Thứ Sáu, 8 tháng 12, 2017

Waching daily Dec 9 2017

This video could be a little bit controversial, so I wouldn't mind a civil discussion about

this afterwards in the comments or on reddit.

And if you you watch this video far in the future, please don't blindly assume that

I still hold the same believes, because I will obviously adjust my world view based

on new information.

Scientific method and stuff.

But in this moment I believe this is generally an issue that we have to deal with, and figure

out where we as hackers, security researchers, the infosec community at large, stand.

So let me make my argument.

Before I go into a very specific example that motivated me to make this video, I would like

to approach this topic from a fundamental level.

This is about mobile security or mobile app security in particular.

So what makes a mobile app secure or insecure?

Generally the apps that concern us are more than just applications on our phone.

Facebook, whatsapp, wire, snapchat, instagram, various banking apps, paypal, bitcoin wallets

and so forth all interact via some API with some kind of online service.

some private user data is cached and stored on the phone, but probably most of it lays

on the servers.

Which means generally a security audit of a mobile application should includes an audit

of the server component or the API as well.

I have done a lot of mobile app security audits and I personally find them pretty boring.

Don't misunderstand me, I love technical challenges.

Debugging apps with frida and maybe defeating some obfuscation or reversing a weird obscure

layer of crypto.

Super fun.

But with "boring" I mean more the impact, the severity, of vulnerabilities that you

can find.

Because our mobile phones are probably the most secure computers that you can get.

if they would get security patches *cough* android *cough*.

So let's consider an up-to-date iOS or Android device.

Both platforms were designed with attack surface reduction in mind.

It starts with the the permission model where each app can define which APIs they want to

use.

That's very different from a regular PC where basically every program can access anything.

Though to be fair that also gets better.

We get sandboxes, namespaces, on mac you have SIP (system integrity protection) and so forth.

Anyway.

So these mobile apps run in this very restricted permission model and have limited access to

those APIs, and only if permissions was granted.

Now obviously a big issue why mobile phones might not feel very secure is, that the general

public doesn't pay attention to permissions and might install trojanized apps from the

google play store that request access to every api and maybe even higher privileges through

device admin and so forth, or a user has a rooted phone and runs a trojan as root.

And that's obviously very bad for the user's naked pictures but that's not really application

security, is it?

So if we audit a mobile app we have to look at how this particular app protects the user's

data.

And like I said the app sandboxes are generally great - if the developers follow the development

security guidelines.

For example when a developer uses the internal storage the developer even doesn't have

to think about protecting that data, because you get that for free from the system.

You can save files directly on the device's internal storage.

By default, files saved to the internal storage are private to your application and other

applications cannot access them (nor can the user).

When the user uninstalls your application, these files are removed.

So the user's data is secure.

Of course some developer save data on the external storage, then for example sb.

Could take out the SD card and get the data through that.

And sure, that's an issue that then should be fixed.

Another example is the update mechanic, which you don't have to care about.

The playstore or appstore is perfectly safe to push your updates.

You don't even have a chance to fuck that up with downloading unsigned updates via http

and execute it.

Then generally android apps are written in Java, so you don't have to care about memory

corruption vulnerabilities, of course an app can place some stuff in native code, which

some do, often for obfuscation or anti reversing reasons, which might actually introduce memory

corruptions.

And sure, that's then an issue too.

But even then you wonder, what's even the attack vector for that.

How does an attacker even reach these code paths.

So let's explore one example in a bit more detail.

android applications can define so called intents.

They are basically entry points to your app that could be called externally.

For example you can register a broadcastreceiver for ACTION_BATTERY_LOW, which will then be

called when the battery gets low.

And these intents, or basically external interfaces can also pass data around.

It's kind of like a more complex function call.

And some developers use it to pass data between some trusted apps.

For example the android facebook app will most likely use that to interact with the

facebook messenger app.

And sometimes developers forget to properly restrict access to only trusted apps, or didn't

realize that what they expose is bad.

And so you can have very interesting vulnerabilities where for example application A implements

a vulnerable intent that reads a user's SMS and returns the text, exposes this intent

publicly, and then app B, which DOESN'T have the sms reading permission, can then

piggyback on app As intent to get access to the SMS.

And I have seen terrible intents, and yes they should be fixed.

But let's be honest.

How realistic are those attacks.

Some intents might be reachable from a URI in the browser, but then that also isn't

really interactive, it's not like a page can invoke an intent and steal SMS text.

And so generally we are talking here about other malicious apps that abuse these intents.

And I mean how likely is that?

I'm not saying that it's not an issue, it should be fixed.

But how realistic is it that a user installs a malicious application from the appstore

that particularly targets this one other application.

Now here we might get into things like banking trojans because we know those exist.

So yeah, a banking app with an exposed intent that allows money transfer without user interaction,

that's bad.

A banking trojans might target that.

But beyond that.

Who really cares?

To me the impact is fairly low, rare, very targeted, nothing people really have to worry

about, mostly because it's something that can be very easily found and fixed because

these intents are defined in a simple .xml file and so apps that get audits are generally

safe.

You can kind of compare it to CSRF on the web.

