The Accidental $70k Android Hack

  Рет қаралды 118,041

Seytonic

Seytonic

Күн бұрын

Пікірлер: 306
@Username-qx9gk
@Username-qx9gk Жыл бұрын
The way that was handled, almost sounds like he discovered a feature..
@nfg_fpv
@nfg_fpv Жыл бұрын
somehow that doesn't sound implausible 🤔
@ologhai8559
@ologhai8559 Жыл бұрын
putting on my tinfoil hat.... a govermemt glowie feature
@MM-24
@MM-24 Жыл бұрын
I'm sure it was actively being used by a 3 letter agency, likely in an active operation we'll hear about decades from now
@interstellarsurfer
@interstellarsurfer Жыл бұрын
@@MM-24 You won't hear about it.
@khazsilverstar
@khazsilverstar Жыл бұрын
Exactly my thoughts!
@medea27
@medea27 Жыл бұрын
Ridiculous that David had to go to that extreme to get Google to move on it... can't say I'm entirely surprised though. And the reflection in someone's glasses is a big security problem if you consider that many people log into secure internal systems during video-conferences. The info on their screen could be all sorts of data... from login details to customer private data to confidential business info. Even worse if someone hacks into their webcam when they _aren't_ on a video call & can observe whatever they are working on.
@MM-24
@MM-24 Жыл бұрын
Yes, everyone knew that, the way google acted. Likely, this "vulnerability" was being used in the spy community, and this revelation was probably going to mess up some crucial active operation
@dealloc
@dealloc Жыл бұрын
Use a password manager and signed certificates for internal systems.
@DrDipsh1t
@DrDipsh1t Жыл бұрын
I've personally used people's glasses reflection for my own benefit in the past playing Yu-Gi-Oh as a kid lol. I could see their hand and use that info to play accordingly. Fun times 😂
@TheSimoc
@TheSimoc Жыл бұрын
Only thing I find surprising in the case was that Google finally received the customer feedback and even bothered to fix the issue. Usually, Google hasn't given a shit about customer feedback nor particularly cared about issues in their products.
@JohnDoe-sp3dc
@JohnDoe-sp3dc Жыл бұрын
Update your body's firmware and get lasik surgery: bug patched 👍
@byteragex
@byteragex Жыл бұрын
I guess lock screen bypass was google's backdoor otherwise who would not take such critical yet easy vulnerability seriously 😁
@dev-debug
@dev-debug Жыл бұрын
Yeah was wondering the same thing. Would not be the first software caught with a backdoor.
@TheSimoc
@TheSimoc Жыл бұрын
Nah, Google has just never given a shit about their shitty products full of bugs, bloat, horrible UIs, and constant API changes for sake of change and keeping devs busy.
@Whatthellisthisthing
@Whatthellisthisthing Жыл бұрын
I remember this CS:GO streamer was using wall hacks and you could see it in the reflection of his sunglasses lol
@the-matrix-has-you
@the-matrix-has-you Жыл бұрын
It has nothing to do with it🤣🤣🤣 you saw someone using csgo hack thats all
@Gamer-ct6hb
@Gamer-ct6hb Жыл бұрын
@@the-matrix-has-you I mean it kinda does have to do with the video. This comment is pretty funny!
@garneet
@garneet Жыл бұрын
@@the-matrix-has-you i mean its literally also reflection in sunglasses, so its somewhat related
@anteshell
@anteshell Жыл бұрын
@@the-matrix-has-you It has everything to do with it. The topic was literally recognizing what's on the screen through the reflection on the specs, which is exactly what happened in the situation OP describes. I mean how dumb you have to be to not understand it? *facepalm
@the-matrix-has-you
@the-matrix-has-you Жыл бұрын
@@garneet ok let me summarize what happened in video guy has input his pin code 3 times locks himself out of system and only way to gain Access again is a PUK code he put the PUK Code in but Android is hanging and not showing the security password area right so he tried the same procedure again to repeat the process after that he knew that he has found a bug in Android system so the videos Topic is a bug in Android System on Google Pixel Phones. Not about some CSGo lamer who is using wallhack and getting busted cause he was just dumb enough to wearing glasses while recording himself... I dont see a similarity between if you can see one you might be high Stop using it bro🤣🤣🤣
@thethiny
@thethiny Жыл бұрын
It's worth mentioning that the sim attack does not "Decrypt" your phone, that's why the phone has to be on and not rebooted. Decryption happens on first entry after boot only. Afterwards it's just a password.
