jm + mobile   55

Prepaid Data SIM Card Wiki
awesome resource.
This WIKI collects information about prepaid (or PAYG) mobile phone plans from all over the world. Not just any plans though, they must include good data rates, perfect for smartphone travellers, as well as tablet or mobile modem users.
data  mobile  travel  sim  prepaid  payg 
august 2016 by jm
Cops Use Stingray To Almost Track Down Suspected Fast Food Thief
Law enforcement spokespeople will often point to the handful of homicide or kidnapping investigations successfully closed with the assistance of cell site simulators, but they'll gloss over the hundreds of mundane deployments performed by officers who will use anything that makes their job easier -- even if it's a tool that's Constitutionally dubious.

Don't forget, when a cell site simulator is deployed, it gathers cell phone info from everyone in the surrounding area, including those whose chicken wings have been lawfully purchased. And all of this data goes... somewhere and is held onto for as long as the agency feels like it, because most agencies don't seem to have Stingray data retention policies in place until after they've been FOIA'ed/questioned by curious legislators.

Regular policework -- which seemed to function just fine without cell tracking devices -- now apparently can't be done without thousands of dollars of military equipment. And it's not just about the chicken wing thieves law enforcement can't locate. It's about the murder suspects who are caught but who walk away when the surveillance device wipes its feet on the Fourth Amendment as it serves up questionable, post-facto search warrants and pen register orders.
stingrays  mobile  surveillance  imsi-catchers  data-retention  privacy  chicken-wings  fast-food 
june 2016 by jm
Three starts network-level ad blocking trial
Three, the mobile carrier, has begun warming up for a network-level ad blocking trial. It will become one of the first mobile carriers worldwide—and certainly in the UK—to try blocking ads before they are squirted over the network to the consumer, rather than attempting to hide or block ads locally on the device, which can cost both bandwidth and battery life.

The ad blocking trial, which will affect both mobile websites and apps, will take place during a 24-hour period sometime between June 13 and 20. Three says it will contact customers and ask them to sign up for the trial, presumably via the online customer portal. It isn't clear how large the trial will be.

Technologically, the network-level ad blocking will be powered by Shine. Due to the nature of the beast—the constant tussle between ad publishers and ad blockers—Shine doesn't like to talk about its tech in much detail. It sounds like Shine uses deep packet inspection and machine learning to find packets that contain ads, and then replaces or removes them in such a way that it doesn't break the layout of the website or app.
shine  three  uk  adblocking  mobile  isps 
june 2016 by jm
ZIP SIM
Prepaid talk+text+data or data-only mobile SIM cards, delivered to your home or hotel, prior to visiting the US. great service for temporary US business visits
visiting  us  usa  zip-sim  sims  mobile-phones  travel  phones  mobile  travelling  data 
april 2016 by jm
How Stingrays were unmasked
'THE DRAGNET: How a man accused of million-dollar fraud uncovered a never before seen, secret surveillance device'
stingrays  crime  fraud  surveillance  mobile  police  imsi-catchers 
january 2016 by jm
User data plundering by Android and iOS apps is as rampant as you suspected
An app from Drugs.com, meanwhile, sent the medical search terms "herpes" and "interferon" to five domains, including doubleclick.net, googlesyndication.com, intellitxt.com, quantserve.com, and scorecardresearch.com, although those domains didn't receive other personal information.
privacy  security  google  tracking  mobile  phones  search  pii 
november 2015 by jm
excellent offline mapping app MAPS.ME goes open source
"MAPS.ME is an open source cross-platform offline maps application, built on top of crowd-sourced OpenStreetMap data. It was publicly released for iOS and Android."
maps.me  mapping  maps  open-source  apache  ios  android  mobile 
september 2015 by jm
Chinese scammers are now using Stingray tech to SMS-phish
A Stingray-style false GSM base station, hidden in a backpack; presumably they detect numbers in the vicinity, and SMS-spam those numbers with phishing messages. Reportedly the scammers used this trick in "Guangzhou, Zhuhai, Shenzhen, Changsha, Wuhan, Zhengzhou and other densely populated cities".

Dodgy machine translation:
March 26, Zhengzhou police telecommunications fraud cases together, for the first time seized a small backpack can hide pseudo station equipment, and arrested two suspects. Yesterday, the police informed of this case, to remind the general public to pay attention to prevention.

