I've been googling around and haven't found an answer on how the fingerprint data is stored on the phones and is it safe regardless of device encryption?
The S5 implementation of the data was horrible and Samsung is not to concerned it seems. At least Apple clearly outlines how and where the data is stored.
Any one know? I really want to start using the fingerprint on my s6
I think it is stored encrypted on /data/biometrics
Yup that is the correct path, are you sure it's encrypted?
Related
HI All,
has anyone used the Data Encryption feature on the TF? Are there any known issues? I want to be able to secure my personal data and also my work data stored on my TF.
I was too afraid as every encryption software we have tried in my company has caused performance hits. It's probably the same with the TF.
Kilmar said:
I was too afraid as every encryption software we have tried in my company has caused performance hits. It's probably the same with the TF.
Click to expand...
Click to collapse
That's exactly what I was afraid of too... But there has to be another way to protect my private data and work data...
Mike
I don't think encryption should cause any performance issues. The storage should be decrypted upon boot and then behave normally. That's how laptop full disk encryption works anyway, no performance hit.
The only downside I can see is issues with recovery software etc...
I'm not sure what it encrypts exactly. Maybe just user data? Just the SD card? Full flash?
Sent from my Nexus S using XDA Premium App
csmall said:
I don't think encryption should cause any performance issues. The storage should be decrypted upon boot and then behave normally. That's how laptop full disk encryption works anyway, no performance hit.
The only downside I can see is issues with recovery software etc...
I'm not sure what it encrypts exactly. Maybe just user data? Just the SD card? Full flash?
Sent from my Nexus S using XDA Premium App
Click to expand...
Click to collapse
mind if i ask you where you got this information? it doesn't really make any sense. decrypting an entire drive would be incredibly slow.
finalhit said:
mind if i ask you where you got this information? it doesn't really make any sense. decrypting an entire drive would be incredibly slow.
Click to expand...
Click to collapse
You wouldn't decrypt the entire volume at once though, just what you were trying to access.
You don't actually have to decrypt the disk to access it. It has the key so it can just gain access. The drive is still encrypted, you just can access it. I may not be wording it properly.
Actually decrypting a disk will take time yes. But that isn't the case with accessing it.
that's how i understand encryption works. the password you use merely unlocks the key which is used to decrypt files on demand. of course, the decryption does take a toll on performance, especially on system files that get accessed often.
so it wouldn't be completely without a performance hit.
i do use full encryption on my ubuntu install (i believe including swap) and although it's not noticeable most of the time, i think when things get busy, i does add some overhead.
Hi all,
So I've got a new Nexus S, and I'm running the stock 4.0.3 from Google. This phone hasn't yet been rooted or had the bootloader unlocked.
I'm a big security fan, and I've read about how tools exist that can simply slurp all the data off a phone without even breaking a sweat, and I'd like to be able to defeat such abilities. Ideally, I'd even like to be able to have su access to a device as the authorized user and owner (This is a Wind Mobile Canada phone, the carrier has no stake in it at all). I remember hacking away at my T-Mobile G1, and being a little concerned that merely pressing a button to get into the recovery at boot-time would enable full access to everything on the device for a knowledgeable attacker.
So I see under "Settings - Security" there's an "Encrypt Phone" option. Google has documentation here for the Galaxy Nexus, but it lacks specifics.
Can anyone here provide or point me to proper details? What is encrypted, how is it encrypted, how strong is the encryption, how much impact does this have on performance and battery life?
*edit - I just found this. If I'm reading this right, this is FDE on the /data partition, which is very good. Still doesn't do anything for the sdcard/usb partition though.
Have you tried it? On my Nexus S 4g (which is, I grant you, slightly different) it DOES encrypt the sdcard as well. I'm interested in other's experiences with FDE. Particularly weaknesses and developing procedures for restoring/flashing after enabling FDE.
Hi,
As part of setting up a work email account, I had to encrypt my Nexus S including the SD card. Unfortunately, that meant that I could not access the SD card to transfer music, photos...or most importantly, new ROMs to flash. I did a factory reset, which seemed to be the only option to get rid of it.
I have now gone back to Gingerbread as it does not have full encryption as an option ( so allows me to keep my work exchange account with just a pin password) But I am keen to try ICS again.
Does anyone have any solution for accessing the SD card on an encrypted phone?
Cheers
What would be really interesting if there is a way to password protect the bootloader. Does anyone know?
