AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Android Debug Bridge Pc8/30/2023 ![]() It has multiple layers of protection But like any other systems, it's not immune to attacks. Please note that I'm not saying Android is secure.I want the people to know about how 'ADB' tool works so that they can better understand when hearing about issues related to ADB and make an informed decision rather than jumping to conclusions. Nowadays, where hacking seems to occur almost every day, I don't blame anyone when they hear the words, "android" & "hack" together, get scared or worried about their privacy. Just looking at the title & the fancy technical terms, a novice android user would get scared if not concerned a bit about his privacy. ![]() I completely agree where it's the vendor's fault to ship devices with 'ADB' enabled, the scenario where the device runs a rooted custom android escalates the issue to another level. It is also clear some people are insecurely rooting their devices, too.īut doesn't seem to highlight it as the major issue. Researching android devices under a specific region(which is famous for rooted devices/custom android images), the article seems to generalize the issue. Although what the article claims could be true, I felt it is a bit misleading. The intention is to highlight the overlooked point of the original article about the attacks through ADB. So I figured I would write a separate blog. I realized, I couldn't summarize my answer into comments.
0 Comments
Read More
Leave a Reply. |