Hi all,
Interesting problem.
An open-source project gets their app removed from google play, so they post a message on mastodon that -for the time being- you can download the app via direct download.
I post a reply saying that directing people to a direct link is not a good idea, as hackers could start doing the same to spread malwhere, better use an official repo (like f-droid, where they are already on).
A typical problem of somebody who writes a genuine post, but without realising it himself writes something that is very close to what a phishing message would look like.
However, this got me thinking.
What you want to avoid is that people get used to the idea that it is OK to download and install apps from a random URL.
But if you point people to f-droid, they need to also download the apk for that, and configure the security on your phone that apk's downloaded via may be installed.
I guess, the later should surely be avoided as most people will then leave that option enabled. (I had to search deep into the security setting to find the option to switch it off again).
What are your opinions on this? What would be the best way to do this and not teach people bad security habbits?
Direct download or f-droid?
Other ideas?
Is there a good sollution for this?
Kr.
I used inspectrum mainly with raw IQ-files from gqrx, so the c16 format is indeed correct.
For me, the great thing about the tool is that it is very visual. (*)
It allows you to get an idea what kind of signal you are looking at (on-off, FSK, PSK, ...) and get a rought idea about timing. That then gives you information to better apply the proper filtering in urh and work from there on. It also allows you to see any "abnormallities" .. e.g. I once came across a signal that sounded to be two-tone FSK, but after closer investigation, you could see that the two tones overlapped (in the time domain).
Concerning the bitstream you demodulated, I am not at all an expert in SIGINT, but I guess we can do some basic research like search forrepeating pattern (that could indicated a start-of-frame indicator), maximum number of consecutive all-0 or all-1 (that can indicate bit-stuffing) etc. The problem with unknown digital signals is that the number of variations of different processing-techniques is almost infinite: scrambling (not encryption, but scrambling) , FEC, ...
(*) The visual element of inspectrum is the reason why I use it in a workshop I give. The workshop I do is similar to the one done by Mike Walters that is on youtube: https://www.youtube.com/watch?v=tGff31uGXQU