“I am the landlord, I changed number, please rent my wife hit the bank card, card number ×××, username ××.” Recently, Jiefang Road, Zhengzhou City Public Security Bureau police station received a number of cases for investigation brigade area of ​​the masses police said, frequently received similar phone scam messages. Alarm, the police investigators to determine: the suspect may be in the vicinity of twenty-seven square, large-scale use of mobile pseudo-base release fraudulent information. [...]

Yesterday afternoon, the Jiefang Road police station, the reporter saw the portable pseudo-base is made up of two batteries, a set-top box the size of the antenna box and a chassis, as well as a pocket computer composed together at most 5 kg.


(via t byfield and Danny O'Brien)
via:mala  via:tbyfield  privacy  scams  phishing  sms  gsm  stingray  base-stations  mobile  china 
august 2015 by jm
"Everything you've ever said to Siri/Cortana has been recorded...and I get to listen to it"
This should be a reminder.
At first, I though these sound bites were completely random. Then I began to notice a pattern. Soon, I realized that I was hearing peoples commands given to their mobile devices. Guys, I'm telling you, if you've said it to your phone, it's been recorded...and there's a damn good chance a 3rd party is going to hear it.
privacy  google  siri  cortana  android  voice-recognition  outsourcing  mobile 
march 2015 by jm
A World Transfixed by Screens - The Atlantic
Excellent "In Focus" this week -- 'The continued massive growth of connected mobile devices is shaping not only how we communicate with each other, but how we look, behave, and experience the world around us. Smartphones and other handheld devices have become indispensable tools, appendages held at arm's length to record a scene or to snap a selfie. Recent news photos show refugees fleeing war-torn regions holding up their phones as prized possessions to be saved, and relatives of victims lost to a disaster holding up their smartphones to show images of their loved ones to the press. Celebrity selfies, people alone in a crowd with their phones, events obscured by the very devices used to record that event, the brightly lit faces of those bent over their small screens, these are some of the scenes depicted below.'
mobile  photography  in-focus  alan-taylor  the-atlantic  phones  selfies  pictures 
january 2015 by jm
Fixing tethering on Android KitKat
Google made a change in Android 4.4 which allows operators to know when users are using tethering and conveniently block tethered devices from accessing internet. This can be fixed permanently using the following procedure.


Well this is stupid. (via Tony Finch)
via:fanf  tethering  android  mobile 
december 2014 by jm
How Etsy Does Continuous Integration for Mobile Apps
Very impressive. I particularly like the use of Tester Dojos to get through a backlog of unwritten tests -- we had a similar problem recently...
dojos  testing  ci  cd  builds  etsy  mobile  ios  shenzen  trylib  jenkins  tester-dojos 
december 2014 by jm
Screen time: Steve Jobs was a low tech parent
“This is rule No. 1: There are no screens in the bedroom. Period. Ever.”
screen-time  kids  children  tv  mobile  technology  life  rules  parenting 
september 2014 by jm
"CryptoPhone" claims to detect IMSI catchers in operation
To show what the CryptoPhone can do that less expensive competitors cannot, he points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone.  Interceptors look to a typical phone like an ordinary tower.  Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device.

“Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says.  “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip.  We even found one at South Point Casino in Las Vegas.”
imsi-catchers  security  cryptophone  phones  mobile  3g  4g  eavesdropping  surveillance 
august 2014 by jm
Six things we know from the latest FinFisher documents | Privacy International
The publishing of materials from a support server belonging to surveillance-industry giant Gamma International has provided a trove of information for technologists, security researchers and activists. This has given the world a direct insight into a tight-knit industry, which demands secrecy for themselves and their clients, but ultimately assists in the violation human rights of ordinary people without care or reproach. Now for the first time, there is solid confirmation of Gamma's activities from inside the company's own files, despite their denials, on their clients and support provided to a range of governments.
finfisher  gamma-international  privacy  surveillance  iphone  android  rootkits  wiretapping  germany  privacy-international  spying  bahrain  turkmenistan  arab-spring  egypt  phones  mobile 
august 2014 by jm
China detains 1,530 in telecom spam crackdown
via Christopher Soghoian: 'IMSI catchers/fake base stations are out of control in China. The gov shut down 24 IMSI catcher factories, 1500+ people were arrested.'
privacy  spam  china  imsi-catchers  mobile  3g  gsm  phones 
august 2014 by jm
Stuck in the iMessage abyss? Here’s how to get your texts back
some potential (apocryphal) workarounds for this extremely annoying Apple bug
apple  bugs  imessage  sms  phones  mobile  android  hacks 
may 2014 by jm
SpideyApp
an Android-based stingray (IMSI catcher) detector that uses machine learning to detect the presence of stingray devices which can be used to eavesdrop on cellular communication.


In pre-launch right now. Via EthanZ via Antoin
imsi-catcher  stingray  surveillance  via:ethanz  snooping  spying  privacy  mobile 
may 2014 by jm
iMessage purgatory
Oh Apple, you asshats. This is some seriously shitty programming. iMessage on iOS devices caches the "iMessage-capable" flag for all numbers, indefinitely, so if you switch from iPhone to Android, messages from your friends' iPhones won't get delivered to you henceforth -- and to add insult to injury, it claims they do with a "Delivered." status appearing under the message. This is happening to me right now...
apple  sms  messaging  phones  mobile  imessage  android  fail  bad-programming  bugs 
may 2014 by jm
Android 4.4 KitKat Problems: HTC UK Speaks Out About HTC One Update Issues
Good advice on improving battery life with the KitKat 4.4.2 point release on a HTC One. I had serious battery problems, but they seem to have been resolved by following this advice
wifi  kitkat  android  4.4.2  htc-one  htc  battery  blinkfeed  mobile  phones 
may 2014 by jm
Oisin's mobile app release checklist
'This form is to document the testing that has been done on each app version before submitting to the App Store. For each item, indicate Yes if the testing has been done, Not Applicable if the testing does not apply (eg testing audio for an app that doesn’t play any), or No if the testing has not been done for another reason.'
apps  checklists  release  coding  ios  android  mobile  ohurley 
may 2014 by jm
Coding For Life (Battery Life, That Is)
great presentation on Android mobile battery life, and what to avoid
presentations  via:sergio  android  mobile  battery  battery-life  3g  wifi  gprs  hardware 
may 2014 by jm
Flood IO Offering Network Emulation
Performance-testing-as-a-service company Flood.IO now offering emulation of various crappy end-user networks: GSM, DSL, GPRS, 3G, 4G etc. Great idea.
flood.io  performance  networking  internet  load-testing  testing  jmeter  gatling  tests  gsm  3g  mobile  simulation 
april 2014 by jm
Uplink Latency of WiFi and 4G Networks
It's high. Wifi in particular shows high variability and long latency tails
wifi  3g  4g  mobile  networking  internet  latency  tcp 
april 2014 by jm
The Emerging Global Web
*Really* intriguing slide deck on how Asia and Africa have invented new ways of operating a business via the internet, and are turning globalisation upside down (via Yoz)
via:yoz  africa  asia  globalisation  internet  web  mobile  payment  business  ecommerce  global 
april 2014 by jm
Daring Fireball: Rethinking What We Mean by 'Mobile Web'
We shouldn’t think of “the web” as only what renders in web browsers. We should think of the web as anything transmitted using HTTP and HTTPS. Apps and websites are peers, not competitors. They’re all just clients to the same services.

+1. Finally, a Daring Fireball post I agree with.
daring-fireball  apps  web  http  https  mobile  apple  android  browsers 
april 2014 by jm
Chinese cops cuff 1,500 in fake base station spam raid
The street finds its own uses for things, in this case Stinger/IMSI-catcher-type fake mobile-phone base stations:
Fake base stations are becoming a particularly popular modus operandi. Often concealed in a van or car, they are driven through city streets to spread their messages. The professional spammer in question charged 1,000 yuan (£100) to spam thousands of users in a radius of a few hundred metres. The pseudo-base station used could send out around 6,000 messages in just half an hour, the report said. Often such spammers are hired by local businessmen to promote their wares.


