[Resolved] [Q] Error with Titanium Backup data profiles. HELP! - General Questions and Answers

Hello everyone,
:crying:
I have a ROOTED Hisence HS-U980 Infinity Pure 1 . Running android 4.2.1
I use TIBU data profiles like crazy. And I use alot of profiles, and once I finish, I delete the unneeded ones.
Anyway,
I was using data profiles today as usual, and I changed the profile to a different one -as always-, but this time I noticed that titanium backup told me "Data profile changed to "...." and applied to 0 apps". ZERO APPS
I was like "Whaaaaaatttttt!!!!". I went after that to the apps I use, to check and see if the multiple profiles for them are somehow disabled. But NO, they are on. So I tried disabling multiple data profiles for them to see what going on with the feature.
And this is what I got: "Sorry, a problem occurred when switching the data profiles for .... app"
And it shows to all the apps I use multiple profiles with. So I think the problem is within TIBU.
What should I do?
I don't want to lose my data on my apps,
Thanks for your help.
EDIT: and BTW, when I activate multiple profiles for a new app, it works fine. But all the previous ones are in error.

SOLUTION
[SOLUTION]
I managed to solve the issue, here are the steps.
- First make a new data profile for this, so that we work away from your old data profiles, and hopefully not lose any former data.
- Go to " /Device/data/data/ " (and there you will find all the apps folders, search for your app folder and enter it)
- (In your app folder) Backup/copy all the data in here -for insurance-, or just copy the needed ones. (you will also see folders named after your data profiles)
- (In your app folder) You will see a folder -mostly hidden- named " .data_profiles ". This is the one causing the error for your app. Delete it, but make sure you don't delete something important inside it, like data profiles or something, unless you made a copy of them.
- Now go back to TIBU , and go to your app, you will see that the multiple profiles feature is now disabled because we deleted ".data_profiles" folder.
- Enable multiple profiles feature for the needed app.( you will see that TIBU will tell you that the current data will be assigned to the current data profile, which is the one we made first.)(CAUTION: THIS STEP WILL DELETE ALL PREVIOUS APP DATA PROFILES FOLDERS FOR THE APP YOU ARE WORKING ON , because now TIBU thinks that this is the first time this app uses data profile, therefore, it will delete all previous data folders to make new ones)
- Now, the multiple profiles feature is re-enabled for your app.
- Go again to your app data folder, and PASTE any needed info from the data you copied previously.(but don't paste the ".data_profiles" folder. You can paste the data that were in it before -if any-, but dont paste the folder itself)
-DONE

"Sorry, problem occured while switching profile data for watsapp 2.12"
Plz help me how to fix it...???

did u fix it? pls help me

sgmarouf said:
[SOLUTION]
I managed to solve the issue, here are the steps.
- First make a new data profile for this, so that we work away from your old data profiles, and hopefully not lose any former data.
- Go to " /Device/data/data/ " (and there you will find all the apps folders, search for your app folder and enter it)
- (In your app folder) Backup/copy all the data in here -for insurance-, or just copy the needed ones. (you will also see folders named after your data profiles)
- (In your app folder) You will see a folder -mostly hidden- named " .data_profiles ". This is the one causing the error for your app. Delete it, but make sure you don't delete something important inside it, like data profiles or something, unless you made a copy of them.
- Now go back to TIBU , and go to your app, you will see that the multiple profiles feature is now disabled because we deleted ".data_profiles" folder.
- Enable multiple profiles feature for the needed app.( you will see that TIBU will tell you that the current data will be assigned to the current data profile, which is the one we made first.)(CAUTION: THIS STEP WILL DELETE ALL PREVIOUS APP DATA PROFILES FOLDERS FOR THE APP YOU ARE WORKING ON , because now TIBU thinks that this is the first time this app uses data profile, therefore, it will delete all previous data folders to make new ones)
- Now, the multiple profiles feature is re-enabled for your app.
- Go again to your app data folder, and PASTE any needed info from the data you copied previously.(but don't paste the ".data_profiles" folder. You can paste the data that were in it before -if any-, but dont paste the folder itself)
-DONE
Click to expand...
Click to collapse
Please explain for those of us who are not experts: What are you talking about here:
- Go to " /Device/data/data/ "
Do you mean on your internal storage on the phone, or what?

