bypass

Latest

  • In this photo illustration, a hand of a person holds a...

    Brave's browser can automatically bypass Google's AMP pages

    by 
    Steve Dent
    Steve Dent
    04.20.2022

    Brave is putting Google's Accelerate Mobile Pages (AMP) on blast with a new feature called De-AMP.

  • Apple fixes lock screen issue in latest iOS 9 update

    by 
    Steve Dent
    Steve Dent
    10.01.2015

    Remember that iOS 9 security issue that allows someone to bypass the iPhone lock screen using Siri and access your contacts and photos? And how some folks thought that it wasn't real? Well, Apple sure did, as the latest iOS 9.0.2 update includes a fix for the problem. Apple said that because of the security hole, "a person with physical access to an iOS device may be able to access photos and contacts from the lock screen." It addressed the issue by "restricting options on a locked device," meaning users will no longer be able to exploit Siri to access those areas.

  • EVE Evolved: Three exploitable game features

    by 
    Brendan Drain
    Brendan Drain
    12.15.2013

    If there's one thing EVE Online players are good at, it's finding ways to get an advantage over each other. The hyper-competitive PvP sandbox breeds players with an investigative streak who will constantly figure out ways to bend and abuse new features to make ISK or get an edge over other players in combat. The most obvious cases include abusing bugs, as happened in 2009's starbase exploit that corporations used to generate valuable tech 2 materials out of thin air and 2010's MonkeySphere exploit that let players hide themselves from the local chat channel and sneak up on unsuspecting victims. Most cases of abusing features for profit or advantage aren't as clear-cut as these obvious exploits, as some have negative consequences but still use completely legitimate game mechanics. When players figured out how to abuse Faction Warfare's kill LP rewards to farm five trillion ISK, for example, they did so using in-game mechanics that just hadn't really been thought through. Many more subtle cases of broken game mechanics that undermine EVE's core design ethos still exist, some of which have been recently introduced and others that have managed to remain unchallenged for years because there isn't really a good alternative. In this week's EVE Evolved, I look at three features in EVE Online that I think fundamentally break the design ethos of the game but don't have very clear solutions.

  • Mobile Miscellany: week of March 25th, 2013

    by 
    Zachary Lutz
    Zachary Lutz
    03.30.2013

    If you didn't get enough mobile news during the week, not to worry, because we've opened the firehose for the truly hardcore. This week, an unknown T-Mobile handset with Snapdragon 800 internals lit up the benchmarks, Sony was foiled at the lock screen and Rogers made 44 new promises without saying much at all. These stories and more await after the break. So buy the ticket and take the ride as we explore all that's happening in the mobile world for this week of March 25th, 2013.

  • Samsung's Android phones affected by another lockscreen bypass, fix is in the works

    by 
    Richard Lawler
    Richard Lawler
    03.20.2013

    Since lockscreen bypass methods are apparently what's hot in the streets, it's no surprise that yet another one has surfaced, this time targeting Samsung's Android phones. A variant of another, earlier uncovered method, this one does not fully unlock the phone by itself, but does provide access to apps and settings for a brief period. Given that, as demonstrated in the video by Terence Eden, it's possible to use Google Play to download an app to disable the locked screen and fully access the phone. According to Terence, this problem is confirmed on the Galaxy Note II, possibly the Galaxy S III and potentially on other TouchWiz UI Samsung Android phones. Disabling screen animations under developer options should reduce the vulnerability, but doesn't eliminate it without switching to another ROM. He also mentions Samsung is aware of the issue and is working on a fix, but that leaves phones accessible right now. We've certainly seen enough of these recently (Apple's latest version of iOS has also been victimized again in the last day) to know leaving our phones out, locked or unlocked, is foolish. At the same time, if a manufacturer insists on adding customized software to the existing platform, it could at least have the courtesy to do so without causing security leaks -- check after the break for a "bonus" vid sent in by another tipster that shows a way to activate voice commands on a locked Galaxy S II.

  • Microsoft corroborates Windows Vista OEM hacks

    by 
    Darren Murph
    Darren Murph
    04.12.2007

    At least Redmond can't say that no one told them so, as the folks at Microsoft are finally holding up a hesitantly-raised white flag and admitting that Windows Vista is indeed far from crack-proof. After depressing the mental "Allow" button, Microsoft Senior Product Manager Alex Kochis has come to grips with the Vista hacks that are currently floating around (and apparently functioning). Interestingly, he insinuates that the company will be looking at ways to "disrupt the business model of organized counterfeiters and protect users from becoming unknowing victims," but also mentioned that it wouldn't be rushing out in a likely futile attempt to nab every "mad scientist" (saywha?) on a mission to hack Windows. Hmm, wonder if that has anything to do with the barren efforts it exhausted trying to one-up FairUse4WM?

  • Vista activation crack #2 auto-renews the 30 day grace period

    by 
    Conrad Quilty-Harper
    Conrad Quilty-Harper
    03.10.2007

    Strike three two for Vista's product activation system: the latest Vista activation workaround is called "Timerstop t2a" which works by automatically renewing the 30 day grace period before the user has to "activate" their presumably legit copy of Windows. Besides the obviously malicious undertone to these kind of utilities, we're certain that there are a whole lot of legitimate Vista owners out there that would prefer to go through this admittedly complex process rather than attempt the normal activation procedure. Just like with DRM, anti-piracy PSAs before movies, and heck, even excessive surveillance, innocent people tend not to like it when they're treated as suspects. The lesson for Microsoft is that when people want to pirate software, they will: even in the face of increasingly complex activation systems. A pity then that Redmond's fired up photocopiers technically can't copy a function that -- purposely -- doesn't exist in Mac OS X.