How Criminal Hackers Can Access Your Phone When On A Public WiFi Hotspot

Avoid using free public WiFi spots because nine times out of ten there’s criminal hackers lurking and looking for ways to exploit the apps on your phone if it’s an Android device and can’t say for sure if this works on IPhone’s.

You Won’t Look At Your Smartphone The Same Way Ever Again.


Here’s an example of what services exist for anyone to spy on you or practically anyone and just as a disclaimer I am not promoting these services as they exist to make people more aware of potential security risks related to using cellphones or other wireless devices.




The Spy Phone

not intended for the criminally minded


JuiceSSH With BackBox Linux


Using JuiceSSH abroad isn’t as easy as looks so I am going to opt on using VPN. Because I am convinced that my adversaries use VPN’s while being connected to there hacking rigs or raspberry pi hacking networks all over town.


Ripe For Abuse

not intended for the criminally minded

See the common misconception is that the only people who use these things is the government and corporations only. Because it would be absurd if private citizens needed to use this service for whatever it maybe and they do use it. There is no conspiracy here folks unless that private citizen is the bad guy like a terrorist for example who needs to take high resolution satellite images to get the lay of the land before he attacks. Then there’s a conspiracy but he wouldn’t need the government to consult him on how to carry out those attacks otherwise he wouldn’t be able to do it in the first place. Yes government’s have there own fleet of imagery satellites but there for them and them only. However I do suspect that career criminal hackers can gain access to them through a trusted position at say a telecommunications corporation that has a contract with the government to maintain there communications infrastructure or with an aerospace company. That kind of stuff in my personal estimation exists where guys with criminal records as thick as Chinese phone books can play the system so well that they can act roles with ease and nobody hardly notices or questions it.


Everything Is In Beta

beta mode

My thing with technology whether it be software and hardware if it is guaranteed to be secure against the prying eyes of government or criminals. Then you should always consider that every piece of technology software or hardware is in beta even if it is off the self brand new with a money back guarantee. It just like with me and encryption I don’t think that it’s entirely full proof for starters. Phil Zimmerman sold the American public and the entire world an idea which is called pretty good privacy.

People who sell these ideas to the public know that they can play with the concept that if I give the idea for free rather than put a price on it from the start. Means that I can pull a captive audience into my inner circles then start building up a decent fortune with an outer circle to compliment my inner circles along with my idea of privacy I am pretty much invincible from a skeptical public. Who might see me selling the idea of privacy as some sort of scam. Quickly lets invited the privacy cult on the left into the mix to sell the idea better to an unsuspecting public who have very little knowledge hardware/software slave processes. See the thing about the privacy cult on the left and what they won’t tell you about encryption is the more of it you use the more you make yourself a target and potential suspect or person of interest each time. Now this depends on what part of the world you live in and how much surveillance is deployed on the unsuspecting public whether that be from the government or threat actors deploying there own surveillance to compete with the government on the information gathering process.

I look at from this perspective, because a person like myself who is one hundred percent skeptical all hours of the day will see things based on the observations of people who are of the same mindset as I.

Just remember if anyone sells you idea rather than a product that will be useful and not a hassle in your day to day life. Then always consider that privacy salesman are a lot like snake oil salesman with the same slick pitch that a used car salesman uses to sell you a vehicle that breaks down six months after you drive it off the lot.

Keep in mind that most of the technology that public puts there hands on or lay there eyes on it is forked somewhere between alpha and beta. Software is always in alpha because it needs bugs fixes, code audits, patches, revisions and updates to stay current with the hardware that is in beta. Meaning that there will always be a better model of smartphone, tablet, computer or game console that will advertise as some flashy, trendy and cool product that gets released to the general public. Now as for the delta, gamma and theta levels of technology the public never gets to put there hands or lay there eyes on it because I suspect that the elite have access to this stuff and them only. Which means the technology that public uses is just the test bed for the products used later on by the elite to which the all bugs are worked out of them before they put there hands on or lay there eyes on it after the alpha or beta public test is completed.

IP Cameras: The Good, The Bad, The Ugly and The Uglier

not intended for the criminally minded

For a year I experimented having IP cameras in my house so that if I was away from the house I could watch to see what was happening without having to guess what could be occurring while I was work. However I should have done more research to see if it was viable option before plugging them into the wall and connecting them to the internet. It wasn’t until afterwards that I realized the camera’s which I purchased off of eBay from a Chinese vendor. At the time I had knowledge about third party commercially available spyware to which anyone could purchase with just about any form of payment. Then put it on a phone they want to target and monitor third party having similar capabilities to law enforcement but without the same authorizations. So being aware of that possibility I continued on hoping that I could avoid it seeing as I had purchased a new smartphone at the time. Which was new out of the box and the IP cameras worked with a particular app called iMegaCam which looked pretty sketchy and the reviews on the google play didn’t score well with other people who had purchased the same cameras with the app that worked with them.


Six Months Later……..

After realizing that my smartphone was hacked by me giving out my phone number to a random individual that said he might know someone who has a car for sale. Which indicated to me afterwards that the person who took my number had placed third party commercially available spyware on my phone. Because the few times I left the house and came back from work the cameras had changed there position because they were three hundred and sixty degree capable. When I hadn’t accessed the iMegaCam app those few time it dawned on me that my hacked smartphone to which I gave the number out to an attacker not someone selling a car they didn’t have. Then I realized that IP cameras have serious flaws built into the hardware and the associated software that interacts with the software on the phone itself.


Camera’s Gone and App Uninstalled

After doing some reading from some reputable source to which I will quote and leave the links below to the quoted articles.

HACKED — That is what is shown on all camera displays instead of live feed video for some Hikvision security camera owners. If it happened to you, then say hello to the backdoor in your security camera.

It’s not just happening to Hikvision-branded IP cameras either, as the backdoor is in “many white-labeled camera products sold under a variety of brand names.”

Apparently, enough time has passed for attackers to get into the game. On Sept. 12, security researcher “Monte Crypto” posted the access control bypass in Hikvision IP cameras on the Full Disclosure mailing list.

Security Cameras Show “Hacked” Instead Of Live Video Feed

By analyzing the security of a camera, I found a pre-auth RCE as root against 1250 camera models. Shodan lists 185 000 vulnerable cameras. The “Cloud” protocol establishes clear-text UDP tunnels (in order to bypass NAT and firewalls) between an attacker and cameras by using only the serial number of the targeted camera. Then, the attacker can automatically bruteforce the credentials of cameras.

Multiple Vulnerabilities Found In Wireless IP Cameras


Don’t waste your money with these cameras and put your private property at risk of being vandalized, stolen or broken into by third party non governmental threat actors.