PilferShush Jammer 4.1.2 [free]

описание

PilferShush Jammer blocks other apps attempting to utilise the microphone without your knowledge. Some apps use hidden processes to record tracking audio in the background
that is either generated by nearby beacons, television commercials, streamed music services or websites. This tracking audio is transmitted between 18 kHz and 22 kHz (near
ultra high frequency) which is beyond the range of typical human hearing but within the recording range of a typical Android phone.
To block unwanted use of the microphone by hidden app processes, PilferShush Jammer requests use of the hardware microphone from the Android system and holds it. This
technique locks up the microphone from any other apps attempting to gain access to it. This technique has been tested only on user apps, not system apps. The Android
system should halt PilferShush Jammer from blocking the microphone whenever a phone call is received or made.
When the jamming technique is running and the microphone is locked up, PilferShush Jammer posts a notification to keep the user informed that it is running. Tests have
shown that it uses 0% CPU, 0% network and 43.6mb RAM when running for over an hour.
This is an experimental app made as part of research into audio counter-surveillance methods within the Android and IoT world.
It requires RECORD_AUDIO permission so that it may access and lock up the microphone.
It does NOT record or listen to any audio.
It does NOT connect to the internet.
Version 2.0 Active Jammer addition:
Tones can be emitted with a carrier frequency and a drift limit with rate all constrained to NUHF of 18 kHz to 24 kHz depending on the device capabilities. For instance
20000 Hz carrier, drift limit 1000 Hz and rate slow - will output random frequency between 19 kHz and 21 kHz approximately every second.
Notes:
Audible artifacts are present during the NUHF tones but this may be changed in a future release.
White noise output may not be very effective at blocking and is a somewhat annoying sound
.
The speaker output may not have enough amplitude to block unwanted NUHF signals - testing will determine.
Source code is available here: https://github.com/kaputnikGo/PilferShushJammer
Research and Project webpage : https://www.cityfreqs.com.au/pilfer.php

Старые версии

Free Download Скачать на QR-код
  • Имя приложения: PilferShush Jammer
  • категория: Инструменты
  • Код: cityfreqs.com.pilfershushjammer
  • В последней версии: 4.1.2
  • требование: 4.3 или выше
  • Размер файла : 2.15 MB
  • время обновления: 2020-02-04