@QualityDoggo
@QualityDoggo Жыл бұрын
Thanks
@TheSimoc
@TheSimoc Жыл бұрын
I didn't get your point. In the video the phone *was* rebooted if I got it right?
@thethiny
@thethiny Жыл бұрын
@@TheSimoc he showed that when it rebooted it got stuck forever.
@TheSimoc
@TheSimoc Жыл бұрын
@@thethiny Yeah, had to rewatch the video.. actually there are severe gaps on the story.. Indeed the phone got "stuck forever" in first place when he needed to enter the PUK due to forgotten PIN. Then, there was never mentioned any of those very relevant things: - Why did that happen. It surely should have shown the lock screen. - How did he get the phone working then. Supposedly by rebooting, which leaves the aforementioned as a mystery occurence, and subsequent details untold.
@thethiny
@thethiny Жыл бұрын
@@TheSimoc 1- this was the bug. When you enter sin pin code it takes you home and forgets to check lock screen, since lock screen is no longer needed after first unlock. 2- He said (original guy, not video) that it was his phone so he knew the password.
@mineisstupid
@mineisstupid Жыл бұрын
tried it on my Pixel 4a 5G... even though it said that this bug was discovered on Pixel 6 & 5, apparently it does work for older phones as well
@fliporflop7119
@fliporflop7119 Жыл бұрын
bugs are backwards compatible
@oqocraft2661
@oqocraft2661 Жыл бұрын
just like modern phones can be destroyed with a tank, old phones can be destroyed too
@frankserafin9207
@frankserafin9207 Жыл бұрын
@@fliporflop7119 not all bugs are backwards compatible
@mateuszzimon8216
@mateuszzimon8216 Жыл бұрын
I tried this on my S10E Samsung and on October patch was still working, on November patch not. If u don't get patch u already screwed
@Sprinkles-r5y
@Sprinkles-r5y Жыл бұрын
I was reading about this yesterday, I hadn’t thought about PUK codes for over 10 or 15 years until then. I wonder what made him even think of trying it, I don’t even know my current PUK code tbh. Great explainer, especially happy you shared this as it exposes how much google dragged their feet with this.
@vgamesx1
@vgamesx1 Жыл бұрын
Yeah, it really shows how much any company actually cares whenever they talk about security or keeping users safe, then they proceed to give everyone an annoyed sigh saying they'll fix their problems.
@ezra1369
@ezra1369 Жыл бұрын
Might be intentional
@key_gen
@key_gen Жыл бұрын
They could just reply to every bug reporter that their find was duplicate, nothing really stops it. Glad he got rewarded though
@ekremaslan8068
@ekremaslan8068 Жыл бұрын
Many people announcing that would just decrease their credibility. So they can't abuse that. There is nothing stopping them from using it occassionally though.
@MM-24
@MM-24 Жыл бұрын
I'm sure this was actually made by design, they were gently trying to communicate that it's likely being used actively by some 3 letter agency to defend the world or save Ukraine
@chri-k
@chri-k Жыл бұрын
@@MM-24 or likely neither of those
@mrkiky
@mrkiky Жыл бұрын
You should tell them you have the bug and then arrange the payment legally at a notary if they're interested before you demonstrating it.
@ro0b0
@ro0b0 4 ай бұрын
Eventually people would just stop reporting bugs, it's much better for them to spend a tiny fraction of their yearly profits on paying out bug bounties. 70k is literally nothing to Google
@jaesen737
@jaesen737 Жыл бұрын
Woah im early
@swiftsilver
@swiftsilver Жыл бұрын
this has been a persistent issue in android since like 7 or 8. People have been using it to bypass factory reset protection (referring to sim card pins in android in general)
@roberteischen4170
@roberteischen4170 Жыл бұрын
"Let me know if your phone is vulnerable." Nice try glowie
@DesertCookie
@DesertCookie Жыл бұрын
0:55 Your phone doesn't ask for the SIM pin code? Every phone I've ever owned in Germany has this as a feature I cannot turn off. TIL I guess.
@chri-k
@chri-k Жыл бұрын
you can remove the SIM PIN code, then the phone won’t ask for ot
@DesertCookie
@DesertCookie Жыл бұрын
@@chri-k Why would you though, I wonder.
@nathnathn
@nathnathn Жыл бұрын
The reflections thing has been done if not with glasses before. I.e window reflections on security cam’s. Its not a generally reliable tactic beforehand but has popped up for finding identifying information before.
@forestcityfishing4749
@forestcityfishing4749 Жыл бұрын
Thats cute that you think police do any investigating.
@nathnathn
@nathnathn Жыл бұрын
@@forestcityfishing4749 you do know places other then the US exist?. Though we do have our own corruption issues here there nothing like in the US.
@anon_y_mousse
@anon_y_mousse Жыл бұрын
@@nathnathn It's cute that you think he was talking about the US. It's a universal fact amongst humans, they're lazy. I wouldn't call it corruption per se, but it's a select few that actually do their job and investigate crimes. The majority of good cops are beat cops who aren't even allowed to do the investigating and the actual detectives just halfass it. It's also cute that you think corruption is worse in the US than literally everywhere else.
@Bashiroo
@Bashiroo Жыл бұрын
Geez, that bug was present on my first Android phone that was running on 4.0.4, though. Restart, sim code, and you didn't need a password to access the phone. I wish I knew that I could get 70k for that.
@OfficialPooYT
@OfficialPooYT Жыл бұрын
This has been a back door for android for a few years now, there are videos going far back on how to bypass 🔒 with the same sim method
@SDogo
@SDogo Жыл бұрын
or the one with the speech assistant and the help links that open chrome XD
@OfficialPooYT
@OfficialPooYT Жыл бұрын
@@SDogo many have came and gone, rip exploits 😂
@mateuszzimon8216
@mateuszzimon8216 Жыл бұрын
@@SDogo yes but they need AFU mode to work. This work in BFU.
@jacksoncremean1664
@jacksoncremean1664 Жыл бұрын
A patch for this was already developed by the Graphene OS team on June 13 but google didn't accept the patch.
@DarklinkXXXX
@DarklinkXXXX Жыл бұрын
That's pretty cool. Do you know what codebase has the lock screen? Kinda wanna see it now.
@iPeaked
@iPeaked Жыл бұрын
I was able to recreate this on 2 different Samsung devices sooo....
@veritas-truth5851
@veritas-truth5851 Жыл бұрын
I think if companies did try to start checking glasses reflections to monitor what their users are doing it could potentially be seen as a form of discrimination based on someone's health and land companies in some legal troubles
@saviorvx1883
@saviorvx1883 11 ай бұрын
shix its not a thing yet , and ppl already label it a discrimination., companies don't gotta go this far to know wassup ,they'll just mandate software/keyloggers only staLKers would go this far and also measure the shadow of sunlight.etc..... we're fuxked as a species , when ppl are on crack all day to be this woke about everything
@GainingDespair
@GainingDespair Жыл бұрын
This doesn't seem like an bug, it bypasses encryption .....
@ekremaslan8068
@ekremaslan8068 Жыл бұрын
"It is not a bug, it is a feature."
@geroffmilan3328
@geroffmilan3328 Жыл бұрын
If Project Zero can do 90-day deadlines, so can we. Probably right call to accept their release date, but also the right move to inform a vendor that public interest means you will disclose if they do not respond.
@jul13n
@jul13n Жыл бұрын
My oneplus 7 pro with android 11 and security patch from June 2022 is not vulnerable to the lockscreen bypass.
@bamgm14
@bamgm14 Жыл бұрын
Interestingly, my phone Realme X7 with it's Android splinter also had this bug however, the moment you got into the main page however, it would immediately kick you off the page and send you back to lockscreen
@mateuszzimon8216
@mateuszzimon8216 Жыл бұрын
And this is proper, on Samsung S10e also show u main but lock you up after any interaction even plugin USB device.
@OcteractSG
@OcteractSG Жыл бұрын
I kind of like the idea of having to wear polarizing glasses just to view what’s in the screen. I suppose that would be a mitigation to the reflection problem, though it’s still uncommon.
@isaackingvideos
@isaackingvideos Жыл бұрын
Wow!!! "Google phone 7 has amazing security"
@20Rewind
@20Rewind Жыл бұрын
Hacker: Spends days of there time trying to find a vulnerability. Random researcher: oh nonono 🤣
@rp479
@rp479 Жыл бұрын
Get off TikTok bud
@20Rewind
@20Rewind Жыл бұрын
@@rp479 huh?
@MTS_IT
@MTS_IT Жыл бұрын
i have potatovision 480p camera from 2000-2010 era (more or less) - i'm safe :)
@isthatso1961
@isthatso1961 Жыл бұрын
What if Google intentionally left the backdoor for govt? That's why they didn't fix it in time.
@Ethorbit
@Ethorbit Жыл бұрын
I've always disliked Android's lock screen security, it honestly seems like older models can do it better while newer ones are setup in a way that favors the gov in case they need to break into your device
@arcticcircle9178
@arcticcircle9178 Жыл бұрын
Why do you say that?
@pingyong6940
@pingyong6940 Жыл бұрын
The $70k look almost like a bribe to shut up. The act doesn't seem to be doing the right thing. If it was, then what with the silence treatment, no actions to fix, and the so-called "duplication" report.
@___DRIP___
@___DRIP___ Жыл бұрын
I remember similar exploits like this on the Galaxy S7.
@user-28qhfk65
@user-28qhfk65 Жыл бұрын
Im using s7 edge right now, can you tell me how you did it?
@crispywings9066
@crispywings9066 Жыл бұрын
Thank you for the informative video
@DaHaiZhu
@DaHaiZhu Жыл бұрын
Astrophotographers use that same technique of overlaying hundreds of images to produce a single sharp image of a planet or nebula. Its not that far fetched (pun intended)
@anteshell
@anteshell Жыл бұрын
Actually, no. The process is significantly different both on what the source material is and how to get to the final result. The idea is the same, but the practical application is nothing alike.
@n00n1n
@n00n1n Жыл бұрын
$70,000? Holy shit, I mean it's Google, they basically print money.He had to be losing his mind once he got that email $70,000 babay
@xxxx-ey7rp
@xxxx-ey7rp Жыл бұрын
😂😂😂
@swaggamesph3342
@swaggamesph3342 Жыл бұрын
This bypass even if release without a patch, will still need a working puk code though, which only telecom providers have access to.
@seraphina985
@seraphina985 Жыл бұрын
It is also included on the plastic card you have to punch the sim out of when you get it, also bear in mind the sim card lock and the PUK is tied to the SIM. Thus you do not need access to their SIM's PUK code, you simply need to be in possession of both the phone and a SIM with a sim lock set that you have the PUK code for, simply swap that in and bingo. Granted this doesn't let you bypass any SIM lock on their card so no sending or receiving future calls or texts to their number. But it does give you access to all data stored on the phone including any and all stored credentials with that information a social engineering attack on the mobile network to request a sim swap is likely to succeed in getting you the former too. Those credentials are likely to include sites that contain all of the customers personal information which could be used to trick customer service into believing you are them. You would likely be able to provide full name, address, phone numbers, email addresses, and likely answer detailed specific questions about their billing history with the phone company if they have their app installed etc, also last 4 digits of payment cards and bank accounts is likely to be available too. Suffice to say that is exactly the sort of information you need to get around phone based identity verification pretty much.
@midimusicforever
@midimusicforever Жыл бұрын
Big L for Google that they didn't handle it better.
@amir3515
@amir3515 Жыл бұрын
No one is perfect
@IShowVelocity.