Hello. Sorry for being away for so long. Thought the details were enough and never checked back on this thread.
Anyway, "Do you mean on your internal storage on the phone, or what?",
If my memory serves me right, I believe it is only on the internal storage. If you are using data profiles then you are rooted and have access to the internal storage. Go there and check it out and also show any hidden folders if they are not visible.
Good luck.

pnadimm said:
"Sorry, problem occured while switching profile data for watsapp 2.12"
Plz help me how to fix it...???
Click to expand...
Click to collapse
Please follow the steps one by one and your problem will be solved. Backup "copy/paste" your data profile folders first before you do anything.
This problem is caused by TIBU for some reason. Corrupted directory of some sort and this is why you need to do the steps mentioned and make TIBU create a new folder. Then you can paste your old data profile information and regain access.
Again, don't paste the whole folder, just the contents inside.

In my solution, what I am explaining is:
There is a folde directory making a problem for TIBU. This directory needs to be deleted. But NOT the contents and data inside it. Making a new version of the problem directory will fix the issue.
In short, the solution is: (From internal storage), backing up all the data profiles for the application you are using, then deleting the directory that is causing the problem "".data_profiles" folder", then going back to TIBU and REACTIVATING multiple profiles for your application will create a clean copy of " ".data_profiles" folder ". Paste the old contents you copied before from ".data_profiles" folder into the NEW version of ".data_profiles" folder. This will fix the problem.

THIS WAY TO SOLVE AN ERROR DATA PROFILE'S ENABLE BUT SHOW ERROR WHEN USER TRY TO DISABLE THEM.
This caused damage may the user change or other activity to system root like change device id with other app or imei with other app where they not supported by TIBU.
Ok, let go to fix.
(CAUTION!!! THIS IS NOT ONLY ONE THE WAY TO FIX THEM IT'S JUST ABOUT MY EXPERIENCE BUT IT'S WORK FOR MY PROBLEM LIKE THIS)
STEPS:
1. OPEN THE TIBU PRO
2. NEXT -> GOTO BATCH ACTIONS
3. CHOOSE -> MANIPULATED DATA -> RUN WIPE DATA FOR USER & SYSTEM APPS
4. THEN YOU WILL SEE THE WIPE DATA FOR USER & SYSTEM APPS AND AND APPS LIST.
5. TAP INVERT SELECTION
6. THEN CHOOSE YOUR APPS WHERE YOU ENABLE MULTIPLE DATA PROFILES BEFORE.
7. TO EXECUTE AND FIX THEM TAP THE SUBMIT BUTTON IN THE RIGHT TOP CORNER OR TAP THIS BUTTON [√].
8. REBOOT YOUR PHONE (DO NOT USE A SOFT REBOOT) BUT FULL REBOOT.
9. OPEN AGAIN TIBU, AND ENJOY WITH PROFILE AGAIN.

Related

[Q] Move game data without root to extSdCard

Hi,
im thinking about this problem some time and i dont understand why there isnt yet app for it. If i understand its technicaly only moving files from one place to another where we have r/w access on both of them. So basicly is possible to create app, where could be some user defined database for example - user could click to add button and define icon, name and path to Android/Data folder for app/game and then add it to database. Now user can see app in list and for example by click on it could move this Android/Data using this teoretical app to extSdCard and back to internal storage.
Or there could be something like moving Android/Data folder for specified app to extSd while adding it and when user want to start it will use button in app (which use process like move back to internal storage and then run the app) or some modified shotcut generated by app (with same process) insted of original. There could be some background process controling if executed app is still running and while not it can move data back to extSdCard.
Its not the best method to do that but i dont see here anything requiring root access. Maybe i missed something?
I hope U understand what I want to say, im sorry english is not my primary language

Whatsapp reencryption of crypt12 backup for use on different whatsapp account/number

