Goodbye, Android

Total Page:16

File Type:pdf, Size:1020Kb

Goodbye, Android Goodbye, Android WRITTEN BY LORENZO FRANCESCHI-BICCHIERAI (/AUTHOR/LORENZOFB) July 29, 2015 // 05:00 AM EST Last week, I was hanging out with some hackers and security experts at a conference in Brooklyn when I took out my Sony phone. “Oh! The journalist uses Android. That’s secure!” said one guy next to me, in a highly sarcastic tone. I dismissed his sarcasm, even though, as someone who writes about information security, I knew that deep down he was right. Just a few days later, his joke now seems almost premonitory. (https://confirmsubscription.com/h/i/62B347AD88B7A90A) As you might have heard, a security researcher revealed (http://motherboard.vice.com/read/stagefright-bugs-leave-950- million-android-devices-vulnerable-to-hackers) on Monday that a series of bugs deep inside Android’s source code allow hackers to hack and spy on users with a simple multimedia message. If you’re worried your Android device might be vulnerable to these bugs, collectively known as Stagefright (http://blog.zimperium.com/experts-found-a-unicorn-in-the- heart-of-android/), well, I've got bad news for you. It probably is. In fact, as many as 950 million phones likely are. “All devices should be assumed to be vulnerable,” said (http://www.forbes.com/sites/thomasbrewster/2015/07/27/android- text-attacks/) Joshua Drake, the researcher who found the bugs. I knew Android’s security wasn’t great. I didn’t know about Stagefright last week, obviously, but I knew Android’s security wasn’t great. Still, I ignored the sarcastic dude because, frankly, I’m a fanboy and a contrarian. I’ve been antagonistic with Apple products ever since I was a teenager, when Apple used to try to shove its apps down my throat (cough iTunes cough) whenever I just wanted to watch a movie trailer on Quicktime. I never liked Apple’s walled garden and “we-control-everything” approach, and I particularly disliked Apple fanboys’ dumb “oh my god there’s a new iThing coming out” reverence and hysteria. So when the original iPhone came out a few years ago, I swore in multiple heated discussions with friends and strangers that I’d never buy an iPhone. Since then, I’ve only owned Android phones. First a few HTC ones, now a Sony phone. Well, I’m sick of it. And I’m ready to go to the dark side. Don’t get me wrong. In many ways, Android is great. I love its open source ethos and the ability one has to customize it. But I can’t take it anymore for one simple, but really fundamental, reason. Google still has very little control over software updates, and Android users are basically at the mercy of their carriers and phone manufacturers Google still has very little control over software updates, and Android users are basically at the mercy of their carriers and phone manufacturers when it comes to getting updates or new operating system versions. For example, it took Sony more than six months (http://gadgets.ndtv.com/mobiles/news/sony-xperia-z-xperia- zr-start-receiving-android-502-lollipop-update-694848) to push Android 5.0 Lollipop to its new line of Xperia Z phones, despite the fact that it had promised (http://www.android.gs/android-5-0-lollipop-update-for-sony- xperia-z3-gets-certified/) for a much shorter turnaround after Lollipop was released by Google. Just for comparison’s sake, when Apple released iOS 8 in September of last year, it immediately became available for all iPhone users, even those with an 2011 iPhone 4S. As security expert Cem Paya put it (https://twitter.com/randomoracle/status/626060385901113344), that was a conscious decision Google made when it created Android. Paya called it a Faustian deal: “cede control over Android, get market-share against iPhone.” Basically, Google was happy to let carriers put their bloatware (http://www.wired.com/2015/03/forget-pc-real-crapware- problem-android/) on their Android phones in exchange to having a chance to fight Apple for in the mobile market. The tradeoff was giving carriers and manufacturers control over their Android releases, leaving Google unable to centrally push out operating system updates. Some carriers and manufacturers are better than others, it’s true, but they all pretty much suck when it comes to pushing updates. There really isn’t a better way to put it. As security researcher Nicholas Weaver put it in a (now deleted) tweet, ”Imagine if Windows patches had to pass deleted) tweet, ”Imagine if Windows patches had to pass through Dell and your ISP before they came to you? And neither cared? That is called Android.” In 2013, the American Civil Liberties Union filed a complaint (https://www.aclu.org/blog/aclu-files-ftc-complaint-over- android-smartphone-security) with the Federal Trade Commission arguing that major wireless carriers were leaving users vulnerable to hackers and cybercriminals by failing to quickly push critical security updates to their customers’ Android phones. Things have changed little since then. Google now has a bit more control (http://arstechnica.com/gadgets/2013/09/balky- carriers-and-slow-oems-step-aside-google-is-defragging- android/) over some updates thanks to Google Play Services, a set of APIs that live outside the OS, and which get automatically updated (http://www.androidcentral.com/solving- impossible-problem-android-updates) in the background. But security has not improved as much. For example, Google itself refused (http://arstechnica.com/security/2015/01/google-wont- fix-bug-hitting-60-percent-of-android-phones/) to fix a security vulnerability affecting 60 percent of Android users, those using the older versions of the OS, just a few months ago. (The bug has not been fixed for those users, and likely never will.) As one of the people behind that FTC complaint put it (https://twitter.com/csoghoian/status/626053193194147840), two years later, Android updates “still suck.” And here’s the worst part of the story. Drake actually first told Google about some of the Stagefright bugs on April 9 (he reported a few more in early May). Google, to its credit, responded quickly and sent out patches to manufacturers almost immediately. Then it’s all good right? Nope, that doesn’t matter—at all— because as I’ve said earlier, it’s now up to the carriers and manufacturers to actually deliver these patches to you. Thomas Fox-Brewster Follow ​@iblametom Hey, they should recall Android phones too! 6:01 PM - 27 Jul 2015 1 1 Let me stress this out once more: the patches are ready to go. They were approved by Google months ago. But you won’t get them for another few weeks (if you’re lucky) or months (most likely) or never (a very solid possibility) depending how old your phone is—if it’s too old manufacturers just stop supporting them—and how lackadaisical your manufacturer and carrier are with regards to updates. Given the open nature of Android, pushing out updates, as Android Central put it (http://www.androidcentral.com/solving-impossible-problem- android-updates), is a “messy, unpredictable business” that requires a lot of “moving parts.” This is the fundamental difference between Android and iPhone. When there’s a bug on iOS, Apple patches it and can push an update to all iPhone users as soon as it’s ready, no questions asked. When there’s a bug on iOS, Apple patches it and can push an update to all iPhone users as soon as it’s ready, no questions asked. When the same thing happens with Android, Google patches and then… god knows when the AT&Ts, Verizons, HTCs, and Sonys of the world will decide it’s important enough that they should care and send you the update with the patch (though to their credit, they’re starting to care, mostly because having an updated OS is now seen as a competitive advantage (http://www.androidcentral.com/solving-impossible-problem- android-updates)). Hell, even Google-owned Nexus phones, which the company has full control over, haven’t been patched (http://www.androidpolice.com/2015/07/28/google- representative-promises-a-stagefright-security-update-for- nexus-devices-starting-next-week/) for Stagefright yet. So what should you do if you own an Android phone? That’s up to you. I can’t tell you what to do with your life, but these are your choices. You can keep your Android phone with that modified version of Android that your carrier or manufacturer has decided to put on it, and get security updates weeks late, or never (if you have a Nexus you’re better off, but who knows if Google is going to keep making Nexus phones in the future). Or you can root your phone and install the excellent and more swiftly updated Android-based operating system CyanogenMod (http://www.cyanogenmod.org/) on it. This is a good alternative, but it’s not trivial to install CyanogenMod, and updates for certain phones depend on volunteers, so, again, you might not get them as soon as you’d wish. Or, lastly, you can give up, switch to Apple and buy an iPhone. As much as my old self will hate me, I’m going to choose the last option. -- TOPICS: Internet Insecurity (/tag/Internet+Insecurity), android (/tag/android), Stagefright (/tag/Stagefright), bug (/tag/bug), cybersecurity (/tag/cybersecurity), infosec (/tag/infosec), information security (/tag/information+security), bugs (/tag/bugs), vulnerabilities (/tag/vulnerabilities), google (/tag/google), apple (/tag/apple), iphone (/tag/iphone), security (/tag/security), Updates (/tag/Updates), upgrades (/tag/upgrades), opinion (/tag/opinion) SHARE 72 COMMENTS (HTTP://MOTHERBOARD.VICE.COM/READ/GOODBYE- ANDROID#DISQUS_THREAD) FACEBOOK TWITTER GOOGLE PLUS TUMBLR REDDIT STUMBLEUPON RECOMMENDED (/read/how-a-dumbphone-can- (/read/stagefright-bugs-
Recommended publications
  • Social Media Why You Should Care What Is Social Media? Social Network
    Social Media Why You Should Care IST 331 - Olivier Georgeon, Frank Ritter 31 oct 15 • eMarketer (2007) estimated by 2011 one-half Examples of all Internet users will use social networking • Facebook regulary. • YouTube • By 2015, 75% use • Myspace • Twitter • Del.icio.us • Digg • Etc… 2 What is Social Media? Social Network • Social Network • Online communities of people who share • User Generated Content (UGC) interests and activities, • Social Bookmarking • … or who are interested in exploring the interests and activities of others. • Examples: Facebook, MySpace, LinkedIn, Orkut • Falls to analysis with tools in Ch. 9 3 4 User Generated Content (UGC) Social Bookmarking • A method for Internet users to store, organize, search, • or Consumer Generated Media (CGM) and manage bookmarks of web pages on the Internet with the help of metadata. • Based on communities; • Defined: Media content that is publicly – The more people who bookmark a piece of content, the more available and produced by end-users (user). value it is determined to have. • Examples: Digg, Del.icio.us, StumbleUpon, and reddit….and now combinations • Usually supported by a social network • Examples: Blogs, Micro-blogs, YouTube video, Flickr photos, Wiki content, Facebook wall posts, reddit, Second Life… 5 6 Social Media Principles Generate an activity stream • Automatic • Who you are – Google History, Google Analytics – Personalization • Blog • Who you know • Micro-blog – Browse network – Twitter, yammer, identi.ca • What you do • Mailing groups – Generate an activity stream
    [Show full text]
  • POPULAR SOCIAL MEDIA SITES Below Is a List of Some of the Most Commonly Used Youth and Teen Social Networking Sites and Tools
    POPULAR SOCIAL MEDIA SITES Below is a list of some of the most commonly used youth and teen social networking sites and tools. Ask.fm (http://ask.fm) Participants log on, post a question anonymously and anyone may answer anonymously. “Do you think I am fat?” or “Would you date me?” are examples of questions posted in the past. There have also been examples in which individuals were encouraged to kill themselves. The site has courted controversy by not having workable reporting, tracking or parental control processes, which have become the norm on other social media websites. Twitter (https://twitter.com) An online social networking and microblogging service that enables users to send and read "tweets", which are text messages limited to 140 characters. Instagram (http://instagram.com) A photo-sharing app for iPhone. Kik (http://kik.com) Kik is as an alternative to email or text messaging and its popularity has grown in the last two years. Kik is accessible on smartphones and supports over 4 million users, called “Kicksters.” Users are not restricted to sending text messages with Kik. Images, videos, sketches, emoticions and more may be sent. A user can block users on Kik from contacting them. Wanelo (http://wanelo.com) Wanelo (from Want, Need, Love) sells unique products online, all posted by users. Products posted for sale range from dishes, clothing, intimate wear and other potentially “R-Rated” products. Vine (https://vine.co) Vine is used to create and share free and instant six-second videos. Topic and content ranges. Snapchat (http://www.snapchat.com) A photo messaging application.
    [Show full text]
  • Turbo-Charge Your Business with Social Media Marketing
    Turbo-Charge Your Business with Social Media Marketing Countless Google searches are taking place every day. However, if people haven’t heard of your brand, they’ll never discover the value of your product or service. Enter social media marketing, a form of internet marketing that implements various social media networks in order to achieve marketing communication and branding goals. Social Media Marketing (SMM) covers activities like social sharing of content, videos, images, A total 74% of and paid social media advertising. SMM develops and sustains customer engagement, which has been found to influence buying behavior. Getting started without any insight or any consumers rely on social previous experience can be tricky. Here’s how you can use social media marketing to grow your media to influence their busines: purchasing decisions, 1. Carefully develop a plan aligned with your goals. To develop your plan, do a thorough analysis of existing social followers across your networks, analyze your competition, and according to CeBIT. identify areas for improvement. When allocating budget and resources to SMM, take into account whether your campaign requires any paid social efforts or if you plan to rely on organic tactics and owned media. Once you have decided on an appropriate budget and sketched your social media campaign, create your dream team and assign clear-cut roles to them. The final steps of your social media campaign strategy should be to identify the metrics you will use to measure the ROI of your campaign. In order to achieve this, you’ll need to outline and define your campaign’s goals, which are the next component of a great campaign.
    [Show full text]
  • Social Media for Social Good
    Social Media for Social Good By Ayelet Baron, Director, Cisco Systems, Inc. [email protected] June 2009 Contents: . Introduc-on . Execuve Summary and Point of View . Social Media Tools . Social Media Planning . Examples . What’s Next? . Sources Appendix A: 51 Social Media Sites Every Business Needs To Be Seen On B: Recommended Books C: Recommended Online Resources D: Social Media Monitoring Tools E: Directory of Tools on TAG 2 Background One of the key deliverables of my Cisco Leadership Fellowship1 was to provide an overview of how nonprofits can use social media. As I write this, I know that there is someone out there creang a new tool that will be out in beta soon that no one has heard of YET that may be the next big trend. While this paper provides an overview of some of the exisAng social media tools that are currently being adopted, what I would like to leave you with is the noAon that the tools will most definitely change but people and human behavior is what we need to focus on when it comes to social media. The guiding principle is that people drive change; not technology. The goal for social media for most nonprofit organizaons is to create conversaons with key stakeholders and for some, it is an opportunity to drive social innovaon. Technology is merely the enabler and the challenge is to ensure building the right processes in an ongoing fashion. Trust and relaonships are fundamental building blocks. The key to social media is focusing on the people that your organizaon wants to connect with and using the tools to build those relaonships.
    [Show full text]
  • Social Media Policies
    CITY OF BERKLEY, MICHIGAN SOCIAL MEDIA POLICIES City of Berkley Social Media Use Policy .......................................................................................... 2 Purpose ....................................................................................................................................... 2 Social Media Standards ............................................................................................................... 2 General ........................................................................................................................................ 2 Definitions ................................................................................................................................... 4 City of Berkley Facebook Standard ................................................................................................. 5 Purpose ....................................................................................................................................... 5 Establishing a page ...................................................................................................................... 5 Content ....................................................................................................................................... 5 City of Berkley Twitter Standard ..................................................................................................... 7 Purpose ......................................................................................................................................
    [Show full text]
  • Social Marketing Method – Quick Start Guide
    Mari Smith’s Social Marketing Method – Quick Start Guide © 2008 Mari Smith All rights reserved. ~ 1 ~ This digital book may not be transmitted, copied, reproduced, or distributed. This is a single user license only. Mari Smith’s Social Marketing Method – Quick Start Guide Mari Smith’s Social Marketing Method: QUICK START GUIDE Published by MariSmith.com Relationship Marketing Spec ialist | Social Media Coach http://www.marismith.com San Diego, CA 92109 USA © Copyright 2008 by Mari Smith All rights reserved under the international and Pan-American copyright conventions. With the exception of brief quotations in review – with proper accreditation – no part of this book may be used, reproduced or transmitted in any manner whatsoever without written permission from the author. DISCLAIMER This publication is designed to provide accurate information in regard to the subject matter covered. The author is not engaged in providing legal, financial, investment, accounting or business advice. Should the reader need such advice, he or she must seek services from a competent professional. The author particularly disclaims any liability, loss or risk taken by individuals who directly or indirectly act on the information contained herein. The author believes the information contained in this publication to be solid, but readers cannot hold her responsible for either the actions they take or the result of those actions. Mari Smith is not affiliated with, nor does she represent, Facebook.com. She is an independent consultant, coach, and active member of Facebook.com. Copyright © 2008 by MARI SMITH v1.0 - FIRST EDITION – November 11, 2008 Please refrain from changing, dismantling, plagiarizing or reselling this guide book.
    [Show full text]
  • Investiture of Ownership
    Vanderbilt Journal of Entertainment & Technology Law Volume 10 Issue 4 Article 3 2008 User-Generated Content and the Future of Copyright: Part One-- Investiture of Ownership Steven Hetcher Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Intellectual Property Law Commons Recommended Citation Steven Hetcher, User-Generated Content and the Future of Copyright: Part One--Investiture of Ownership, 10 Vanderbilt Journal of Entertainment and Technology Law 863 (2021) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol10/iss4/3 This Symposium is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. User-Generated Content and the Future of Copyright: Part One-Investiture of Ownership Steven Hetcher* ABSTRACT While user-generated content (UGC) has been around for quite some time, the digital age has led to an explosion of new forms of UGC. Current UGC mega-sites, such as YouTube, Facebook, and MySpace, have given UGC a new level of significance, due to their ability to bring together large numbers of users to interact in new ways. The "user" in UGC generally refers to amateurs, but also includes professionals and amateurs aspiringto become professionals. "Generated"is synonymous with created, reflecting the inclusion of some minimal amount of creativity in the user's work. Finally, "content"refers to digital content, or that generated by users online. Because discussion of the legal aspects of UGC is in its infancy, and new UGC is distinguishablefrom old UGC, the initial focus must be on the copyrightability of UGC-whether UGC falls in the core of copyrightable subject matter.
    [Show full text]
  • An Analytical Literature Review of State of Art Works on Online Social Media Platforms
    International Journal of Computer Applications (0975 – 8887) Volume 114 – No. 9, March 2015 An Analytical Literature Review of State of Art Works on Online Social Media Platforms Namrata P. Bhatt Jatinderkumar R. Saini, Ph.D Lecturer (Adhoc), Director I/C & Associate Professor, Narmada College of Science and Commerce Narmada College of Computer Application Bharuch, Gujarat, India – 392 011 Bharuch, Gujarat, India - 392 011 ABSTRACT Marketing land [10], there are approximately 540 monthly There are various online media platforms available today and active users. According to Wikipedia [25], Tumbler is another include Facebook, LinkedIn, YouTube, StumbleUpon, Digg, social networking website and micro blogging platform that Reddit, Del.icio.us, Pinterest, Tumbler and Google+, to name allows users to post multimedia contents. According to a few. Such platforms are exploited by individuals as well as Tumbler [16], Tumbler records the hosting of over 201.3 masses for different purposes ranging from communicating blogs as of September 1, 2014.There are many more social with relatives and friends to using them for online marketing. networking sites available nowadays. Most important of all is With the proliferation of such online media platforms, the how contents uploaded are getting viral. Jess [26] argued that world has converged and the effect of the virality of such Spike and Growth are two patterns of the contents getting platforms on general society is tremendous. The current paper viral. Further, he concluded that Spike patterns imply that presents an analytical review of related literature and on the content suddenly gets popular and gets viral on social media sidelines also aims at identifying the parameters responsible within less time but gets down soon while Growth patterns for influencing the usage and popularity of such platforms.
    [Show full text]
  • The Ultimate Guide to Increasing Your Traffic with Stumbleupon
    THE ULTIMATE GUIDE TO INCREASING YOUR TRAFFIC WITH STUMBLEUPON StumbleUpon is an amazing source of traffic for bloggers and companies alike – one good post and you can find yourself getting heaps of traffic from it, with minimum effort. In this blog post, I’m going to cover everything about it– what StumbleUpon is, why it brings in so much traffic and how you can use it to get better results for your website and blog. It had been some time since I used StumbleUpon, and, like many others before me I’m sure, one day when I checked my analytics I noticed a huge spike in traffic from the popular content discovery tool. The traffic was impressive, especially considering I hadn’t done anything with StumbleUpon in a while, so I could only imagine what would happen if I actually put a strategy into place and used it to my advantage. As other social media networks are making it more and more difficult to get your content out there (I’m looking at you, Facebook!), StumbleUpon has remained a constant source of fantastic © Lilach Bullock www.lilachbullock.com traffic, where so long as you have great content, you are bound to improve your traffic stats, as well as your engagement levels. It’s also not as saturated as the main social networks, and you actually stand a good chance of getting your content into the eyes of people who are interested in reading, engaging and sharing. I decided to take this opportunity to create an ultimate guide to StumbleUpon, for all of you who aren’t familiar with it, and for those who, like me, have not used it for a while.
    [Show full text]
  • 58 Social Media Tips for Content Marketing
    SOCIAL MEDIA TIPS 58 FOR CONTENT MARKETING Social Media Tips: A Reference Guide for Content Marketers Content marketing and social media make a great team. Think Laurel and Hardy. Woodward and Bernstein. Jordan and Pippen. No content marketing strategy is complete without a strong social media strategy. As Jay Baer says, social media is the fuel to set your content on fire. According to 2013 research from CMI and MarketingProfs, B2B marketers use an average of five social me- dia channels to distribute content, whereas B2C marketers use four. Whether you’re just getting started with social media or looking to fine-tune your plan, this guide is for you. This eBook includes a collection of best practices for the top social media channels that content marketers use to reach their audiences, including examples of brands that have found social media success. Over the course of this book, we’ll cover: Social networks like Facebook, Twitter, Google+, and LinkedIn Video channels like YouTube and Vimeo Photo sharing sites like Instagram and Flickr Online communities like Pinterest, Foursquare, and Quora Niche content sharing sites like Tumblr, StumbleUpon, and SlideShare First, let’s take a look at the social networks we all hold near and dear. 2 Facebook You need more than just an interesting subject. Even if your product category is naturally interesting, execution is very important. Spend time posting well-edited photos and well-written copy. Volume certainly isn’t everything on Facebook; consistent quality is much more significant. It’s good to be brief, but it’s better to be good.
    [Show full text]
  • Protecting Browsers from Extension Vulnerabilities
    Protecting Browsers from Extension Vulnerabilities Adam Barth, Adrienne Porter Felt, Prateek Saxena Aaron Boodman University of California, Berkeley Google, Inc. fabarth, afelt, [email protected] [email protected] Abstract browser’s full privileges. If an attacker can exploit an ex- tension vulnerability, the attacker can usurp the extension’s Browser extensions are remarkably popular, with one in broad privileges and install malware on the user’s machine. three Firefox users running at least one extension. Although At this year’s DEFCON, Liverani and Freeman presented well-intentioned, extension developers are often not security attacks against a number of popular Firefox extensions [24]. experts and write buggy code that can be exploited by ma- In one example, if the user dragged an image from a mali- licious web site operators. In the Firefox extension system, cious web page into the extension, the web site operator these exploits are dangerous because extensions run with could install a remote desktop server on the user’s machine the user’s full privileges and can read and write arbitrary and take control of the user’s mouse and keyboard. files and launch new processes. In this paper, we analyze These attacks raise the question of whether browser ex- 25 popular Firefox extensions and find that 88% of these tensions require such a high level of privilege. To investi- extensions need less than the full set of available privileges. gate this question, we examine 25 popular Firefox exten- Additionally, we find that 76% of these extensions use un- sions to determine how much privilege each one requires.
    [Show full text]
  • Web Browsers Namely Mozilla Firefox, Internet Explorer, Google Chrome, Opera
    12 ABSTRACT Web browser is the most commonly used client applicationWeb and speedBrowsers and efficiency of our online work depends on browser to a great extent. As the market is flooding with new browsers there is a lot of confusion in everyone’s mind as to which is the best browser.Our project aims to answer this question. We have done a comparative study of the four most popular web browsers namely Mozilla Firefox, Internet Explorer, Google Chrome, Opera. In the first phase of our project v arious comparison parameters are selected which can be broadly cat egorized into -General Features, Security features and browser extensibility features. Using the selected benchmarking tools each browser is tested. We have also use our own test scripts for some parameters .Depending on the performance of the browser points are assignedSubmitted to each browser by .Public opinion is considered for usability issue and finally we have come to a conclusion t hat opera and firefox are leading the browser war. firefox has finished first scoring 49.84 and opera has scored the next highest 48.90 Our other contributions include a K-chromium browserAmogh ,addon Kulkarni for firefox and (05CO05) scripts showing the major browser attacks. Jaison Salu John (05CO29) The report gives details of work done by our team from Jan 6 th 2008 till March 29 th 2008. Yohan John Thampi (05CO67) Shravan Udaykumar (05CO59) I. INTRODUCTION Gaurav Prasad(08IS03F) The World Wide Web has come a long way in itsVrinda short existence. Halarnkar Without it, (08IS04F) many people wouldn’t know what to do with their day.
    [Show full text]