Removal Australia
 
Installtracker 2.0
Installtracker 2.0Installtracker 2.0
Installtracker 2.0
Dmitry Eremeev
 
Motionics Wireless Laser Rangefinder User Manual
Motionics Wireless Laser Rangefinder User ManualMotionics Wireless Laser Rangefinder User Manual
Motionics Wireless Laser Rangefinder User Manual
Motionics, LLC
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
skowshik
 
Exacqvision2
Exacqvision2Exacqvision2
Exacqvision2
julieeelaine
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp
 
Leaking Ads—Is User Data Truly Secure?
Leaking Ads—Is User Data Truly Secure?Leaking Ads—Is User Data Truly Secure?
Leaking Ads—Is User Data Truly Secure?
Priyanka Aash
 
Tips and Tricks: Updating your Sony Ericsson Xperia Smartphone to the latest ...
Tips and Tricks: Updating your Sony Ericsson Xperia Smartphone to the latest ...Tips and Tricks: Updating your Sony Ericsson Xperia Smartphone to the latest ...
Tips and Tricks: Updating your Sony Ericsson Xperia Smartphone to the latest ...
Mobile88 com
 
Digital Winners 2014: Shortcutlabs pitch
Digital Winners 2014: Shortcutlabs pitchDigital Winners 2014: Shortcutlabs pitch
Digital Winners 2014: Shortcutlabs pitch
Telenor Group
 
mspy
mspymspy
mspy
fodotumo
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
Lookout
 

What's hot (19)

How to install cell phone spyx
How to install cell phone spyxHow to install cell phone spyx
How to install cell phone spyx
 
How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!How to know if your iPhone is hacked? Check these 5 points now!
How to know if your iPhone is hacked? Check these 5 points now!
 
BuzzBox SDK
BuzzBox SDKBuzzBox SDK
BuzzBox SDK
 
Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]
 
Null pune 1st March-news bytes
Null pune 1st March-news bytesNull pune 1st March-news bytes
Null pune 1st March-news bytes
 
Counter Display_Grellner OMS (1)
Counter Display_Grellner OMS (1)Counter Display_Grellner OMS (1)
Counter Display_Grellner OMS (1)
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Apteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App PerformanceApteligent - Choosing the Right SDKs to Optimize App Performance
Apteligent - Choosing the Right SDKs to Optimize App Performance
 
Malware | spyware removal
Malware | spyware removalMalware | spyware removal
Malware | spyware removal
 
Installtracker 2.0
Installtracker 2.0Installtracker 2.0
Installtracker 2.0
 
Motionics Wireless Laser Rangefinder User Manual
Motionics Wireless Laser Rangefinder User ManualMotionics Wireless Laser Rangefinder User Manual
Motionics Wireless Laser Rangefinder User Manual
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
 
Exacqvision2
Exacqvision2Exacqvision2
Exacqvision2
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
 
Leaking Ads—Is User Data Truly Secure?
Leaking Ads—Is User Data Truly Secure?Leaking Ads—Is User Data Truly Secure?
Leaking Ads—Is User Data Truly Secure?
 
Tips and Tricks: Updating your Sony Ericsson Xperia Smartphone to the latest ...
Tips and Tricks: Updating your Sony Ericsson Xperia Smartphone to the latest ...Tips and Tricks: Updating your Sony Ericsson Xperia Smartphone to the latest ...
Tips and Tricks: Updating your Sony Ericsson Xperia Smartphone to the latest ...
 
Digital Winners 2014: Shortcutlabs pitch
Digital Winners 2014: Shortcutlabs pitchDigital Winners 2014: Shortcutlabs pitch
Digital Winners 2014: Shortcutlabs pitch
 
mspy
mspymspy
mspy
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 

Similar to Mobile Miner Installation

Hacking ingress
Hacking ingressHacking ingress
Hacking ingress
Eran Goldstein
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Tyler Shields
 
P series quick installation manual
P series quick installation manualP series quick installation manual
P series quick installation manual
Joaquín Sánchez
 
Mobile Application Testing
Mobile Application TestingMobile Application Testing
Mobile Application Testing
Ramakrishna Telapolu
 
Turn your smartphone into a sensor.pptx
Turn your smartphone into a sensor.pptxTurn your smartphone into a sensor.pptx
Turn your smartphone into a sensor.pptx
vishal choudhary
 
Android malware presentation
Android malware presentationAndroid malware presentation
Android malware presentation
Sandeep Joshi
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issue
shekar M
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
Cognizant
 
sts-scanner_tutorial
sts-scanner_tutorialsts-scanner_tutorial
sts-scanner_tutorial
tutorialsruby
 
sts-scanner_tutorial
sts-scanner_tutorialsts-scanner_tutorial
sts-scanner_tutorial
tutorialsruby
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
Tyler Shields
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
IJIR JOURNALS IJIRUSA
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
STO STRATEGY
 
Basic Instructions for Downloading a vCard
Basic Instructions for Downloading a vCardBasic Instructions for Downloading a vCard
Basic Instructions for Downloading a vCard
Pam Lehr
 
Android tips and tricks 2014
Android tips and tricks 2014Android tips and tricks 2014
Android tips and tricks 2014
Web Rifer Technologies
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Rapid7
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
NIRMAL RAJ
 
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Giles Greenway
 
Firefox OS Presentation
Firefox OS PresentationFirefox OS Presentation
Firefox OS Presentation
José Manuel Cantera Fonseca
 
Virtual Smart-phone (1) (1)
Virtual Smart-phone (1) (1)Virtual Smart-phone (1) (1)
Virtual Smart-phone (1) (1)
Hemanth kumar
 

Similar to Mobile Miner Installation (20)

Hacking ingress
Hacking ingressHacking ingress
Hacking ingress
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
P series quick installation manual
P series quick installation manualP series quick installation manual
P series quick installation manual
 
Mobile Application Testing
Mobile Application TestingMobile Application Testing
Mobile Application Testing
 
Turn your smartphone into a sensor.pptx
Turn your smartphone into a sensor.pptxTurn your smartphone into a sensor.pptx
Turn your smartphone into a sensor.pptx
 
Android malware presentation
Android malware presentationAndroid malware presentation
Android malware presentation
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issue
 
Mobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, SolutionsMobile Banking Security: Challenges, Solutions
Mobile Banking Security: Challenges, Solutions
 
sts-scanner_tutorial
sts-scanner_tutorialsts-scanner_tutorial
sts-scanner_tutorial
 
sts-scanner_tutorial
sts-scanner_tutorialsts-scanner_tutorial
sts-scanner_tutorial
 
Shmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the BerriesShmoocon 2010 - The Monkey Steals the Berries
Shmoocon 2010 - The Monkey Steals the Berries
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
When developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part iiWhen developers api simplify user mode rootkits development – part ii
When developers api simplify user mode rootkits development – part ii
 
Basic Instructions for Downloading a vCard
Basic Instructions for Downloading a vCardBasic Instructions for Downloading a vCard
Basic Instructions for Downloading a vCard
 
Android tips and tricks 2014
Android tips and tricks 2014Android tips and tricks 2014
Android tips and tricks 2014
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
 
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)
 
Firefox OS Presentation
Firefox OS PresentationFirefox OS Presentation
Firefox OS Presentation
 
Virtual Smart-phone (1) (1)
Virtual Smart-phone (1) (1)Virtual Smart-phone (1) (1)
Virtual Smart-phone (1) (1)
 

More from kingsBSD

Droid Hacking for the Innocent
Droid Hacking for the InnocentDroid Hacking for the Innocent
Droid Hacking for the Innocent
kingsBSD
 
Crowds and Clouds
Crowds and CloudsCrowds and Clouds
Crowds and Clouds
kingsBSD
 
MobileMiner and NervousNet
MobileMiner and NervousNetMobileMiner and NervousNet
MobileMiner and NervousNet
kingsBSD
 
Toward a Mobile Data Commons
Toward a Mobile Data CommonsToward a Mobile Data Commons
Toward a Mobile Data Commons
kingsBSD
 
Our Data Ourselves, Pydata 2015
Our Data Ourselves, Pydata 2015Our Data Ourselves, Pydata 2015
Our Data Ourselves, Pydata 2015
kingsBSD
 
Research on Online Digital Cultures — Community Extraction from Twitter Netwo...
Research on Online Digital Cultures — Community Extraction from Twitter Netwo...Research on Online Digital Cultures — Community Extraction from Twitter Netwo...
Research on Online Digital Cultures — Community Extraction from Twitter Netwo...
kingsBSD
 
Twitter Community Extraction by Markov Clustering
Twitter Community Extraction by Markov ClusteringTwitter Community Extraction by Markov Clustering
Twitter Community Extraction by Markov Clustering
kingsBSD
 

More from kingsBSD (7)

Droid Hacking for the Innocent
Droid Hacking for the InnocentDroid Hacking for the Innocent
Droid Hacking for the Innocent
 
Crowds and Clouds
Crowds and CloudsCrowds and Clouds
Crowds and Clouds
 
MobileMiner and NervousNet
MobileMiner and NervousNetMobileMiner and NervousNet
MobileMiner and NervousNet
 
Toward a Mobile Data Commons
Toward a Mobile Data CommonsToward a Mobile Data Commons
Toward a Mobile Data Commons
 
Our Data Ourselves, Pydata 2015
Our Data Ourselves, Pydata 2015Our Data Ourselves, Pydata 2015
Our Data Ourselves, Pydata 2015
 
Research on Online Digital Cultures — Community Extraction from Twitter Netwo...
Research on Online Digital Cultures — Community Extraction from Twitter Netwo...Research on Online Digital Cultures — Community Extraction from Twitter Netwo...
Research on Online Digital Cultures — Community Extraction from Twitter Netwo...
 
Twitter Community Extraction by Markov Clustering
Twitter Community Extraction by Markov ClusteringTwitter Community Extraction by Markov Clustering
Twitter Community Extraction by Markov Clustering
 

Recently uploaded

SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 

Recently uploaded (20)

SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 

Mobile Miner Installation

  • 1. Mobile Miner Installation ● The app is not (yet) in the Google Play store. ● Android allows installation of apps from unofficial sources. ● To begin, swipe down from the top of the screen to reveal the quick settings icon. (It looks like a portrait.) ● Tap it, then access full settings by tapping the icon that looks like a gear wheel.
  • 2. Mobile Miner Installation ● Tap the “security” option. ● Select “unknown sources”. ● Whilst in “settings”, make sure wifi is enabled. ● Vist the app's Github page using the phone's browser. http://kingsbsd.github.io/MobileMiner/ ● Tap the QR code to download the app's .apk package file.
  • 3. Mobile Miner Installation ● Swipe down from the top. ● Select the downloaded “MobileMiner.apk” file. ● Accept the app's requested permissions to install it.
  • 4. What it does. Can we capture the data-trails that smartphones transmit to third parties and make them available? No. This would require rooting the 'phones. An Android phone is a Linux system, where the end user typically doesn't have admin rights. If the app reaches a mass audience, we cannot expect users to root their phones. Some rooting software contains malware, we cannot ensure that users root their devices safely. For a technical description of the Android permissions system and Android malware, watch: http://tinyurl.com/weidmandroid
  • 5. What can we do, then? Use the “Start” button to start collecting data. Detect when apps access the internet: 1) Use the Android API to log Txed / Rxed bytes on a per-app basis. 2) Examine the Linux filesystem to find the TCP port of network sockets. (e.g: port 80 is http, port 443 is secure https.) Log cell-tower ids. Log wireless networks. Full description of the app: http://tinyurl.com/miningmobileyouth
  • 6. Recording app notifications. If you authorize the app as an “accessibility service”, we can log when network enabled apps send notifications to the user. We don't log the contents of the notifications. We don't know which websites you've accessed.
  • 7. What happens to the data? Every 10 minutes, if you are on a wireless network, the 'phone transmits data to a CKAN server. http://ckan.org/ The “My Data” button gives some ability to explore data on the device. A list of apps ordered by activity is provided. Heats-maps of cell-tower usage can be generated. http://opencellid.org/
  • 8. Anonymity? Your 'phone is assigned a random string of digits as an ID by the CKAN server. You can access this via the apps' menu. You can also set the app to start recording a soon as the 'phone is switched on. -The app consumes quite a lot of power.
  • 9. Anonymity? Your 'phone is assigned a random string of digits as an ID by the CKAN server. You can access this via the apps' menu. You can also set the app to start recording as soon as the 'phone is switched on. -The app consumes quite a lot of power.
  • 10. Other ways to access your data. The “Export” button in the “My Data” screen copies the app's SQLite database to where you and other apps can find it. Apps like”SQLite Master”. Look for .sqlite files in /storage/sdcard0. Don't. Make. An. App.