Sony DSC-RX100M3 Sensor Dust [Sample Pics] : [Repaired by Sony]

Sony DSC RX100M3 Sensor Dust Sample Image RX100 RX100M2 RX100M4 RX100iii

I bought my RX100M3 in December 2014 and it’s pretty much the only camera I use to capture my personal memories and I choose to leave the bulky Canon 5D Mark iii for work only events.

In the last 8 months I’ve taken my trusty RX100M3 skiing in Austria, a long weekend in Paris, a stag week in Vegas, a week at Glastonbury Festival and most recently a week in Switzerland. I look after my kit and it’s never dropped, exposed to moist or excessively dusty environments, kept in a soft pouch, etc. It’s got an official Sony screen protector on the rear and Sony grip on the front. (If you are reading this and you own any RX100 model do yourself a massive favour and buy the Sony stick on grip, you’ll thank me).
So on my latest trip to Switzerland I was trying to capture the beautiful lake view and instantly noticed a large dark spot in the sky on every image.

Sony RX100M3 Sensor Dust
Continue reading “Sony DSC-RX100M3 Sensor Dust [Sample Pics] : [Repaired by Sony]”

Fuji X10 problem with dust inside lens units

Fuji X10 Dust Inside LensI’ve only had my Fuji X10 for a couple of months and it’s an excellent bit of kit but it’s not without its flaws. Aside from the known issue with white discs (blooming) in highlight areas and slow boot times if you don’t format the card in the camera I’ve now got a bigger and much more annoying problem dust inside my lens.

I checked the camera thoroughly when I received it and there were definitely no dust traces inside the lens when it was new. The other day I was cleaning it with my trusty Lens Pen 2 and noticed there were some stubborn spots of dirt I couldn’t shift. On closer inspection I was shocked to find there is what I consider to be a large number of dust particles clinging to the inside of the front lens element and also to one of the inner lens elements.

Fuji X10 Dust Inside Lens

It seems that this is quite a common problem with many other Fuji X10 users reporting the same. It is, however, reassuring to know that Fuji have been cleaning dust from inside the lens for other users free of charge under warranty. I will be getting this done but since Fuji have announced there is a new sensor replacement program on the horizon this month (May 2012) to combat the white orb sensor issue, I think I’ll wait until I send it off for the sensor swap and ask them to clean inside the lens at the same time.
Continue reading “Fuji X10 problem with dust inside lens units”

How to hack Facebook and other iOS apps using a plist extracted from iOS backups

Facebook_Hack_Plist_OAuth_Backup_scoopz_com

Summary

This post details the step-by-step method required to extract a plist/OAuth token from a standard (non encrypted) iTunes backup of any iOS device (iPod Touch, iPhone and iPad) and then copy this onto another device to automatically log in using those creditials.

NOTE: The process outlined below will not work if you have iTunes set to encrypt your iOS backups. This method was confirmed as working as of 10th April 2012 using the latest iOS xxx and current Facebook (v.4110.0), Dropbox (v1.4.6) and LinkedIn (v35) iOS apps. You do not need to have a jailbroken iPhone or iPad for this to work. I do not condone using the methods below to gain access to anybody’s accounts without their prior permission, I hold no responsibility if using the information in this post lands you in trouble with your ex partner,  current partner, your boss, the police, your kids, etc.

Background

In case you weren’t aware a security flaw was found by Gareth Wright earlier this week that allows your Facebook login key to be copied form one iOS device to another and essentially allow a 3rd party access to your account without needing to know your account email address or password. The same vulnerability has also been found in Dropbox, LinkedIn, Tumblr, Vimeo and 1Password. At the time of writing this post, Dropbox have said they are going to address the problem and 1Password have gone one step further and rewritten the way the user details are stored so this exploit cannot be used anymore and have submitted the update to Apple for approval before it’s released. Facebook appear to dismiss the security vulnerability saying it is only really an issue if your device is jailbroken or you use a 3rd party app to access the files on your iOS device. WRONG! If you have ever connected your iOS device to iTunes via USB and iTunes has taken a backup of your device then you are at risk (unless you tick the box to encrypt your backups, in which case rest easy and don’t worry about anything written below). The plist file that is the centre of this whole security flaw is copied to your computer via iTunes backup, no third party app here extracting files as Facebook suggests. Granted you need a third party app to access the file and place it onto another iOS device but crucially, the insecure file is copied to your computer during a normal iTunes backup.

What does this mean to most end users then? Probably not a lot to be honest. If you only ever connect your iPhone or iPad to your own personal computer then there’s nothing to worry about since the insecure file, locked away in the backup of your device, resides on your personal machine and nobody else can get to it easily. But in today’s modern and social society, the likelihood is that you have a computer you share with your wife, girlfriend, housemates, family or you have been at a friends house with a low battery and connected your iPhone to give it a little extra juice. This is where things become a little more vulnerable, if the computer you connected your device to made a backup of your device (remember a backup is always made when you are updating the iOS via iTunes) then the crucial plist file with your OAuth key in for apps such as Facebook, Dropbox, LinkedIn and more now reside on that computer in that backup.

So if you currently share a computer with your partner and want to log into Facebook as them, you can if you follow the steps below. Likewise, if your ex-partner used to connect their iPhone or iPad to your computer but left you several months ago for somebody hotter, then you too can dip into their old backup on your computer and log into Facebook and other apps as them. [Again I re-iterate the moral/legal implications of such actions]

Step by Step Guide

Ok so how can you hack into somebody else’s Facebook using a file from their iOS backup? You’ll need two pieces of sofware:
1 – to read the backup files an extract the plist file
2 – to allow you to drag and drop plist files onto your current iOS device

Let us pretend you want to gain access to your ex-girlfriend’s Facebook account and you know that she used to connect her iPhone or iPad to your computer. The first thing to do is open up iTunes and go to Preferences and select the Devices icon along the top which lists all device names that are backed up on your machine along with date of the backup.Facebook_Hack_Plist_OAuth_Backup_scoopz_com

Continue reading “How to hack Facebook and other iOS apps using a plist extracted from iOS backups”