[Infowarrior] - New G2 phone comes w/'rootkit'

Richard Forno rforno at infowarrior.org
Wed Oct 6 07:27:04 CDT 2010


Newest Google Android Cell Phone Contains Unexpected ‘Feature’ -- A Malicious Root Kit.

Published:  October 5, 2010

 
http://oti.newamerica.net/blogposts/2010/newest_google_android_cell_phone_contains_unexpected_feature_a_malicious_root_kit-380

Chip on Phone Overwrites User-Preferred Software -- Re-installs Original Firmware.

Yesterday, some T-Mobile stores began selling its newest mobile device, the G2, an Android-based smart phone originally slated for an October 6 release while AT&T is slated to release it later in the year. This device truly is representative of the next generation of mobile devices. The hardware capabilities surpass the abilities of most available netbook computers, including the ability to play High Definition video seamlessly. Unfortunately, the G2 also comes with built-in hardware that restricts what software a device owner might wish to install.

Specifically, one of the microchips embedded into the G2 prevents device owners from making permanent changes that allow custom modifications to the the Android operating system. This is the same Android that purposefully opened up its source code under the Apache License, allowing anyone to use, modify, and redistribute the operating system code even if they choose not to contribute back to the development community. Even among other Android computing devices and phones, the G2 is touted as an open platform. Unfortunately, the hardware in this device completely undermines this license by allowing mobile network providers to override end-user changes to the source code. Wireless network operators have deployed a hardware rootkit that restricts modifications to a device owned by the user. This would be akin to a computer sold with Microsoft Windows containing chip that prevented users from installing Linux or another operating system of their choice.

Of course, the G2 is not really a phone. It is a mobile computer with an interface that connects to a mobile network. The majority of time many people spend using their G2 mobile computer is taking notes in meetings, reading and responding  to email, editing documents, browsing web pages, getting news from their RSS feed readers, listening to audio files, watching YouTube videos, and interacting with online social networks. Occasionally, we may take a photo or maybe even a video, and sometimes users may respond to text messages or make a phone call. These are the same activities most people do with their home and office desktop and laptop computers.

Plugging a USB wireless modem into a laptop for T-Mobile’s broadband services does not mean that T-Mobile can say that Ubuntu Linux is not an approved operating system, or that Skype is not an allowed voice service. Yet when unsuspecting members of the public buy Google’s Android G2 at a T-Mobile store, they aren’t getting a customizable mobile computer or phone but are instead getting a device where the hardware itself dramatically limits users' right to make changes to their computers and install the operating system of their choice.

Clearly, this is a major new initiative to control users rights to run their computers as they see fit. Instead, the new Google Android hardware rootkit acts just like a virus -- overriding user’s preferences to change settings and software to conform to the desires of a third party. And just like a virus, this kind of behavior should be just as illegal. Users of the new Google Android G2 should be warned that their device has a rootkit that will overwrite their software modifications. We are seeking further clarification as to the legality of this malicious software.

More info:
http://press.t-mobile.com/articles/T-Mobile-G2-with-Google
http://forum.xda-developers.com/showthread.php?t=794053


More information about the Infowarrior mailing list