@IShowVelocity. Жыл бұрын
Theory: google actually put this as a backdoor access feature
@ecodev15
@ecodev15 Жыл бұрын
this doesnt seem to be an "encryption bypass" the device has to be in AFU to be unlocked (aka, after it has been decrypted in ram) as seen, when the device is in BFU (right after booting) it is not vulnrable to this, and just glitches out since it doesnt know how to decrypt the phone.
@mateuszzimon8216
@mateuszzimon8216 Жыл бұрын
U don't need AFU, if u hear this after battery was depleted.
@MMOStars
@MMOStars Жыл бұрын
My phone has like 10 Chinese malwares running on it, so this has to be the least of my worries at this point 😅
@bokexd3173
@bokexd3173 Жыл бұрын
I just tried it on Redmi Note 7 Global on Lineage OS 18.1, doesn't work, just gets stuck on the lock screen
@trueriver1950
@trueriver1950 Жыл бұрын
"Government and bad actors..." Surely you meant "Government and OTHER bad actors"
@BTRSJ
@BTRSJ Жыл бұрын
I have tried in most Xiaomi device with A12 Thankfully its not working
@GingerWritings
@GingerWritings Жыл бұрын
This is why I like Samsung secure folder. I can at least put another pin in the way of stuff. Not much, but I appreciate the feature.
@macktheripper7454
@macktheripper7454 Жыл бұрын
Same
@cedricvillani8502
@cedricvillani8502 Жыл бұрын
These bugs are worth a lot more than 100K and grabbing finger prints from vids has been done for years, the ten-printers use prisms and Unix to grab a finger print that was as of 1999. SenseTime in Taiwan knows a bit about grabbing pictures and info from sources you may not think to check 🎉
@lowwastehighmelanin
@lowwastehighmelanin Жыл бұрын
the irony of me getting a Google Pixel ad on this 😂
@heikosoeder
@heikosoeder Жыл бұрын
The US backdoor are closed xD
@ologhai8559
@ologhai8559 Жыл бұрын
when one backdoor close, another opens
@chri-k
@chri-k Жыл бұрын
a bacwindow has been created as a replacement
@ologhai8559
@ologhai8559 Жыл бұрын
and if not that, then at least back chimney 🤣
@lilyydotdev
@lilyydotdev Жыл бұрын
i remember doing that to a samsung device about 8 years ago, at that time i was too naive to realise it was a security vuln, very funny seeing this pop back up
@lorenzcyber
@lorenzcyber Жыл бұрын
Nice video been loving them for a long time now!
@LaurentiusTriarius
@LaurentiusTriarius Жыл бұрын
There's probably a dozen Nigerian shop specializing in this exploit. (Glad your friend David got his bounty tho 👍)
@Hichilisthxforspyingonme
@Hichilisthxforspyingonme Жыл бұрын
The first fucking time I’ve got an advertising it wasn’t for Google pixel but of course it was for fucking Google fiber
@corel965
@corel965 Жыл бұрын
Wow you are late toooo much cmon...it is patched already🤦🤦🤦
@wombatdk
@wombatdk Жыл бұрын
There is no device that is secure, unless it is disconnected, powered off and hidden in a vault miles underground.
@mrkiky
@mrkiky Жыл бұрын
What if someone digs a tunnel underground and then drills through the vault?
@Jaob994
@Jaob994 Жыл бұрын
After trying on my Nokia X20. Well.... I tried it 5 times and I only got it to work once I guess. I think it works a little bit different on all phones and I messed up once and did it by accident.
@nulcow
@nulcow Жыл бұрын
Yet another reason to not use Android
@akingevo3930
@akingevo3930 Жыл бұрын
another reason not to use phones
@trixer230
@trixer230 Жыл бұрын
The bug was left unpatched because law enforcement was actively using it.
@NithinJune
@NithinJune Жыл бұрын
8:10 This could apply today to livestreamers and content creators
@napent
@napent Жыл бұрын
There is also another unpached bug that's allows to suppress lockscreen. I also reported it and get similar answer.
