Monday, April 6, 2020

What should you do when you get a ‘Coronavirus’ fine


MANY people are unfortunate enough to obtain a fine while driving their motor vehicle, where the majority of those drivers are unaware that the fine for the alleged offence may have been handed out unlawfully.

To make things worse for the motorist, it’s not a matter about the money, i.e. a civil case, but rather a criminal matter, i.e. you’re a ‘criminal’.

In these ‘virus times’ the authorities have gone rouge on the residents of this colony and now have started to issue fines for ‘non essential travel’ whatever that means.  

So without further ado, what should you do when the cops reckon you’re allegedly committing some ‘non essential travel’?


First things first when you get pulled up by your state's ‘friendly’ police person you are only required at law to provide your name and address, where there is no legal requirement to provide your date of birth, irrespective of what the nice police person tries to yell tell you.

What you should do, or rather are required to do is shut your mouth with regards to any further questions, as it is your right not to self incriminate.

Therefore to put it quite bluntly you are not required at law to provide an answer as to why you were driving your motor powered whatever on the roads.

When you get issued a notice with an allegation of a criminal offence, then you have the right, or rather it should be your duty to deal with it, where your first step to your benefit would be to contested the 'infringement notice' in court.

In the mean time it would be also to your benefit that you seek legal advice.

Hint:
Every single state of this colony is its own very specific legal basket case with regards to the validity of law.

 P.S. Templates are NOT the go here, where the only one we recommend is something called the affidavit.

Saturday, April 4, 2020

Fear mongering cashless agenda accelerated; boycott Bakers Delight, Coles, Woolies


Briefly,

Corporations have seized the opportunity to use fear with regards to the Coronavirus in order to profiteer from their customers by limiting their choices to cashless purchases only.

As usual there is no action there by the government of the colony we call Australia, as it is itself a corporation aggregate.

What a 'conflict of interest', there hey?

Asking the Australian people to do something with regards to their ‘liberties’, privacy and (perceived) ‘freedoms’ is like talking to a rock and expecting a response.

Conversely when [now] footy and beer runs out, the herd WILL riot.

No wonder the Australian politicians laugh at the ‘commoners’, literally having their way with them.

The RAM and the WHO (sounds like a couple of good names for rock groups, but in any event the acronyms are Royal Australian Mint and World Health Organization, respectively) have stated that:

“Medical experts have confirmed that cash, including coins is safe to use – there is no evidence that either coins or cash spread COVID-19.”


- No reprimands/fines for the CEOs of Baker's Delight by the 'government'?
- No 'fake news'/information taken down by media 'authorities'?

Seems that the 'brotherhood' are looking after each other.



Wednesday, April 1, 2020

Spyware Apps: TrueCaller (by True Software Scandinavia AB)

Indian Army says TrueCaller is a spyware, should be deleted from phones immediately

Indian Army has issued an advisory for its personnel asking them to delete TrueCaller from their phones immediately.




Indian Army has issued an advisory for its personnel asking them to delete TrueCaller from their phones immediately. The advisory issued on November 24 notes that TrueCaller is a "spyware" or a "malicious ware" and that it should be immediately deleted from the personal and official phones. The advisor also lists some 40 other apps, mostly from China-based companies, that should not be installed on smartphones by Indian Army personnel and if they are installed, they should be deleted immediately.

The advisory largely focuses on apps made by China-based companies. But TrueCaller stands out in the list, not only because it is not from a Chinese company but also because it is arguably the most popular app in the list of apps that Indian Army deems dangerous.

While the list is obviously meant for people part of national security apparatus, if Indian government is deeming an app dangerous for its officials it is also probably dangerous for regular users.

In a statement to India Today Tech, TrueCaller said that it was studying the Indian Army advisory and denied that it was a malware. "In response to certain reports, we would like to clarify that we are a Sweden based company. We are not sure why the app is on this list, but we're investigating. Truecaller is not a malware, and all our features are permission based and are disabled by default," a TrueCaller spokesperson said.

Also Read: Be warned if you use Chinese apps such as Weibo, WeChat, others: Home Ministry

Of late, there is a growing concern over the use of apps made by China-based companies in India, and the data that these apps access on smartphones. Recently, Indian government had asked over 30 big phone makers in the country to explain how they were collecting data from their phones sold in the country and how they were using this data. Of particular concern to the Indian government are apps and devices that collect user data and then send some of its data, mostly for valid reasons, to servers based in China.

TrueCaller, incidentally, doesn't send data to China-based servers and it is not an app made by a Chinese company. However, it does have certain privacy issues given how it works. Whenever a user installs the app, its functionality -- mostly checking for the identity of the callers and fighting spam -- is enabled only when a user allows the app access to its contacts. These contacts are then copied and uploaded on to TrueCaller servers.

The way TrueCaller scoops contacts is probably the reason why TrueCaller is in the list of apps that Indian Army considers too dangerous. Earlier, talking of TrueCaller, here is what we wrote:

The problem is with the default behaviour of Truecaller. It has built in some privacy checks -- you can delist your number, if you find it in the Truecaller database -- but these steps are after thoughts. By design, by default, Truecaller is a pervasive app. Its business model is all about collecting numbers. And it does so zealously. When you install the app, it takes a look at your whole contact book and siphon off that data -- numbers and names included -- to its servers.

Source: indiatoday.in

Tuesday, March 31, 2020

Fear mongering media self-isolation cleaning misinformation?


This evening, in Australia, a television campaign started with regards to people being in ‘self-isolation’.

The ‘idiot-box’ (as it is affectionately known) informed the viewers that those who are self isolated must wash their hands and clean surfaces regularly.

What, are you serious? 

Have you been harbouring some spare coronavirus ‘germs’ on these surfaces?

VERY difficult to do, especially when you have not been in contact with the outside world!

The is the kind of garbage the media propagates, creating fear in the ‘herd’ class section of the community.

It seems that it’s an advertisement for the sanitising corporations in order to reap HUGE profits.

Good one!

Monday, March 30, 2020

Your pension was a grant


When it comes to the actions of the people in charge of this colony we call Australia, you can bet your grandmother’s pension that there is a whole lot of corruption involved.

The ‘trouble’ didn’t start in 1865, but rather that's when the imperial government had enough of the feral colonialists in government and reminded them to ‘behave’ with the Colonial Laws Validity Act of 1865.

Mind you, that Act didn’t stop them from misbehaving, as they still didn’t take notice, but rather kept it a bit more on the quiet side, still not following imperial law as mandated.


Fast forward a bit to the mid 1980’s where the colonialists in government didn’t have a clue about the authority or rather legality of an Act they were try to pass through that they initiated two different versions, one from the motherland and one local in order to screw over the tax slaves.

The motherland at the time was rolling on the floor laughing (without the acronym), at what sort of legal basket case Australia is, but once again that's a digression.

Similarly, a lot of dodgy deals have been done with regards to the ‘worker’s’ pensions.

Once upon a time, your pension was handed out by a department called the Department of Social Security, where it was stated that your pension was a grant.

Now whether or not this was legitimately in play is not the purpose of this post.

In more modern times, your pension came from a place called Centrelink, under  a government called the ‘Australian Government’ or ‘Government of Australia’, but now it comes under ‘Services Australia’, no longer a 'grant'?



Confused? 

Well you should be, because that’s the way it was designed.

You may or may not find answers in the ‘Constitution Act’, and no silly it’s not a red or even the ‘unlawful’ green book, that many imbeciles peddle on social media.

Like pre-1865, today we STILL have feral colonialists in government, where it seems that they are untouchable.

Okay, okay, Section 44 gave the boot to a few, meh!

Google can still use Bluetooth to track your Android phone when Bluetooth is turned off


When it comes to tracking the precise location of an Android user’s phone, Google appears to use every means available—including Bluetooth-based location information transmitted to the company when the user might think they have Bluetooth turned off entirely.

A Quartz investigation found that a user can turn Bluetooth off on their smartphone running Google’s Android software, and the phone will continue to use Bluetooth to collect location-related data and transmit that data to Google. It does this by sending Google, among other things, the unique identifier codes of Bluetooth broadcasting devices it encounters. Such devices, known as beacons, are often used in stores, museums, and other public places to help phones ascertain their locations within buildings. Alphabet-owned Google does the tracking in part so advertisers can target “more useful” digital ads to users, but Quartz discovered that the company taps into an array of signals that can yield an individual’s whereabouts even when the user thinks they’ve disabled such tracking.

How it works

Google’s Bluetooth tracking is a confluence of three features: Location History, which activates Google’s location-tracking; Bluetooth; and Bluetooth scanning, an option buried deep in the Android settings menu. When Location History is activated, Android phones try to send a plethora of nuanced information back to Google (we reported on that here), including nearby Bluetooth devices.

When either Bluetooth or Bluetooth scanning is enabled, a report containing a list of nearby Bluetooth beacons is sent to Google any time an app refreshes Android location services. The only way to prevent Google’s Location History from sending this data back to Google, Quartz found, is to turn off both Bluetooth and Bluetooth scanning—eliminating access to Bluetooth devices—or to turn off Location History, crippling certain features of Android and Google apps. In a world of wireless headphones and hyper-customization, that’s an increasingly difficult proposition—especially when the tools to manage personal privacy are this blunt.

A spokesperson for Google confirmed that turning off Location History would stop a phone’s reporting of nearby Bluetooth beacons.

A third option on Android called “Device only” location allows a user to utilize only GPS to determine location, rather than “High accuracy,” which uses GPS, wifi, Bluetooth, and cellular signals. But even when a phone is in Device-only mode, beacon information is sent to Google when Bluetooth is off (though not when scanning is also disabled). If Location is turned off entirely, and then re-enabled, the phone resets to the High accuracy mode, making the setting hard to rely on.

Quartz was able to capture Bluetooth data transmissions on three phones from different manufacturers, running various recent versions of Android. To accomplish this, we created a portable internet-connected wifi network that could eavesdrop and forward all of the transmissions the devices connected to it broadcast and received.1 None of the devices had SIM cards inserted. We walked around urban areas; shopping centers; and into stores, restaurants, and bars. The rig recorded every relevant network request2 made by the Google Pixel 2, Samsung Galaxy S8 and Moto Z Droid, we were carrying.




Understanding Bluetooth beacons

In a world of wireless headphones and hyper-customization, that’s an increasingly difficult proposition.

While the sharing of locations derived from GPS and similar signals may be acceptable to some users of Google Location—its accuracy limited by buildings, trees, and other obstructions—Bluetooth low-energy beacons are used to pinpoint a device to a more specific locale. Museums use them to give guided audio tours, restaurants use them to deliver food to the proper table, airports use them to guide passengers around terminals, and retailers use them to track and advertise to customers in their stores. A beacon does not collect information on nearby devices—like a television station, its signal is a one-way broadcast—but when an Android phone sends Google a unique Bluetooth identifier, the company can not only track you around town, but also into a mall, through a store, and up to a specific rack of clothes.

In its investigation, Quartz browsed a Macy’s in Palo Alto, California, that appeared to contain dozens of Bluetooth beacons, seemingly contained in transparent white domes mounted on the ceilings above racks, escalators, and display cases. In a Bloomingdales in the same shopping center (both stores are owned by Macy’s Inc), only one beacon was detected, above the store’s entry.


No signals were detected in a Nike Store in the same shopping center, but many signals were received while perusing nearby traditional menswear retailer, Jos. A. Bank. The 15,000-square-foot Apple Store (1,400 square-m) one block away was also full of signals from about a dozen different beacons.

Bluetooth-beacon information can be collected in such a way that it’s hard to avoid being geographically tracked. Even if a beacon’s location has not been proactively registered into a public database by whomever installed it, all it takes for Google—or any other company—to determine a beacon’s geographic location is a single nearby phone with loose privacy settings. The location of a device with tighter privacy settings can then be determined using the information collected by the first.



Understanding Bluetooth scanning

While turning off Bluetooth is easy enough, “Bluetooth scanning” is buried in a secondary settings menu. Descriptions of its function are unclear, and the option to turn it off doesn’t work as any reasonable person would expect.


Of the three phones tested by Quartz, only one somewhat accurately describes the scanning functionality on the screen where it can be manipulated. The Samsung Galaxy S8 running Android 7.0 notes that Bluetooth scanning will cause the phone to connect to nearby devices “even while Bluetooth is turned off.”

The Pixel 2 running Android 8.1—the latest version of the operating system—and Moto Z Droid running Android 7.1.1, by contrast, only specify that Bluetooth scanning will allow the system to “detect Bluetooth devices at any time,” leaving it unclear if that means any time Bluetooth is enabled, any time the phone is on, or any and all times the phone exists in the world. The messages displayed on all three devices are also the equivalent of digital fine print, utilizing smaller font sizes and lighter colors that make them easy to ignore or dismiss as ancillary.







For an Android user who doesn’t want her phone to connect to her car while someone else is driving it (Bluetooth), but still wants more precise location services (Bluetooth scanning), the counterintuitive “off means off sometimes” setting may be preferred. Conversely, the user who wants his phone to connect to his car but doesn’t want his phone to use Bluetooth to locate him will need to adjust additional settings.

The messages are the equivalent of digital fine print, utilizing smaller font sizes and lighter colors that make them easy to ignore or dismiss as ancillary.

Other Bluetooth settings messages are conditional and buried many menus deep, where most users may not see the warning. There are no fewer than six ways to toggle Bluetooth on newer Android phones, and only one of them—the hardest to get to—displays a message about how Bluetooth scanning is still active when Bluetooth is turned off.

That menu is accessed by continually drilling down to deeper and deeper menus until there are no deeper Bluetooth menus to go to. Toggling from the quick settings, the default Google voice assistant,3 and higher-up settings menus provides no explanation that some Bluetooth functionality remains active when the option is disabled.


Where to find Bluetooth scanning on your phone

Making it harder for a Android user to adjust these settings, the labeling and location in the settings varies from device to device.

On the S8 scanning is located under

Settings >
  Connections >
    Location >
      Improve accuracy

On the Moto Z Droid it’s

Settings >
  Location > 
    [three-dot menu in the top-right corner] >
      Scanning

On the Pixel 2 it’s

Settings >
  Security & location >
    Location >
      Scanning



Individually searching for terms like “scanning” and “Bluetooth” from the main settings screen only provided a shortcut to the Bluetooth scanning setting on the Pixel 2 and Moto Z Droid. The only search we could find that revealed Bluetooth scanning on the S8 was “improve accuracy.”


Asking Google Assistant to “turn off Bluetooth scanning” by voice led the Pixel 2 to turn off Bluetooth and leave Bluetooth scanning enabled.4 On other phones the same request returned a web page with instructions. Location History cannot be turned on or off through the voice assistant.


For a person casually setting up a new Android phone—that is to say, someone who agrees to every default prompt during setup—Bluetooth scanning will be enabled on some.





1:
We used software called SSLSplit on a laptop which accessed the internet through an additional mobile phone connected with a USB cable. The laptop was set up to share that phone's internet connection over the computer's wifi. Any device that connected to the password-protected wifi network was subject to what is known as a man-in-the-middle attack.

2:
We captured requests on ports 80, 443, 465, 993, 587, 5222, 5228, and 8443 while allowing requests on other ports to be transmitted without diversion.

3:
Samsung’s Bixby assistant does not suffer from the same issue because it brings a phone user to the Bluetooth-settings page rather than manipulating the setting without leaving the voice assistant interface.

4:
Conversely, Samsung's Bixby assistant is able to turn off Bluetooth scanning from a voice command.


Source: qz.com