full image - Repost: A text file was read either from an Android phone or from a Google drive when a chromium book and a android phone were on a partly public Wi-Fi. Need to figure out how that happened and how to protect against it? (from Reddit.com, A text file was read either from an Android phone or from a Google drive when a chromium book and a android phone were on a partly public Wi-Fi. Need to figure out how that happened and how to protect against it?)
Mining:
Exchanges:
Donations:
A text file was read either from an Android phone or from a Google drive when a chromium book and a android phone were on a partly public Wi-Fi. Need to figure out how that happened and how to protect against it?My friend lost a small amount of Bitcoin because in the text file was a very old address with a private key. That's how he knows the file was read. And he nlonows exactly when the Bitcoin transfer happened.It wasn't a large financial loss but he's freaked because he wants to know if someone's able to read his Google drive or read text on his phone when he's on a public wi-fi. The Chromebook had access to his Google drive and his Android phone had access to his Google drive and the Android phone and the Chromebook were Google linked together. There may have been a time when they were actually physically linked together with a dual charger cord as well but I don't think so.He had used that set up many times before and never had a problem.He had a crypto address monitoring program running so he actually got notified in real time as the funds were transferred and he realized the funds that were transferred were from old Bitcoin addresses that he had kept in this text file. Obviously we all know that you shouldn't keep private keys in a text file so that's not really the issue . no need to say that. It was a very old text file with some very old addresses with not much coin in them.The big question is is somebody now able to read his Google drive and or read his phone and how can he check?He knows the only txt file that the private keys were on on his Google drive and on his phone. The same txt file was on his phone and on his Google drive. He checked his Google drive to see if that file had been accessed recently and it said it had not been accessed by him recently. I'm assuming Google drive would have thought that anyone who accessed it was him so it would have indicated he accessed it. I'm also assuming that anyone who accessed the file probably did a full scan quickly for Bitcoin related addresses and did the transfer relatively quickly. I doubt someone would have had a txt file unless they knew it had the addressed or they did a complete text scan of his whole Google drive and and or phone somehow. The file name was innocuous so it would have taken a deep scan to detect the Bitcoin and think that file was special in any way. He has gigabytes of files on his Google drive.the only unusual thing he did one day before the incident was he gave permission for an popular note app on the android app store to link across his Android devices so all notes were merged. He had never done that before.This apparently gives that app some amount of file storage ability on his Google drive. I'm not sure if that gives that app the complete readability of everything on his Google drive and what happened maybe totally unrelated to that particular program but I'm mentioning it because I'm trying to say it all the circumstances that were in play when the transfer happened.Apparently he was on his Chromebook watching some videos through VLC player and generally browsing the internet on his phone to sites that he had visited many times before. So I'm not sure there was anything unusual in that unless a video file can be hacked so that when VLC runs it it runs a worm or something.He actually had a third Android phone also using the Wi-Fi and that phone was acting weird in terms of it was showing its storage was getting very low and it rebooted itself a couple of times. For that matter apparently so did his chromebook. As far as I know he's never shared any finals from his Google drive.Any thoughts are welcome. Any software or other things that might be used to do some penetration testing to figure out how this thing happened is really kind of the goal because if it's his Google drive he wants to know and if it's somebody's able to read his phones he wants to know and it may be a coincidence that it happened while he was tied to this sort of public network public Wi-Fi or it may not.That's all I know thanks.
Social Media Icons