Goal: pass a whatsapp chat history backup (.crypt12) from one device to another with different telephone (whatsapp account) numbers.
Update: I succeeded with ultimate goal to move the chat history to a different device with a different phone number, but I failed with the re-encryption.
Encryption
First, I believed that the /data/data/com.whatsapp/files/key file might have been a leftover from an old version of Whatsapp on the old device, because I could not find the file. It turned out that it was generated later on the new device, after I finished my experiments. I’m not sure what triggers its creation.
Furthermore I was not able to decipher header and footer of the crypt12 backup file. I believe that a message authentication code (MAC) is part of it and something related to the Whatsapp account number (telephone number), because the app was quick in determining if a backup file is a restore candidate without decrypting, I’ld say.
How I managed to transfer the chat history:
Short version: get root on both devices and move /data/data/com.whatsapp/databases/msgstore.db over to the new device.
Long version: root on the new device will be less problematic, I guess. For the old device I used the fishy Kingroot app. It looks very professional and seems to download exploit code from a huge database for many devices. I got instant root access without flashing anything, but to be honest I don’t trust it regarding what else it might be doing...
Kill both Whatsapp apps before reading the msgstore.db file from the old and writing to the new device. I also removed the msgstore.db-* files on the new device. Sqlite might detect itself that the new database does not fit those helper files, but if they are not even there, they will be recreated correctly without any doubt.
Also set the permissions and ownership of that file to what it would be on the new device (not the old). My biggest oversight were the SELinux security attributes stored in the extended file attributes (XA). It made me believe that Whatsapp is verifying the database content and rejects it, but in reality it eats it just fine, as long as it gets proper access to it.
The XA tools I had available on the phones apparently show all the extended file attributes with “getfattr -d filename”, while e.g. on a standard Linux you need “getfattr -dm- filename” to get them all, not just the user.* domain. „ls -Z” shows the SELinux security context, which is a specific part of the extended file attributes, and in this case the only part I had set.
As with the file ownership, check which context is usually set on the database file on the new device and set it accordingly (“setfattr”). My old device did not even have SELinux and no extended file attributes were set there.
Other findings:
As the restore kicks only in during initial whatsapp setup, I’ve cleared data on whatsapp a lot. Constant reactivating the same phone number will trigger a hold-off on the whatsapp servers, delaying activation-SMS or -call.
But a seemingly corrupt or missing msgstore.db file trigger a restore as well, so it is possible to feed backups to Whatsapp without constant reactivation. Whatsapp failed with the restore if the SELinux context was wrong on the to-be-replaced database file, I believe. During my trials I just deleted the database (if I recall correctly) and the artificially triggered restored worked out.
Below this line is stuff I tried before:
At the moment I try to plant the old backup on whatsapp for decryption. To get to the point of restore, I force close whatsapp, clear app data, open whatsapp, give it no permissions and activate a number. At this point it asks for permissions to find restore files: I deny “contacts”, but allow for “media/files”. Here it consistently finds the most recent _local_ backup from the _same_ whatsapp account. At this point I force close the app and clear the app cache.
Restarting whatsapp brings it to the backup screen where it finds the local backup for the _same_ device.
At the moment I’m investigating which backups it picks up. For this I use backups from the same device/account as well (known to be working).
/data/data/com.whatsapp/files/key
This file is non-existent on the new device. If I drop a key file from a different account, it seems to get ignored. Whatsapp still finds the native backup (not one matching the key), and it successfully restores it.
/data/data/com.whatsapp/shared_prefs/keystore.xml
This file already exists, but only with “client_static_keypair”. If I replace that entry with the one from the old device, whatsapp will still find the native backup, but it will fail to restore it. The restore has to be skipped and whatsapp triggers a reactivation of the phone number, but if you enter the same new number again, whatsapp accepts it without SMS/call.
→this seems to be the encryption key to be used by whatsapp.
I can confirm the following crypt12 decryption code to be working:
https://gist.github.com/nlitsme/b079f351eb1bf9c3d356ce988bb6afdc
https://github.com/EliteAndroidApps/WhatsApp-Crypt12-Decrypter
They both require the backup file and the “key” file. The latter has a check where it compares a component from the key file with the backup 1:1. In the code this is called “t1” and “t2” which should match. So far I have backups with three different t1/t2. The original backup, with a matching key; the backups from the new account on the new devices, without a key; and the backups from the new device/account, where I mixed the string from the keystore.xml file in.
