In that case.Lmaooo naw. I’m not offended by it even when used offensively.
Thanks for asking though.
@Bank pay these ppl 8m for posting.
Deacon BDP
View attachment 151028
So what do you think they're going to do with pictures of aged up people? Or is it something more sinister like they're stealing data from our phones unbeknownst to us?This shit all over the news lmaooooo. We tried to tell you niggas.
And Apple I guess just let that shit slide? They have a vetting process, right?It has nothing to do with the effects they use man. Catch up.
And Apple I guess just let that shit slide? They have a vetting process, right?
Nah, not at all. I'm just not seeing what nefarious acts can be done with FaceApp that can't be done with any other app we happily give our data to.I can see you already been got got out here. Lol.
Bet we will hear about this being used somehow in the elections
Nah, not at all. I'm just not seeing what nefarious acts can be done with FaceApp that can't be done with any other app we happily give our data to.
But please, expound on the additional risks this app brings so I may be educated. Is this the only app from Russia on the app store?
Full disclosure, I deleted the app after I took my pic cause that's all I wanted it for. I know if there was any risk of harm it's already done, but I didn't delete because of any risk.
so who do we find it on our phones since no one else askedremote access to your phone can be set up and maintained even if you've deleted the app. The app can drop a payload during the installation that will set up remote access to a command and control server. The app will then send a single packet to the server at a set interval (i.e. every 10-15 minutes) just to let the C&C server know it's alive and ready. When the time comes, the individual (or group) behind all of it can then activate the payload for any number of things, screenshots, activate your camera, pull files from the device, push files to it, alter things like DNS settings to point to their servers, etc.
One of the tools I use for network security, Metasploit, has the ability to create payloads like that and wrap them in a number of different ways.
so who do we find it on our phones since no one else asked