Showing posts with label source code. Show all posts
Showing posts with label source code. Show all posts

Thursday, February 16, 2012

Meet Auraslate, an Open Source Android Tablet for Developers. Mischief Encouraged. Hackers Welcomed.



Auraslate is a tablet designed for developers for only $199 and is made with Gorilla Corning Glass, and comes with the hardware source code included.

If you’re sick of firmware lockdowns and failed reflashings on your other Android tablets, the Auraslate may be for you. It’s basically an Ice Cream Sandwich-compatible tablet built from the ground up for hax0rz and programmers alike.

There are two models – the 7-inch 726B and the 10-inch 1026 – and the 1026 can run the latest version of Android. You can upload any version you want, however, and even the hardware is open source in that you receive a hardware source disk for about $20 extra.



For about $130, you get a standard Android CORTEX A9 tablet from a Chinese OEM that you could get for about $95 if you really dug around. However, Auraslate is promising open source software updates for their hardware and you also get a support community and the source code. This sort of package is ideal if you’re working on an Android hardware project, for example, as you will be able to talk with a community of hackers dealing with the same hardware and software rather than picking up a fly-by-night tablet from China and hoping it works.



The tablet was designed by Aura Design, an Android Tablet Design Start-Up that helps other companies or start-ups develop their own unique tablet for consumer , commercial, or industrial uses. They encourage mischievous and curious individuals to see what comes naturally for them to dig in and see what possibilities this tablet may become.

Saturday, February 11, 2012

Hackers release Symantec source code after extortion attempt fails


Hackers that claim to have stolen the source code of Symantec's pcAnywhere software have attempted to extort $50,000 from the anti-virus firm, in exchange for keeping the code offline.

However, after negotiations broke down, the group uploaded the source code to The Pirate Bay. It has also released a log of the email exchange with Symantec -- but the virus-hunting firm has said that the emails were a sting operation, with law enforcement officials posing as a Symantec employee.

The email exchange is from January 2012 and kicks off with a hacker called YamaTough -- spokesperson of Indian hacker group Lords of Dharmaraja, which is affiliated with Anonymous' Op AntiSec. He's talking to a Symantec "employee" named Sam Thomas -- actually a law official, says Symantec.

At first, Thomas wants assurances that the hackers actually have their code. Thomas suggests uploading it using FTP. Yama thinks this is a trick -- "If you are trying to trace with the FTP trick it's just worthless," he says. "If we detect any malevolent tracing action we cancel the deal."

Yama threatens the anti-virus firm. "We have many people who are willing to get your code. Don't fuck with us."

The hacker asks Symantec to name a price. "How much do you consider enough to pay us in order to work all the issues out?" Stalling, Symantec asks how the money transfer will be made. Yama suggests payment processor Liberty Reserve, though "wire transfer to a bank account in Lithuania or Latvia is also an option."

"What assurances can you provide that once we pay, you will actually destroy the code and not ask for more money?," Thomas asks. "None of course," Yama bites back. "If we were really bad guys we would have already released or sold your code."

Symantec tries to make a smaller payment of $1,000 through PayPal to keep the hacker happy. Yama says no: "we can wait till we agree on final amount." So Thomas comes back with his final offer: "We will pay you $50,000.00 USD total." That's about £32,000.

The security software outfit suggests paying $2,500 a month for the first three months. If Symantec is convinced that the hackers have destroyed the code, and make a public statement to say that the hack was all a lie, the firm will pay over the rest.

Not good enough, says Yama. "I am afraid we have to cancel the whole deal because our offshore people wont let us securely get the money because they wont process amounts less than 50k a shot."

Yama has noticed that Mr. Symantec has stopped using his "@symantec.com" email address, and has adopted a Google Mail address. "Say hi to FBI agents," Yama says, perhaps twigging that this is a sting operation. "We are not in contact with the FBI," Thomas assures the hacker.

With negotiations breaking down, Yama says "we give you 10 minutes to decide which way you go or the two of your codes fly to the moon -- pcAnywhere and Norton Antivirus."

"We can't make a decision in ten minutes," says Thomas. "We need more time." The hacker group then proceeded to release a 1.27GB file as a torrent.

Symantec has said the version of the source code in the hacker's possession was from 2006, and no longer posed a threat to its customers even if the source code was released. After the hack was made public in January, the firm instructed its pcAnywhere users to disable the product but it later declared it safe to use after offering free upgrades.

As for the hacker, YamaTough said he never intended to take the money. "We tricked them into offering us a bribe so we could humiliate them," the plucky young hacker told Reuters.

Source