1.3 / October 1, 2012
(4.9/5) (3530)

Description

This little App will help you to protect against the USSDvulnerability detected on many devices.

Just install it and if you reach a Website with malicious codeinside there will be a popup asking you wich app to launch. Justselect "use as standard" an choose NoTel:URL as app and you will befine.

Starting with Version 1.1 of the App, malicious USSD Codes areshown within a popup Window. To gain best protection there is noway to execute USSD codes. If you klick on a valid phone numberwithin a webpage or received by barcode you are able to execute therequest if your Android OS Version is >= Ice CreamSandwich.
Below this Version there is no way to directly rout the number tothe dialer, so you need to do this manually by typing the number inthe dialer.

There is no need to start the App manually. If you do so, therewill be an explaining Popop now.
Everything will went automatically if the app is justinstalled.

Detailed Information can be found on my Website:
http://fotovossblog.peggy-forum.com/

Here you will also find urls and barcode for testing

Keywords: USSD, security

App Information NoTelURL

  • App Name
    NoTelURL
  • Package Name
    com.voss.notelurl
  • Updated
    October 1, 2012
  • File Size
    157k
  • Requires Android
    Android 2.0.1 and up
  • Version
    1.3
  • Developer
    Joerg Voss
  • Installs
    100,000 - 500,000
  • Price
    Free
  • Category
    Productivity
  • Developer
  • Google Play Link

NoTelURL Version History

Select NoTelURL Version :
  • 1.3 (4) - Latest Version
  • NoTelURL 1.3 APK File

    Publish Date: 2016 /3/14
    Requires Android: Android 2.0.1+ (clair, API: 6)
    File Size: 157.1 kB
    Tested on: Android 4.0.3 (Ice Cream Sandwich, API: 15)
    File Sha1: 37a814179e394b35e718f085ebfd9025cb4b9de0
    APK Signature: 6769d9122a5bfff2d6e27208329e658b205ce05e

Joerg Voss Show More...

NoTelURL 1.3 APK
Joerg Voss
This little App will help you to protect against the USSDvulnerability detected on many devices.Just install it and if you reach a Website with malicious codeinside there will be a popup asking you wich app to launch. Justselect "use as standard" an choose NoTel:URL as app and you will befine.Starting with Version 1.1 of the App, malicious USSD Codes areshown within a popup Window. To gain best protection there is noway to execute USSD codes. If you klick on a valid phone numberwithin a webpage or received by barcode you are able to execute therequest if your Android OS Version is >= Ice CreamSandwich.Below this Version there is no way to directly rout the number tothe dialer, so you need to do this manually by typing the number inthe dialer.There is no need to start the App manually. If you do so, therewill be an explaining Popop now.Everything will went automatically if the app is justinstalled.Detailed Information can be found on my Website:http://fotovossblog.peggy-forum.com/Here you will also find urls and barcode for testingKeywords: USSD, security
LogMan logcat check 1.3.3 APK
Joerg Voss
This app will scan your device logcat forlines which contain privacy related data like your phone number oryour IMEI, IMSI, Sim-card serialnumber, Android_ID your emailaddress or location data.The app requires following permissions:READ_LOGS - used to fetch the LogcatREAD_PHONE_STATE - used to get phonenumber,IMEI,IMSI and SIM-Serialto allow exact matchWRITE_EXTERNAL_STORAGE - used to write temp filesKeywords: security, privacy, logcat, logging
NoStalk 1.4 APK
Joerg Voss
This application turns your Android absolutlyquiet if a call with “unknown caller ID” will come to your AndroidG1 GSM.NoStalk will resume normal RingingMode after this. Every time"unknown Caller ID" is displayed your Android will keep silent upfrom now.Update to V1.4 New German language pack and more.
Unique ID 1.1 APK
Joerg Voss
Diese App dient als Demo zu einemmeinerBlogbeiträge. Sie zeigt die auf dem jeweiligen DeviceverfügbarenHard und Software IDs an und zeigt ebenfalls wie einfaches seinkann, Systemunabhängige IDs zu generieren, welche das DevicefürDritte NICHT trackbar machen.Darüber hinaus demonstriert diese App wie es möglich ist,Datenaus einer App ins Internet zu übertragen, ohne die dafürnotwendigeBerechtigung "Vollständiger Internetzugriff" zuhaben.In dem dazugehörigen Blog wird dargelegt, welche IDs es aufdenSmartphones gibt und warum man Vorsicht walten lassen sollte sieimNetz zu verteilen.Diese App benötigt die Berechtigung"READ_PHONE_STATE"(TELEFONSTATUS UND IDENTITÄT ABRUFEN)Dieses wird lediglich verwendet um die Daten anzuzeigen.Dieausgelesenen Daten werden weder ins Log geschrieben noch anDritteübertragen.Bei Fragen zu dieser App kann jederzeit ein Eintrag zudementsprechenden Artikel in meinem Blog gestellt werden. Dortkannich auch gezielt und direkt antworten.https://android-security.peggy-forum.com/2013/01/risiken-durch-gerateids-von-smartphones/This app serves as ademofor one of my blog posts. It is the list available ontherespective device and hardware IDs and software also shows howeasyit can be to generate system-specific IDs, which make thedevicefor others NOT trackable.In addition, this app demonstrates how it is possible totransferdata from one app to the Internet, without thenecessaryauthorization to "Full Internet access".In the project's blog, pinpoints the IDs are on thesmartphonesare and why they should be approached cautiously todistribute thenet.This app needs permission "READ_PHONE_STATE" (PHONE STATEANDIDENTITY RETRIEVE)This is only used to display the data. The data read is notwrittenin the log or transferred to third parties.For questions about this app at any time an entry can be madetothe relevant article in my blog. There I can alsorespondspecifically and directly.https://android-security.peggy-forum.com/2013/01/risiken-durch-gerateids-von-smartphones/