Friday, April 13, 2018

it complicates...and it complicates. and. it. complicates. and it's complicated...so, you to fucking use some asshool card...you need to have this connection to his phone...then you need to install AirDroid...and then finally NFCproxy...

Setup networking

This will let you find your pi locally using it's name, e.g. ping davepi.local
sudo apt-get update
sudo apt-get install avahi-daemon
Set a static ip
sudo nano /etc/network/interfaces
Then do something clever in here. Aftwards, make sure your ports are forwarded in your router, so the pi can be seen from the outside world.

Compile adb

Because you can't download adb for the pi.
Your development server adb will need to be the same version as the pi adb.
sudo apt-get install git build-essential libncurses5-dev libssl-dev
mkdir aosp
cd aosp
git clone https://android.googlesource.com/platform/system/core.git system/core
git clone https://android.googlesource.com/platform/external/zlib.git external/zlib
You might need to checkout a speific brach, tag, or commit here. See this page for branches / tags https://android.googlesource.com/platform/system/core/
cd system/core/adb
wget -O Makefile https://gist.github.com/jsonfry/62d59c9cc0295cc8de4f/raw/405031a85521364f3b04cfac435768d6bbc39408/Makefile
make adb
sudo cp adb /usr/local/bin/

Set correct permissions on adb

sudo chown root:mylovelyusername /usr/local/bin/adb
sudo chmod 4550 /usr/local/bin/adb

SSH Login

mkdir ~/.ssh
nano ~/.ssh/authorized_keys
Run cat ~/.ssh/id_rsa.pub on your development machine / ci server / who ever will be connecting to the pi and copy output into the open file
# Kill and local adb
adb kill-server
# Forward adb port
ssh -f user@example.com -L 5037:localhost:5037 -N
# Make sure remote adb server is running, and wait for it to start
ssh user@example.com "adb start-server"
# List the devices, just for fun!
adb devices
# Uninstall your app
adb devices | tail -n +2 | awk '{print $1}' | xargs -I {} adb -s {} uninstall com.example.app
# Run the tests, but still exit with success so jenkins carries on
./gradlew connectedAndroidTest lintDebug | true
# Grab the exit code of the tests, so we can fail the build later if we need to
export MY_EXIT=${PIPESTATUS[0]}
# Close the ssh tunnel
ps aux | grep "ssh -f" | grep "5037:" | awk '{print $2}' | xargs kill
# Fail the build, if the tests failed
(exit $MY_EXIT)
# Taken from this lovely post http://forum.xda-developers.com/showpost.php?p=55619695&postcount=70
SRCS+= adb.c
SRCS+= adb_client.c
SRCS+= commandline.c
SRCS+= console.c
SRCS+= file_sync_client.c
SRCS+= fdevent.c
SRCS+= get_my_path_linux.c
SRCS+= services.c
SRCS+= sockets.c
SRCS+= transport.c
SRCS+= transport_local.c
SRCS+= transport_usb.c
SRCS+= usb_linux.c
SRCS+= usb_vendors.c
SRCS+= adb_auth_host.c
VPATH+= ../libcutils
SRCS+= socket_inaddr_any_server.c
SRCS+= socket_local_client.c
SRCS+= socket_local_server.c
SRCS+= socket_loopback_client.c
SRCS+= socket_loopback_server.c
SRCS+= socket_network_client.c
SRCS+= load_file.c
VPATH+= ../libzipfile
SRCS+= centraldir.c
SRCS+= zipfile.c
VPATH+= ../../../external/zlib/src
SRCS+= adler32.c
SRCS+= compress.c
SRCS+= crc32.c
SRCS+= deflate.c
SRCS+= infback.c
SRCS+= inffast.c
SRCS+= inflate.c
SRCS+= inftrees.c
SRCS+= trees.c
SRCS+= uncompr.c
SRCS+= zutil.c
CPPFLAGS+= -DADB_HOST=1
CPPFLAGS+= -DHAVE_FORKEXEC=1
CPPFLAGS+= -DHAVE_SYMLINKS
CPPFLAGS+= -DHAVE_TERMIO_H
CPPFLAGS+= -DHAVE_OFF64_T
CPPFLAGS+= -D_GNU_SOURCE
CPPFLAGS+= -D_XOPEN_SOURCE
CPPFLAGS+= -DWORKAROUND_BUG6558362
CPPFLAGS+= -I.
CPPFLAGS+= -I../include
CPPFLAGS+= -I../../../external/zlib
CFLAGS+= -O2 -g -Wall -Wno-unused-parameter
#LDFLAGS= -static
LIBS= -lrt -lpthread -lcrypto -lssl
TOOLCHAIN=
CC= $(TOOLCHAIN)gcc
LD= $(TOOLCHAIN)gcc
OBJS= $(SRCS:.c=.o)
all: adb
adb: $(OBJS)
$(LD) -o $@ $(LDFLAGS) $(OBJS) $(LIBS)
clean:
rm -rf $(OBJS)
Connect to adb over a network. Useful for running jenkins in 'the cloud', but testing on real devices locally.  
GIST.GITHUB.COM


