Active Topics

 


Reply
Thread Tools
Guest | Posts: n/a | Thanked: 0 times | Joined on
#1
::::.:...::....:.:.:::..:..::::::::::..::::.:..:

Last edited by ryan.campini; 2011-05-29 at 01:28.
 
Posts: 692 | Thanked: 264 times | Joined on Dec 2009
#2
Haven't seen any, but I've only looked at the code of a few apps. If you want to be safer, avoid closed-source apps - the only way to examine a closed-source app is via black box testing.
__________________
"Impossible is not in the Maemo vocabulary" - Caballero
 

The Following 2 Users Say Thank You to GameboyRMH For This Useful Post:
dchky's Avatar
Posts: 549 | Thanked: 299 times | Joined on Jun 2010 @ Australian in the Philippines
#3
Let me just prefix this by saying I don't do any of what I've written below, I'm quite apathetic really.

I guess ultimately there are really just two big issues that most of us would care to worry about.

1. Code that intentionally damages your data.
2. Applications that make use of networking features to benefit from your data. (Spyware mainly)

How to mitigate these problems:

1. Anti-virus / anti-spyware and so on. Scan your N900 filesystem over sshfs, NFS, CIFS, or whatever protocol you have handy that gives your scanner full access.

Additionally look around for rootkit detection or preventative measures. Maybe also contemplate running clamav.

2. Install iptables, tcpdump, wireshark, nmap, and various other networking odds and ends, then monitor for a while. If you see anything you don't like, kill it.

Linux. It comes with an almost infinitely steep learning curve : )
 

The Following User Says Thank You to dchky For This Useful Post:
Reply


 
Forum Jump


All times are GMT. The time now is 19:11.