(via Bernard Tyers)
stingers  imsi-catcher  mobile-phones  mobile  cellphones  china  spam  via:bernard-tyers 
march 2014 by jm
Only 0.15 percent of mobile gamers account for 50 percent of all in-game revenue
Nice bit of marketing from the day job:
The group of gamers responsible for half of all in-game revenue in mobile titles is frightening because it is so narrow, according to a survey by Swrve, an established analytics and app marketing firm. About 0.15 percent of mobile gamers contribute 50 percent of all of the in-app purchases generated in free-to-play games.

This means it may even more important than game companies realized in the past to find and retain the users that fall into the category of big spenders, or “whales.” The vast majority of users never spend any money, despite the clever tactics that game publishers have developed to incentivize people to spend money in their favorite games.
swrve  whales  gaming  games  iap  money  mobile  analytics 
february 2014 by jm
"High Performance Browser Networking", by Ilya Grigorik, read online for free
Wow, this looks excellent. A must-read for people working on systems with high-volume, low-latency phone-to-server communications -- and free!
How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications—including HTTP 2.0 and XHR improvements, Server-Sent Events (SSE), WebSocket, and WebRTC.

Author Ilya Grigorik, a web performance engineer at Google, demonstrates performance optimization best practices for TCP, UDP, and TLS protocols, and explains unique wireless and mobile network optimization requirements. You’ll then dive into performance characteristics of technologies such as HTTP 2.0, client-side network scripting with XHR, real-time streaming with SSE and WebSocket, and P2P communication with WebRTC.

Deliver optimal TCP, UDP, and TLS performance;
Optimize network performance over 3G/4G mobile networks;
Develop fast and energy-efficient mobile applications;
Address bottlenecks in HTTP 1.x and other browser protocols;
Plan for and deliver the best HTTP 2.0 performance;
Enable efficient real-time streaming in the browser;
Create efficient peer-to-peer videoconferencing and low-latency applications with real-time WebRTC transports


Via Eoin Brazil.
book  browser  networking  performance  phones  mobile  3g  4g  hsdpa  http  udp  tls  ssl  latency  webrtc  websockets  ebooks  via:eoin-brazil  google  http2  sse  xhr  ilya-grigorik 
october 2013 by jm
_Measuring Mobile Web Performance_ [slides]
Notable slide is #13, displaying a graph of HSDPA packet RTTs measured from a train. Max RTT gets up to 20,266ms. ouch
rtt  packets  latency  hsdpa  mobile  internet  trains  packet-loss 
june 2013 by jm
Skype's principal architect explains why they no longer have end-to-end crypto
Mobile devices can't handle the CPU and constantly-online requirements, and an increased reliance on dedicated routing supernodes to avoid Windows-client monoculture and p2p network fragility

(via the IP list, via kragen)
skype  p2p  mobile  architecture  networking  internet  snooping  crypto  via:ip  via:kragen  phones  windows 
june 2013 by jm
The $12 Gongkai Phone
Welcome to the Galapagos of Chinese “open” source. I call it “gongkai” (公开). Gongkai is the transliteration of “open” as applied to “open source”. I feel it deserves a term of its own, as the phenomenon has grown beyond the so-called “shanzhai” (山寨) and is becoming a self-sustaining innovation ecosystem of its own.

Just as the Galapagos Islands is a unique biological ecosystem evolved in the absence of continental species, gongkai is a unique innovation ecosystem evolved with little western influence, thanks to political, language, and cultural isolation.

Of course, just as the Galapagos was seeded by hardy species that found their way to the islands, gongkai was also seeded by hardy ideas that came from the west. These ideas fell on the fertile minds of the Pearl River delta, took root, and are evolving. Significantly, gongkai isn’t a totally lawless free-for-all. It’s a network of ideas, spread peer-to-peer, with certain rules to enforce sharing and to prevent leeching. It’s very different from Western IP concepts, but I’m trying to have an open mind about it.
gongkai  bunnie-huang  china  phone  mobile  hardware  devices  open-source 
may 2013 by jm
Breaking the 1000 ms Time to Glass Mobile Barrier [slides]
Great presentation from Google on HTML5 CSS+JS render speed, 3G/4G network latency, etc. (via John G)
google  slides  3g  4g  lte  networking  telcos  telecom  css  js  html5  web  via:jg  mobile 
april 2013 by jm
Irish mobile phone companies: still spammy
'Pro tip: if you're going to spam, try not to spam the DPC's Director of Investigations.' -- lolz
funny  oh-dear  three  hutchinson  ireland  mobile  spam  dpc  law 
december 2012 by jm
Mallory: Transparent TCP and UDP Proxy – Intrepidus Group - Insight
'a transparent TCP and UDP proxy. It can be used to get at those hard to intercept network streams, assess those tricky mobile web applications, or maybe just pull a prank on your friend.'  basically, cause wifi clients to associate with an Ubuntu host, then sniff their packets
proxy  security  network  sniffing  transparent-proxies  mobile  reverse-engineering  from delicious
april 2011 by jm
RIM: The inmates have taken over the asylum
some notes from Blackberry's slow circle round the toilet, as it's hammered by iPhones and Androids. also: I can't believe QNX is still alive
rim  mobile  blackberry  qnx  embedded  phones  from delicious
march 2011 by jm
Cellphones Track Your Every Move, and You May Not Even Know - NYTimes.com
data retention in Germany revealed via FOI: 'in a six-month period — from Aug 31, 2009, to Feb. 28, 2010, Deutsche Telekom had recorded and saved his longitude and latitude coordinates more than 35,000 times. It traced him from a train on the way to Erlangen at the start through to that last night, when he was home in Berlin.'
data-retention  germany  phones  mobile  geolocation  tracking  mobile-phones  surveillance  from delicious
march 2011 by jm
#O2Fail – What You Need To Know About Mobile Phone Content Control
'Because it’s easy for a kid to find a site that isn’t blocked – or to “borrow” mum or dad’s credit card – it’s of no serious concern to the intrepid kid. It does suck if they want to find out how not to get AIDS though. So, we’re stuck with a situation that’s expensive for MNOs, embarrassing and annoying for consenting adults, and trivial for a child to bypass.'
o2fail  o2  uk  politics  filtering  censorship  porn  the-sun  page-3  mobile  from delicious
march 2011 by jm
BikeDroid
Warren's Android app to track DublinBike availability: 'Use BikeDroid to locate the nearest free bike or stand to you. Get real-time status of all bike stands displayed on a map of your city.'
bikes  dublinbikes  apps  android  mobile  from delicious
february 2011 by jm
Dublin Bikes 2 Go!
'an [unofficial] mobile web application that the public can use to find 'Dublin Bikes' stations and information about bike availability'
bikes  dublin  dublinbikes  cycling  mobile  apps  iphone  android  from delicious
february 2011 by jm
FareBot: Read data from public transit cards with your NFC-equipped Android phone - codebutler
'When demonstrating FareBot, many people are surprised to learn that much of the data on their ORCA card is not encrypted or protected. This fact is published by ORCA, but is not commonly known and may be of concern to some people who would rather not broadcast where they’ve been to anyone who can brush against the outside of their wallet. Transit agencies across the board should do a better job explaining to riders how the cards work and what the privacy implications are.' (via Boing Boing)
via:boingboing  privacy  android  rfid  security  transit  mobile  encryption  mifare  desfire  farebot  from delicious
february 2011 by jm
DocScanner
document scanner app for the iPhone/Android smartphones; take a photo of a doc, it'll fix geometry, remove shadows, white balance and sharpen appropriately, generate PDFs and image files, and upload to Evernote for OCRing. EUR4.99 though
android  apps  evernote  iphone  mobile  ocr  pdf  document  scanner  scan  from delicious
july 2010 by jm
Mobile Internet access data retention (not!)
so, it seems the wireless ISPs don't have sufficient IPv4 space for their customers, and are filtering access to the internet via NAT; unfortunate side effect is that this breaks data retention as defined in the UK. wonder if the same applies here?
uk  data-retention  privacy  nat  isps  wireless  mobile  phones  networking  internet  filtering  from delicious
january 2010 by jm
Malicious App In Android Market
phisher creates a banking app for Android phones which relays the authorization details to another site, possible because of insufficient app vetting (via Mulley)
apps  iphone  android  smartphones  phones  mobile  phishing  security  banking  fraud  from delicious
january 2010 by jm
All Android Phones
so many! Saw a Hero last night, it looked pretty swish -- although not quite as pretty as the iPhone ;)
phones  android  htc  hero  os  g1  mobile  tech  shopping  from delicious
november 2009 by jm
HTC Hero is on Meteor
according to Fergal, at half of the price of O2's iPhone "deal"
htc  hero  o2  iphone  android  phones  mobile  ireland  meteor  from delicious
november 2009 by jm
Apps.ie
Irish-made iPhone apps. there's a surprising number of 'em
iphone  ireland  irish  apps  mobile  from delicious
september 2009 by jm
Internet access is Britons' top priority
'Britons will choose to cut back on almost anything other than food before economising on electronic communications services. Crucially, we will even cut spending on their mobile phone and TV package before foregoing Internet access'
internet  broadband  uk  ofcom  research  recession  cutbacks  spending  consumer  mobile  tv  linx 
august 2009 by jm
Spinvox in trouble after BBC investigation
'A UK firm that turns mobile messages into text faces questions over its privacy standards, technology and finances following a BBC investigation' .. 'claims to the BBC suggest that the majority of messages have been heard and transcribed by call centre staff in South Africa and the Philippines.' 'The fact that messages appear to have been read by workers outside of the European Union raises questions about the firm's data protection policy.'
data-protection  privacy  facebook  bbc  technology  mobile  transcription  spinvox  security  south-africa  offshoring 
july 2009 by jm

