Originally posted by SteveRiley
View Post
I considered popping open the tar ball that I looked at but I don't do risky things like that any more. The tarball you untarred appears to be for an Android 4.2.1 OS. Even after the tarball is opened and the files deployed, unless one can verify the binary by compiling its putative source and comparing the compiled output with the binary one cannot guarantee that spyware has not been planted in one of the *.so's or ELF binary executables.
Comment