Mayur's Posterous

Unboxing the Galaxy Nexus

To get a better/bigger view, click on the first picture and navigate left or right using the arrow keys on your keyboard.

I won't be doing a full review of this phone because I don't have the time and instead of doing a half-a$$ed writeup, just google "Galaxy Nexus review" and you should get about 167 million hits.

A few notable reviews:

AnandTech - Review for the nerds (added 19 Jan 2012)

The Verge. (Or you could skip the text and just watch the excellent video review here)

Engadget

Slashgear

CNET.co.uk

Google's latest and greatest is here and it comes pre-loaded with Android 4.0 a.k.a. Ice Cream Sandwich. The first few words that came to my mind after I started using the phone were "Holy Mother of God that is fast". Android's latest UI has been overhauled to make it extremely user friendly (or n00b friendly, if you must) and it's blazing fast. I love the sexy, subtle, snappy animations that respond everytime I touch that beautiful 720p screen. I can't possibly list all the awesome new features that are available on this phone ... Roboto font, face unlock, barometer, head tracking, 3rd party controller setup ... the reviews cover everything in detail. Engadget calls it the best Android phone and "possibly even the best phone available today, period". 

I also received this welcome message from Team Android after I activated my device :) 

 

Media_httpiimgurcompf_diaad

 

To be honest, I don't really need a new phone. My current phone is a Nexus One that's rooted and running CyanogenMod 7.1 with a kernel that was cherry picked to work best for my day-to-day needs. I've been using Android since Eclair (2.1) came out and ICS is a big jump for all of us who currently use Gingerbread. My Nexus One has aged gracefully and can still give any current generation iPhone/Blackberry/Windows phone a run for their money but the hardware is the only thing that's holding it back. I still don't know how I feel about not having a micro-sd card on the Galaxy Nexus, time will tell. I feel sorry for my friends in the States, they're going through hell not knowing the actual release date for this phone. Hang in there guys, even Hitler is pissed!

I've also put up a few comparison pictures at the end of the image gallery. You'll see the Galaxy Nexus, Samsung Galaxy S II, iPhone 4 and my Nexus One in that particular order. 

If anyone's got a question or wants a feature comparison, feel free to drop me a question via email, Facebook or Google+. You can also leave a comment below :)

Posted

Fraudulent Google credential found in the wild

Security researchers have discovered a counterfeit web certificate for Google.com circulating on the internet that gives attackers the encryption keys needed to impersonate Gmail and virtually every other digitally signed Google property.

The forged certificate was issued on July 10 to digitally sign Google pages protected by SSL, or secure sockets layer. It was issued by DigiNotar, a certificate authority located in the Netherlands. The forged certificate is valid for *.google.com, giving its unknown holders the means to mount transparent attacks on a wide range of Google users who access pages on networks controlled by the counterfeiters.

It's at least the second time in five months that unauthorized parties have gotten hold of valid SSL certificates used to cryptographically prove that a sensitive website is authentic rather than a forgery. In March, hackers broke into the servers of a web-authentication authority and minted valid certificates for Google Mail and six other domains. It took eight days for the counterfeit credentials to be fully blocked from all major browsers, and much longer to be blacklisted from email programs.

The episode exposed serious vulnerabilities in the net's foundation of trust, because in the intervening time it was possible for attackers to create convincing forgeries of trusted services that were almost impossible for people on attacker-controlled networks to detect. The hack was carried out on a reseller of certificate authority Comodo, and came from servers that used an Iranian IP address. Monday's attack appeared to be more of the same.

“This isn't a huge surprise,” Moxie Marlinspike, a researcher and frequent critic of the SSL system said on Monday about the discovery of the latest Google certificate forgery. “This is the kind of thing we should expect is happening all the time. The only thing noteworthy is that anyone noticed.”

Google and Mozilla have responded to the forgery by preparing updates to Chrome, Firefox and other software programs that take the highly unusual step of blocking all certificates issued by DigiNotar while the forgery is being investigated.

According to a post published on Sunday by a user calling himself alibo, the counterfeit certificate surfaced when he tried to log into his Gmail account using the Google Chrome browser.

“I think my ISP or my government did this attack (because I live in Iran and you may hear something about the story of Comodo hacker!)” he wrote.