@m4rt_
@m4rt_ Жыл бұрын
... you could also just take of your glasses if you are near sighted (can't see things that are far away)
@FAB1150
@FAB1150 Жыл бұрын
TIL american SIM cards aren't protected by a PIN by default
@MacGuffin1
@MacGuffin1 Жыл бұрын
Dude using PUK code to bypass phone pin, been around since 2001
@espero_dev
@espero_dev Жыл бұрын
i know a bug for all devices to bypass the pin and password get full access to everything
@Gh0st_0723
@Gh0st_0723 Жыл бұрын
Instructions unclear, phone boots into IOS now. Need itunes account.
@kingrutse3278
@kingrutse3278 Жыл бұрын
This is pretty bad lol so the SIM cards have authority over everything lol
@Hootie811
@Hootie811 Жыл бұрын
I always giggle at the way you say depreciated , it sounds like it's head is getting chopped off! Is that how it's normally pronounced? We say it very different in Australia
@uhZeny
@uhZeny Жыл бұрын
I use a dslr daily as my webcam, but I don’t wear glasses 😊
@dislikebutton1718
@dislikebutton1718 Жыл бұрын
Lolll google said they already received that bug report. Lolllll you believe that? They say that so they don’t have to pay
@TealTunic
@TealTunic Жыл бұрын
8:58 *AMONG US?!* (this is just a stupid joke. chill)
@TJ_519
@TJ_519 Жыл бұрын
using a pin locked sim to bypass lock screen and frp has been around for a little while now
@atpray
@atpray Жыл бұрын
Might have to start using non reflective glasses or contact lens
@akingevo3930
@akingevo3930 Жыл бұрын
use white and black camera and very cheap one for best privacy or just don't use camera
@NeverTilt96
@NeverTilt96 Жыл бұрын
a small price for what could have cost google way more in stock prices decreasing if he went and made the bug public :)
@rakeshchowdhury202
@rakeshchowdhury202 Жыл бұрын
I read this on twitter, and well he should be thankful to that google employee for giving her hairpin 😂
@snarevox
@snarevox Жыл бұрын
who still has that thing with the puk on it from their sim card? i doubt i do... idek.
@Aura_Mancer
@Aura_Mancer Жыл бұрын
wait wait, why did you skip over a Google employee putting a bandaid on him??? That's hilarious xD
@sebas0469
@sebas0469 Жыл бұрын
Samsung phones aren't affected as for other OEMs not sure
@adityachk2002
@adityachk2002 Жыл бұрын
Love the channel
@ChrisDeAnna
@ChrisDeAnna Жыл бұрын
David=Randal from Recess✍️
@creepychris420
@creepychris420 Жыл бұрын
Backdoor 100%. Also why he was ignored
@xpower7125
@xpower7125 Жыл бұрын
The bug doesnt work on my tealme
@mythakreep
@mythakreep Жыл бұрын
i got locked out of my phone today pls tell me a working way for the pin code
@koghs
@koghs Жыл бұрын
Good thing my laptop's webcam is complete shit
@infotruther
@infotruther Жыл бұрын
I think the way to get around peeking is to where contact lenses?
@rajeshnayak8492
@rajeshnayak8492 Жыл бұрын
What about pattern lock, there is no way to put puk code in there.
@foxtailedcritter
@foxtailedcritter Жыл бұрын
To be fair though iPhone still has a way to bypass the lockscreen, bad IME and the find My iPhone. Least now they're both on the same field. Kinda iPhone vulnerability spans across several generations to this day.
@shoalstone7831
@shoalstone7831 Жыл бұрын
new market for low-res webcams
@ElonTusk.
@ElonTusk. Жыл бұрын
xioami phones dont ask for sim pass, youll need to manually need put put a password on sim i think. never happened to me
@xxxx-ey7rp
@xxxx-ey7rp Жыл бұрын
Yes it’s a extra option you have to put on
@pa3ckp7
@pa3ckp7 Жыл бұрын
Wait you guys don't have to enter pin after every restart?
@fliporflop7119
@fliporflop7119 Жыл бұрын
Wait a min, so google payed someone 100k for submitting a bug that they could not replicate and payed 70k for the same bug that was explained better? How did they know the bug was real if they cannot replicate to verify? Anyone can make shit up.
@chri-k
@chri-k Жыл бұрын
i think there was a misunderstanding - first guy was likely not paid at all
@BossBoss-hj8gw
@BossBoss-hj8gw Жыл бұрын
Is the raid forums 2.0 a scam or is it legit?
@cameronmoore136
@cameronmoore136 Жыл бұрын
Severe vulnerability found? Reluctance to fix it? Kinda sounds like it was a well-kept secret feature, rather than a bug...
@JohnSmith-lc1ml
@JohnSmith-lc1ml Жыл бұрын
70k is way to low of a reward
@okgoodgame
@okgoodgame Жыл бұрын
cant trust any tech thise days
@btuard
@btuard Жыл бұрын
Google are terrible at patching their phones, I got my grandma a 6a because her old phone wasn't working anymore, only for the phone to stop making and receiving calls and they haven't fixed it since.
@thisisalexsin
@thisisalexsin Жыл бұрын
If you guys think this is crazy, wait until you find about AT commands and android phones. I can remove google accounts, send ghost touch commands, remove lock screens, remove KNOX, etc with a few commands sent over the serial port in a few seconds. And yes this has been known about for awhile, people have been removing google accounts from phones with this sim password method for years
@Life-Sky
@Life-Sky Жыл бұрын
Didn't understand anything but you are probably missing out on 70k lol
@thisisalexsin
@thisisalexsin Жыл бұрын
@@Life-Sky that heavily depends on what I needed to use it for
@willstikken5619
@willstikken5619 Жыл бұрын
This pixel guy used Googles tactics on bug disclosures against them.
@mintydevil7982
@mintydevil7982 2 ай бұрын
8:59 NO WAY BRO SAID THAT
@cid3384
@cid3384 Жыл бұрын
5:49 - isn't that FTX's Sam (SBF)?
@FriedTendi
@FriedTendi Жыл бұрын
If Google patches it like that does that mean that it will go out to all other Android systems too how far back does this bug go can you do it with old cell phones
@JohnAlbertM
@JohnAlbertM Жыл бұрын
"Give it a go on your own device and let me know down below if your phone is vulnerable." Nice try Black hat
@MsMiDC
@MsMiDC Жыл бұрын
The glasses reflection does have an easy fix though. Just dont put them on if you are that paranoid. Put in some lenses.
@timothy-9995
@timothy-9995 Жыл бұрын
I got a google pixel ad on this video.
Hiding Malware in Space Pictures
9:12
Seytonic
Рет қаралды 116 М.
I Was Scammed With 800 MicroSD cards
10:56
Seytonic
Рет қаралды 208 М.
The Joker wanted to stand at the front, but unexpectedly was beaten up by Officer Rabbit
00:12
Как подписать? 😂 #shorts
00:10
Денис Кукояка
Рет қаралды 8 МЛН
My Daughter's Dumplings Are Filled With Coins #funny #cute #comedy
00:18
Funny daughter's daily life
Рет қаралды 5 МЛН
Стойкость Фёдора поразила всех!
00:58
МИНУС БАЛЛ
Рет қаралды 4,9 МЛН
Dad Takes out Town's Internet by Mistake
9:20
Seytonic
Рет қаралды 157 М.
The Problem With Elon Musk
42:46
Johnny Harris
Рет қаралды 4,2 МЛН
What is the Smallest Possible .EXE?
17:04
Inkbox
Рет қаралды 400 М.
Poop Delivery Website Hacked
8:52
Seytonic
Рет қаралды 207 М.
Stealing Files From Your Power Supply?!
9:12
Seytonic
Рет қаралды 139 М.
Is This the Beginning of the End for Volkswagen?
11:03
TLDR Business
Рет қаралды 256 М.
The Hacking Empire Built on Discord
9:57
Seytonic
Рет қаралды 215 М.
Stop Hackers With This!
10:15
Seytonic
Рет қаралды 103 М.
Somebody emailed me a trojan virus
14:06
Bog
Рет қаралды 813 М.
Severe Google Home Vulnerabilities
11:10
Seytonic
Рет қаралды 124 М.
The Joker wanted to stand at the front, but unexpectedly was beaten up by Officer Rabbit
00:12