The “key” file is not generated by the latest Whatsapp anymore, as it seems. Maybe the encryption/decryption key is generated on-the-fly from the keystore.xml data. If this is true, then a new activation of my new telephone number would make these backups unreadable.
Created by author: 2018-04-19
Last edit by author: 2018-05-01
siemer said:
Goal: pass a whatsapp chat history backup (.crypt12) from one device to another with different telephone (whatsapp account) numbers.
Update: I succeeded with ultimate goal to move the chat history to a different device with a different phone number, but I failed with the re-encryption.
Encryption
First, I believed that the /data/data/com.whatsapp/files/key file might have been a leftover from an old version of Whatsapp on the old device, because I could not find the file. It turned out that it was generated later on the new device, after I finished my experiments. I’m not sure what triggers its creation.
Furthermore I was not able to decipher header and footer of the crypt12 backup file. I believe that a message authentication code (MAC) is part of it and something related to the Whatsapp account number (telephone number), because the app was quick in determining if a backup file is a restore candidate without decrypting, I’ld say.
How I managed to transfer the chat history:
Short version: get root on both devices and move /data/data/com.whatsapp/databases/msgstore.db over to the new device.
Long version: root on the new device will be less problematic, I guess. For the old device I used the fishy Kingroot app. It looks very professional and seems to download exploit code from a huge database for many devices. I got instant root access without flashing anything, but to be honest I don’t trust it regarding what else it might be doing...
Kill both Whatsapp apps before reading the msgstore.db file from the old and writing to the new device. I also removed the msgstore.db-* files on the new device. Sqlite might detect itself that the new database does not fit those helper files, but if they are not even there, they will be recreated correctly without any doubt.
Also set the permissions and ownership of that file to what it would be on the new device (not the old). My biggest oversight were the SELinux security attributes stored in the extended file attributes (XA). It made me believe that Whatsapp is verifying the database content and rejects it, but in reality it eats it just fine, as long as it gets proper access to it.
The XA tools I had available on the phones apparently show all the extended file attributes with “getfattr -d filename”, while e.g. on a standard Linux you need “getfattr -dm- filename” to get them all, not just the user.* domain. „ls -Z” shows the SELinux security context, which is a specific part of the extended file attributes, and in this case the only part I had set.
As with the file ownership, check which context is usually set on the database file on the new device and set it accordingly (“setfattr”). My old device did not even have SELinux and no extended file attributes were set there.
Other findings:
As the restore kicks only in during initial whatsapp setup, I’ve cleared data on whatsapp a lot. Constant reactivating the same phone number will trigger a hold-off on the whatsapp servers, delaying activation-SMS or -call.
But a seemingly corrupt or missing msgstore.db file trigger a restore as well, so it is possible to feed backups to Whatsapp without constant reactivation. Whatsapp failed with the restore if the SELinux context was wrong on the to-be-replaced database file, I believe. During my trials I just deleted the database (if I recall correctly) and the artificially triggered restored worked out.
Below this line is stuff I tried before:
At the moment I try to plant the old backup on whatsapp for decryption. To get to the point of restore, I force close whatsapp, clear app data, open whatsapp, give it no permissions and activate a number. At this point it asks for permissions to find restore files: I deny “contacts”, but allow for “media/files”. Here it consistently finds the most recent _local_ backup from the _same_ whatsapp account. At this point I force close the app and clear the app cache.
Restarting whatsapp brings it to the backup screen where it finds the local backup for the _same_ device.
At the moment I’m investigating which backups it picks up. For this I use backups from the same device/account as well (known to be working).
/data/data/com.whatsapp/files/key
This file is non-existent on the new device. If I drop a key file from a different account, it seems to get ignored. Whatsapp still finds the native backup (not one matching the key), and it successfully restores it.
/data/data/com.whatsapp/shared_prefs/keystore.xml
This file already exists, but only with “client_static_keypair”. If I replace that entry with the one from the old device, whatsapp will still find the native backup, but it will fail to restore it. The restore has to be skipped and whatsapp triggers a reactivation of the phone number, but if you enter the same new number again, whatsapp accepts it without SMS/call.
→this seems to be the encryption key to be used by whatsapp.
I can confirm the following crypt12 decryption code to be working:
https://gist.github.com/nlitsme/b079f351eb1bf9c3d356ce988bb6afdc
https://github.com/EliteAndroidApps/WhatsApp-Crypt12-Decrypter