related tags

2g  3g  4.4.2  4g  adblocking  africa  alan-taylor  analytics  android  apache  apple  apps  arab-spring  architecture  asia  bad-programming  bahrain  banking  base-stations  battery  battery-life  bbc  bikes  blackberry  blinkfeed  book  broadband  browser  browsers  bugs  builds  bunnie-huang  burner-phones  business  cd  cellphones  censorship  checklists  chicken-wings  children  china  ci  coding  consumer  cortana  crime  crypto  cryptophone  css  cutbacks  cycling  daring-fireball  data  data-protection  data-retention  desfire  devices  document  dojos  dpc  dublin  dublinbikes  eavesdropping  ebooks  ecommerce  egypt  embedded  encryption  etsy  evernote  facebook  fail  farebot  fast-food  filtering  finfisher  flood.io  fraud  funny  g1  games  gaming  gamma-international  gatling  geolocation  germany  global  globalisation  gongkai  google  gprs  gsm  hacking  hacks  hardware  hero  hsdpa  htc  htc-one  html5  http  http2  https  hutchinson  iap  ilya-grigorik  imessage  imsi-catcher  imsi-catchers  in-focus  internet  ios  ipad  iphone  ireland  irish  isps  jenkins  jmeter  js  kids  kitkat  latency  law  life  linx  llama  load-testing  locale  location  lte  mapping  maps  maps.me  messaging  meteor  mifare  mobile  mobile-phones  money  nat  network  networking  o2  o2fail  ocr  ofcom  offshoring  oh-dear  ohurley  open-source  os  outsourcing  p2p  packet-loss  packets  page-3  parenting  payg  payment  pdf  performance  phishing  phone  phones  photography  pictures  pii  police  politics  porn  prepaid  presentations  privacy  privacy-international  proxy  qnx  recession  release  research  reverse-engineering  rfid  rim  rootkits  rtt  rules  scams  scan  scanner  screen-time  search  security  selfies  shenzen  shine  shopping  short-codes  sim  sims  simulation  siri  skype  slides  smartphones  sms  sniffing  snooping  south-africa  spam  spending  spinvox  spying  sse  ssl  stingers  stingray  stingrays  surveillance  swrve  tcp  tech  technology  telcos  telecom  tester-dojos  testing  tests  tethering  the-atlantic  the-sun  three  tls  tracking  trains  transcription  transit  transparent-proxies  travel  travelling  trylib  turkmenistan  tv  udp  ui  uk  unity  us  usa  via:bernard-tyers  via:boingboing  via:eoin-brazil  via:ethanz  via:fanf  via:ip  via:jg  via:kragen  via:mala  via:sergio  via:tbyfield  via:yoz  visiting  voice-recognition  web  webrtc  websockets  whales  wifi  windows  wireless  wiretapping  xhr  zip-sim 

Copy this bookmark:



description:


tags: