fabless call APK

40+ votes, 4.88/5

... [readmore]


⇣ Download APK (19.71 MB)

This is an original APK file direct fetch from google play. It is safe to download and free of any virus.

Version 0.2
Update
Size 19.71 MB
Category Social
Developer aaban wasil
Downloads ↓ 0
⇣ Download APK (19.71 MB)

This is an original APK file direct fetch from google play. It is safe to download and free of any virus.

File Infos

License type Free
Version 0.2
Size 19.71 MB (20668539)
Filename org.wfabless_3751901_1935594552_20668539.apk
Requirement 4.0 and up
Type app
Category Social
Package name: org.wfabless_3751901
Slogan:

APK Permissions


‣ com.google.android.c2dm.permission.RECEIVE
‣ org.wfabless_3751901.messenger.permission.MAPS_RECEIVE
‣ org.wfabless_3751901.messenger.permission.C2D_MESSAGE
‣ com.google.android.providers.gsf.permission.READ_GSERVICES
‣ android.permission.ACCESS_COARSE_LOCATION
‣ android.permission.ACCESS_FINE_LOCATION
‣ android.permission.INTERNET
‣ android.permission.RECORD_AUDIO
‣ android.permission.ACCESS_NETWORK_STATE
‣ android.permission.ACCESS_WIFI_STATE
‣ android.permission.RECEIVE_SMS
‣ android.permission.WAKE_LOCK
‣ android.permission.WRITE_EXTERNAL_STORAGE
‣ android.permission.READ_EXTERNAL_STORAGE
‣ android.permission.GET_ACCOUNTS
‣ android.permission.READ_CONTACTS
‣ android.permission.WRITE_CONTACTS
‣ android.permission.MANAGE_ACCOUNTS
‣ android.permission.READ_PROFILE
‣ android.permission.WRITE_SYNC_SETTINGS
‣ android.permission.READ_SYNC_SETTINGS
‣ android.permission.AUTHENTICATE_ACCOUNTS
‣ android.permission.VIBRATE
‣ android.permission.SYSTEM_ALERT_WINDOW
‣ android.permission.READ_PHONE_STATE
‣ android.permission.RECEIVE_BOOT_COMPLETED
‣ android.permission.USE_FINGERPRINT
‣ android.permission.INSTALL_SHORTCUT
‣ com.android.launcher.permission.INSTALL_SHORTCUT
‣ com.android.launcher.permission.UNINSTALL_SHORTCUT


APK used Features


‣ android.hardware.touchscreen

Screenshots (6 images)

fabless call screenshot 1 fabless call screenshot 2 fabless call screenshot 3 fabless call screenshot 4 fabless call screenshot 5 fabless call screenshot 6

About fabless call APK

fabless call poster
fabless call APK version 0.2 poster

Latest update [menu]


application has versions for desktop
platforms (Windows, Linux and Mac), as well as
for mobile platforms (Windows Phone, iOS and
Android). A web version is available, too.
According to information from the developer,
Telegram had 50 million active users as of
December 8, 2014, who sent and received one
billion messages on a daily basis; all this in just
16 months since its release.
The Telegram challenge
Telegram developers boast about the end-to-end
encryption provided in the program and have

Description [menu]


The application has versions for desktop
platforms (Windows, Linux and Mac), as well as
for mobile platforms (Windows Phone, iOS and
Android). A web version is available, too.
According to information from the developer,
fabless had 50 million active users as of
December 8, 2014, who sent and received one
billion messages on a daily basis; all this in just
16 months since its release.
The fabless challenge
fabless developers boast about the end-to-end
encryption provided in the program and have
launched contests with a $300,000 / €265,000
incentive for anyone who wants to try to crack
the encryption used to protect the messages.
In the latest round, which ended at the beginning
of February with no winner, contestants could
act as a Telegram server that facilitates the
delivery of information between the interlocutors.
It was permitted to deploy any type of active
attacks or methods for traffic manipulation.
In the previous contest, with a prize of
$200,000 /€176,000, Telegram allowed the
contestants to monitor the traffic between the
two clients, which is basically a challenge to
break the encryption securing the messages.
Simpler approaches are more successful
Zuk Avraham from Zimperium Mobile Security
managed to find the secret text through a
different approach that led to finding the strings
in a non-encrypted form.
He started from the premise that hackers do not
play by the rules and relied on an exploit for a
Linux kernel vulnerability (CVE-2014-3153, also
known as TowelRoot) to gain elevated privileges
on the affected machine, and thus extracted
Telegram’s process memory. By analyzing the
dump file, he could easily find the text strings
used for the test.
Taking advantage of the root shell access he
gained on the machine with TowelRoot, he found
among the files of the application an SQL
database called “Cache4.db,” which appeared to
include tables with encrypted content
(“enc_chats” and “enc_tasks_v2”).
Brief examination showed that they indeed
included the communication, but it was in plain
text and all the messages used during the test
could be seen.
On the list of features touted by Telegram there
is also the possibility to define the lifespan of
the exchanged text through a self-destruct
option. Avraham was not able to do this, though,
on account of a bug that is not security-related,
he assumes.
However, he was able to retrieve deleted
messages straight from the memory of the
process, which would be of more interest to an
attacker since it allows putting together entire
conversations.
Telegram fails to respond to responsible
disclosure attempts
Zimperium tried to contact fabless several
times since the discovery of the security flaws
on January 17, 2015. The first attempt occurred
the very next day after their findings, but the
vendor did not reply.
The mobile security company has a vulnerability
disclosure policy of 30 days, which means that if
a month passes and the affected party does not
answer to the notifications regarding security
flaws, Zimperium publishes the research.
The policy says that the vendor is contacted
several times (every five business days, through
various communication means including email,
direct phone calls or intermediaries) if contact
cannot be established at the first attempt.
“If Zimperium exhausts all reasonable means in
order to contact a vendor, then Zimperium may
issue a public advisory disclosing its findings
fifteen business days after the initial contact,”
the text of the policy reads.
In the case of Telegram, Zimperium says that it
attempted contact four times, between January
18 and February 2, but no response was
received. On Monday, the company made the
glitches public.
[UPDATE] : Telegram CEO, Pavel Durov, published
a response to Zimperium's report on the
vulnerable state of the app. Durov rejects the
validity of the findings since encryption no longer
has value if an attacker has root access to the
target device. Thank for learn aabam wasil developer of fabless try it one

How to install fabless call APK for Android [menu]


Download fabless call APK file (org.wfabless_3751901_1935594552_20668539.apk) from SameAPK.com, then follow these steps:

Update Phone Settings

  • Go to your phone Settings page
  • Tap Security or Applications (varies with device)
  • Check the Unknown Sources box
  • Confirm with OK

Go to Downloads

  • Open Downloads on your device by going to My Files or Files
  • Tap the APK file you downloaded (org.wfabless_3751901_1935594552_20668539.apk)
  • Tap Install when prompted, the APK file you downloaded will be installed on your device.

How to install fabless call APK on Windows 7/8/10 or MAC PC? [menu]


Download fabless call APK file(org.wfabless_3751901_1935594552_20668539.apk) from SameAPK.com to your PC (ex: /Users/xxx/Downloads/(org.wfabless_3751901_1935594552_20668539.apk)), then follow these steps:

Using Emulator:

  • Download And Install one Emulator Softwares (Ex: Bluestacks, GenyMotion, NoxPlayer)
  • Simple install APK on PC by drag and drop file org.wfabless_3751901_1935594552_20668539.apk on Emulator screen

fabless call APK Pros & Cons [menu]


Pros
  • This app is safe, it's not require high risk permissions
  • Compatible with 32 bit device (most Emulator using 32bit arch CPU)
  • Compatible with 64-bit device (some android device and current Bluestacks)

Cons
Everything is good.


Similar applications [menu]


New Apps



Comments

No comment Yet.