Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    <p>You are talking about "reverse engineering" a network protocol.</p> <p><strong>Full sniffing</strong></p> <ul> <li>Get a market enabled emulator: <a href="https://stackoverflow.com/questions/1387830/how-to-install-android-market-app-on-the-emulator">How to install Android Market App on the emulator?</a></li> <li>Get a network sniffer: tcpdump, wireshark, ...</li> <li>Start to sniff what's going over the wire</li> <li><a href="http://www.thoughtcrime.org/software/sslstrip/" rel="nofollow noreferrer">http://www.thoughtcrime.org/software/sslstrip/</a> - an ssl stripping proxy</li> <li>Inject your ca: <a href="http://www.mcbsys.com/techblog/2010/12/android-certificates/" rel="nofollow noreferrer">http://www.mcbsys.com/techblog/2010/12/android-certificates/</a></li> </ul> <p>This should, in theory, enable you to sniff any https or plain text connection.</p> <p><strong>Already available APIs</strong></p> <p>I would not try to hijack the connection. There is already a contacts API, it's called xmpp. You should be able to use the talk integration to pull your friend list.</p> <p><strong>Future APIs</strong></p> <p>You may also want to <a href="https://services.google.com/fb/forms/plusdevelopers/" rel="nofollow noreferrer">sign up for the upcoming API</a>.</p> <p><strong>UPDATE</strong></p> <p>It appears that the Android client uses (at least partially) XMPP. The regular client requires an open XMPP connection and you can see a "RealTimeChat" in your logcat. It looks like the connection is encrypted because you get a "TLS required" message (the client seems to go through the XMPP connection states). I'm not sure if that's used for client based posts or just for server push. You can see the open connections with the help of "netstat". The connection goes away when google plus terminates.</p> <p>I'd thus expect the API to be really open once released (or rev.eng).</p> <p><strong>UPDATE 2 (06. Jul. 2011)</strong></p> <p><a href="http://gigaom.com/video/google-plus-hangouts-interoperability/?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+OmMalik+%28GigaOM%3A+Tech%29" rel="nofollow noreferrer">Hangout is build on XMPP/MUC+JINGLE</a> (muc == multiuser chat, jingle is roughly a SIP alternative on top of XMPP). And yes, they'll release the the details of it :-)</p> <p><strong>UPDATE 3 (06. Jul. 2011)</strong></p> <p><a href="http://www.stilbruch.at/" rel="nofollow noreferrer">Multiple XMPP components for gtalk/gplus</a> have been revealed by reading the JS code. It also emphasizes that they have build a great deal of features on XMPP.</p>
    singulars
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
    2. VO
      singulars
      1. This table or related slice is empty.
    3. VO
      singulars
      1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload