RT @raviborgaonkar: "How Vulnerabilities in Cellular Wireless Networks Can Enable Advanced Persistent Threats" from AT&T research http://t.co/JaCBFbGCSP #A
RT @brutelogic: An almost invisible ssh connection (no who, no IP logged): ssh -o UserKnownHostsFile=/dev/null -T user@host /bin/bash -i
KGTP: flexible, lightweight and realtime Linux debugger and tracer with X86-32, X86-64, MIPS and ARM support - http://t.co/5cZzgUraZs
7:15pm May 31st 2013 via web
I liked a @YouTube video from @teawater http://t.co/RTylqLUqms Use KGTP debug the Linux kernel of Android
Defeating the latest version of hosedex2jar - https://t.co/65gktMaaUE via @TeamAndIRC
7:08pm May 31st 2013 via web
@alsutton makes sense, but wish it was easier... hopefully /vendor comes in a separate partition in android 5 with proprietary blobs
@revskills @DaSnOoTeRKiNG @viaforensics @mercemolist @mgesteiro @invitasjonskode @Rogunix @shafigullin @jordimurgo @ferrervicent Thanks! :D
8:19am May 31st 2013 via web in reply to pof
@oscarintherocks @scottyab @tr1ana @lostinsecurity @RicardoJRdez @insitusec @_juan_vazquez_ @NoxOner @sha0coder @Shiftreduce Thanks! :D
8:18am May 31st 2013 via web in reply to pof
@Newlog_ @SQLbre @jvinaja @timstrazz @kevinmswartz @whatsbcn @TeamAndIRC @odexcide @interferencies @tripledes @roman_soft Thanks! :D
8:18am May 31st 2013 via web in reply to pof
@tracer0tong @cryptax @Groove @frommelmak @hdubli @quine @phr0nak @NeoTokyo_ @G13net @pwntester @quetzal @javivf @iolandatweets Thanks! :D
8:17am May 31st 2013 via web in reply to pof
@astralia @ibelmonte @segofensiva @secnight @hacktimes @lain77z @Gunther_AR @anantshri @MikeTracking @dukebarman @ldelgadoj Thanks! :D
8:17am May 31st 2013 via web in reply to pof
RT @carlosacastillo: [PDF] DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware http://t.co/2ZkEyolRL9
8:00am May 31st 2013 via web
android coffee art - http://t.co/ybuLaiCEqa
7:41am May 31st 2013 via web
RT @xdadevelopers: Using Internal/Hidden Classes of the Android API http://t.co/FnbxDVx487
RT @opersys: "Leveraging Android's Linux Heritage" presentation now online: http://t.co/OTJZgIuSEj #AnDevCon
RT @karimyaghmour: "Inside Android's UI" presentation now online: http://t.co/4xxRpxdwft #AnDevCon
why release a new device for 'Google edition' instead of providing a ROM for existing ones? @htc & @SamsungMobile #youredoingitwrong
RT @AndroidPolice: Respected Security Researcher To Demo "One Root To Rule Them All" At Black Hat Conference http://t.co/aDPgmCQS1Q
RT @SantokuLinux: I'm feeling very... seedy. Download my all new torrent: https://t.co/gnhktuVgOi
Steve Kondik post on "revoke app permissions" on @CyanogenMod - https://t.co/vog3u3yPyz
11:12am May 30th 2013 via web
w00t!!! My talk has been accepted for @_defcon_ 21, see you in Las Vegas! \o/
10:47am May 30th 2013 via web
morpher: commercial code obfuscator, with Android (ARM) support - http://t.co/MsbtWblnjd via @andreybelenko
10:16am May 30th 2013 via web
@TeamAndIRC curious to see how long it takes them....
procyon-decompiler: New open source java decompiler - https://t.co/zbYmqcIQ6o via @marcograss
8:38am May 30th 2013 via web
RT @jduck: Building a Nexus 4 UART Debug Cable (by myself and @hustlelabs) http://t.co/TCC9hZMbDC
@aitorgrandes mira de acercarte a algún evento del GDG Madrid, seguro q encuentras gente -> https://t.co/4448c3eOyp
RT @hugofortier: Recon Schedule and Talk Descriptions are now online: http://t.co/3bKI5OdasV
RT @viaforensics: Mobile app developers, it's time to stand out. Comptia Mobile App Security+ exam FREE BETA now available. Details: https://t.co/SUmghmGNVr
1:53pm May 28th 2013 via web
RT @raviborgaonkar: "@mod0: HTC Mail client does not properly verify SSL certificates. #htc #ssl #mitm http://t.co/Dt0AUrynEa" cc @pof
@quetzal @ibelmonte @frommelmak @oriolrius @tripledes no, ni idea
@TeamAndIRC not that I know of, /cc @jmoutte @trufae
@hex_cat no, i'm only using app settings... modaco has one worth looking as well.
"Interesting cross platform product to protect your apps: http://t.co/R0ybOVLXPl " via @jmoutte @trufae
Per App settings (Xposed mod) is still the best solution to revoke perms on android 4.x - http://t.co/8eS4JxJJm6 http://t.co/npcGnA7jUz
Simple bypass of data wipe when unlocking the bootloader on Nexus4 - http://t.co/eVjCFLEYAe
Sky Twitter hack was a prank, Android apps not hacked and replaced - http://t.co/UXrIHhyNS8 via @timstrazz
8:05am May 27th 2013 via web
oh, apparently Kivlad has not been updated since 2011 and only works with the included example apk - http://t.co/HECXyQfw1u
8:01am May 27th 2013 via web
Kivlad (alpha release): native Dalvik bytcode decompiler writen in Ruby - http://t.co/IyqHx0mCZU
7:44am May 27th 2013 via web
DexGuard obfuscated apk, with original source code - https://t.co/ENGdG0grMP
7:38am May 27th 2013 via web
@thuxnder as always, great work! :D
Advisory for Framaroot's Gandalf exploit (CVE-2013-2595) - https://t.co/zVq38VUSzu via @TeamAndIRC
3:36pm May 26th 2013 via web
@TeamAndIRC @PaulOBrien not me, at a quick glance it does not seem compromised, but any change might be subtle and fool us easily...
RT @thuxnder: Slides about Android RE and Defenses are now online: http://t.co/SwEZ5Is2kQ #SRCDub2013 @BerlinSides @pleed_
RT @iamnion: guy disqualified from paypal bug bounty program for age, posts PoC for unpatched bug on full-disclosure :) http://t.co/j0Noovz8kM
RT @SkyHelpTeam: UPDATE: All Sky's Android apps were hacked and replaced... please uninstall it, And we will let you know when it will be available
@PaulOBrien @TeamAndIRC Thanks Paul!
RT @grsecurity: The definitive exploit for the perf events vuln: http://t.co/5d7rYptIzR Many new techniques to be found inside. All distros, x86/x64
@TeamAndIRC @NinpoUK @PaulOBrien were any of you able to download the samples?
@amccormack @AndroidPolice i don't have the samples, hopefully someone downloaded them and will share soon
RT @AndroidPolice: Sky Apps Hacked By Syrian Electronic Army – BSkyB: 'Android Apps Were Hacked And Replaced' http://t.co/x8fuWLt5AD
RT @TeamAndIRC: Apparently google's app verification service is actually active now http://t.co/3HP23KKFAk
RT @TeamAndIRC: Trying to get an android security community gonig on G+ https://t.co/ciCztMncu6
@tripledes lol, no :P
mv /mnt/dish /dev/body #olakase http://t.co/vtCxPEhgOf
@MordodeMaru messes with packages.xml (chmods it 777 and chattr's it), UI is still awful and unclear. IMHO not worth the money :(
Beta Test new "Permissions Denied" application (3.91 EUR) - https://t.co/CfFbcBa0ed just downloaded, let's see what's new!
6:45am May 25th 2013 via web
Security Testing of the Communication among Android Applications - [PDF] http://t.co/VGndI2hwkc
6:39am May 25th 2013 via web
Android Mobile Security: Threats and Protection - [PDF] http://t.co/RRTsTRN3Rf
6:35am May 25th 2013 via web
FireDroid: Hardening Security in Android with System Call Interposition [PDF] - http://t.co/Wa6hLCJufu
6:33am May 25th 2013 via web
RT @TeamAndIRC: Explained and automated the little LG escalation bug http://t.co/bMR069f2F5 http://t.co/HSyiAs7Ldu
RT @davtbaum: Thanks for coming out to my #Android #hacking talks #AnDevCon! All slides available here http://t.co/J6sPrkF7
I liked a @YouTube video http://t.co/yDpPD9u8WG Google I/O 2008 - Dalvik Virtual Machine Internals
@apuigsech congrats!
