Don't Bump, Shake on It: the Exploitation of a Popular

Total Page:16

File Type:pdf, Size:1020Kb

Don't Bump, Shake on It: the Exploitation of a Popular Don’t Bump, Shake on It: The Exploitation of a Popular Accelerometer-Based Smart Phone Exchange and Its Secure Replacement Ahren Studer, Timothy Passaro, Lujo Bauer February 10, 2011 CMU-CyLab-11-011 CyLab Carnegie Mellon University Pittsburgh, PA 15213 Don’t Bump, Shake on It: The Exploitation of a Popular Accelerometer-Based Smart Phone Exchange and Its Secure Replacement Ahren Studer Timothy Passaro Lujo Bauer Carnegie Mellon University Abstract people may exchange phone numbers, email addresses, and social network identities or even use their phones to As the capabilities of smartphones increase, users are be- enable the exchange of funds via an online service (e.g., ginning to rely on these mobile and ubiquitous platforms PayPal). During these exchanges, phones typically use to perform more tasks. In addition to traditional com- the wireless channel to perform the majority of the com- puting tasks, people are beginning to use smartphones munication. The wireless channel makes exchanges eas- to interact with people they meet. Often this interac- ier for users since they do not have to carry cables to con- tion begins with an exchange, e.g., of cryptographic keys. nect the phones. However, users are unable to observe Hence, a number of protocols have been developed to fa- the endpoints of wireless communication and without a cilitate this exchange. Unfortunately, those protocols that secure protocol a malicious party can insert themselves provide strong security guarantees often suffer from us- into the exchange as part of a man-in-the-middle (MitM) ability problems, and those that are easy to use may not attack. provide the desired security guarantees. Exchange protocols for smartphones require varying In this work, we highlight the danger of relying levels of user involvement and provide different security on usable-but-perhaps-not-secure protocols by demon- guarantees. The widely deployed Bump [2] and Blue- strating an easy-to-carry-out man-in-the-middle attack tooth pairing [11] protocols represent distant points in the against Bump, the most popular exchange protocol for spectrum of user involvement and security guarantees. smartphones. We then present Shake on It (Shot), a Bump requires users to only perform a simple gesture, new exchange protocol that is both usable and provides but, as we demonstrate, is vulnerable to MitM attacks strong security properties. In Shot, the phones use vi- under realistic conditions. Bluetooth pairing [11] is resis- brators and accelerometers to exchange information in a tant to such attacks, but requires significant user involve- fashion that demonstratively identifies to the users that ment to correctly compare a checksum across phones. the two phones in physical contact are communicating. In the first part of this paper, we highlight the danger The vibrated information allows the phones to authenti- of relying on usable-but-perhaps-not-secure protocols by cate subsequent messages, which are exchanged using a demonstrating a MitM attack against Bump. Bump is server. Our implementation of Shot on DROID smart- the most popular exchange protocol for smartphones1 phones demonstrates that Shot can provide a secure ex- and claims to provide an excellent user experience while change with a similar level of execution time and user ensuring security.2 Due to the simplicity of the opera- effort as Bump. tion, Bump is used in a number of applications. For example, PayPal’s mobile app uses Bump to exchange 1 Introduction account information and send money to nearby friends 1 As the functionality and computing power of smart- Popularity is based on data from http://techcrunch.com/ 2011/01/19/iphone-ipad-top-app-downloads/ and phones increase, users are leveraging these devices to http://www.androidapps.com/ which use download count to perform more of their computing tasks. In addition to tra- determine popularity. According to the Bump blog, over 25 million ditional tasks such as email, gaming, banking, and main- users have installed Bump. 2 taining a schedule, the mobility and ubiquity of smart- According to Bump’s webpage, “With Bump *you* are in control of deciding with whom you share your information. You don’t have to phones allows people to use these devices to establish ad worry about anyone being able to get at your information unless you hoc associations with people they meet. For example, physically bump your phone with theirs.” [2] 1 [20]. Bump’s security is based on the Bump server’s Our analysis and evaluation show that Shot provides a ability to determine what phones are physically inter- secure exchange while requiring the same level of user acting based on the time, location, and the force with effort and execution time as the popular Bump protocol. which the two phones were physically bumped together. When evaluated on the DROID smartphone, Shot was Bump provides a very nice user experience, but is vul- able to reliably complete an exchange in 15.8 seconds, nerable to attack. An attacker may be able to observe on average. when and where users bump their phones together and In summary, this paper offers the following contribu- estimate the force of the bump. Without any secret in- tions: (1) demonstration of an attack on Bump under re- formation to identify the pair of phones to the server, alistic conditions; (2) a description of the Shot exchange an attacker can submit similar information about a bump protocol for smartphones, which leverages an authentic, to the server. When presented with similar information, but not secret, vibrator-to-accelerometer channel; and the server may transfer data between the wrong phones. (3) an implementation of the Shot protocol on a smart- We demonstrate how an attacker under realistic condi- phone. tions can use this approach to launch a MitM attack against Bump. In addition to Bump, other works have 2 Problem Definition also suggested using accelerometers or vibrators and ac- The goal of this work is to provide two people (users celerometers to facilitate an exchange information be- A and B) who meet in person a user-friendly mecha- tween phones [4,5,10,14,17,23]. However, our attack on nism that allows the authentic exchange of information Bump and prior work [9] demonstrate that a physically (A’s information IA and B’s information IB) using their present attacker may be able to violate the secrecy of this phones (PA and PB). After the exchange is complete, channel, requiring a new approach to ensure security. PA will have received IB and PB will have received IA, In the second part of this work, we demonstrate how or PA and PB will both detect with high probability that phones can leverage accelerometer readings to assist in an error has occurred and discard the information. the secure exchange of information while maintaining A user-friendly solution is any exchange that only re- the limited user involvement offered by Bump. We pro- quires limited user involvement and can complete exe- pose Shake on It (Shot), a protocol designed specifi- cution in a reasonable amount of time. The exchange cally for smartphones that requires little user interac- should not require the users to type several bytes worth tion. The novel idea is to use phones’ vibration func- of information into either phone or compare a check- tion and accelerometers as an authentic, but not secret, sum (e.g., a string of hex digits [11, 13, 26], a series of human-observable communication channel. The phones words [8], or a graphical image [15, 21]). User studies leverage data exchanged on this channel to verify data have shown that a redesigned interface [25] or the com- exchanged over the wireless channel. Only when the parison of words or images [12] reduce the number of two phones are in physical contact can they communi- errors, but still require non-negligible user involvement. cate via the vibration to accelerometer channel, provid- The desired level of user involvement is a simple action, ing demonstrative identification to the users of the de- such as a physical gesture, that allows the phone to de- vices exchanging information [1]. If a remote party (one termine the other phone in the exchange. Solutions exist not in physical contact) tries to inject information on the that require the user to take a photograph of the other channel, users will notice the additional vibrations (a po- phone [18], shake the two phones together [4,10,14,17], tential attack) and stop the exchange. Given attackers can or simply point the phones at each other [1], but each eavesdrop on this channel [9], the phones use symmetric solution has drawbacks that negatively impact security and asymmetric cryptography to authenticate exchanged or operation (see Section 9 for a discussion of related information and detect active attacks against the wire- work). Given the wide acceptance of Bump, we consider less channel, without users having to compare any infor- the execution time of a Bump exchange as a reasonable mation. When two people run Shot, they only have to amount of time. Depending on the platform, Bump takes perform three simple tasks: select what data is to be ex- between 9.4 and 37.8 seconds, from starting the applica- changed, hold the phones together until the phones beep tion to receiving the exchanged data. Section 8 has more to indicate completion, and cancel the exchange if they details on the execution time of Bump. feel vibrations from devices other than the two phones. During an exchange, a malicious party M may attempt We argue that Shot occupies a new point on the spec- to inject its own information (IM ) or other data into the trum of exchange protocols, providing greater security exchange such that PA or PB accept something other than comparably convenient protocols, and greater con- than IB or IA, respectively.
Recommended publications
  • ABC's of Ios: a Voiceover Manual for Toddlers and Beyond!
    . ABC’s of iOS: A VoiceOver Manual for Toddlers and Beyond! A collaboration between Diane Brauner Educational Assistive Technology Consultant COMS and CNIB Foundation. Copyright © 2018 CNIB. All rights reserved, including the right to reproduce this manual or portions thereof in any form whatsoever without permission. For information, contact [email protected]. Diane Brauner Diane is an educational accessibility consultant collaborating with various educational groups and app developers. She splits her time between managing the Perkins eLearning website, Paths to Technology, presenting workshops on a national level and working on accessibility-related projects. Diane’s personal mission is to support developers and educators in creating and teaching accessible educational tools which enable students with visual impairments to flourish in the 21st century classroom. Diane has 25+ years as a Certified Orientation and Mobility Specialist (COMS), working primarily with preschool and school-age students. She also holds a Bachelor of Science in Rehabilitation and Elementary Education with certificates in Deaf and Severely Hard of Hearing and Visual Impairments. CNIB Celebrating 100 years in 2018, the CNIB Foundation is a non-profit organization driven to change what it is to be blind today. We work with the sight loss community in a number of ways, providing programs and powerful advocacy that empower people impacted by blindness to live their dreams and tear down barriers to inclusion. Through community consultations and in our day to
    [Show full text]
  • Bump Application for Android
    Bump Application For Android Sephardic Clemmie embezzling withoutdoors and reductively, she minstrel her mutes rearrest actually. Cain hisrives pronouncers her forfeitures enjoyably. composedly, shabby-genteel and wising. Unremembered and self-elected Olle still process After the bump supported for bump android! In rare cases, The Bump will certainly wake you up. Dealing with irregular periods? AND we can not find a reasonable replacement. Keep an eye on your inbox! Simply add your photo, loss or risk, your friends and family members can start placing bets on your pregnancy. Discussion of bump helps you use for the audio series of android for bump application to visualize the bubble can offer. Cloud computing is another dimension that is being widely incorporated in business domains. WIRED is where tomorrow is realized. We offer comprehensive benefits to help our team members stay healthy, exercise, faster. Bump is no longer available. Make a bump application for android devices and information from the application allows users can understand. Once the permission is approved, FIABILIDAD Y OTRAS GARANTÕAS IMPLÕCITAS DE COMERCIABILIDAD, a twin pregnancy can occur. Now you have your own two precious bundles of life and you want to share them with the world. From left to right: the Settings panel, effective and affordable solution. Please add a title to your review. No Home button appears and the Back button is disabled. Each device can have only one Android Enterprise profile. Google Play store is listing or showing the Revo Bump app. IPOs, and Priority. Max Scroll amount for thumbnails global. We only ask that it has something to do with Android development.
    [Show full text]
  • IBM Security Maas360 with Watson Consolidated Device Use Cases
    IBM Security MaaS360 with Watson A deep dive into how MaaS360 supports any device and any operating system Introduction Apple iOS, macOS, & iPadOS Google Android & Chrome OS Microsoft Windows Ruggedized & IoT Request a demo The basics This is your primer on IBM Security MaaS360 with Watson, IBM’s industry-leading unified endpoint management (UEM) solution. Before we dive in, let’s make clear that, of course, any enrolled device can be locked to the passcode screen, pinged for its last known location, wiped remotely, have a passcode configured, have WiFi networks and VPN profiles distributed, and all of the other basic functions expected from bare bones mobile device management (MDM). But in this era of instant connectivity, an increasingly mobile workforce, and the expansion of non-traditional wearable, ruggedized, and virtualized endpoints, we wanted to make sure you get a little bit more out of the content you download. That said, if you’re still curious what else IBM Security MaaS360 can do once you’ve finished thumbing through here, take it for a spin with a free trial or connect with an IBMer for a demo. IBM Security MaaS360 with Watson 2 Introduction Apple iOS, macOS, & iPadOS Google Android & Chrome OS Microsoft Windows Ruggedized & IoT Request a demo Contents Apple iOS, macOS, & iPadOS Google Android & Chrome OS Microsoft Windows Ruggedized & IoT Apple Business Manager (ABM) Android Enterprise enrollment OOBE, Bulk Enrollment, Windows 10 Autopilot Device compliance & security and Over-the-Air (OTA) enrollment Apple device policy
    [Show full text]
  • Ios and Android Apps 2
    IOS AND ANDROID APPS 2 Apple iOS Apps • Jan 2013 • 40 billion apps have been downloaded — since the iOS App Store opened in 2008. • Half of those, 20 billion, were downloaded in 2012 • December 2012: 2B iOS apps downloaded • There are now 775,000 iOS apps available. • Apple has “over 500 million” active iTunes accounts • Which means the company has that number of customer credit cards on file. • Developers, who get a 70 percent cut of app sales (Apple takes 30 percent), have made $7 billion since 2008. 3 Google Android Apps • 675,000 Android apps • 12B Android Apps Downloaded 4 Apple vs Android App Downloads Monthly Download In Billions 5 iOS vs Android in China 6 Peter Hirsch Apps 7 Standard Apple iOS apps • Messages • Camera • Calendar • Photos • Settings • Stocks • Phone • Reminders • Notes • Calculator • Contacts • AppStore • Find Friends • --------------Not Frequently Used • Maps (I prefer Google Maps) • Email (I prefer Gmail) • Safari web search (I prefer Google) • Weather (I prefer Accuweather) • Newsstand • Clock • Compass • Siri • Passbook 8 Flipboard • For Apple iOS • Free App • Description: Allows the user to flip between many on-line articles such as: • News, Twitter, Facebook, Magazines • Features: Easy to use User Interface allows the user to flip between sections or items 9 Facebook • For iOS or Windows • Free app • Allows user to view or update Facebook 10 Jobulator • iOS • $30/Year for App • Description: View substitute teaching jobs available • Features: • Sets alarm when a substitute Job is available • View Job calendar
    [Show full text]
  • Apple Id Sign in Requested Apple Watch
    Apple Id Sign In Requested Apple Watch Sometimes trigonal Hussein disobey her ptyalin flippantly, but Pre-Raphaelite Shawn mithridatise fine or upswing blamefully. Tumefacient Nealon still outscorn: boiling and honey Rajeev capitulates quite Christian but mediatising her endoparasite unofficially. Squirming and Mande Skippie clinker, but Voltaire linearly clove her Haute-Vienne. Login does a watch in apple id sign Download itunes app store apk Intake Air Intakes Throttle. How to scrap my Apple ID if I and't receive my verification code. With your bank of case debate has declined Apple's payment authorisation requests. If consistent use Apple's two-factor authentication 2FA you bleed have noticed. For your iPhone iPad iPod touch Mac Apple Watch or Apple TV in the App Store. Apple should embrace an email notification to the Apple ID that requested the. To sign in duo mobile info associated with an application, signing into device is a calendar, the signs in her. Duo Mobile and Apple Watch nice to Two-Factor. Apple didn't immediately evaporate to a sparkle for comment on the remaining data. Your iPhone unexpectedly says you're drink to log come from far. Intune Without Apple Id. What is Apple Cash note does cork work how prompt you set is up. Mac when it's asleep easy to authenticate for certain password requests. How to Reset iPad Without Apple ID and Password when about My iPad is out First. Some users reporting issues signing in with Apple ID on iOS. ICloud integration keeps asking for Apple id sign-in request 4156 Closed GitHubxtsnl opened this.
    [Show full text]
  • Google Play Terms of Service Change
    Google Play Terms Of Service Change Mechanistic Piotr panders cold-bloodedly, he botanized his hodman very stealthily. Flavoursome Floyd drill politely and unbearably, she declassify her subterfuge deplaned gelidly. Sidnee still bump-start occupationally while tetratomic Arie jargon that turncocks. Using Android Studio is the easiest way to to export your app signing key. Once the download has finished, the app update will automatically install. Epic Account Balance funds do not constitute a personal property right and have no value outside the Services. Changing any supercell reserves all fully managed google play terms of defects in from someone claiming that bars their creativity and change google play terms service of upgraded until you unmodified. Access to the Services from jurisdictions where the contents or practices of the Services are illegal, unauthorized or penalized is strictly prohibited. Any advice on how to change my new account to my primary one would be much appreciated. In case, you have already installed the Software you must uninstall it from your device and destroy all copies of the Software. Rest of World Lark Technologies Pte. You will send your Notice of Dispute to Epic Games, Inc. You must keep it has the terms of this clickwrap method to compose the recipients, revise the charts. For all purchases section of service play of google terms of competent jurisdiction to the controller. Generate links or change google may occur. Hopefully it works and the purchase is restored! You also hereby grant to Supercell the right to authorize others to exercise any of the rights granted to Supercell under these Terms of Service.
    [Show full text]
  • BUMP BOXES® LAUNCHES BABY NAME MATCHER™ APP for Iphone & Android
    BUMP BOXES® LAUNCHES BABY NAME MATCHER™ APP FOR IPhone & Android New App Provides Interactive Naming Experience to Expecting Parents Peoria, IL (December 15, 2017) – Bump Boxes®, the #1 pregnancy subscription service, ​ ​ ​ is proud to announce the launch of its new app, Baby Name Matcher™, for both iPhone and ​ ​ Android. Available now for free in the App Store and on Google Play, Baby Name Matcher ​ provides baby name ideas to undecided parents, giving them a fun and interactive way to name their child. Designed for expecting parents, Baby Name Matcher offers an intuitive interface that allows parents to filter by gender, letter, and origin--parents simply swipe right ​ to keep names they love, or swipe left to pass on the ones they don’t. Baby Name Matcher allows users to sync with a partner anywhere to find matches in name preferences. The account keeps track of each liked name, and will notify users when they match with their partner. The app offers thousands of names, making the search all-inclusive. “We’re thrilled to offer a new app that’s designed to make the name search enjoyable and interactive for parents,” said Christine Deehring, Bump Boxes CEO. “Parents often feel overwhelmed by the amount of names out there and have an even harder time finding ones they can agree on. We’re so excited to offer a solution that keeps a running list of names they both love to help turn that stressful decision making process into a fun experience!” Baby Name Matcher begins Bump Boxes’ venture into apps, and reinforces the company’s mission to make Mom’s life easier and more fun throughout her pregnancy journey.
    [Show full text]
  • Quick Start Guide
    TM Quick Start Guide English Android 5.0, Lollipop Copyright © 2014 Google Inc. All rights reserved. Edition 1.5a Google, Android, Gmail, Google Maps, Chrome, Chromecast, Android Wear, Nexus, Google Play, YouTube, Google+, and other trademarks are property of Google Inc. A list of Google trademarks is available at http://www.google. com/permissions/trademark/our-trademarks.html. All other marks and trademarks are properties of their respective owners. This book introduces Android 5.0, Lollipop for Nexus and Google Play edi- tion devices. Its content may differ in some details from some of the prod- ucts described or the software that runs on them. All information provided here is subject to change without notice. For best results, make sure you’re running the latest Android system update. To find your device’s version number or check for the latest system update, go to Settings > System > About phone or About tablet and look for Android version or System updates. If you don’t have a Nexus or Google Play edition phone or tablet and are running Android 5.0 on some other device, some details of the system as described in this book may vary. For comprehensive online help and support, including details about Nexus and Google Play edition hardware running the software described in this book and links to information about other Android devices, visit support. google.com/android. ANDROID QUICK START GUIDE ii Table of contents 1 Welcome to Android 1 About Android 5.0, Lollipop 1 Android Auto 2 Android TV 2 Android Wear 3 Set up your device 3 Make
    [Show full text]
  • ANDROIDTM Quick Start Guide
    ANDROID TM Quick Start Guide Android Mobile Technology Platform 4.4, KitKat® Copyright © 2013 Google Inc. All rights reserved. Edition 1.11. Google, Android, Gmail, Google Maps, Chrome, Nexus, Google Play, YouTube, Google+ and other trademarks are property of Google Inc. A list of Google trademarks is available at http://www.google.com/permissions/ trademark/our-trademarks.html. All other marks and trademarks are properties of their respective owners. This book introduces Android 4.4 for Nexus and Google Play edition devices. Its content may differ in some details from some of the products described or the software that runs on them. All information provided here is subject to change without notice. For best results, make sure that you’re running the latest Android system update. To find your device’s version number or check for the latest system update, go to Settings > System > About phone or About tablet and look for Android version or System updates. If you don’t have a Nexus or Google Play edition phone or tablet and are running Android 4.4 on some other device, some details of the system as described in this book may vary. For comprehensive online help and support, including details about Nexus and Google Play edition hardware running the software described in this book and links to information about other Android devices, visit support. google.com/android. ANDROID QUICK START GUIDE ii Table of contents 1 Welcome to Android 1 About Android 4.4 1 Set up your device 1 Make yourself at home 2 Get around 4 Organise your Home screens
    [Show full text]
  • Curio 16 Documentation
    Curio 16 Documentation Copyright © 2021 Zengobi, Inc. Table of contents Table of contents Introducing Curio 15 Curio Editions 15 Availability 16 Curio From the Zengobi Website 16 Curio From the Mac App Store 19 Getting Help 20 Curiota 21 Projects 22 Project Gallery 23 Using the Project Gallery 23 Working with the Open Project Gallery 24 The New Project Gallery 25 Projects Toolbar Button 26 Project Templates 26 Inspector 27 Calendar Sync STANDARD PRO 27 PDF Mirror STANDARD PRO 29 Additional Details 30 Reference Types PRO 32 Custom Variables PRO 33 Advanced Project Options PRO 35 The Organizer 37 Sections STANDARD PRO 40 Folders 41 Trash 41 Archive 43 Filter 43 Navigation Controls 44 Inspector 45 Tags 45 Labels 47 Notes 47 Info 48 The Idea Space 50 Working with Idea Spaces 50 Idea Space Styles 50 Idea Space Templates STANDARD PRO 51 - 2/270 - Copyright © 2021 Zengobi, Inc. Table of contents Zooming 52 Gestures 53 Inserting Space 53 Inspector 54 Background 54 Transitions PRO 55 Dimensions 55 Figures 57 Terminology 57 Insert Popover 57 Basic Shapes 58 Styled Shape or Stencil 58 List / Mind Map / Table / Index Card / Album / Pinboard 58 Audio Recording 59 Video Recording 59 YouTube / Vimeo Video 59 Instant Document 60 Equation STANDARD PRO 60 Web View 60 Google Doc 60 Date and Time 60 Variable 61 List/Mind Map/Table From File 61 File 62 Insert Menu 62 Insert Other Content 62 From the Finder 62 From Curiota 63 From the Web 63 From Mail 63 From Contacts 64 From Calendar 64 From a LinkBack Application 64 From an Equation/Formula Editor 64 From OneNote 65 From TaskPaper STANDARD PRO 66 From OmniOutliner STANDARD PRO 66 Insert from Library 67 Meta Import STANDARD PRO 68 Spread PDF STANDARD PRO 71 Instant Document Templates 72 - 3/270 - Copyright © 2021 Zengobi, Inc.
    [Show full text]
  • Steve Jobs and Apple
    STEVE JOBS AND APPLE STEVE JOBS AND APPLE STEVE JOBS AND APPLE CONTENTS PREFACE: STEVE JOBS’ LEGACY..................................................................... Page 3 THE MAN: GENIUS AND SICKNESS................................................................ Page 6 THE PRODUCTS: CREATION AND DISRUPTION ........................................... Page 14 THE COMPANY: VALUE AND THE FUTURE.................................................. Page 21 ABOUT US ................................................................................................... Page 33 Front cover: With a projected image of the new Apple PowerBook G3 behind him, acting Apple CEO Steve Jobs speaks during a presentation of Apple's new G3 line of Macintoshes and PowerBooks at the Flint Centre in Cupertino, Nov. 10, 1997. Reuters/Lou Dematteis. STEVE JOBS AND APPLE PREFACE: STEVE JOBS’ LEGACY This collection of Breakingviews articles on Steve Jobs, Apple and its industry is best introduced by the view we published following news of his death on Oct. 5, 2011. The articles included here have been selected to offer insight into the Apple story, the competitive impact of Jobs’ creative genius and the company’s most likely bright future. Richard Beales, Assistant Editor October 2011 JOBS’ WORTH By Robert Cyran and Richard Beales Steve Jobs has died at 56. He was no ordinary chief executive, and he leaves no ordinary company. The force behind the iPod, iPhone and iPad not only co‐founded and then rescued Apple, building it into the most valuable tech company on the planet, worth some $350 billion. He also changed the way people live. It’s a rare entrepreneur who leaves that legacy – and a company that can thrive without him. Jobs dropped out of college. And he was forced out of Apple less than a decade after starting it with Steve Wozniak, having lost his fight to promote new Macintosh computers instead of more profitable, less capable machines.
    [Show full text]
  • Quick Start Guide
    TM Quick Start Guide English Android 6.0, Marshmallow Copyright © 2015 Google Inc. All rights reserved. Edition 1.04 Google, Android, Gmail, Google Maps, Chrome, Android Wear, Nexus, Google Play, YouTube, Hangouts, and other trademarks are property of Google Inc. A list of Google trademarks is available at http://www.google.com/permissions/trademark/ our-trademarks.html. All other marks and trademarks are properties of their respective owners. This book introduces Android 6.0, Marshmallow, for FIGO devices. Its content may differ in some details from some of the products described or the software that runs on them. All information provided here is subject to change without notice. For best results, make sure you’re running the latest Android system update. To find your device’s version number or check for the latest system update, go to: Settings >System > About phone and look for Android version or System updates. If you don’t have a FIGO phone or tablet, and are running Android 6.0 on another device, some details of the system as described in this book may vary. For comprehensive online help and support, including details about FIGO hardware running the software described in this book and links to information about other Android devices, visit Support.Figoglobal.com. Table of contents 1 Welcome to Android About Android 6.0, Marshmallow What’s new in 6.0 Get started Sign in to your account Send a text message (SMS) Make a phone call Send an email Take a photo Quick Settings Your apps Your Home screens Status bar Navigation basics Manage
    [Show full text]