Esther codes

Esther

Purple hacker, psychorigid developer and asocial cypherpunk.

  1. Reverse engineering: Google Location protobuf specifications

    While driving with Waze as travel companion, Waze periodically sends various information to the Google Location Service using compressed protofub messages with the MASF protocol. Packet overview With MITMProxy, it is easy to capture traffic generated by the application. As an example, here is the screenshot of a captured message…

  2. Privacy audit: PayByPhone

    Here is a light privacy audit of the PayByPhone application. PayByPhone is wholly-owned by Volkswagen Financial Services, part of the largest auto manufacturer in the world, with brands that include VW, Audi, Porsche, Bentley, Lamborghini and Ducati. APK details: Version name 2.7.0.7180 Version code 270718019 Sha256sum 6b55cde4e97ca3e15dc49fb7b901803bfecf2804c793df656d66488d9a6222f4…

  3. Start 2018 with a good resolution

    End of 2017 was quite intense for the Exodus Privacy team. Our community is growing and we are proud to work with our partners: Yale Privacy Lab and F-Droid! Thank you all for your support! In order to take a good start for 2018, we release the first alpha version…

  4. Les mouchards dans nos mobiles alimentent la surveillance de masse

    Depuis les révélations de Edward Snowden en 2013, nous savons que Google, Microsoft et Yahoo!, principalement, ont été la cible de la NSA dans le cadre du programme PRISM : PRISM, également appelé US-984XN1, est un programme américain de surveillance électronique par la collecte de renseignements à partir d'Internet et d'autres…

  5. HotSpoot: a privacy pot.

    The HotSpoot is a device meant to be on stage during privacy related conference for educational purpose. It offers a Wifi access point. At the beginning of the conference, just ask the attendees to connect to your HotSpoot. During the conference, people will naturally use their smartphones to browse the…