How to access secure element in nexus S....any suggestion everyone....please help me coz i don't have any references for this...
thanks
Regard
spurwa
Secure element? Could you be more specific?
According to my knowledge, the secure element or also referred to as secure storage at the Nexus S PN544 chip is embedded in the Nexus S. so maybe there who know how to access the chip. By using any tools or may have never been tried.
In the secure element we can put the security (cryptography) in it so that our people have no access to them.
please if anyone can help ...
could call to this forum or email to: [email protected]
and thank you so
Sincerely,...
Right now Google is the only one that can access the SE in the Nexus S.
Related
Hi,
I need to supply stable energy to a NFC-powered chip card that doesn't send any data of any kind over the NFC field.
The problem is that, when NFC enabled, the Nexus S only provides a pulsating NFC field : every 0.1 second (or even less), the NFC field is turned off for 0.1 second before it restarts.
So the goal would be to build an application that goes deep enough in the phone's settings to modify that pulsation and provide a stable field (or at least longer pulses).
Do you think this might be possible in a non-rooted phone?
In a rooted phone? Maybe using CyanogenMod as mentionned in an Internet article called "Uncovered: The hidden NFC potential of the Google Nexus S and the Nokia C7"?
Or do you think this won't be possible unless we have access to the Samsung firmware?
Thanks,
Gildas35
I get further in my researches and I am now sure that I can't modify the NFC field pulse in neither SDK or NDK.
So I am now browsing the Android source code (on that website: grepcode.com/file/repository.grepcode.com/java/ext/com.google.android/android-apps/4.0.3_r1/com/android/nfc/NfcService.java?av=f) to find where should I modify it.
But more and more I believe that it should be in the C part of the source code, not in the Java part. Especially in the libnfc layer?
Do anyone knows where I could find such a file?
Thanks,
Gildas
Hi Guys. I've been wondering around the internet looking at information for unlocking sim locked mobile phones and have come across the same typical information. I was wondering if anyone knows the in's and out's of how the operators lock their phones to thier networks so that at least it can answer a few questions which I have not come about.
Now I know that there are various programs out there for nokias that use your IMEI number to generate codes to unlock your mobile phone, but as I'm not a nokia user and have an old HTC Hero, these I guess would not work.
I have also tired and failed to look for software that does the same for smart phones. Code generators etc...
The only solution I can find is to use a website to input my IMEI number, pay a rediculous ammount of cash to get a code to unlock the phone.
Now, obviously these companies can get hold of the information to generate the code to unlock the phone.
1. Do they get this code from a program they use? And if so... would anyone like to share the name of this program with us???
2. Or is it a case that they gain the codes from the operators who lock them in the first place? And thus there is no way of getting the code to unlock the phone? (with out paying)
3. Are there any programs on the net that can decode these codes that are made for Android phones or universal, or apps made to automatically do this via the android market etc...
4. If not, is there anyone who would be able to make one? I've seen one for the samsung Galaxy s2. But would there be a universal one available or someone willing to write apps for the specific phones if that's the case?
5. I've rooted my phone, would using a different rom unlock the phone? Or is this totally seperate from the rom?
I just find it difficult to believe that with all the rooting, making software run on phones they weren't ment to, app building and stuff you clever people do on this site... why does it seem so difficult to do and make something that unlocks the phone to all networks? Is it actually that hard?
6. I'd like more information on why it is so hard if anyone knows?
Thanks everyone for any information and any help you can give me on this matter?
Regards.
anyone have any info or ideas?
I am currently working with a couple of different GSM Androids and the Android OS property gsm.sim.state caught my attention. I am interested in knowing just where this property is being defined by the system.
Does anyone know what part of the source code I can refer to in order to see where the OS checks for the SIM in order to assign a value for this property?
Does anyone know if there is a file within a running version of Android that contains this property so that I can modify it?
Thanks for your help.
XDA_BUST said:
I am currently working with a couple of different GSM Androids and the Android OS property gsm.sim.state caught my attention. I am interested in knowing just where this property is being defined by the system.
Does anyone know what part of the source code I can refer to in order to see where the OS checks for the SIM in order to assign a value for this property?
Does anyone know if there is a file within a running version of Android that contains this property so that I can modify it?
Thanks for your help.
Click to expand...
Click to collapse
Did you ever get a reply to this question or figure out the answer? I'm also interested in how and where to set the gsm.sim.state
"I wish I could say that I'd anticipated this possibility in advance
and created a fake password that unlocked a completely
innocuous partition on my phone, but I wasn't nearly that
paranoid/clever." (c) Cory Doctorow
Thats clever indeed.
I'm sure no mobile OS has been having that back to 2007 - certain plousible deniability solution for mobile devices.
Yet there is no apps with that kind of functionalities on the market.
Aslo while searching I discovered one interesting work which would solve storage side matters:
users.encs.concordia.ca/~mmannan/student-resources/Thesis-MASc-Skillen-2013.pdf
I'm not a developer and I have no clue how to:
- split and store user profiles on differect partitions
- be able to decrypt one of those on demand and allow user to login into desired one depending on the pattern / pin has been entered
Are you guys aware of any an existing solutions for Android?
Thank you!
Hallo,
I've noticed this problem 1 year ago and it keeps affecting my different Samsung devices, when I format them, even with nand erase and re partition using pit files, after some days or even hours the problem comes back.
The said permission contains an unique code for every token on different Samsung proprietary apps, like smart switch, Samsung account, etc.
It's some sort of backdoor that allows a user with high privileges to run shell codes of every sort, and even creating a Linux subsystem, or having subtle root access to change build prop data, and imei spoofing, and many other issues that can be addressed as digital identity theft.
Any help about how to get rid of that?
Here is a further explanation of the issue (I don't know if I can post such links, in case not sorry moderators)
Remote Code Execution as System User on Samsung Phones - NowSecure
We examine a security vulnerability of Samsung devices.
www.nowsecure.com
That's interesting, thank you