But on the web you just have to hide a hidden iframe that performs the attack in an ad or

just send them a link.

That's bad and google even pays quite a bit for that on their plattform.

But exposed intens, you have to get a user to install another malicious app.

And at that point they have much bigger issues than the exposed intents of an app.

But this is probably as bad as it gets for android app vulnerabilities.

Like I said the sandboxing and permission model is great, it's not much you can do

on a phone.

You can kind of compare most mobile apps to the browser.

The browser renders and runs a javascript/html client application on your computer which

interacts with a server in the background.

And so does your mobile app.

It's just a piece of UI written in java and interacting with the server api.

And browser client security has a lot more impact because web applications in the browser

share the same browser, while apps are very isolated from each other and have to be installed

first.

Now the much more serious issues, like with web security, obviously lie with the server

component.

For example the API could have access control issues where one user is allowed to request

messages from other users.

Because a developer forgot the authorization check.

And you know a whole bunch more issues… but at this points it's basically web security.

And so if you find an issue with the web api, would you classify that as a mobile app issue?

I think the issue here is not the mobile app.

And the server is in direct control of the vendor and can immediately be patched, while

mobile apps have to get a new update via the store and many users might not update for

a long time.

Calling these kind of issues mobile app issues, is I think misleading.

But there is also a big part in between the app and the server - and that is the network.

Which I think is probably the biggest risk and threat for mobile apps.

Because over the network you will send all the user's private data, session tokens

and so forth.

And mobile phones are very mobile, a lot of people connect them to open wifis.

And we generally have accepted that the network is untrustworthy, that's why we use SSL.

And so of course if an app communicates with server over http, then that is bad.

Somebody just has to sniff the air.

And I would consider that an issue with the mobile app.

Now even if HTTPS is used, it has to be implemented securely.

That means you have to have a valid trusted certificate and you don't ignore SSL errors.

If you do ignore those errors in your app, then it can be very bad if you have an attacker

in a man in the middle position.

But if you use SSL correctly, with a valid certificate, then the connection is secure.

Ok.

So up to this point I hope I was able to kind of show you with a few examples that android

apps are pretty secure.

You can screw up some stuff but it's generally also easy to fix and if there are issues they

generally are very targeted and are not as scalable as for example an authentication

bypass on the web api, which could be automated to taking over every facebook account there

is and download the private messages.

Now let's move to one particular example that motivated me to make this video.

And let's start with how a particular research was described in the abstracts and short summaries

about the work.

It's from 2016 and is about the banking mobile app from Number26.

N26.

Here is Reuters, a very reputable news agency:

Vincent Haupert, a research fellow and PhD student ..., told the Chaos Communications

Congress in Hamburg how he and two colleagues found N26 security defenses riddled with holes

that could have been used to defraud thousands of users.

For example, Haupert said he compared data from a leak of 68 million account credentials

from online file sharing company Dropbox with information on N26 users … to identify 33,000

N26 user credentials - without being thwarted by N26 anti-fraud systems.

From there, he said it would have been simple to send a phishing email to these N26 customers

that could potentially have allowed him to break into their accounts.

Wait, I thought Haupert got 33.000 user credentials?

Why does he need to send out phishing emails?

Well Reuters kind of misunderstood what the guy did.

N26, like almost every website I know will tell you in some way if an email is registered

with the system or not.

So he just took a list with millions of emails and found 33.000 of them had a N26 account.

And he could use that to target them with phishing.

But it sounds so much worse... he was able to identify 33,000 N26 user credentials - without

being thwarted by N26 anti-fraud systems.

I understand.

Not his fault in this case.

Reporters have also mixed up stuff that I have said.

It sounds terrible to the reader, those are nuances they probably don't understand.

But let's move on.

In response, N26 said in a statement it had made customer accounts more secure by reducing

and encrypting data transfers.

Wait.

They now encrypted data transfer?

Did they not use SSL?

Holy shit for a banking app that would be bad.

Let's look at Hauperts official abstract of his research that he had presented on 33c3.

Here he writes:

we succeeded independently from the used device to leak customer data, manipulate transactions,

and to entirely take over accounts to ultimately issue arbitrary transactions—even without

credit.

Entirely independent of the used device, we were not only able to reveal N26 customers

and to manipulate transactions in real-time but also to completely take over a victim's

bank account.

This sounds insane.

If that were true, this is massive.

And I can only explain this kind of impact if you somehow can either mitm everything,

for example when they use HTTP.

Or the API completely fucked up authentication.

And that's why this makes me so mad.

Because this is not the case.

And I better insert here now a disclaimer.

I'm going to rant now a little bit, and I don't want to attack this researcher,but

I will criticise his scientific work.

And he just happened to be the scapegoat now, because he was very public about this research,

with a lot of media attention.

But this is not a single isolated example.

I know he didn't deliberately mislead or manipulate.

Infact I know more people that agree with his assessment of the vulnerabilities here,

than I know people that agree with me.

And that's why I said in the beginning that this video could be controversial and I would

like to see a discussion because it's not quite black and white and there is a fine

line here.

So let's see what the vulnerability actually was.

