07-18-18 08:26 AM
4,574 ... 9495969798 ...
tools
  1. blockbuy's Avatar
    Any noticeable changes?

    - radio and wifi performance
    - phone app lag and vibration issue
    - poor camera focus
    - heavy keyboard
    - Android app lag
    - active frames lag
    - assistant opening too slow
    - Battery saving mode optimisation



    Posted via CB10
    Battery life is immense and performance is lightening ;-)

    Here's the settings for camera - don't recall what's on previous version.
    You know what, didn't realise the focus was a bug, always thought bad light, settings or dirty lens - however just quickly setup a shot and it looks crystal :-)

    The rest seem all Okey for now.

    Latest Spotted OS Memorial Thread for BlackBerry 10-img_20150309_165536.png

    Posted via CB10
    03-09-15 11:59 AM
  2. Paul94's Avatar
    Battery life is immense and performance is lightening ;-)

    Here's the settings for camera - don't recall what's on previous version.
    You know what, didn't realise the focus was a bug, always thought bad light, settings or dirty lens - however just quickly setup a shot and it looks crystal :-)

    The rest seem all Okey for now.

    Click image for larger version. 

Name:	IMG_20150309_165536.png 
Views:	5773 
Size:	64.5 KB 
ID:	339993

    Posted via CB10
    How is the browser? Does it have the same lag? Especially on YouTube videos.
    03-09-15 12:07 PM
  3. James97's Avatar
    I was sure the culprit managed to intercept the files as opposed to extracting them.

    Via CB10 from Scotland using PassportSQW100-1/10.3.1.2480
    sadly got banned from CB lol, im sure either a new 10.3.1 bulid or 10.3.2 bulid will be leaked without him loll

    Posted via CB10
    03-09-15 12:10 PM
  4. juice1179's Avatar
    On 2267 i have
    Cryptographic 5.6.4.44867 and you have 5.6.2
    I was wondering the same thing?

    Posted via CB10
    03-09-15 12:15 PM
  5. anon(5900120)'s Avatar
    sadly got banned from CB lol, im sure either a new 10.3.1 bulid or 10.3.2 bulid will be leaked without him loll

    Posted via CB10
    he is jealous )
    03-09-15 12:16 PM
  6. blockbuy's Avatar
    How is the browser? Does it have the same lag? Especially on YouTube videos.
    Just checking out a YouTube vid and it does slow down in places and sometimes inadvertently pauses






    Posted via CB10
    03-09-15 12:19 PM
  7. anon(5900120)'s Avatar
    go to bed :| and hope that tomorrow the autoload 2558 appear )
    00h39' from VietNam )

    Posted via my Q10
    03-09-15 12:40 PM
  8. jdesignz's Avatar
    Just checking out a YouTube vid and it does slow down in places and sometimes inadvertently pauses






    Posted via CB10
    What about freakattack? Is it still vulnerable?

    Pasaporte Pilipinas | SQW100-1/10.3.1.2480
    03-09-15 12:42 PM
  9. BlackScorpion3's Avatar
    OS 10.3.2.233 - SW 10.3.2.126

    What OS I'm on is my business, get off my .... ! Ex-BerryLeaks member (best group ever)
    moyah8 and muindor like this.
    03-09-15 12:43 PM
  10. blockbuy's Avatar
    Sorry no idea what that is

    Posted via CB10
    03-09-15 12:43 PM
  11. BlackScorpion3's Avatar
    Seriously sometimes it takes a hell lot more time than it should to be sure a spotted O.S has not been reported yet because all of the off topic stuff.

    Why not start another thread called "Thoughts and questions regarding latest spotted OS".....

    IMHO this thread should only have posts with OS versions in them and the source for each find.
    I agree with this 100%

    What OS I'm on is my business, get off my .... ! Ex-BerryLeaks member (best group ever)
    moyah8 likes this.
    03-09-15 12:44 PM
  12. thurask's Avatar
    Sorry no idea what that is

    Posted via CB10
    https://freakattack.com/

    Posted via CB10
    03-09-15 12:44 PM
  13. ArmedHitman's Avatar
    https://freakattack.com/

    Posted via CB10
    Wasn't 10.2.1 the only OS revision and vulnerable to FREAK?

    Scratch that, just checked on Q5, it is.
    03-09-15 12:52 PM
  14. thurask's Avatar
    On 2267 i have
    Cryptographic 5.6.4.44867 and you have 5.6.2
    Crypto kernel is concerning me. 5.6.2.44214 is the version way back on 10.0.10, which is quite a ways back from what we have now.

    Assuming 2558 is a screwup.

    Scratch that, I also have 5.6.2.44214 on 2480. Weird.
    Paul94 likes this.
    03-09-15 01:54 PM
  15. Paul94's Avatar
    Crypto kernel is concerning me. 5.6.2.44214 is the version way back on 10.0.10, which is quite a ways back from what we have now.

    Assuming 2558 is a screwup.

    Scratch that, I also have 5.6.2.44214 on 2480. Weird.
    I agree with that. Maybe they rolled back for stability reasons.
    03-09-15 02:22 PM
  16. thurask's Avatar
    I agree with that. Maybe they rolled back for stability reasons.
    I tried the 10.0.10.261 simulator with a SSL test (https://www.ssllabs.com/ssltest/viewMyClient.html) and it still trips the FREAK test.

    Incidentally, I checked the OpenSSL runtimes included with the Native SDK and they're only OpenSSL 1.0.1i (which is before the FREAK fix version, 1.0.1k). Not sure if that's relevant to what's used on device, though.

    But anyway, I digress. Nothing new in metadata.
    Paul94 likes this.
    03-09-15 02:48 PM
  17. Paul86's Avatar
    So, in this order, we wait for device simulator to appear, get removed from server, leak on CB, wait... carrier release?

    Bloc buy, when you get a chance, can you check and see if the Android runtime is updated. I think this is long over due. I am one of those interested if I will have album art in Spotify. Had to downgrade and find performance slow in all other Android apps

    Posted via CB10
    03-09-15 02:51 PM
  18. blockbuy's Avatar
    Tracking the FREAK Attack
    Good News! Your browser appears to be safe from the FREAK attack.
    On Tuesday, March 3, 2015, researchers announced a new SSL/TLS vulnerability called the FREAK attack. It allows an attacker to intercept HTTPS connections between vulnerable clients and servers and force them to use weakened encryption, which the attacker can break to steal or manipulate sensitive data. This site is dedicated to tracking the impact of the attack and helping users test whether theyre vulnerable.

    The FREAK attack was discovered by Karthikeyan Bhargavan at INRIA in Paris and the miTLS team. Further disclosure was coordinated by Matthew Green. This report is maintained by computer scientists at the University of Michigan, including Zakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, and J. Alex Halderman. The team can be contacted at freakattack@umich.edu.

    For additional details about the attack and its implications, see this post by Matt Green, this site by the discoverers, this Washington Post article, and this post by Ed Felten.

    Who is vulnerable?
    The FREAK attack is possible when a vulnerable browser connects to a susceptible web servera server that accepts export-grade encryption.

    Servers

    Servers that accept RSA_EXPORT cipher suites put their users at risk from the FREAK attack.Using Internet-wide scanning, we have been performing daily tests of all HTTPS servers at public IP addresses to determine whether they allow this weakened encryption. More than a third of all servers with browser-trusted certificates are at risk.

    Currently VulnerableChange Since Mar.*3
    HTTPS servers at Alexa Top 1 Million domain names9.5%down from 12.2%
    HTTPS servers with browser-trusted certificates36.7%unchanged
    All HTTPS servers26.3%unchanged
    See below for a list of vulnerable popular domains. You can test servers using the SSL FREAK Check tool or the Qualys SSL Labs SSL Server Test, which can also identify other security problems.

    Clients

    Update (Mar.*5): * Browsers are vulnerable to the FREAK attack because of bugs that allow an attacker to force them to use weak, export-grade encryption. One example is the OpenSSL bug described in CVE-2015-0204, but some other TLS libraries have similar problems. Far more browsers are vulnerable to the FREAK attack than was initially thought when the attack was announced, including:

    Vulnerable BrowserStatus
    Internet ExplorerSecurity advisory
    Chrome on Mac OSPatch available now
    Chrome on Android
    Safari on Mac OSPatch expected next week
    Safari on iOSPatch expected next week
    Stock Android Browser
    Blackberry Browser
    Opera on Mac OS
    Opera on Linux
    You can check whether your browser is vulnerable using our FREAK Client Test Tool.

    Chrome for Windows and all modern versions of Firefox are known to be safe. However, even if your browser is safe, certain third-party software, including some anti-virus products and adware programs, can expose you to the attack by intercepting TLS connections from the browser. If you are using a safe browser but our client test says youre vulnerable, this is a likely cause.

    In addition to browsers, many mobile apps, embedded systems, and other software products also use TLS. These are also potentially vulnerable if they rely on unpatched libraries or offer RSA_EXPORT cipher suites.

    What should I do?
    If you run a server

    You should immediately disable support for TLS export cipher suites. While youre at it, you should also disable other cipher suites that are known to be insecure and enable forward secrecy.For instructions on how to secure popular HTTPS server software, we recommend Mozillas security configuration guide and their SSL configuration generator. We also recommend testing your configuration with the Qualys SSL Labs SSL Server Test tool.

    If you use a browser

    Make sure you have the most recent version of your browser installed, and check for updates frequently.Updates that fix the FREAK attack should be available for all major browsers soon.

    If youre a sysadmin or developer

    Make sure any TLS libraries you use are up to date.Unpatched OpenSSL, Microsoft Schannel, and Apple SecureTransport all suffer from the vulnerability. Note that these libraries are used internally by many other programs, such as wget and curl. You also need to ensure that your software does not offer export cipher suites, even as a last resort, since they can be exploited even if the TLS library is patched. We have provided tools for software developers that may be helpful for testing.

    Popular sites that are susceptible to FREAK
    The following sites from the Alexa Top 10,000 websites permit RSA_EXPORT cipher suites, which potentially puts their users at risk from the FREAK attack. This list is current as of March 6 at 4:30*PM EST.We urge these sites to drop support for export cipher suites as soon as possible.
    jdesignz likes this.
    03-09-15 03:18 PM
  19. blockbuy's Avatar
    So, in this order, we wait for device simulator to appear, get removed from server, leak on CB, wait... carrier release?

    Bloc buy, when you get a chance, can you check and see if the Android runtime is updated. I think this is long over due. I am one of those interested if I will have album art in Spotify. Had to downgrade and find performance slow in all other Android apps

    Posted via CB10
    Version 10.3.1.221
    Release 4.3
    Kernel 3.2.41-qnx
    Sdk 18

    Posted via CB10
    Paul86 likes this.
    03-09-15 03:34 PM
  20. conite's Avatar
    Version 10.3.1.221
    Release 4.3
    Kernel 3.2.41-qnx
    Sdk 18

    Posted via CB10
    Decent jump from 191.

    Z30STA100-5/10.3.1.2267
    Paul86 likes this.
    03-09-15 03:44 PM
  21. HotFix's Avatar
    Guys, please take the back and forth about blockbuy's OS to another thread so we can keep this one focused on new spotted OSs.

    Posted via CB10 on Z30STA100-5/10.3.1.2267
    03-09-15 06:16 PM
  22. conite's Avatar
    Guys, please take the back and forth about blockbuy's OS to another thread so we can keep this one focused on new spotted OSs.

    Posted via CB10 on Z30STA100-5/10.3.1.2267
    That was already done 2 hours ago. There had been no further posts since.

    http://forums.crackberry.com/showthread.php?t=1005243

    Z30STA100-5/10.3.1.2267
    03-09-15 06:24 PM
  23. HotFix's Avatar
    That was already done 2 hours ago. There had been no further posts since.

    http://forums.crackberry.com/showthread.php?t=1005243

    Z30STA100-5/10.3.1.2267
    I'm not sure a whole 2 hours means the chatter is done here, but thank you Paul86 for trying a proactive approach.

    Posted via CB10 on Z30STA100-5/10.3.1.2267
    moyah8 likes this.
    03-09-15 07:33 PM
  24. mainely_linux's Avatar
    OS 10.3.2.239 - SW 10.3.2.130

    Posted via CB10
    paulwallace1234, Uzi and moyah8 like this.
    03-10-15 07:30 AM
  25. paulwallace1234's Avatar
    Battery life is immense and performance is lightening ;-)

    Here's the settings for camera - don't recall what's on previous version.
    You know what, didn't realise the focus was a bug, always thought bad light, settings or dirty lens - however just quickly setup a shot and it looks crystal :-)

    The rest seem all Okey for now.

    Click image for larger version. 

Name:	IMG_20150309_165536.png 
Views:	5773 
Size:	64.5 KB 
ID:	339993

    Posted via CB10
    I won't spam you with Questions :P
    How is the Rotation Lock working?
    That bloody bug is irritating me
    03-10-15 12:44 PM
4,574 ... 9495969798 ...

Similar Threads

  1. Blackberry Z30 no quiere Configurar
    By CrackBerry Question in forum Ask a Question
    Replies: 20
    Last Post: 04-12-18, 07:40 AM
  2. WhatsUp10 - A new WhatsApp client for BlackBerry 10 from Nemory Studios
    By CrackBerry News in forum CrackBerry.com News Discussion
    Replies: 7
    Last Post: 05-17-17, 01:46 AM
  3. What can I do to terminate my blackberry phone's Security Wipe?
    By CrackBerry Question in forum Ask a Question
    Replies: 3
    Last Post: 05-03-17, 07:21 PM
  4. Replies: 2
    Last Post: 05-03-17, 03:03 PM
LINK TO POST COPIED TO CLIPBOARD