Tip:
Highlight text to annotate it
X
Hi guys.
Thanks to be there, i'm really happy to be here with you.
Thanks to Craig Fox of course for this great event, for the barbecue...
that was really nice.
I met some really nice people there, and I'm really happy at and I will
be happy to be in New York next time also.
My talk will be split into different parts.
The first part is around me, who I am, and my hobbies
and such stuff.
And then I want to talk about the history of what I did by
the past, because people know
that I did late jailbreaks for iOS like
5.0.1, 5.1.1,
but they don't know that before that, long ago, I did some jailbreaking stuff.
So,
the first part of the presentation is not technical at all
I think, yeah okay, they will be some stuff like exploits, buffer overflow and
some stuff, but
nothing
that you would need to use your brain for.
but the second part is far more uh... technical and uh... and i hope that's
usually not sleep
in in this book
so uh... might might be name is city
i'm from france
and so did you use salt
uh... i've known not listening
mike my parents use to to happen sued
to just uh... uh... one one first name for me
uh... i didn't know particular city in france also
uh... where most biosecurity researcher seemed certain tonight
for
resorting to my blog
just want to say also stink euphoric everyone following me
uh... this is kind of of some amazing there's like a ramp
this three hundred and forty thousand people around the world says while
soul soul mates
uh... and every
everything you i was veteran again like ten percent of new people
cigs
sync you security one
when uh... until i get started into a computer science and uh...
and acting
uh... effect expelled you know me
because my uh...
my thousand uh...
wrote me a computer u_h_f_ five
hi x edelise it's and uh... even if i could and write a seeing are reducing in
a book
i cope i basic programs from from looks to uh... two v_'s disease addicts
eighty-one computer to to play stuff on its
so uh... i started beating him
into i was really into into programming
uh... than uh...
later different computers of chris admin strata
unitary exit and and and you get uh... uh... among those ones any
handed it to get to see
uh... than i had a an experienced t
some years later
and did some jeff a basic
uh... it's e
sixty eight cells and that some of the and demornay
uh...
at the age of uh... fourteen
mcsame
uh... idea and seen it and see christmas acts of college
ends and worked as a java developer
and after that of project manager
for in use
uh... but that's not stacking
right that's only development
uh... i get into packing because one day
i was barring by uh... the performance for small driver
for the wm two years fifty four g router
at the driver's ed that can uh... that's a pen it's two
to play and as the cards to meet
and is rather residents know
like to get it you could issue like you know
uh... three hundred uh... job i specimens to in in reading or writing
uh... band lease too
which is a statistic out so i optimized as his driver in somebody coat
this is like my from
my first uh... my first train xing
uh... with that
i hear
i hacked
uh...
windows mobile phone
uh... that was cool e-ten xa
five a little plus
and uh... cook two new roman for its windows moment six point one because
group that uh... the maker of the phone intent
uh... can provide it
though you can see my post if you're interested in a in death for 'em
uh... besides called detect e-ten uses alrighty
you
and my and i look in name was serial it was in the two sides southern takes off
some of the total nine passing
uh... after sats uh... i was pretty uh...
disappointed by windows mobile as a as a phone
so daughter and iphone like uh... i think everyone here
and uh... and also and i put and i put two g that was uh... uh... at that time
and o_j_ broken and people really got stuck andrea and that's a breaking of
this error
of this uh... of citibank's i remember miss unloaded some research chronic
again from the chronic destined added some wished research also we had a good
cause
uh... foreign forces device
uh... but it but the the western companies such so
here is uh... wada when i answered the scene
uh...
so into something nine uh... it's like uh...
uh...
a lot of like when i uh... when i'm the man and doing xing
and
i don't know anything about the backing indoor almost assembly at that time but
just i i read somewhere that people were found
and i'm sick go hee... hee... amd seven sorry and seven go comment
in the i'd go to the i go to one
uh... which uh... which
was not security like other comments this is what's uh... chronic pointed out
uh... but seduce them
uh... but they did a quick as she is uh... insight code executing with it
so i just uh...
addis arrived so it's right it's tried to uh... to chad connected in the ipo to
my computer
needed some stuff and i can one oh where alitalia right and achieve because
execution on its is just and looking
i really it's not a
an and and uh... and this uh... uh... permits me to enter the chronic thirteen
my first my first that and interpreting
uh... that so that's why i learned alma somebody and and try to uh... to wrote
payloads for fought foxes are indeed the effort to drink
and a m a slight onto the other two g boats from dis this is it was really
amazing nine i'm really happy with his
uh... okay this is an afterthought of sings here but what it was important is
uh... just as outside
i have reversed the uh... people trauma the uh...
