I report this info to show to what extend the technology can be hacked and information can be extort from us.
The method was explained during the 2011 Night of the hack. This is a technical paper which can be found here: http://virtualabs.fr/ndh2k11/hacking-android.pdf
The method was explained during the 2011 Night of the hack. This is a technical paper which can be found here: http://virtualabs.fr/ndh2k11/hacking-android.pdf