![]() |
#166 |
Connoisseur
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 92
Karma: 2222222
Join Date: Sep 2011
Device: Kindle
|
Just a quick question about the ad supported kindle. If I do not upgrade the firmware, and keep it in airplane mode, but later jailbreak disable automatic firmware upgrades, purchase the ad removal, do I need to upgrade my firmware in order to get rid of the ads?
|
![]() |
![]() |
![]() |
#167 | |
Wizard
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 1,751
Karma: 4382688
Join Date: Jul 2006
Location: Somewhere on earth
Device: Onyx Boox Tab X C
|
Quote:
The Amazon support removed the adds on my Kindle for free. |
|
![]() |
![]() |
![]() |
#168 |
Ex-Helpdesk Junkie
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 19,421
Karma: 85400180
Join Date: Nov 2012
Location: The Beaten Path, USA, Roundworld, This Side of Infinity
Device: Kindle Touch fw5.3.7 (Wifi only)
|
No, I just needed to connect to WiFi to have the ads removed.
Firmware upgrades are generic and apply to every device out there. You don't need a firmware upgrade to disable ads. It would be like needing a firmware upgrade to register your device. |
![]() |
![]() |
![]() |
#169 | |
Connoisseur
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 92
Karma: 2222222
Join Date: Sep 2011
Device: Kindle
|
Ok, thanks. What do you mean you by
Quote:
I wasn't sure if it was a firmware upgrade that made it ad free, or if was just a registration issue. |
|
![]() |
![]() |
![]() |
#170 | |
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
Quote:
None of those are going to be getting an upgrade again in our lifetime. Jailbroken Kindle is not required to remove ads, just pay the fee (if any) and connect to Amazon. Your batting a perfect game - neither. You don't need a firmware upgrade to remove the ads after opting out with Amazon. S.O. program is just an entry in their database and a matching one in your Kindle. But you do have to let the device connect with Amazon so that Amazon can record your opt-out on the device itself. Removing ads is not (directly) related to device registration. It is in-directly - - It has to be registered so that the "manage my Kindle" page works at the Amazon site for that device. It is that page that allows you to opt-out of the service. |
|
![]() |
![]() |
![]() |
#171 | |
Wizard
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 1,196
Karma: 1281258
Join Date: Sep 2009
Device: PRS-505
|
Quote:
|
|
![]() |
![]() |
![]() |
#172 | |
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
Quote:
But the context got lost (our comments on NoExpert's post). A statement like: "If not fixed by <deadline> then we will do <something>" is a threat. I think that you will see that our rational in withholding publication while the vendor has time to evaluate the situation is exactly the same as the cert's description of their policy. Both the first and second paragraphs of the page you linked to. The only significant difference is the author has not published an exact time period. The reasoning here is that a responsible vendor does not need to be pressured into correcting a potentially harmful software error. If it needs fixing (in the vendor's opinion), then it will get fixed. And just for the record, here is the last time our members found an exploitable error: http://www.kb.cert.org/vuls/id/122656 https://web.nvd.nist.gov/view/vuln/d...=CVE-2012-4248 https://web.nvd.nist.gov/view/vuln/d...=CVE-2012-4249 If the vendor feels they need a specific amount of working time, then they will coordinate that with the author. I can think of no reason that the author need publish any of those negotiations. Also, keep in mind that Amazon/Lab126 actively follows the discussions on this site. A thread that gathers an average of 1,000 views per day gets their attention. Last edited by knc1; 10-23-2015 at 10:21 AM. |
|
![]() |
![]() |
![]() |
#173 |
Junior Member
![]() Posts: 3
Karma: 10
Join Date: Oct 2015
Device: PW3
|
![]()
Keep up the great work ! let me know if you guys ever need anything
|
![]() |
![]() |
![]() |
#174 |
Connoisseur
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 95
Karma: 1699999
Join Date: Aug 2015
Device: Voyage
|
Amazon security team isn't responding to my e-mails at this point. Will release Oct 31st.
|
![]() |
![]() |
![]() |
#175 |
Addict
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 230
Karma: 1500000
Join Date: May 2007
Location: San Vito de Coto Brus, Costa Rica
Device: Sony PRS-500, 505, 600, 350, T1 Amazon Kindle PW1, PW2, Voyage
|
|
![]() |
![]() |
![]() |
#176 | |
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
Quote:
https://forms.cert.org/VulReport/ I think you have more than met the "... make a reasonable attempt to contact the affected vendor." requirement. I have never used it myself, but it seems straight forward: https://forms.cert.org/VulReport/sta...tructions.html Last edited by knc1; 10-23-2015 at 05:58 PM. |
|
![]() |
![]() |
![]() |
#177 |
hub
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 715
Karma: 2151032
Join Date: Jan 2012
Location: Iranian in Canada
Device: K3G, DXG, Kobo mini
|
|
![]() |
![]() |
![]() |
#178 |
Member Retired
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 3,183
Karma: 11721895
Join Date: Nov 2010
Device: Nook STR (rooted) & Sony T2
|
Out of interest, how does the hack represent a threat? Presumably the hack can only be used by a user on their own device. Would it possible for a hacker to access someone else's device?
|
![]() |
![]() |
![]() |
#179 | |
Going Viral
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 17,212
Karma: 18210809
Join Date: Feb 2012
Location: Central Texas
Device: No K1, PW2, KV, KOA
|
Quote:
![]() But consider what has to happen to install our developer's signature certificate; execution of arbitrary code with 'root' privileges. Never a nice thing on any computer system. For instance, the 2012 vulnerability was not under the user's control, which is why it could represent a threat. (See links above for details of that one). Last edited by knc1; 10-23-2015 at 09:58 PM. |
|
![]() |
![]() |
![]() |
#180 | |
Member Retired
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 3,183
Karma: 11721895
Join Date: Nov 2010
Device: Nook STR (rooted) & Sony T2
|
Quote:
Edit: Okay, I see that if the device is rooted, theoretically connecting to a malicious web page could be a threat. Last edited by Rizla; 10-24-2015 at 09:24 AM. |
|
![]() |
![]() |
![]() |
Tags |
jailbreak, jailbreaking |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
KINDLE DEAL: Released: A Story of God’s Power Released in Pro Baseball ($ | gospelebooks | Deals and Resources (No Self-Promotion or Affiliate Links) | 0 | 07-14-2011 09:12 PM |
iPad iPad jailbreak released | scottjl | Apple Devices | 25 | 05-08-2010 02:20 PM |