@reversemode didn't notice the mention until @bluejay00 said it! Thanks Rubén!
RT @reversemode: "Identify Backdoors in Firmware By Using Automatic String Analysis" http://t.co/bnLeJNPnhh Backdoors, Markov and industrial firmware...
RT @dakami: http://t.co/Ppc0FK9Wc6 *facepalm* Google. Charge for services. It's OK. We'll still like you and it will clean up this gunk.
@trufae yes they can be clicked http://t.co/wDyopNx3Rz
RT @TeamAndIRC: A wild LG exploit appears http://t.co/HSyiAs7Ldu
Understanding how motochopper works - http://t.co/OpuhRcIWxR
11:14pm May 23rd 2013 via web
SEAndroid and the motochopper exploit - http://t.co/9J051LRwCV interesting post, cc @djrbliss
10:44pm May 23rd 2013 via web
RT @jtsylve: A new post describing a feature of Dalvik Inspector: Automated Volatility Plugin Generation http://t.co/zVlvHagLFL #dfir
RT @radareorg: Also… here’s a sample config to change radare2’s color theme. http://t.co/al2OJrivYa
RT @ChainfireXDA: Quick and dirty code but mostly works - sgs4ext4fs - https://t.co/Qodaj8mxMe
RT @djrbliss: Introducing Loki, a set of tools for booting custom kernels and recoveries on the AT&T/VZW Samsung Galaxy S4: https://t.co/qAQLLNnNg2
2:44pm May 23rd 2013 via web
RT @djrbliss: Exploiting Samsung Galaxy S4 secure boot: http://t.co/DKYdEqr95y
2:41pm May 23rd 2013 via web
RT @z4ziggy: #zCrackme2 – ARM Crackme competition http://t.co/plY0ssgmnc goes public; #ForBeerAndGlory
RT @esizkur: Our paper #IEEESP2013 "Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization" is available here: http://t.co/NVN0TmD6Ah
RT @twitter: Make your Twitter account more secure with login verification, in 4 easy steps: https://t.co/OvAU2eIOIN
RT @BlueboxSec: Black Hat: @BlueboxSec's Jeff Forristal, a.k.a. Rain Forrest Puppy, will present: ANDROID: ONE ROOT TO OWN THEM ALL. http://t.co/viEKTljcOa
RT @grsecurity: No more kallsyms/System.map requirement: looking up symbols via the kernel itself: http://t.co/2lJcNNFzWZ
RT @jduck: Nice smorgasbord page by @saurik - #android #technical #architecture - http://t.co/dM3WjKQoBk
RT @gtvhacker: Google notified us today that they have pulled our #CubeRoot application from the Play Store. Info on our blog at: http://t.co/N7F7r2I342
RT @jedisct1: :) RT @ekse0x: lol https://t.co/Icw3JQMq2F
@devteev getting 404 on the Google Play link, is the apk somewhere else?
RT @JonathanSalwan: Little script to trace a kernel function https://t.co/d1nyLPBHE2
RT @joedamato: new blog post: A closer look at a recent privilege escalation bug in Linux (CVE-2013-2094) http://t.co/rsvbxLEhA4
RT @timstrazz: My #Android #syscan13 slides are finally online - sorry for the delay http://t.co/ihQF7KUJVy
RT @Accuvant: Zero-day Java exploit that enabled @jduck to take control of a patched Windows OS within 15 secs and win #Pwn2Own:http://t.co/4GpxVWY655
Detecting GPS Information Leakage in Android Applications [PDF] - http://t.co/S0sqblk6Si & Brox Tool: http://t.co/Nt9mrGFvwx
6:05pm May 21st 2013 via web
RT @devteev: DroidSQLi - MySQL Injection tool for Android http://t.co/7tbURqBlIw
RT @FSecure: Search engine available for Internet Census 2012 data http://t.co/cOxVpgq0Sk
@PaulOBrien no problem, got a backup, thanks. Did Google remove all your apps?
@PaulOBrien did you remove tweakdeck from play store? can't find it :(
3:32pm May 21st 2013 via web
RT @xdadevelopers: App Analytics, or the Death of the Independent App Developer http://t.co/ygydM83Anh
RT @AndroidDev: All the #Android session videos from #IO13 in one YouTube playlist: http://t.co/1JKjmUEIZK
RT @kapitanpetko: Script to split Android backup into backups for individual apps: http://t.co/JB35r8CChj
@0xroot congratz! :D
@roman_soft curl? :)
@josuegf si, solo enctipta /data, por debajo usa LUKS, no debería notarse en el rendimiento para nada. http://t.co/kj9LAA5CH9
@josuegf faulty hardware? tengo Nexus4, Nexus7 i GNex con full device encryption y no he notado impacto en el rendimiento en ninguno... :-/
RT @supercurio: @xdadevelopers Thread for Stupid SU: stupid exploit for a stupid anti root strategy by @SamsungMobile on the S4: http://t.co/ijWePG5mQq
New ADT 22 breaks eclipse projects using libraries, here's the workaround: https://t.co/d1Av7s2PVR
10:50am May 17th 2013 via web
@jduck new hangouts app breaks OTR chats. No idea what you said. :-/ http://t.co/NmLwznpWQr
RT @AndroidPolice: Hilarious Easter Egg in Hangouts. http://t.co/HR1eySCnsu
@rallat perfect for a reverse shell, expect malware using it too :)
@EternalTodo w00t! felicidades :)
@AndroidPolice "none of us have been able to get the Hangouts app to actually open on a tablet" #nexus7 from apk http://t.co/PHQifLx0bq
name change again! RT @madCdan #AndroVM moving to a commercial product #Genymotion http://t.co/1UhQ7oWGEW
HIGHSEC Phone, Giesecke & Devrient RT @m_spreitz new Android crypto-phones -- http://t.co/GjYx4tjIOt
@pwntester done :)
@bluejay00 woah, that's a good start.... enjoy your new adventure! :)
@trufae on android you can just dismiss that dialog
@JZdziarski you can avoid the 'z' in new tar versions and it detects and decompress gzip/bzip2 automatically
RT @AndroidPolice: [I/O 2013] New Google Wallet Instant Buy API Should Make Emptying Your Bank Account Much Easier, More Efficient http://t.co/fzJSQOSyFi
@shawnvalle afaik that's not possible using adb backup, you have to use something else like titanium backup or helium...
Google Hangouts in the play store (replaces google talk) - https://t.co/s4XiBgpLbW
7:21pm May 15th 2013 via web
Android Studio early access preview, ready for download - http://t.co/790GIWRut0
so, who's writing the first reverse shell using the new Google Cloud Messaging "upstream" feature?
5:30pm May 15th 2013 via web
will this gs4 nexus edition be exynos or qualcomm? and will it be AOSP supported?
5:07pm May 15th 2013 via web
RT @tapbot_paul: Standard android <clap clap> Unlocked device <clap clap> Unlocked boot loader <clap clap> Just $649 <cricket cricket> #
RT @cprofiler: BlueBox Android Challenge: http://t.co/xNszuyRlK4
i/o keynote, starting very soon... watch it live here: https://t.co/WqKxHi94kX
3:55pm May 15th 2013 via web
CodeAurora Forum Security Advisory Publication Guidelines - [PDF] https://t.co/ZNmPqcbCt3
12:07pm May 15th 2013 via web
TIL adb backup only backups data from the primary user account.
12:05pm May 15th 2013 via web
@thomas_cannon good luck!
8:19am May 15th 2013 via Falcon Pro in reply to thomas_cannon
RT @cortesi: Just released mitmproxy 0.9. A huge release, with improvements across the board and major new features. http://t.co/3ciVJeicmG
RT @raviborgaonkar: Handy website for encoding/decoding/analyzing #2G, #3G, and #LTE messages http://t.co/GOpKP2JAUh. Useful while building a fuzzer.
@adumont thanks, very interesting read
RT @adumont: @pof btw just found this page about "The Xposed Framework" http://t.co/KmaCBQGd7i
@adumont yes, same concepts but different implementation
RT @saurik: With Substrate, WinterBoard is also now available on Android, supporting icon packs and Theme Chooser on stock ROMs. https://t.co/RA0LrLWxfg
@PaulOBrien have a look at this extension example, you might like it for your modaco mods :-) http://t.co/TyGu0d7Ult
5:47pm May 14th 2013 via web in reply to pof
@PaulOBrien yes! similar concept, it uses /vendor/lib/liblog.so instead of modifying /system/bin/app_process
Substrate for Android: code modification platform behind Cydia which allows hooking Java-level APIs - http://t.co/Rh8FibWlmb
5:32pm May 14th 2013 via web
RT @viaforensics: The best mobile security distro just got better. Santoku 0.4 beta now available. Blog: https://t.co/BS6RtgfcbJ
RT @matthew_d_green: New blog: on cellular encryption protocols (and wiretapping all the world). http://t.co/iStUkKepZg
RT @hackerfantastic: Android malware grabbing script - uses emulator to browse "urls.txt" and send random web events via tab & click http://t.co/YR2UmMoJiB
@quine lol, yes mom!
