Ollie
Droid Does
- Joined
- Apr 13, 2012
- Messages
- 3,424
- Reaction score
- 2,068
- Location
- South Coast
- Current Phone Model
- Note Edge - iPhone 6 Plus
I'm curious if this could be accomplished via email as well.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
From what I read, I believe it said that this is based on how android handles media in MMS messages.I'm curious if this could be accomplished via email as well.
From what I read, I believe it said that this is based on how android handles media in MMS messages.
According to Lookout...So does email handle media files differently? You would think they hook into the same framework as the MMS does.
Yeah. I was wrong. Oh well. I'm still not disabling anything on my phone.The memory over flow is a separate exploit released yesterday evening. It isn't StageFright.
Textra update I got this morning says it's fixed now on their appHow are we to know when the problem has been fixed?
Sent from my Verizon Galaxy Note4 using Tapatalk
Bold claim. Wondering what they did to fix it...Textra update I got this morning says it's fixed now on their app
Support Our Troops !!!
<><
Beast Mode 4
Bold claim. Wondering what they did to fix it...
The vulnerability is fixed, or they added an option to not auto-retrieve MMS?
Well, they're technically right. If you download a message that wasn't downloaded by auto-retrieve and it's got the necessary code/command/whatever for the exploit, you're SOL.I find it suspect that they released the very same feature that I requested a few days ago. It is suspect because they told me that simply turning off auto downloading wasn't enough to protect yourself from StageFright.
And I quote (from my response email):
"P.S In other apps, turning off auto-retrieve is NOT enough as once you tap 'download' the exploit becomes active. Additionally you would not get any MMS pics or group messages. Not a good solution."
Maybe they threw that in their because I mentioned I would have to switch back to Messenger in the mean time?
Well, they're technically right. If you download a message that wasn't downloaded by auto-retrieve and it's got the necessary code/command/whatever for the exploit, you're SOL.
I'm assuming that they've added some code to block whatever the trigger is so that you can still get MMS and group messages without having to worry. If that's truly the case, that's a better fix than turning off Auto-Retrieve.
I'm fine with that until Google does its part, pushes it to Samsung, who will find a way to add bloat to it and take forever to do so then push it to AT&T who will take forever to do it and find a way to make it use more battery on my phone and add more bloat at the same time before eventually pushing it out.It looks like they just added a feature that other text apps have. They can't fix the exploit...just hinder the path the exploit needs to take so their update is putting them on par with other apps. I just found it to be funny.