- #OpStopReliance - twitter.com/opindia_revenge @opindia_revenge
- * Reverse engineered Reliance Jio app.
- * Took all the components apart.
- * Found references to chinese code. IPs found "18.104.22.168:8086", "poc.gongsunda.com:8083", "www.rsocial.net:8087", "acp.jiobuzz.com:8090" - https://twitter.com/opindia_revenge/status/610128602009448448
- * Reliance is sending unencrypted geolocation data to a chinese company. - https://twitter.com/opindia_revenge/status/610161774030098433
- * Using plain HTTP instead of HTTPS. - Main point that we wanted to prove. -https://twitter.com/opindia_revenge/status/610160684874223616
- * Putting people at security risk of getting hacked by chinese hackers.
- R.I.P Reliance Jio App
- Rest is upto the people if they still trust Reliance Jio and their projects. Also don't expect gov to take action on this. They enjoy idea of mass surveillance.
a guest Jun 14th, 2015 1,571 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
RAW Paste Data