Skip to main content


Busy morning


Let’s reflect on what I did this morning:

- ADB shell dumps of system & user apps on Android,
- Blocked SystemUI network traffic and monitored overall stability,
- Reverse-engineered APKs looking for HTTP beacons and hardcoded IPs, because spyware....
- Used VirusTotal + Hybrid Analysis to sandbox vendor .apks,
- Correlated IPs with ASN, location, and possible service origin, then isolated and blocked them,
- Avoided 'Google Play Protect' despite pressure, preserving system integrity against thread model and previous security hardening,
- Assessed potential psyops or disinfo campaigns online sparking user doubt in specific vendor hardware.

I need a drink.