do you know what's this? mercury fulminate ...mercury and nitric acid...you call this MEMS or what

...again..."Butadiene (also nitrile rubber) forms explosive mixtures with air and oxidizing agents. It may be self-igniting. Should a fire occur, evacuate all personnel from the danger area. Do not extinguish flames due to the possibility of explosive re-ignition"...textiles? ...radical muslums?
...again...
Deltrate 20 drug information: uses, indications, description, generic name. Compare prices for generic deltrate 20 substitutes: Danitrin, Dilcoran, Dipentrate
NDRUGS.COM

Good morning! welcome back to war! another weekend....do you know PENTAERYTHRITYL TETRANITRATE ? yes, you do
Dilcoran (pentaerythrityl tetranitrate) Buy medicines online. Licensed european doctors. Lowest prices. Fast and safe delivery.
EUROMEDS-DOCTOR.COM

Thursday, April 12, 2018

If I want very very serious diplomatic problems...I will be at the american school....i will not be at s. bento...because i want to strike where it hurts more, the cattle, little children...and specially family from the major piece of shit of the little pútugal republic.
ok. let's then radicalize it! what I have here, for start its the "impulse" App on my android. I have an alcatel phone, a RF transmitter, the relay, the electrical match, and the vibration alarm. I have the grenade pryro, a gas bottle, the gasoline gallon, for hidden the IED the emergency blanket, and finally, the sodium nitrophenalate. You might wonder, where's the ammonium fertilizer... at Leroy Merlin store...where's the paraffin wax, at Celeiro store
Ok, Father, this is a quick explanation, of the most scary discipline to over trow them... ok, the screen, has pixels, the pixels run on a matrix vertical and horizontal, the frames are dynamic buffering seconds after seconds, this is all encrypting an image, a site...the pixel is a rgb (colour) and its modulated in wavelets, meaning a radio generating several layers inside the pixel, also uses an encryption algorithm (or several types) as Huffman pyramid, ....so not to be decrypted ...Father, they protect the pixels on non overlapping blocks...this is electronics components ....and this hardware, finally, has a scintillator with radioactive source, probably thorium, detecting the intrusion. Do, you now understand why am I so God damm scared?
GostoMostrar mais reações
Comentar
Comentários
Elsa David do you Father Papa Francisco ?
Gerir
GostoMostrar mais reações
Responder18 min
Elsa David this is not all Papa Francisco ...their architecture of hardware divides the buffering in hundreds of multi channels (frequencies) and harder ...they make hundreds of partitions (dividing the RAM on hundreds of disks)
Gerir
GostoMostrar mais reações
Responder7 min
Elsa David if we could break this pixel data...then Papa Francisco a screen would open, with the very famous elliptic curve....least of the problems...
Gerir
GostoMostrar mais reações
Responder6 min
Elsa David and even least problem...Papa Francisco what the pretentious asshools, call the metadata storage problem...which is very simple using old drupal language
Gerir
GostoMostrar mais reações
Responder5 min
Elsa David so, will Jesus help me?
Gerir
GostoMostrar mais reações
Responder4 min
Elsa David being pragmatic Papa Francisco we can not break this, decipher, decrypt...we only can write a virus
Good morning! welcome back to war! I wish I scored here, guys...could it be that the NSA encrypts RGP pixels with DCT wavelet, and we could cross it with ...this
Kaspersky CoinVault Decryptor is a tool that can decrypt files that were taken hostage by the CoinVault ransomware.