Show missing security patches. Find mobile abuse (IMSI catchers & stealth SMS).
advertisement
名前 | SnoopSnitch |
---|---|
バージョン | 2.0.13 |
アップデート | 2023年11月01日 |
サイズ | 13 MB |
カテゴリー | ツール |
インストール | 500千+ |
開発元 | Security Research Labs |
Android OS | Android 4.4+ |
Google Play ID | de.srlabs.snoopsnitch |
SnoopSnitch · 説明
Disclaimer: Patch analysis will work on any phone. However, active network tests and attack monitoring require a compatible* rooted device with Qualcomm chipset.
What. SnoopSnitch analyzes your phone's firmware for installed or missing Android security patches. On compatible* rooted phones, SnoopSnitch can also collect and analyze mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking, and SS7 attacks.
How. SnoopSnitch allows you to analyze your phone's firmware and provides a detailed report with the patch-status of vulnerabilities (CVEs) by month.
Network security and attack monitoring: To use these features, a rooted device* with a Qualcomm chipset running stock Android 4.1 or higher is required. Custom ROMs are often unsupported as they can lack necessary proprietary drivers. (CyanogenMod seems to work for some users.)
Contribute. SnoopSnitch uses data contributed by users. Patch analysis results and firmware build details are uploaded to our server. This enables further tool improvements and research of the Android patch landscape.
You may also choose to help improve our global network security and threat statistics by uploading your network measurements or security events. SnoopSnitch will ask for confirmation before uploading any such information to our servers. All uploads are encrypted.
Permissions. The app asks for a number of permissions, most of which are only required for network tests and attack monitoring:
https://opensource.srlabs.de/projects/snoopsnitch/wiki/Android_application_permissions
License. SnoopSnitch is open-source software released under the GPL version 3. Please visit our project website for source code and further information:
https://opensource.srlabs.de/projects/snoopsnitch
*Compatible phones (when rooted). A list of these devices can be found here:
https://opensource.srlabs.de/projects/snoopsnitch/wiki/DeviceList
Feedback. We look forward to hearing from you at snoopsnitch@srlabs.de.
PGP fingerprint: 9728 A7F9 D457 1FBB 746F 5381 D52C AC10 634A 9561
-- snoop snitch
What. SnoopSnitch analyzes your phone's firmware for installed or missing Android security patches. On compatible* rooted phones, SnoopSnitch can also collect and analyze mobile radio data to make you aware of your mobile network security and to warn you about threats like fake base stations (IMSI catchers), user tracking, and SS7 attacks.
How. SnoopSnitch allows you to analyze your phone's firmware and provides a detailed report with the patch-status of vulnerabilities (CVEs) by month.
Network security and attack monitoring: To use these features, a rooted device* with a Qualcomm chipset running stock Android 4.1 or higher is required. Custom ROMs are often unsupported as they can lack necessary proprietary drivers. (CyanogenMod seems to work for some users.)
Contribute. SnoopSnitch uses data contributed by users. Patch analysis results and firmware build details are uploaded to our server. This enables further tool improvements and research of the Android patch landscape.
You may also choose to help improve our global network security and threat statistics by uploading your network measurements or security events. SnoopSnitch will ask for confirmation before uploading any such information to our servers. All uploads are encrypted.
Permissions. The app asks for a number of permissions, most of which are only required for network tests and attack monitoring:
https://opensource.srlabs.de/projects/snoopsnitch/wiki/Android_application_permissions
License. SnoopSnitch is open-source software released under the GPL version 3. Please visit our project website for source code and further information:
https://opensource.srlabs.de/projects/snoopsnitch
*Compatible phones (when rooted). A list of these devices can be found here:
https://opensource.srlabs.de/projects/snoopsnitch/wiki/DeviceList
Feedback. We look forward to hearing from you at snoopsnitch@srlabs.de.
PGP fingerprint: 9728 A7F9 D457 1FBB 746F 5381 D52C AC10 634A 9561
-- snoop snitch