RT @quine: Reposting (publicly) the lame way I resolved resource IDs to strings in Androguard (/cc @thuxnder @adesnos @pof): http://t.co/gdLoTX8AyD
RT @lennyzeltser: This is NOT the wireless access point you are looking for: http://t.co/Yr67SKMEm0 < A pen test experience by @Jason_Wood
AnaDroid: Malware Analysis of Android with User-supplied Predicates - [PDF] http://t.co/lSFQGDmJM2 tool: http://t.co/V2XGTmgj2k
8:56pm May 13th 2013 via web
hboot-tools, a set of utilities to reverse engineering HTC bootloaders, open sourced by @unrevoked - https://t.co/cfwQzAkJlG
productive Sunday: Santoku 0.4 iso ready & (almost) finished writing one more chapter of the Android Hacker's Handbook.
4:42pm May 12th 2013 via web
RT @kaepora: Snapchat encryption cracked. Uses AES-ECB, hard-wired keys, more awful design flaws: http://t.co/NPOKl6XIG9
@Marccoga @iolandatweets @interferencies che :) q aprofite!
Android Hardware Abstraction Layer Documentation - http://t.co/LczP7bDMDM
9:17am May 11th 2013 via web
RT @trufae: Agedu - tool to calculate wasted disk space - http://t.co/hKfTOFaGz1
RT @VXShare: .@pof All of the samples in the January 2013 torrent are in the May 2013 torrent. Don't bother with January - it's going to get deleted.
RT @kapitanpetko: @timstrazz Here it is, comes with weird manga and much info: http://t.co/1RKXFhE4RP
RT @sole_marc: Voice-controlled Home Automation with Android http://t.co/4YO2BwHLh3 #MIBers
VirusShare Android malware samples: - 6.24GB torrent (May 2013): http://t.co/oklyE1SRHV - 3.24GB torrent (Jan 2013): http://t.co/iuslNS3xq5
7:20am May 10th 2013 via web
RT @shawnvalle: Mobile Hacking BlackHat 2013 All-Stars: @planetbeing @pimskeks @cryptax @adi1391 @sunnyrockzzs @georgiaweidman https://t.co/DywVWtFwGf
@ibelmonte @quetzal @frommelmak yo no puedo :(
@PaulOBrien ah, i see... thanks for pointing out that, let's see if OP answers
RT @Jmz_Software: @pof not for me. I get lock pattern
RT @lilH3rmit: @RobertWBurton @pof Same here, lock pattern in viewing photos
RT @RobertWBurton: @pof I am getting challenged for the pattern when attempting to view the photo
Lockscreen bypass in HTC One (maybe Sense 5.0) - https://t.co/OUne72KjL8 Anyone can confirm?
1:59pm May 9th 2013 via web
@frommelmak yo me pillaria el air de 11 maxed out (i7,8GB) + un monitor externo para uso en casa.
@frommelmak miralo aqui http://t.co/S3LznbB5uQ? con i7 + 8GB sale por ~1630, el dell por ~1330 iva incl.
10:31am May 9th 2013 via web in reply to pof
@frommelmak la pantalla no, pero el i7 si que se lo puedes poner al air si lo compras online...
@frommelmak tiene muy buena pinta y sale más barato que el air con las mismas specs.
@frommelmak can you buy the developer edition in Spain?
@oriolrius felicitats viejuno :P q tinguis un bon dia :)
Dalvik Technical Information (bytecode format, .dex format, instruction formats) - http://t.co/RmacVfNqaY
7:34am May 9th 2013 via web
@jedisct1 haha, true :)
What could possibly go wrong? - http://t.co/4JqDb5gYv7 #lockpicking
7:19am May 9th 2013 via web
RT @collinrm: http://t.co/QqJuxpXSQX Some research to counter mTAN/OTP SMS Trojans on Android.