I'm going to play the crucial part of his talk "Shut Up and Take My Money!

The Red Pill of N26 Security"

Just to talk about like the infrastructure of N26.

Basically they have two apps, one for iOS and one for Android and they communicate over

a JSON based protocol, TLS encrypted.

Their backend is at api.tech26.de

How do I know actually that this is a JSON based protocol?

Because I used a TLS mitm attack, a man-in-the-middle attack to log the protocol.

I actually suspect that I only needed to install a certificate, a mitm certificate on the client

, but actually I was suprised I didn't need to touch the client, because they didn't

implement any certificate pinning.

<audience laughs and claps>.

WHY IS THE AUDIENCE LAUGHING AND CLAPPING HERE?

What is the surprise here.

SSL performs verification of the certificate with the local CA store.

Of course if you install your own certificate on the device the device will trust it.

And the application did nothing wrong here.

It checked the certificate via the local trust store and found that the user trusts it.

This is how SSL is supposed to work.

And yes, there is criticism about the CA system.

We have issues with it.

Certain CAs are not trustworthy.

We had incidents of compromised root certs and we have a rampant problem of middleboxes

and anti virus software that install their own certificate into the local CA store.

But there is not much evidence or data on actual attacks of SSL mitm.

But take a step back from mobile app security and lets look at the web.

There is HPKP, which will actually be deprecated now because it has it's own issues.

We have the chrome public key pinning preload list and some of the big sites are listed

there.

But as far as I can see for example paypal doesn't do it for their website.

Why is nobody screaming how insecure paypal is because they don't use pinning on the

web?

SSL has it's issues.

No question.

But it's also holding up surprisingly well.

Realistically, how many real world attacks on SSL connections do we actually see?

Public key pinning can be a defense in depth strategy, but claiming that an app that doesn't

do it is insecure?

That I don't agree with.

Or most of the web can be considered broken.

Let's continue with the talk.

Because now he makes an exam ple how that could be turned into an attack.

The first thing that comes to mind is.

Lets do real-time transaction manipulation.

That means we manipulate a transaction that the user does, but we will change the recipient

and the user won't see nothing about this.

Remember in his abstract he claimed that he will show how to "manipulate transactions

in real-time but also to completely take over a victim's bank account."

So if you look at this graphic again, what if an attacker could get the DNS record of

api.tech26.de under control?

That would mean that all traffic is routed over the man in the middle attacker server,

and as there is no certificate pinning we could just issue a let's encrypt TLS certificate

and the app is going to trust the certificate.

AGHJdafadasrfhsekf wat?

I mean we have seen DNS hijacks in bank heist before, but if you can hijack the DNS record

of a domain to redirect it to your own server and now MITM everything, of course you are

screwed.

What is the surprise there?

But does that count as vulnerability for N26?

No the issue, the vulnerability or attack would be the weak DNS system or account they

used.

Maybe through social engineering or bruteforced credentials.

Everything that happens after the DNS hijack is pretty much just creative ways how you

can cause damage.

And yes again, pinning might have helped here to protect the transaction, but we don't

know what other systems and data could have been compromised through a DNS hijack like

that.

So at best, it would be a defense in depth mechanism, and sure a nice to have improvement.

But I don't agree that this is a vulnerability of the app that leads to complete take over

of accounts.

And in the paper he describes this as:

If an attacker can launch a man-in-the-middle (MitM) attack, the transaction can be tampered

with transparently.

Yeah, if it were HTTP, but you can't.

Because SSL is used.

But he argues:

This becomes possible because, even though the N26 apps make

strict use of HTTPS, they do not make use of certificate pinning—a best practice that

prevents unauthorized third parties from breaking the confidentiality and integrity of the transmitted

data.

Strict use of HTTPS does ensure confidentiality and integrity.

Without pinning you don't loose that.

And he lists three claims how this could be done..

– A trusted certificate authority (CA) issues the certificate.

Vulnerabilities in CA validation processes sometimes allow an attacker to take hold of

a certificate for domains they do not own.

Ok yeah.

Could happen.

Theoretically.

But you know, how realistic is that this would be used in an attack against N26?

Is that a real risk or just a theoretical risk?

And also isn't that then a vulnerability in the CA and not really a vulnerability in

the app?

– Both Android and iOS are frequently the prey of privileged malware—that is, malware

that performs a privilege escalation exploit before executing their payload.

It is a trivial task for privileged malware to place a certificate.

That doesn't make even sense?

Why would a malware that used a privilege escalation exploit even bother to install

a certificate so somebody can perform a MITM attack?

Why not just extract the credentials from the app, hook the functions to change recipient

or do whatever?

But there is malware that does in fact install certificates sometime, because they run a

local proxy to inject ads into everything.

That's a common thing.

But not for MITM attacks like that.

And if you have a malware on your phone, a privileged malware that is.

You have other problems.

This is where obfuscation comes into play as a possible defense in depth strategy, but

come on.

If we talk about theoretical attacks like that, then theoretically you can always reverse

engineer and steal stuff with a privileged malware.

Nothing helps.

– A user can be tricked into installing the certificate through phishing or other

means of social engineering.

The user is the weakest point in the system.

So, the app should pin its certificates.

In general, attacks using phishing or social engineering are particularly dangerous and

have a high success rate.

A user can also be tricked to install a malware?

Or a N26 developer could be phished for DNS account credentials or to install a malware

and grab the SSL root certificate that they are pinning.

It's not a good argument.

And so, no!

N26 does not have massive security issues.

Once you have the MITM setup you can hijack all the stuff obviously.

Now N26 had some API design issues that the researcher also goes into that were quite

interesting, some logic issues with some card number and two factor issues.

I think these were valid API design concerns because N26 clearly wanted to implement something

a certain way and he showed that it was a bit flawed.

But nothing that would warrant this large negative response.

Now I want to summarize.

The media will obviously exaggerate certain security issues.

Or just make genuine mistakes not understanding the impact.

But in this case, "manipulate transactions in real-time but also to completely take over

a victim's bank account.".

I find this to be a very misleading wording coming directly from the researcher.

And seeing through that is particularly difficult, because his research is not bullshit.

There is a lot of good information and research in there, but it feels like the impact of

them were a bit artificially inflated and so you have this kind of half true, half theoretical

mix that for somebody who is not very experienced with, will lead to a wrong impression.

And I think that's dangerous and maybe even a little bit unethical.

And very early in the video I mentioned that I don't think he did that intentionally.

Because I know that many people hold this believe that "no cert pinning" on mobile

is a valid issue.

I already explored earlier why I don't really think it's an issue.

My thesis is, and the main point of this video should be, that I think mobile apps are sooo

boring because issues are generally very low impact, that somehow the security industry,

researchers our community agreed that missing certificate pinning and "only" implementing

SSL correctly is apparently not enough.

And I think what I say is true, because nobody really complains about that on the web.

Nobody says using only SSL for your website is an issue that can lead to traffic manipulation

and full account take over.

Because SSL is actually the technical solution to exactly those issues.

And like I said there are certain weaknesses in the whole CA system, but that is something

else.

That is a different research field.

Now the researcher also announced a talk for the 34c3.

Most of the information including the abstract only seems to be available in german for now.

It's again about banking apps.

Banking apps are often target of banking malware.

And there is a lot of android malware.

So what banking malware usually does, for example on your desktop pc, it will hook into

the browser and steal your credentials or use your session to wire money.

And basically they would do similar stuff on android as well.

As long as the malware somehow gets root, either through old unpatched android exploits

or because sb runs a rooted device and gave the malware root permissions.

And so banks obviously don't want that their customers get "hacked" because of malware.

So banks invest money into solutions attempting to mitigate that.

But obviously the banking app can't prevent that.

It can try to implement root detection and refuse to run.

Or obfuscate itself so hard, that it's not easy to hook into the app and steal credentials.

But it's always going to be a cat and mouse game.

The bank just tries to make reversing expensive enough, that it's not economically feasible

anymore for the malware author.

It's just a best-effort in order to protect users from themselves.

Now if a malware is able to bypass any anti-debugging anti reversing or anti root detection mechanisms,

Is that a security issue of the banking app, an issue of the obfuscation solution?

Is it fair to blame the bank for it?

And that seems to be the gist of his new talk.

At least from what I can understand from the abstract and few interviews, he seemed to

have implemented some kind of hooking, dynamic or static analysis of the promon obfuscation.

And is able to basically do what promon tries to prevent in this best effort approach.

Which is neat, it's probably some really cool stuff and I'm looking forward to the

technical details.

I'm obviously just speculating here, and the talk and paper could be actually much

more.

But if I'm right, why is this talk not just called "Defeating Promon" and going then

into details of how promon works and how you can get around it?

That would be a cool technical talk.

Why does this talk have to focus on banking apps and fear mongering.

Leading to countless of media titles claiming how 31 banking apps are insecure and hackers

can hack them.

That's only half-true.

We are talking here about already compromised devices and a best effort approach of banking

apps trying to protect users from their infected devices, why shame the banking apps?

What is the purpose of this, if not just for self-promotional reasons, making the research

sound more scary and impactful.

And at the same time ignoring the damage it does in the public perception of what are

actual threats and what are hackers capable of.

This to me is FUD.

For more infomation >> Some thoughts on Mobile App Security - is it FUD? - Duration: 26:54.

-------------------------------------------

IM FIGHTING WITH DANIELLE BREGOLI (BHAD BHABIE) - Duration: 2:03.

Hey bitches welcome back to my channel, and I thought to record a video that a lot of people are gonna

Take seriously

But it's actually a joke because I just wanted to bring attention to something that happens on my journal all the time

And I find it fucking hilarious, and my lips are dry today

Come on dry lips, but every week

I get a hoard of like

Teenyboppers preteen kids that come to my channel and tell me that I'm copying the cache meows

I curl Daniel brocoli burka Lee

Doesn't think it's where the last name is because I guess that she says hey bitches at the beginning of her video

But I wasn't though some simple logic out there than one

I'm not the first person that ever said hey bitches

I'm pretty sure there's that makeup guy that says hey bitch, and then I mean hey bitches

It's a common fucking phrase so one who gives a fuck, but two

I've been on YouTube a lot longer than her and I've always said hey bitches in my videos

So thank you very much teeny bopper children. She's copying

me out do not try to do the fuckin Beyonce hair flip with a

Fucking Santa Claus out because they're actually really fucking her fluff in my eye

but how fucking stupid is it that people will try to cause drama and

Controversy on people's channels over stupid things like openings to videos

It's not like I'm doing like a James Charles video montage thing where he's like

At the beginning of the fucking video because that's just dumb, but doesn't she say hey hos as well

So you know it's just so fucking stupid the things that people find to nitpick on YouTube I could do a fucking list of them

and really just read people - fuck you both, but I'm not going to so Danielle cache me outside bitch because you took my

opening I just fucking joking you guys so that is this little anybody video that I'm gonna upload for you because

Honestly, I find it hilarious and ridiculous that people take the time out of their day. I don't know if they're looking

for

like people who say bitches

I don't know if they're just trying to be an asshole or they're trying to think that they're

Shading me in some way by telling me that I'm copying Danielle. Whatever first of all another problems her

I think it's great that she has rose to such success all for something goes stupid as catch me outside

I especially would do something better with it and try to be like you know

You know what it's not gonna get into back as Oh uproar

There'll be a fucking uproar you guys, so that's it for this video

I love you all please subscribe to my vlog Channel, and I will see you guys in my next video. Bye

For more infomation >> IM FIGHTING WITH DANIELLE BREGOLI (BHAD BHABIE) - Duration: 2:03.

-------------------------------------------

PERREO NAVIDEÑO - NANOMIX [REMIX] 2017 ʜᴅ - Duration: 2:29.

For more infomation >> PERREO NAVIDEÑO - NANOMIX [REMIX] 2017 ʜᴅ - Duration: 2:29.

-------------------------------------------

3 Tips to Increase Your Boat's Value | BoatUS - Duration: 2:50.

Hi there!

This is Lenny Rudow from BoatUS Magazine, and we at BoatUS love our boats.

We're sure you do, too.

But you know there's going to come a day sooner or later when you have to sell your boat.

So, today, let's talk about three maintenance tips that will help you get more money for

your boat when you finally do have to sell it.

Here's tip number one: Every time you use your boat, give it a thorough washdown with

a microfiber cloth and some boat soap.

Because, truth be told, the way your outboards look on the outside is every bit as important

as the way they look on the inside when you go to sell your boat.

These motors here, they actually have eight years and over a thousand hours of use on

them, but you wouldn't know it by looking at them.

And by the way, every couple months, make sure to treat them with a nice coat of paste

wax, too.

Here's tip number two: Of course you want your outboards to run as good as they look,

right?

So, after each and every use, make sure to give them a thorough freshwater flush.

Most outboard mechanics will agree that this is about the most important thing you can

do to maintain your engines, along with regular oil changes.

And you freshwater guys, you keep this in mind, too, because while it's true that this

is most imperative for saltwater boaters, running your motors in lakes and rivers will

end up putting mineral deposits inside those engines.

So make sure you give them a flush.

For tip number three, we're right back here to the seat because one of the items on a

boat that deteriorates and gives it a really awful look quite often is the vinyls.

The most important thing about keeping your vinyls in good shape is simply again to wash

them down after each and every use.

The dirt that gets into the vinyl is what the mildew actually attaches to.

Now, I hate to admit it, but as you can see, in this case, this is where I've fallen down

flat.

And when someone comes to look at this boat, this mildewed vinyl is going to be a real

turnoff.

You may have noticed a them here, folks.

The use of lots and lots of freshwater and keeping your boat really, really clean are

the most important things you can do so when you go to sell it, it brings top dollar on

the used boat market.

Visit BoatUS Magazine at boatus.com and check out the many videos and articles we have that

will help you maintain and operate your boat.

On top of that, folks, we hope you'll go to the comments section below and let us know

what you would like to learn more about.

For more infomation >> 3 Tips to Increase Your Boat's Value | BoatUS - Duration: 2:50.

-------------------------------------------

🎵 Blackbear - IDFC ( Crankdat Re-Crank ) #Trap #EDM #Music 🎵 - Duration: 3:55.

Blackbear - IDFC (Crankdat Re-Crank) #Trap #EDM #Music

For more infomation >> 🎵 Blackbear - IDFC ( Crankdat Re-Crank ) #Trap #EDM #Music 🎵 - Duration: 3:55.

-------------------------------------------

7 Tips That Will Make You a Better Freestyle Ice Skater - Duration: 5:52.

Hey guys, this is a special video, not really a tutorial, but I'm going to present you

7 completely different ways to get better in freestyle ice skating.

Let's jump right into it!

(starting off the list) Practice the basics in both directions.

There are only a few ways your skates can contact the ice: You're either going forwards/backwards

or you're using the inside/outside edge of your feet when traveling.

Everything else is just the combination of these.

If you practice at least the basic movements in both directions, you'll get insane stability

on the ice, basically you'll be prepared for every situation.

Do you turn and spin only to the left?

A simple 180 is enough to change the situation.

Being confident on all edges come in handy when you save tricks or yourself from falling.

In this example it was pretty good that I had experience with moves to the right, right?

Roller Skating.

This is... completely another world, it's like driving another type of car.

A few things are easier, like eagle, backwards crossover, some others are impossible like

a simple high speed drifting stop.

Little bumps and obstacles can improve your balance and gingerly prepare you to handle

unexpected situations.

You can find bumps on frozen lakes too, and the quality of the ice can just drop to zero

in a matter of meters.. (evil laughter)

Muscle memory.

This actually means a lot.

But the one that is important now is a cheat that speeds up the learning process of the

robotic movements.

A robotic task in freestyle can be a complex trick for example where you do different things

with your legs and arms simultaneously and is generally taking a long time to learn.

The concrete tip here: When you are tired, don't practice difficult, energy demanding

tricks.

Why?

Because your procedural memory will store the wrong, tired version of that trick and

you'll learn to execute it badly.

The power of muscle memory is HUGE.

These are 3 different 540s on ground.

Have you seen the difference?

No?

The only difference is that guy in the background.

This is how important the muscle memory is.

Learn to fall.

The ice is a very hard material, but it's slippery which can be an advantage for us.

Your traveling speed just barely matters at all when falling.

Your only task is to use your arms to balance the fall and protect your head.

When falling on your back: try to support yourself, keep your head as high as possible.

Falling forward: mostly happens when going backwards, hitting your chin is the risk here.

You just slightly hit your chin and the trip is earned to the hospital immediately.

Same goes here, keep your head up at any cost, you can rotate away on the slippery ice this

way transforming the momentum to another direction.

Plus if you're practicing an advanced trick I found there is only a few frequent ways

to fall so you can get familiar with them quickly and it will be less scary over time.

Just analyze what's wrong and work on it more.

Oh by the way, analysis: Record yourself and compare.

The perfect way would be to compare 2 videos frame by frame (with a video editing software).

OK, I know that not everyone has access or the knowledge to do that, so… to spot the

differences between your tries and a nicely executed trick you can still do the cheap

version: Compare slow motion videos by eye to find small details.

Compare the positions of your arms, the foot placements, angles, stop the video if needed.

Youtube also has slow motion feature.

BUT!

Don't get lost in the small details!

The tempo of a trick is equally important (if not more important) and you can only see

that in normal speed.

You need to memorize visually how much time you have for a specific movement.

So keep watching the tricks in normal speed until you can recall the full movement from

your memory in that speed.

Stretching (is at number 6).

And warming up of course, because you don't want to pull a muscle in beginning of your

session, or it will to be crap for the whole day.

Stretching can improve your posture and mechanics.

Sometimes it's just style, but that's a help too.

It's important if you train for some muscles, stretch them after the session because they

will contract.

That leads to decreased your movement efficiency or cause other problems.

Few typical stretches that is helpful for an ice skater: Stretching your legs for a

few minutes.

Hip flexors, adductors, hamstrings.

Most of these I do regularly.

Always be sharp.

Sooner or later, depending on the ice quality, your skates will get blunt.

Especially when you're learning something you need to know whether you fall because

of a bad technique or because the skates are blunt.

Why would you want to get frustrated by slipping all the time?

So sharpen regularly.

Good news that we are developing a mobile sharpener for different kinds of blades.

I hope can post updates on this later.

+1, before you go!

I have one last advice, to really believe in yourself.

Because NOTHING is a legendary achievement.

Everything can be built up from zero, safely.

Believe me, I have dream tricks too and difficulties with the trainings all the time.

Whatever you're struggling with, I'm sure there is always a next step.

I learned everything alone in the sports I do and I'll make a tutorial later on how to

learn anything that you want by just watching videos.

Tip number 5 in this video is something you can apply until that.

Thanks guys for watching, I'll be back with a remastered eagle tutorial shortly and some

other stuff.

Have a nice icy day!

For more infomation >> 7 Tips That Will Make You a Better Freestyle Ice Skater - Duration: 5:52.

-------------------------------------------

BREAKING: Black Thug Who President Trump Got Out Of Chinese PRISON… Look What He's Doing Now. - Duration: 4:04.

BREAKING: Black Thug Who President Trump Got Out Of Chinese PRISON…

Look What He's Doing Now.

In a bid to remain relevant LaVar Ball attempts to reignite his feud with President Donald

Trump.

This guy just will not give up.

Ball has been desperately seeking to gain President Trump's attention.

Ball rose to national attention as the father of former UCLA basketball player LiAngelo

Ball was jailed for shoplifting while in China.

LiAngelo along with Jalen Hill and Cody Riley were caught shoplifting sunglasses from a

Louis Vuitton store in China.

LaVar famously….or rather infamously….refused to thank President Trump for intervening what

could have become an international incident potentially sparking a diplomatic crisis to

free his son.

According to LaVar?

It was no big deal!

LaVar said of the incident – "Everybody is making it a big deal.

It ain't that big of a deal.''

LaVar's ungrateful response prompted President Trump to take to Twitter to publicly scold

LaVar calling him an "ungrateful fool" in a tweet.

Now LaVar is attempting to revive the incident and gain relevance by attacking President

Trump on social media.

He tells the President #stayinyolane and posts a GIF of a basketball player slam dunking

President Trump.

It is becoming all too clear that LaVar is merely attempting to use his son as a PR stunt

to promote his Big Baller line of sneakers.

LaVar appeared on CNN on Tuesday demanding a "thank you" from President Trump claiming

it as his due because he sent the President three pairs of sneakers.

Now, Lavar is posting a GIF of himself dunking on Trump.

While LaVar's eldest son Lonzo is a rookie with the LA Lakers and was a college basketball

star with UCLA, it seems LaVar's ego has insured his younger two sons will never have

that opportunity.

After LiAngelo disgraced himself and his family requiring President Trump's intervention,

UCLA suspended him indefinitely from the basketball team.

Rather than wait to find out the length of the indefinite suspension, LaVar instead opted

to withdraw his son from school proclaiming to one and all that LiAngelo would be entering

the 2018 NBA draft, therefore making a transfer to another school impossible.

Now LaVar has signed both LiAngelo and his younger brother LaMelo with an agent with

the intention of finding a team to play overseas.

Lonzo's agent Harrison Gaines, has opted to take on his two younger brothers as well.

However, signing with an agent this soon makes a high school player ineligible to play college

basketball except in rare instances.

LaMelo is 16 and was formerly a junior at Chino Hills High School.

However, his father had an ongoing feud with the school's basketball coach causing LaVar

to yank LaMelo out of school.

The original plan was to homeschool LaMelo.

Instead, LiAngelo's situation has significantly changed things.

Gaines has now put the word out the Ball brothers are looking for a team to play professionally,

but most credible European general managers are rolling their eyes while yelling "RUN

AWAY!"

It seems most European club executives want little to nothing to do with the Balls partially

because of the stage dad from hell routine that LaVar plays and partially because the

two younger boys come with no known track record.

According to the Bleacher Report, Francesc Solana, general manager of Spanish club MoraBanc

Andorra, and a regular at the annual NBA Summer League in Las Vegas was approached by the

Ball family this week.

He remains very leery of their intentions and and of their credentials.

He states of the situation –

"LiAngelo and LaMelo were offered to our team, both kids, looking for a deal in Europe.

Money isn't an issue to them, but they have zero experience, so it's difficult to take

them seriously.

I don't know what to do with the dad, LaVar Ball (laughs).

This isn't a good or normal situation; I don't like it, we are not going to sign

them."

what do you think about this?

Please Share this news and Scroll down to comment below and don't forget to subscribe

Top Stories Today.

For more infomation >> BREAKING: Black Thug Who President Trump Got Out Of Chinese PRISON… Look What He's Doing Now. - Duration: 4:04.

-------------------------------------------

Ishq Na Darda | Punjabi Folk Songs | Live Performance by Sultana Sisters | USP TV - Duration: 7:22.

(Aalap)...

(Aalap)...

(Aalap)...

Je kar deen ilam vich hunda

Je kar deen

Je kar deen ilam vich hunda

Tan sar naizay kyun chadh de hoo

Je kuchh mulahiza uss darr da kar de

Je kuchh mulahiza...

Je kuchh mulahiza uss darr da kar de

Tan khe mein tambu phu sad de hoo

Je kar mann ne maiyat rasooli

Je kar mann ne

Je kar mann ne maiyat rasooli

Tan pani kyun band karde hoo

Sadik deen dina de Baahoo

Sadik deen dina de Baahoo

Jo sar qurbaani kyun karde hoo maula

Ishq na ho ishq na

Ho ishq na darda maut kolo

Ho ishq na darda maut kolo

Bhanvein sooli chadhna pae jave

Bhanvein sooli chadhna pae jave

Nach nach ke

Ho nach nach ke yaar mana lainda

Nach nach ke yaar mana lainda

Bhanvein kanjari banna pae jave

Bhanvein kanjari banna pae jave

Ho ishq na

Ho ishq na darda maut kolo

Zubaani...

Zubaani kalma har koi aakhe

Zubaani kalma har koi aakhe

Dil da padhda koi hoo

Dil da kalma aashiq padh de

Dil da kalma aashiq padh de

Ni jaanan yaar khaloi hoo

Kalma yaar padha

Yaar padha yaar

Kalma yaar padhaya Baahoo main sada suhagan hoi hoo

Log panj namazaan padh de

Log panj ho namazaan padh de

Pichhe sara din velle firde

Log panj ho namazaan padh de

Pichhe sara din velle firde

Aashiq dum-dum de vich padh de

Aashiq dum-dum de vich padh de

Bhanvein teg tale sir leh jaave

Bhanvein teg tale sir leh jaave

Ho ishq na darda maut kolo

Chal ve Bulleya..., Bulleya..

Chal ve Bulleya chal othe chaliye jithe saare anne

Na koi saadi zaat pehchane

Na koi saadi zaat pehchane

Te na koi saanu manne

Maula.. maula.. maula.. maula

Ishq Bullah Shah ho aukha valla

Ishq Bullah Shah ho aukha valla

Surat hai sanam di, arsh-nu-allah

Ishq Bullah Shah ho aukha valla

Surat hai sanam di, arsh-nu-allah

Bin yaar de

Ho bin yaar de na koi allah hai

Bin yaar de

Ho bin yaar de na koi allah hai

Bhanvein rabb naal ladna pae jave

Bhanvein rabb naal ladna pae jave

Ho ishq na

Ho ishq na darda maut kolo

Bhanvein kanjari banna pae jave

Bhanvein kanjari banna pae jave

Ho ishq na

Ho ishq na darda maut kolo

Ho ishq na, ho ishq na

Ho ishq na darda maut kolo

Ho ishq na, ho ishq na darda maut kolo

For more infomation >> Ishq Na Darda | Punjabi Folk Songs | Live Performance by Sultana Sisters | USP TV - Duration: 7:22.

-------------------------------------------

Lost Souls of Igneon | Garry's Mod - Duration: 25:54.

Hello everyone. My name is Crow_Se7en

Welcome to Garry's Mod. This map called Lost Souls of Igneon

Say hello to the space captain

Kenny: Hello, I'm Kenny

Ok.. The rules..

We don't need to read the rules. Well, we can read the tips

Kenny: Same.. Same.. Same..

Pay attention to the text messages

Press the start button

That's the name of this map, Lost Souls of Igneon

C7: Game over! Kenny: We're dead

C7: What? Say again Kenny: We're dead

We're dead!

Kenny: What company?

Ready?

Vacuum chamber

Ah! Time out! You go first!

Kenny: Nothing

It's an elevator!

Kenny: Let's go up

Fine, let's go up

Kenny: We're going down

You said go up

Kenny: I pressed the up button and it was nothing happened. I pressed the down button

Ok

Kenny: This area reminds me of the unreal tournament. This place where

the game starts. It looks like that place

Plot twist.. We're in the unreal tournament

Kenny: We're gonna kill each other

THE HUNGER GAME!

Kenny: Need the code..

C7 & Kenny: An access code

Need the plasma cutter

Who is that?

Kenny: Did you finish reading? C7: Need to find the crowbar to open something

Kenny: Yes

This is the server room

Need the crowbar

Oh wait..

We forgot something

Kenny: Let me look for something

Let's go back to the server room

Kenny: Where are you? Oh, found you

I was in the server room

Now, it's working

The plasma cutter is in the storage room

Kenny: Let's go downstairs. C7: Need to find the storage room. Ok, fine

Maybe, we should go to the computer room

Oh, let's go back

Kenny: Oh, we found it

Kenny: Perfect, we have - -

Kenny: Let's try the door

C7: Go to.. the vent

Kenny: You found the plasma cutter

Kenny: We didn't notice it

Ok?

Did you find anything in the bathroom?

Kenny: Nothing, just a hangman

Kenny: Let's go downstairs

Kenny: Oh right.. We need the code

Maybe the code is in the bathroom. Check it again

1873

Kenny: Irony.. When I went toward the mirror, it was nothing happened

Kenny: I went toward the mirror again and it happened

That's weird

Kenny: 3781

1873

Kenny: It said flip it

C7: We're going down Kenny: It said come to us or something

I dunno

Kenny: We're deaf

We're here!

Kenny: We're gonna ride the cart!

Disney!!!!!

Kenny: Cool

Kenny: I really want to go to the outer space and see like this

I'm stuck

Kenny: Good job

I'm free

Kenny: Do you want food? C7: It's alive!

Kenny: No? It doesn't want food

Pay attention!

Seriously...

He locked himself in here. Maybe he's still alive or dead

What did you do?

Where are you? Come on

Kenny: I'm here. Oh

I think we're done

Kenny: We're riding the cart!

Disney!

Kenny: I will go to Disney World when Star Wars hotel is done

We're in Disney in the outer space!

Kenny: Do you think they will make Disney in the outer space like this?

Space Mountain...

Kenny: No, the real one. Disney in space C7: Space Mountain. Space Mountain

Kenny: Disney Death Star C7: Space Mountain

Kenny & C7: Go up

C7: We're stuck Kenny: Oh wow

We're stuck

Oh ok? We're fine

Kenny: Technical difficulties

Kenny: We're going up again

To the vacuum chamber

Kenny: Go to the computer room and get the suit

Wasted our time

Kenny: Up then down

Kenny: Yes, this way

Kenny: Did you see that?

Ok?

C7: Ok, perfect. Move. You got it Kenny: Did I get it

Kenny: Ready?

Kenny: This time... You're... an airplane

The viewers probably will not understand what are you talking about

We need to fix the solar panels

Kenny: Thank you

I'm still up. I want to go down

There are more solar panels

Kenny: We're flying!

It's really slow

Kenny: Go back

Now, we're gonna home

Yes, we're going to home

Kenny: But.. Where are we going to?

Earth

Kenny: I don't see Earth

Far far away!

This is really small..

Kenny: Did we sit like this?

This ship is only fit for one person

Two people, we sit like this

You can sit in the back of the ship

Fail

Thank you for watching. Please click Subscribe, Like, Share

or whatever that will help me a lot

Không có nhận xét nào:

Đăng nhận xét