I don’t know whether you guys are familiar with this client but it is by far the most complete twitter client for Android.
Once available on the play store, the application was then removed by request from twitter after reaching the maximum allowed authentication requests of 100 000 users, especially that the app which costed 5$ was mainly installed via blackmart and aptoide for free.
That forbid users who already bought the app from the play store and those who were willing to pay for it from getting the app or any further updates it could have. However, Falcon Pro developers made the app available for free on http://getfalcon.pro/ and included a very interesting (and smart) workaround in the last update (v2.4) which allowed users to overcome the maximum allowed tokens error.
Note: Users who already had an access token could easily upgrade to the latest version.
So here’s a step by step guide to install and use the latest version of Falcon Pro for twitter:
1. Make sure you delete any older versions of Falcon Pro if you have them and restart device.
2. download and install the Falcon Pro for twitter app from http://getfalcon.pro/
3. Once you open the app a login screen will appear.
4. Press the Falcon logo, then press all corners until all squares are on, then turn off the orange one
5. Shake your phone!
explanation: I know this might sound crazy and it is but please carefully follow all steps.
click the logo –> click all 4 corners of the screen (each corner will light up with a different color) –> turn off the orange one (click it again) –> SHAKE YOUR PHONE!! yes shake it shake it!!
6. At this point you’re in, follow ALL the instructions (Press HELP). No I mean it… PRESS THE HELP BUTTON!
7. A detailed picture guide will tell you what to do there.
8. Follow all steps and voila!
Please include any questions or problems you might have in the comments.
I have been wanting to write about this for a while now and been postponing it due to recent commitments at work and thus the lack of free time.
First of all I’d like to state that I am no security expert nor I claim to be an electronics geek but what I’m going to show you is more of what I stumbled on randomly at the beginning and decided to look further into it afterwards.
Skipping the smartphones introduction and the way they changed our lives, the way we’ve slowly become dependent on these devices that we now require them for the simplest of our daily tasks. I am going to go straight to the point of this post.
In the intention of finding an app that changes/alters the permissions given to an app to function on my phone, I instead found an app that lists you all permissions given to installed apps on your smartphones.
For those who still don’t know what we’re talking about, permissions are what an app asks you to grant it upon installation after you download it. Most of us including myself until recently, skip these steps by pressing NEXT NEXT NEXT NEXT OPEN.
So the application I found is called App Permission Watcher (click for download)
This app scans all applications on your phone for “suspicious apps” judging by the permissions these apps require.
Here are some screenshots from App Permission Watcher of apps one could’ve never suspected to be suspicious or malicious.
So let us start with EVERNOTE, my favorite place to write notes.. Neat and nice interface and is used by millions worldwide.
It appears that Evernote (as shown in picture above) can relay your contact data allowing itself to send all contact information over the internet. One could say that’s cool, I don’t mind someone knowing my contacts but why does Evernote want to know my movement profile? Allowing it to track my position anytime anywhere and without my permission?! Fine again, one could argue that I don’t care if someone knew where I was and when.. It’s fine. But can someone please explain why evernote can use my phone as a covert listening device?!! They can actually listen to our phone calls and use our device microphone to record audio clips and send them over the internet without! I repeat again, WITHOUT our permission.
Now just as you’d think they’ve done it all, you learn that they can use your device camera to send data over the internet, which can be used to watch the field of view of your phone at anytime, without you finding out. Cool eh?
same goes for our beloved facebook and whatsapp apps
only whatsapp can send sms from your phone to anyone without your permission and without you even finding out about it..
but my biggest surprise came when I checked my what supposed to be ANTIVIRUS / ANTISPAM / ANTITHEFT / ANTIFRAUD app…
sadly this app simply takes full control of your phone and can and probably is or will hurt you in many ways.
AVG antivirus app can:
1- share your contacts
2- share your location
3- make phone calls
4- send and relay sms messages
but most dangerously… this app can FALSIFY sms messages sent TO YOUR PHONE such (as explained by the next pic) mTAN codes sent to your phone by online banking services and could lead to an attacker getting into your bank account.
pretty shocking and unbelievable in some cases but that doesn’t mean all apps are malicious..
For example the google drive, translate, hotmail and Instagram apps require only contact info and usually that kind of info is used to add your friends on these services.
To conclude this, there are many ways that these permissions YOU yourself allow these apps to have can be used against you. A simple example which some might call an exaggeration is the capability for a hacker/security expert to place you somewhere perhaps a crime scene without the possibility for you to deny that claim.
Another example would be to send sms or make a call on your behalf that could lead to financial, social or even physical harm.
Next time you are installing an application on your phone, make sure you read the permissions you are giving it.
Knowing that most apps require these permissions to allow you to install them on your phone, a way to come around this is to install an application called SRT appguard PRO which allows you to alter applications permissions AFTER you install them and thus being able to deny them any undesirable permissions and privileges.