Alibo's claims that Iranian ISPs including ParsOnline were using the certificate to validate Gmail couldn't be independently confirmed. But the document he published has been verified by researchers as a valid certificate issued on July 10 by DigiNotar that digitally signs all URLs that end in Google.com.

“This CA should receive an internet death sentence as their carelessness may have resulted in deaths in Iran,” an unknown researcher who verified the certificate wrote. “This cert was issued in JULY of 2011 and it is now just a few days before SEPTEMBER. It is being used in the wild against real people in Iran *right* now.”

Indeed, statements issued by Google and Mozilla shortly after this article was first published indicate a growing mistrust of DigiNotar, which in January was acquired by VASCO Data Security, a maker of two-factor tokens and other authentication products.

“While we investigate, we plan to block any sites whose certificates were signed by DigiNotar,” a statement issued by Google announced.

Google credited a security feature recently added to its Chromium browser engine with protecting alibo and bringing the bogus credential to public attention.

Mozilla, meanwhile, said it planned to issue updates for Firefox, Thunderbird and SeaMonkey shortly “that will revoke trust in the DigiNotar root and protect users from this attack.” It invited users who don't want to wait to manually purge the DigiNotar root from their browsers following these instructions.

Representatives from DigiNotar didn't respond to repeated requests for comment.

Marlinspike has recently proposed a new system he calls Convergence for authenticating websites. It allows end users to query parties they trust when validating the SSL certificates provided by websites they encounter. The system, which is enabled through an add-on for Firefox, is designed to eliminate reliance on certificate authorities, which aren't legally or financially accountable to end users and have suffered a variety of security breaches over the years.

Someone relying on Convergence wouldn't have been tricked by the rogue certificate discovered Monday.

“Whoever got this cert seems to have had it since July 10th, almost 40 days!” Melih Abdulhayoglu, CEO of Comodo wrote in an email. “Maybe they already had a good use out of it would be one guess I have. I find it difficult to believe that this is for notoriety, as if it was, then they would publish it immediately after obtaining it.”

Abdulhayoglu said the certificate was revoked on Monday, but that status may not do much to stop any attacks in progress. As Marlinspike demonstrated in 2009, it's trivial for attackers to suppress the error messages returned by revoked certificates, allowing rogue certificates to live on for weeks or months after they are discovered. The only foolproof way to revoke a certificate is to update each browser, email client, and other piece of software accepting SSL certificates to blacklist the counterfeit credential.

That means the certificate could be a threat until patches are issued by all software makers that work with SSL certificates. It's unclear how long that will take.

If it's true that this credential is being used to snoop on Gmail users, there's no telling how long it will take to stop the attack. ®

This post was updated to include comment from Google and Mozilla.

Posted

New MIUI Lockscreen

Posted

Patrick Bolvin Releasing a “Kick-Ass Stop-Motion Animation” Video in October Featuring Optimus “Prime”

Posted

Official Google Blog: Games in Google+: fun that fits your schedule

Posted

Android App Turns Smartphones Into Mobile Hacking Machines - Andy Greenberg - The Firewall - Forbes

Dangerous hacks come in small packages.

Or they will, perhaps, when an app called Anti, or Android Network Toolkit, hits the Android market next week. The program, which Israeli security firm Zimperium revealed at the Defcon hacker conference in Las Vegas Friday and plans to make available to Android users in coming days, is designed for penetration testing–in theory, searching out and demonstrating vulnerabilities in computer systems so that they can be patched. Anti aims to bring all the hacking tools available to penetration testers on PCs to smartphones, with an automated interface intended to make sniffing local networks and owning remote servers as simple as pushing a few buttons.

 

Media_httpblogsimages_atlwh

“We wanted to create a penetration testing tool for the masses, says Itzhak “Zuk” Avraham, founder of Tel-Aviv-based Zimperium. “It’s about being able to do what advanced hackers do with a really good implementation. In your pocket.”

 

Posted

Microsoft's internal Gmail parody video.

All Gmail has to do is point at Hotmail and have a laugh. Seriously.
Posted

TouchPal Keyboard - the future of input

Posted

Google Search with Instant Pages

Posted

Barnes & Noble NOOK Color hacked to run MeeGo Linux

Posted