uh... of the ipods the with some friends like for example closets ninja
uh... chronic also and again we will escort uh... seepage
uh... and to be reversed like uh... eighty percent of the code of the
control
uh... and uh... and i was a time again i was looking at and found a new built
within the rapidity for his boot rom which is called a twenty-four que poner
and this is world what's enters its the i'd put to g_e_ and the three g x
an important part of its is that i worked for the first time *** appended
being
and uh... and the payloads of the uh... and of his aunt is uh... went into the
but from card
and into was really nice
sorry that there's a lot of things to say again
uh...
after that's uh... i worked on a played in fact with with the eye blips and a
ends
and and try to fred's it's attempt to two-thirds for usb funy ready to use and
found one
uh... so uh... it's it's an old uh... us to to to rhoda ajit ajit break at that
time but uh... jlist com came
and uh... and it is the is one first
more i recently selects in two thousand saying
i worked on at the game on the boat from whispers extends out for example
amiraults fitters and uh...
uh... it and we uh... we have found uh... it at that time and you've been
gravity
uh... which is called center
uh... it's kind of cut complicated to explain but uh... the um... the
exception victors in fact a right to vote
even if it's syndrome
uh... right only memory
uh...
so uh... you told us to to write about the game uh... answering exploits
that was never released because of
geo at popping up again
with rendering
and uh... more recently uh... and this is uh...
and sink when people start to confirming uh... i thought to narrow the team the
acceptance in years and india's mister
uh...
pressing health the uh... the devoting
and uh... and wrote on uh... and export for it
in the works with bullets ninja again too
to to create their green poison direct to
which include benefits face stupid faces data the answers are incurred
okay so uh... this is about score amount sold at the generate for five hope
uh... at that time again and
was
pretty alone on this work
uh...
i mean everybody nearly every single own then of people join me
uh... for the uh...
for for the exile from but for the before pots i was was alone on this one
and first through little fits that
uh... for a chat fest
and uh... and found if over flow uh... in into a sex
then uh... it took me a long time to to understand its into them
to achieve the things we
uh... and and and exploit that that's one
uh... uh... it was uh... really amazing of people my uh... michael latest
uh... my friends uh... object breaking uh... works has said no wheat you can do
is is that states not exploded all do lose your time
and finally it was some magic item no again leke
uh... as uh... success in exploiting it
uh... so this is uh... my in my first the use them into a break but that did
the alone
uh... so this is a kennel exploit in the a ship is back than it looks like i was
the format strings in their ability the rec room said is
by fixing it for fixing its again
and uh... enrolled a generator to insulate format strings uh...
and uh... that could rights uh... rockcote to memory and uh... and start
of the people uh... diddy camel payload from
from the wreck consents
so and
this is uh... pretty pretty interesting
uh... expands at one in a attacking the box it was really complex to explain but
yet
ang i'm really proud of this one
so
as you you've seen
uh...
it's been a long time since since i am i'm in the
security research
uh... answer of course i think it's a
is difficult today
for a funny people to come because the
they don't the they haven't seen all of this research we did before so good on
though what soon to look or to uh...
uh... scheme in the research uh... zip
okay so i mean
this is experience to them to be able to chip to bring device today asking janet
a lot of experience
uh... and uh... old might might may we should give up some newcomers without
this on this task
matter of at the moment so i i uh... have no and have no idea though to find
his people
uh... to uh... to help us
this is uh... technical but
uh...
i want to explain all work out into std
and uh... all and we uh... we realize it's a break with it
that they are in fact so this is the change log of the uh... u_s_ six
uh... we
uh... apple fixed
uh... building their attitude is that we used
rookie rec room
and the first one is the him
he's a raccoon bird
zepce uh... allude s to her
to *** to limb salvage we cook arbitrary code at boot up
uh... so here is that uh... description
a buffer overflow existed in the ending of franken preferred inch
configuration file is and this is u_s_ address through improved valves ticking
thank you
uh... the impact of these veneer aditya that's amalya smelly she sleek ref to
directly configuration file a maybe two ab
eatery code execution
and this is a killer one
because of course for directing it
at least one campbell exploits too muddy for the camel itself because only the
kennel can write to camel memory
uh... this is a bag in the uh...
into but if you turn into the issue but could feel to that allowed to
detriments biting in memory and now the jury bags memory
sold at the description does not
perfect on this
anybody pointer difference piece you existed in the camels ending of package
pizza ideal controls spe
allowing it to go to pilot a camera memory
this issue was addressed to improved their own handling
okay
do i'd fall uh... allow that other i've found is due the first baritone rec room
uh... just like again
uh... raccoon our at unknown dot seats
it's um... it's gone goldmine of birds because it's difficult to get some
returned back into something
uh... and uh... and was meeting with uh...
one
animal uh... not lose it was no security in nine th sold there
uh... blacks everywhere in this code
so uh... at
and i realize that's four oh five
don juan
i would just i would use raccoon again
then uh...
the night i did a quick search on their own the i'd be six tubes but racket
and found some seem really interesting
one guy in the books like i said uh...
when i got more than two margit cup of coffee
statements in rockland calls
uh... rec room vanishes just have to start with that any single iran into
look fine
segmentation faults
so i tried of course i tried on my iphone and realize that it's eater
it worked
began a composed of the reporting
and nobody answer ansatz
even after the successful expedition look for the i was five oh one jedrik
uh... the babies to opens so at dissect who was uh... no support
uh... the resulting user is uh... idle noel to to say that misused musician
it
sixty in by the way
and attached also configuration five for me to play
so let's try it out
um...
here is
on the left side uh... is configuration file
with the fact that they are three missed speed
parts of read sections
and silica tried crashed
then i i try to sts simplifies consideration fight through to anderson
what with the baby a
was really
ends uh... if it was only about abuse g_m_ s for statements
so this is a contrite whistled it though says on the
on leave diana's for statements it up so precious this way
so acts were done and another way with only one section and sixty n is for
statements
and crushed also
so it has nothing to do
uh... with distinctions in fact
it's it does something to do with the with the fact that they are more than
for units for statements that's cool
uh... it's it sounds like uh... buffer overflow
because that of his
and uh...
after that i i tried to look into their the actor six
guide to stick to his source code
so it is
sorry for people did not knowing if any code
uh...
and you can see is the test sing if
d_m_s_ for
index
he's great schism access
uh... iraq no more than
x
guinness
but says no exit no break
massing they'll return
so it just outputs uh... a message
but but i was in the sick nothing
but did you not see more than that
and iced is that
he uses his index to uh...
uh... two sets and an array
guinness for
and this
can see
i hope you can see it and on them
okay so there is a stretcher
whereas uh... sports is d_m_s_ for
stuff
as you can see if there is a map in the rain here
index
this is pretty nice because zack means
if you can
overflow the array
you ride although the index
this is this is neat
so
at
this is look at and analytics if its like again but while
uh... so
so this is what happens here in fact
when you
right more then four statements
heaps statements right over the index
which mean that's the next one who writes
in the country label position in memory
so what to do with it
it's memory
uh... abhi to remove the return of the new ready to eat
and silk it's and those estimates and using we wont in memory
and this is pretty interesting for for a for example complying i will drop
payloads too
to the memory
but there're limitations to this
um... the fact that's you write a over the index
means that you can do it
s one single time only
so you can write the bites to anyplace memory caught the block of bytes but
that's it's weekend you cannot to write a different position memory was one
config file african
this is uh... bt imitation of its
and berries
there is like a gin
that it is exactly the same mistake for another array that's called indian s
so if you use
a more than four when statements uh... you can
uh... you can do the exactly the same things
and somehow
there's no more limitations
so let's see allude to
exploit the stuff
gates's approve
the same coat exactly copy pasted for that we must uh... statements
him
there is always taught to in a inventor
in the memory you have that
you have to arrays
at the same position
uh... i mean uh... not the same position that the sites
let's
let's take a look
closer look
and what out all we can exploit this
is it
first of all
here's the key the states
of the minority the indexes zero
and as uh... random data india rate
now you writes the wings statements
which is which is good is the is that you can drive and and i_t_t_ address
which means
so deep so did u beats
in fact anything you can read committing to it
a second win statements
a certain one
force and now the magic happens
rewrites
dash one egg one
to the index
so
uh... we can write over guinness for index magic
okay so
we can write for example anybody you indeed guinness poindexter
in in fact what we did
but issuing a bit of the neck statement in his four
is that we can rack
anything had anything at anyplace ok tks is what i pay a
and roads and about a little bit and left on the screen
we have like that dennis ***
x
he calls y
and which is good now if if we can do it again
because do it
it's it sick it is not exactly in the same states that it was uh...
at first track
you know the them
the read books is exactly the same place
you can do it
and at the time without any problem
so we we have exploited is back
we can write any bites
in and anyplace in memory and we can do it
as many times that we once
splitting and explaining your we can read overactive
everybody double page in the address base of the *** binary was precise
control
so now we can write a polaroid rupp a note
anywhere we want
the second step of course is too
to a sheaf could execution salute to do that we need to control the pc
to stuffed i will drop they don't
the tribunal p yet
thanks sorry
okke marini overrides
uh... ultimately controlled it the pc
uh... we can overrides
uh... a safety seems stack
which is good because we have the memory right anyway
uh... we can overwrite the function pointer newry so that's it
of course no
picnic
of course no
uh... there is s at all
bennett's
and so
became with it too
rights a pc memory of bits we don't know wheat is in fact because it's random
everest out of the binary
the memory changes the so thats you don't know what to put to a variety fact
which is a magical bit etcetera
uh... butts it's kinda broke in on uh... on the u_s_
this is uh...
saluted is uh... interesting
so only does this at all
works
in fact in in nightline's
uh...
all the done demand that the memory them map memories on the shifted
by uh... and and them out
uh...
yes please
okay the binary in age and the stack
ashes to do with the same slides
and that if you slide it was another venue
uh... the showcase you've been at the same
and it is
is maps differently
at every boots of the press
but we we focus only on the stack in binary image
wire
is it's a failure
uh... because uh... the binary image
and the stock
classified ads with the same value
it's only takes but he told you could say can uh... two hundred and fifty six
possible but used
filled as only the
s_s_
of uh... of them the member here
but can change
and also of the stock market is file being here
then the maximum slides
which is uh... direct sanford zero zero
gays in the mood it is uh... assume on what happens
so you have been remains that gets loaded
and this track
that gets slighted also with the same value
so let's imaging lip we have the saved pc in stack
somewhere
that we want to attack
it gets shifted by the the slight okay
so
what if we try to britain beauty brute force sorry and this uh... uh...
uh... disliked i mean
what if we tried every possible values
that's about it on that uh... appointed or something to explain
the idea in fact is to try to uh... to to detect the slight so we we are going
with one too
ruth three-fourths of throughout two f f
and he writes dispositions
because uh... this tech map
is bigger than the slide
uh... we want to do and
about address
type of exception because there's something here
memories met so no problem
weekend we can try every possible values
this is what haynes explaining here
and when we hit
the correctly shifted
the process of jumps to the specific address
investable
weekend detects a slide
uh...
alleging dust the slide is three for example
uh...
we'll try zero one two
and when when we try three
uh...
i will dis dispatch a killer payloads week-old here
uh... kit
contained the clip the constant three
so that we know it's the sites three
because
it's in fact the said payload that gets executed
so this is the idea of the f_b_i_ settled on bypassing
uh... retry
two hundred and fifty six different passes
uh... every rights uh...
two hundred and fifty six rugby fields to to the stack
of course because uh... it's a lot of
for tries and a lot of writes to memory
to issue but the good performance uh... with uh...
what i did
is to uh... to split
uh... disrupt a building two parts
the first part iv which has taken the bootstrapping grew up a don't
and used to be as small as possible
and uh...
and the other parts uh... is uh...
the real stuff
is basically what uh... what struck they don't
uh... does
it's open if the uses the could the code it's open affiant
then read it
and stuck devotes to to the memory
where it's going to go to treat
so we we have to hundred and fifty six
smolder you don't like this
between append the correct find zero one two three s etcetera
so we know it exactly uh... the slides when we uh...
when we execute the the realtor the real stuff
and
so i spent here at the absolute addr address applies to that the because the
e_p_a_'s a really touch also lead to file file be gibbons amak slide
so i i choose an address into deep somewhere in the meeting
so there's no problem with it even if the d_p_s_ lighted
says no there's no problem
uh... please this absolute address
uh... and the sizes constancy it's uh... if the pillow size
everyone is ok
this is technical and that i know that's ok i'm trying to explain the rec room
which is a completed and stuff
so what does the final payload na
uh... we know so it's it's lighter accordingly to the bootstrap payloads
because we know the slide
it's computes uh... thirty windy shoutcast slide
which is different
so that's we can use more gadgets to called more functions and stuff
uh... executes a kennel exploits to do you think he's a little bit securities
and that's a jail break
and then if callers date exactly the d the g_b_ installed binary
if it exist in the fight system
melt looking quickly about the candle exploits
it's uh... burke
in the packet filter
photoshoot agreements and now be treat bags from ken and memory
uh... david splendid being
an idea was to use it to change the annex beats
uh... which has been though executes
eats flag from one to zero so that's we can map uh...
executed on page in memory
and cold uh... i work a little bit of pavement
so this is pretty interesting idea
pretty neat
and of course this is fixed income and six
now talking about these
jailbreak and still binary
which is uh... binaries that uh... gets executed the first time
uh... the first time to exploit these uh... executed it's renounced the system
function redirect
extols unmodified at first
extracts satya
to the system partition
out of the a_f_c_ if he choose sevis
and switches the way we can work with the study too
thirty sealants decal
so that it's the first thing cold by the first place the cement
then it removes itself
now talking about the injection victor so al two uh...
installed b sc
this uh... configuration file
and stuff
to to the ufone
and executes
the uh... essex the the staff of the jailbreak
uh... so unique u_s_ avs also known as teams kicks
uh... messed around with nfc and we'll buy back your service to achieve a
directory traversal
so that we can write everything we wants to defy system
uh... and sixty does its by creating steam links with dave c
watching outside the at c_c_h_ fruits
and uh...
and that having movie mobile back ip restored the feist is that some links
you know it's it's kinda complicated but yet this is only works
so it's used in obscene to and this fix tonight at six
with this uh... injection victor we modified the overrides they just fine
involved you do you manage to you give your tutor
uh... s dependence to modify existing configuration ativan configuration so
uh... we entered the recording setup such stocks a boot up
loading to jailbreak config fact
and of course is fixing a with six
i mean week counts use overrides the least anymore
to do this
the picnic picnic
the future
will i released today u_s_d_a_ listed cedric no
of course not
a quick wit
milk
so
what do we have at the moment uh...
we have some bucks from injection but that
uh... which means we can write to to the system that this to you use a petition
freight uh... excuse me foot weakened writes the you the best petition to
anyplace
uh...
but it's not useful at the moment because
uh... we cannot writes the system partition
ends a apple fixed the overrides released uh... fine
the fourth in the use of the season so we accounts
stuck with this
uh...
without of maintenance to assure filed away in eighty two too
to two nd to bypass the camel anticipate a similar because it's partially broken
uh... with posix means that sorry not-so-subtle social ticket
at the protected
uh... and we have been you saw the pictures on the web and stuff
developer only friedrich we nichole favorite because it's
it's not really a generator
uh... but those does choose structures inside binaries as and and the roots
this is not a big thing in fact because we cannot um... releases its it's only
for developers it's only for security researchers
and uh... anyone it's a
uh... one b visa anyway
uh... so
uh... in fact we don't have much to mixed into the flight was six bets and
but we uh... we we've met said his barbecue stuff of creek foxman anza
henry and now we have
we want to do it again and try to work on this uh... dosage directly we won its
yet
maybe earlier who will find something is amiss next few weeks item no
it depends
that's it
paprika
yet inside
yeah yeah but that doesn't work it only works for direct seven oh one
if
uh... and don't think so
no only the uh... before work
of raccoon is a dispatched
not be the open source one
uh... i mean not i mean the wild i'd dissect was is isn't is not fix anything
yeah there were other drugs as well that's uh... for almost uh... for more
uh... earlier versions of uh... africans it's not interesting for us
here here there are a lot of birds that were statements the beat up a chance of
a u_s_ so we we don't have anymore these exploits
uh... and sit up out of them anyway uh... in the defense favorite stuff
and distant uh... if effect i haven't really used its came in
uh... words
along though
that's why we um... we mean really leaves uh... the timing because we don't
know if the before in the next mission there that was the one i think stellar
becks so that's it
we want to lose a work in fact yet
okay
uh...
okay eka
uh...
yet because you need to
to certificates to use its unit to be able to sign binaries
uh... uh... route so use uh... in in consigning means and means nothing uh...
you you
you signed your but your you'll find it that's all
and uh... and then uh... you can and execute this as a rule it's because we
has we have another exploit to do this
uh... and this exploits uh...
also realize uh... in the fact that you need to be
developer
and as a legal issues with this
that's why we can't really isn't any in any way
uh... the fact that since that new process uh... is nuts and really a
problem
uh... it's
each speech he is
because we have of uh...
which will exploit which is my mind for a four
and we don't have this kind of magical exploits for a uh... eighty five
or eighty six
so we cannot execute disp specific
and uh... exploits
uh... that uh... the fact that they have to change them the processor to turn you
on that ivan nucor is and and and such
uh...
doesn't seem to think
sorry for the timing
a fun an iphone five or four s is do the same thing
it's like both sides are really difficult to exploit
ted the differences line rain
on a five you we don't have landry
this is the point len rainy the
uh...
which will make sports
and that only existing a foreign preaches patience
so we with this
facial kind of exploits you can changes the the wool uh... the organ chain you
can change p
includes and camel and its used to do in fact
foley
yet exactly yeah this is the only difference here injection victor
uh... you mean uh...
i was gets more and more secure than revision
uh... guessing so
icing so they could be the attacks of save face
is not accuse that really large in fact
uh... so
uh... it
from fish into fashion
the they try to limits these ethics of face by removing
uh... use this features
they didn't buy the past for
i don't know for a deep debating lal i don't know why did being true justice
features and with new new version of the system there
to try to remove
every use this feature so that the ethics of faces
is bridges to the maximum
uh... the steel uh... for example not more by safari
uh... which is uh...
uh... oj attack ethics of faced which possible ethics the face
but they're a lot of people actively working
and and searching
on this one so vendor attitudes gets fixed really reedy creek
soviet
didn't catch that sorry
yeah it's getting more difficult yet
of course
and maybe one day it will be
uh... difficult enough uh...
sort so that we we we won't have the time
to fill a two to review the jail break between uh... traditions of a list
essences appointment it this is what they want to achieve
no i'm not and i didn't write about this
yet to doing it as like uh...
three or four for people doing some research
uh... for breaks the that i know that i'm aware were the red some where art
of my friends x
and
okay so that there's only three of four people uh... that's not consider find
exploits anonymous because bills only only if u
uh... substituting
so the air
what i want you to do uh... is tuf is to find an extended
uh... these these peoples
to help us too
uh... asserts that
uh... we can uh... have more uh... polar
instead have the
uh... again sap apple in fact that he can get against it fixes
uh...
finding a business people is quite compete aged because they are very
skilled and uh...
a special people
uh...
how can i reach out to me and of smiles
uh...
on the issue
uh... what would be good i think it's is to set up ah... channel and i have seen
uh... dedicated for abuse people coming with olya and ready to you that i want
to
to outbursts to to do a job req
and uh... and then we could fields of to have these people
and uh...
and get them into the team somehow
this is the easy idea
of course does not people working on until breaks and uh...
city setting it's
uh... in the uh...
and a market
yeah uh... how unique is one of them
uh...
others as well i think
uh...
the it is a business in fact
and this is done in two people that can
they can do a job req but today the just want you to work with it
you do research
on a with with its and uh... and to the wants you
to revisit to the *** this is a their businessman who in fact
him with they are the few people doing this and so maybe a two or three here
and that's really involved in the basement stuff
uh... i've tried to uh... the last time like boat u_s_ apus s asar p four
for the pontotoc confronts little i want to see is to find uh... about in the
basement and wanted to of course i get the big prize of uh... one and read this
house and the dollar's that's uh... via uh... and the fact that you don't find
anything at that time
so i don't give up and and now i'm focused on on top of the stuff
that's a good question
uh...
then the between code in fact is really short it's all the like uh...
twenty k bytes
uh...
and i said apple don't mortified the just fix stuff in it
so today i don't sing those anymore there's no more than the revenue teenage
uh... what we could expect uh... is that for example if they want to switch to
usb three your or andrew and you would shoot sets or stuff
maybe because introduce a burgundy is and we could use as as a book from
exploits
but on two days mission ended ed
a four three four eight five eight six
uh... zappa i think that is the relieved
elites which has been no chance at all that so is another transport
thank you very much