They both require the backup file and the “key” file. The latter has a check where it compares a component from the key file with the backup 1:1. In the code this is called “t1” and “t2” which should match. So far I have backups with three different t1/t2. The original backup, with a matching key; the backups from the new account on the new devices, without a key; and the backups from the new device/account, where I mixed the string from the keystore.xml file in.
The “key” file is not generated by the latest Whatsapp anymore, as it seems. Maybe the encryption/decryption key is generated on-the-fly from the keystore.xml data. If this is true, then a new activation of my new telephone number would make these backups unreadable.
Created by author: 2018-04-19
Last edit by author: 2018-05-01
Click to expand...
Click to collapse
I'm trying to do the same thing as you; it is going mostly smooth with permissions and user/group, but I'm having some issues changing the SELinux extended security attributes. I must change mine from
Code:
u:object_r:app_data_file:s0
to
Code:
u:object_r:app_data_file:s0:c512,c768
but I can't really find enough guidance online... If you could help, I'd be really grateful
Hi
My whatsapp backup was corrupted, I extracted it from Google Drive
Then .dump into a sql file, fixed the errors
Recompile into a repair db, which works because it can be viewed on the WhatsappViewer.exe
Since the db is not encrypted, how do I restore it in my own phone?
Can msgstore.db be placed inside /data/data/com.whatsapp/databases/ of my own phone? Will it work without the msgstore.db being crypted with crypt12?
Nite.Achilles said:
Hi
My whatsapp backup was corrupted, I extracted it from Google Drive
Then .dump into a sql file, fixed the errors
Recompile into a repair db, which works because it can be viewed on the WhatsappViewer.exe
Since the db is not encrypted, how do I restore it in my own phone?
Can msgstore.db be placed inside /data/data/com.whatsapp/databases/ of my own phone? Will it work without the msgstore.db being crypted with crypt12?
Click to expand...
Click to collapse
Hi, bro. Would you mind telling me how you fixed errors in the sql file? I have one corrupted database and Im not able to see it in WA Viewer. Thanks in advance.
IvanN8458 said:
Hi, bro. Would you mind telling me how you fixed errors in the sql file? I have one corrupted database and Im not able to see it in WA Viewer. Thanks in advance.
Click to expand...
Click to collapse
Hi I used this
reference from here https://andreas-mausch.de/whatsapp-viewer/
echo .dump | sqlite3 msgstore.db > temp.sql
echo .quit | sqlite3 -init temp.sql repaired.db
Nite.Achilles said:
Hi I used this
reference from here https://andreas-mausch.de/whatsapp-viewer/
echo .dump | sqlite3 msgstore.db > temp.sql
echo .quit | sqlite3 -init temp.sql repaired.db
Click to expand...
Click to collapse
Thank you very much, bro. I'll try that and hope it can fix it. Have a nice one.
Hi,
had any of you success with the restored db, to get it reintegrated into WhatsApp?
siemer said:
Goal: pass a whatsapp chat history backup (.crypt12) from one device to another with different telephone (whatsapp account) numbers.
Update: I succeeded with ultimate goal to move the chat history to a different device with a different phone number, but I failed with the re-encryption.
Encryption
First, I believed that the /data/data/com.whatsapp/files/key file might have been a leftover from an old version of Whatsapp on the old device, because I could not find the file. It turned out that it was generated later on the new device, after I finished my experiments. I’m not sure what triggers its creation.
Furthermore I was not able to decipher header and footer of the crypt12 backup file. I believe that a message authentication code (MAC) is part of it and something related to the Whatsapp account number (telephone number), because the app was quick in determining if a backup file is a restore candidate without decrypting, I’ld say.
How I managed to transfer the chat history:
Short version: get root on both devices and move /data/data/com.whatsapp/databases/msgstore.db over to the new device.
Long version: root on the new device will be less problematic, I guess. For the old device I used the fishy Kingroot app. It looks very professional and seems to download exploit code from a huge database for many devices. I got instant root access without flashing anything, but to be honest I don’t trust it regarding what else it might be doing...
Kill both Whatsapp apps before reading the msgstore.db file from the old and writing to the new device. I also removed the msgstore.db-* files on the new device. Sqlite might detect itself that the new database does not fit those helper files, but if they are not even there, they will be recreated correctly without any doubt.
Also set the permissions and ownership of that file to what it would be on the new device (not the old). My biggest oversight were the SELinux security attributes stored in the extended file attributes (XA). It made me believe that Whatsapp is verifying the database content and rejects it, but in reality it eats it just fine, as long as it gets proper access to it.
The XA tools I had available on the phones apparently show all the extended file attributes with “getfattr -d filename”, while e.g. on a standard Linux you need “getfattr -dm- filename” to get them all, not just the user.* domain. „ls -Z” shows the SELinux security context, which is a specific part of the extended file attributes, and in this case the only part I had set.