RT @mrbarnabyrobson: #unix nerds will appreciate this beverage. http://t.co/NhH4gdUWjx
RT @TeamAndIRC: Smali 2.0 beta is out https://t.co/jn5uC7S94y
RT @collinrm: http://t.co/V6AB0f5Knd Mobile Security News Update May 2013
paper from previous retweet: Evaluating Android Anti-malware against Transformation Attacks - [PDF] http://t.co/pwyuUD7yYn
4:06pm May 7th 2013 via web
RT @Angelill0: Anti-Virus Software for Android Fooled by Common Techniques, Researchers Say http://t.co/RPv27JaVU9
RT @WuShell: ${filename%.*} <- remove ext. from filename | ${filename##*.} <- get ext. from filename | useful #bash tricks -> http://t.co/r5N42kDhpV
RT @fail0verflow: New blog post: The future of console homebrew (and a shot of Espresso) http://t.co/NnVsoSB9UI
RT @_defcon_: RT @legitbs_ctf: DEF CON CTF Quals registration is live! http://t.co/uv3VE8nqRE
RT @godfreynolan: For those that asked me slides for @MobiDevDay Android Performance talk are up on http://t.co/F51EWwzsVs
@robert_aran ya has pillat algo chungo... tan de mac no pot ser bo :P
RT @FortiGuardLabs: Improving #Android Reversing DEXterity 101 with Crypto Girl https://t.co/wgrjWzCsgp #reverseengineering #dex
Android CTS tests for security bugs (master branch) - https://t.co/HvI85hqK76
3:14pm May 6th 2013 via web
@cryptax hehe, well redexer comes from maryland university...
Redexer: A Dalvik bytecode instrumentation framework - http://t.co/q77yBSmTKi
6:35am May 6th 2013 via web
RT @AndroidPolice: Samsung Aims To Block Root Exploits And Tighten Up Security With Latest Exynos Galaxy S4 Update, But This Is A... http://t.co/WT1Y6XpBYi
RT @adi1391: Walkthrough on #AndroidFrameworkforExploitation (AFE) - Finding and Exploiting Leaking Content Providers http://t.co/OcwrOYGYdd .
@adi1391 quick overview looks cool, i'll watch full later and give u feedback!
RT @oriolrius: Share your #android display with BBQScreen https://t.co/MDUtR8W5FX #app
11:31am May 4th 2013 via web
filegive: secure & easy sending of files, point-to-point without 3rd party servers - http://t.co/Q6pXFlJC9Z
10:51am May 4th 2013 via web
RT @_tomsteele: For all my credential harvesting homies https://t.co/RTbMa2ArZn
Blackberry 10 and Android with Samsung Knox, approved by the Pentagon to be used by the U.S. Department of Defense - http://t.co/li5TkAvgJc
10:07pm May 3rd 2013 via web
Explanaion by @koush on HTC's "S-Off vs Unlocked, and flashing firmware" - https://t.co/RdGq2jG7VQ
7:05pm May 3rd 2013 via web
RT @newsycombinator: Portal Released For Steam On Linux http://t.co/hApTdaAp55
RT @NicolasFalliere: Android/BadNews.A decompiled by JEB at http://t.co/uasadNChEy #jeb java decompiler
@Gunther_AR yes, should work without problems, use /data/data/app.namespace/ or /data/local/tmp/
RT @carlosacastillo: [PDF] AppsPlayground: Automatic Security Analysis of Smartphone Applications http://t.co/9ISCrsrPIV
@timstrazz yes, got a chinese rk3066 here (hdmi stick) which is nice to hack, but i won't put my Gmail credentials on it... just in case
@timstrazz u bought them hoping to find any badware in those Chinese firmwares?
RT @kapitanpetko: More about code signing and permissions http://t.co/AelfTOlr1w
RT @PaulOBrien: Playing Google Music tracks in the native HTC Music player using GMusicFS = awesome. http://t.co/0hwrSqkKaM
RT @AndroidPolice: Dan Rosenberg Has Unlocked AT&T Galaxy S4's Bootloader, But We Won't Get To See How For A While - Here Is Why http://t.co/NOYT5x4hbe
RT @djrbliss: I'll just leave this here...*whistles* http://t.co/u83828TnrD
RT @yappare: #Web Based #android #emulator https://t.co/dJXwXI4Adh
RT @saurik: "Exploiting a Bug in Google's Glass" http://t.co/2C59FJRMBO <- This is both a "how to" and a detailed explanation of @Bin4ryDigit's exploit.
RT @viaforensics: Hacking while hacking: Slides from our live demo of hacking mobile at #THOTCON 2013: https://t.co/tZPr5inPKr Presentation by vF CEO @ahoog42