As with the file ownership, check which context is usually set on the database file on the new device and set it accordingly (“setfattr”). My old device did not even have SELinux and no extended file attributes were set there.
Other findings:
As the restore kicks only in during initial whatsapp setup, I’ve cleared data on whatsapp a lot. Constant reactivating the same phone number will trigger a hold-off on the whatsapp servers, delaying activation-SMS or -call.
But a seemingly corrupt or missing msgstore.db file trigger a restore as well, so it is possible to feed backups to Whatsapp without constant reactivation. Whatsapp failed with the restore if the SELinux context was wrong on the to-be-replaced database file, I believe. During my trials I just deleted the database (if I recall correctly) and the artificially triggered restored worked out.
Below this line is stuff I tried before:
At the moment I try to plant the old backup on whatsapp for decryption. To get to the point of restore, I force close whatsapp, clear app data, open whatsapp, give it no permissions and activate a number. At this point it asks for permissions to find restore files: I deny “contacts”, but allow for “media/files”. Here it consistently finds the most recent _local_ backup from the _same_ whatsapp account. At this point I force close the app and clear the app cache.
Restarting whatsapp brings it to the backup screen where it finds the local backup for the _same_ device.
At the moment I’m investigating which backups it picks up. For this I use backups from the same device/account as well (known to be working).
/data/data/com.whatsapp/files/key
This file is non-existent on the new device. If I drop a key file from a different account, it seems to get ignored. Whatsapp still finds the native backup (not one matching the key), and it successfully restores it.
/data/data/com.whatsapp/shared_prefs/keystore.xml
This file already exists, but only with “client_static_keypair”. If I replace that entry with the one from the old device, whatsapp will still find the native backup, but it will fail to restore it. The restore has to be skipped and whatsapp triggers a reactivation of the phone number, but if you enter the same new number again, whatsapp accepts it without SMS/call.
→this seems to be the encryption key to be used by whatsapp.
I can confirm the following crypt12 decryption code to be working:
https://gist.github.com/nlitsme/b079f351eb1bf9c3d356ce988bb6afdc
https://github.com/EliteAndroidApps/WhatsApp-Crypt12-Decrypter
They both require the backup file and the “key” file. The latter has a check where it compares a component from the key file with the backup 1:1. In the code this is called “t1” and “t2” which should match. So far I have backups with three different t1/t2. The original backup, with a matching key; the backups from the new account on the new devices, without a key; and the backups from the new device/account, where I mixed the string from the keystore.xml file in.
The “key” file is not generated by the latest Whatsapp anymore, as it seems. Maybe the encryption/decryption key is generated on-the-fly from the keystore.xml data. If this is true, then a new activation of my new telephone number would make these backups unreadable.
Created by author: 2018-04-19
Last edit by author: 2018-05-01
Click to expand...
Click to collapse
Those extended attributes ... I would never have suspected that if it weren't for you, thank you so much !
so, does it work ?
Nite.Achilles said:
Hi
My whatsapp backup was corrupted, I extracted it from Google Drive
Then .dump into a sql file, fixed the errors
Recompile into a repair db, which works because it can be viewed on the WhatsappViewer.exe
Since the db is not encrypted, how do I restore it in my own phone?
Can msgstore.db be placed inside /data/data/com.whatsapp/databases/ of my own phone? Will it work without the msgstore.db being crypted with crypt12?
Click to expand...
Click to collapse
Hi,
So how you fix it ultimately?
Hi, I am having the same problem as with restoring my Whatsapp history and wondered if any kind soul can help me to restore my Whatsapp history?
What I had done :
I had my S8 rooted. The whole phone was wipe when it was rooted. I hope this step is correct.
My encrypted backup (crypt12 and crypt14) was saved already before I rooted and I also need a backup of my phone (just not the application data because the Dr Fone software mentioned that my S8 needed to be rooted before I can backup my application data)
But I couldnt find the folders mentioned here :
/data/data/com.whatsapp/databases/msgstore.db
Can anyone guide me pls?
XMatrix2099 said:
Hi, I am having the same problem as with restoring my Whatsapp history and wondered if any kind soul can help me to restore my Whatsapp history?
What I had done :
I had my S8 rooted. The whole phone was wipe when it was rooted. I hope this step is correct.
My encrypted backup (crypt12 and crypt14) was saved already before I rooted and I also need a backup of my phone (just not the application data because the Dr Fone software mentioned that my S8 needed to be rooted before I can backup my application data)
But I couldnt find the folders mentioned here :
/data/data/com.whatsapp/databases/msgstore.db
Can anyone guide me pls?
Click to expand...
Click to collapse
Hello, since you rooted your phone it wiped out all data.
So you msgstore.db is actually crypt12 and crypt14 data.
Don't root unless you have all your items.
It wipes the key as well.
I do think key don't exist anymore and login happens in keystore.xml with static client

|ROOT/ADB?| Fully stopping Instant Apps from installing ever again

Hey guys, this is my first thread, and I'm a bit confused on the app. Today I'll tell how did I stop the freaking google 'malware' from installing and updating every single day. This would work on any rooted device that has access to the data partition, maybe it could be reproduced via adb without root.
First off, I searched everywhere looking on how to disable, uninstall, break, or do anything to this forced battery hog. The best answers were using 'pm hide' on the package but this caused a very high battery usage, due to the file dependencies. So I searched where it was installed. Luckily enough, it is an user app, so it means I would find it on /data/app and /data/data. I will use solid explorer, but any file manager with root access and chmod to change permissions should do just fine.
Once we locate the folder (/data/app/com.google.android.instantapps.supervisor-1 in my case) we delete it. Utterly. After that, we will create a file, and name it exactly the same as the folder did. This is a dummy file that the system will believe it is a folder, and will try to install the application inside it. We fill that file with enough random characters for making the system think it can't just delete it (sometimes cleaners point empty files as worthless and wipe them out)
Now we need to make the dummy file unremovable for anyone but us, by using chmod. Solid explorer has a nice interface for that. We long press the file, enter to properties and set the permission to 0 0 0 (attributes tab). This makes play store unable to delete the file to recover the old folder, and when it tries to download the package, it will fail because it won't have a respective folder to be sent to.
After this, we reboot the phone and see that google play services for instant apps has lost roughly 90% of it's size, and when we enter settings>google>google play instant it'll ask for installation. I was bold enough to accept, just for getting an error dialogue when it tried to install itself.
Known issue: The app reinstalls once again after reboot. The cause is that, when android can't install the app in the first folder (the one that ends with a -1), it can create a second one (ending with a -2 instead), like an alternative. This is solved by just doing the same procedure above on the second folder, and you will end up having two dummy files instead of one. A third folder cannot show up, or at least it didn't in my phone.
Notes: You can repeat this with the folder in /data/data and any other data partition level instant app folder, but I wouldn't do it because I already broke all functionality since I deleted the base apk, and the app size is less than 300KB now so I don't think the trouble is worth it.
You must whitelist these files from any memory cleaner, i.e SD maid corpse finder will delete it thinking it's a leftover of an old app
WARNING; I'M NOT RESPONSIBLE FOR ANY MISLEADS, WRONGS, OR PLUTONIUM-UNSTABLE ROMS THAT MAY EXPLODE IN ANY WAY. YOU ARE THE RESPONSIBLE FOR YOUR DEVICE'S SAFETY AS THIS ISN'T EVEN FULLY TESTED IN MY PHONE AND I DON'T KNOW THE ULTIMATE CONSEQUENCES OF DOING THIS. YOU ARE WARNED.
PD: Please make some suggestions about how I made the thread, I did what I think it's my best

[AIO] Fixes for Issues in Custom ROMs

I decided to combine posts for fixes in the LineageOS 17.1 and other ROMs threads and keep it unified in a single thread. This thread will be updated in future for more fixes to newer problems
Issue 1: Work around for video codec issues in Google Chrome and other Chromium based browsers
1. Go to chrome://flags
2. In search box type Hardware and some results will pop up.
3. Of those disable Hardware-accelerated video decode and Hardware-accelerated video encode. You can check here.
4. Restart and play videos happily.
Isuse 2: Jio4G Voice for Jio users
1. Install app from Play Store.
2. Go to Settings > Apps and Notifications > Default apps > Set Jio 4G voice app as the default one in Phone app and SMS app.
3. Either restart your phone or Clear Data and Force Stop it to get new configuration messages.
4. GIve all the required permissions, try sending and making calls.
5. It will work. (Note: if you connect to WiFi, Jio4G Voice app wont work)
Note: If you are still unable to use Jio4G Voice app then. Open File Manager and enable this option "show hidden files", delete .JioCall (this is hidden file i.e., it contains dot at the beginning) and JioCallFiles. Now clear data of the app and start using it.
Issue 3: Data not getting backed up to Google Drive
1. Read these 2 posts to fix this issue. For me after removing the lock screen, Google Backup has worked. You can find more info on these two posts. Post 1 and this post . (Note: In second post you have use ADB commands).
Issue 4: Unable to delete pics in DCIM folder
1. Open stock File Manager.
2. Go to DCIM folder and select all the pics you want to delete.
3. Move the selected ones to any file (except DCIM, like Downloads, Pictures, Movies etc.).
4. Now select the moved ones and delete them.
reserved

Extracting my whatsapp keyfile/recreating it

Hello!
I want to get my whatsapp keyfile, but I'm having a lot of trouble... and I don't want to root due to warranty.
Things I've tried:
Full backup: turns out at some point, google added the option for apps to control which files are backed up, and thus, I can't get a backup that includes the keyfile... This led me to:
installing an older version of whatsapp, from before the version of android which allows control over what is backed up. however, due to a bug, I can't verify my number with the older version, so... no keyfile.
editing the apk to allow a full backup - didn't work. Tried with APK easy, with the option to use the original signature enabled, but the change to the manifest XML is detected and I can't verify my number.
Extracting the key from whatsapp web, and using python scripts that can be found on github to decode my encrypted conversation. However, I couldn't figure out from the scripts what the format of the keyfile is...
I'm out of ideas, so I'm hoping someone could tell me how to translate the data found in whatsapp web (F12 on chrome/firefox, "Application" -> Local Storage -> "https://web.whatsapp.com" -> WASecretBundle on chrome, "Storage" -> Local Storage -> "https://web.whatsapp.com" -> WASecretBundle on firefox) into a keyfile.
Or offer up another way to get that keyfile. I've been foiled at every turn...

Categories

Resources