Best regards,
SuperMaz
I have thus far been unable to find the information I'm looking for in regards to full disk encryption for Android. When you encrypt the drive, Android uses the same password used for unlocking your phone. There are methods out there to defeat the lock screen. Does this bypass encryption as well?
I assume that if it's really encrypted then getting around the lock screen without the appropriate password/key combination would result in you being unable to access the data. If this is not the case then the question becomes whether or not the data can be considered encrypted while the hard drive remains on the phone.
Anyone have any practical knowledge of this, and of whether the key for turning the phone on is the same as for unlocking the phone? I would appreciate any input toward this discussion. Thank you!
-E
emccalment said:
I have thus far been unable to find the information I'm looking for in regards to full disk encryption for Android. When you encrypt the drive, Android uses the same password used for unlocking your phone. There are methods out there to defeat the lock screen. Does this bypass encryption as well?
I assume that if it's really encrypted then getting around the lock screen without the appropriate password/key combination would result in you being unable to access the data. If this is not the case then the question becomes whether or not the data can be considered encrypted while the hard drive remains on the phone.
Anyone have any practical knowledge of this, and of whether the key for turning the phone on is the same as for unlocking the phone? I would appreciate any input toward this discussion. Thank you!
-E
Click to expand...
Click to collapse
So, to be clear, any encryption can be bypassed. If the password is weak, then there is no issue and can be done in no time, if the password is strong (capital letters, numbers, symbols), then a brute-force attack can take years! Said that, you have to understand that Android devices has weaknesses, like every other device, and out there are also companies that guarantee they can decrypt any android device. Another way to decrypt an Android device is freezing the device at -10c (yes physically and no is not a joke). Researchers has demonstrated that if you freeze the device, and quickly disconnected and reconnected the battery will put the device in a vulnerable loophole. Even if encryption means data altering, and it requires a key to access/restore the data, this behavior probable occurs because the low temperatures causes data to fade from internal chips more slowly. That way is possible to obtain encryption keys and unscramble the phone's encrypted data. So, to reply to your question, yes, someone with enough knowledge can bypass your encryption.
Hey, thank you for your response! I read the article about bypassing encryption by slowing the rate of RAM fade and using FROST. I have a few minor follow on questions about that, however I'm not terribly concerned with tracking that down. I'm doing some research for a project, and I've just run out of time basically, so I can't try everything.
So, I know that it can be bypassed. I also know that you can run a kernel called Armored that supposedly keeps the keys for your encryption on the CPU instead of RAM, which supposedly shuts down cold boot attacks. I think that's a bit extreme for everyday situations, but it's there. I'm more curious about the authentication mechanism for the encryption I guess. It's ran through AES128, then salted with SHA, if I remember what I read. So without encryption, if you bypass the password, you're in. I'm curious, if you were to be able to bypass the encryption password (without actually getting it right). Would the system let you in, but leave everything encrypted and unreadable since you didn't provide the appropriate credentials?
-E
emccalment said:
Hey, thank you for your response! I read the article about bypassing encryption by slowing the rate of RAM fade and using FROST. I have a few minor follow on questions about that, however I'm not terribly concerned with tracking that down. I'm doing some research for a project, and I've just run out of time basically, so I can't try everything.
So, I know that it can be bypassed. I also know that you can run a kernel called Armored that supposedly keeps the keys for your encryption on the CPU instead of RAM, which supposedly shuts down cold boot attacks. I think that's a bit extreme for everyday situations, but it's there. I'm more curious about the authentication mechanism for the encryption I guess. It's ran through AES128, then salted with SHA, if I remember what I read. So without encryption, if you bypass the password, you're in. I'm curious, if you were to be able to bypass the encryption password (without actually getting it right). Would the system let you in, but leave everything encrypted and unreadable since you didn't provide the appropriate credentials?
-E
Click to expand...
Click to collapse
Encryption is carried out at boot time. After the device has booted, a lockscreen bypass will yield full access to the device's data. Encryption only protects your data when the phone isn't turned on, effectively. Or if you know the adversary won't be able to bypass the lockscreen, and would end up rebooting it without knowing it was encrypted.
pulser_g2 said:
Encryption is carried out at boot time. After the device has booted, a lockscreen bypass will yield full access to the device's data. Encryption only protects your data when the phone isn't turned on, effectively. Or if you know the adversary won't be able to bypass the lockscreen, and would end up rebooting it without knowing it was encrypted.
Click to expand...
Click to collapse
@pulser_g2 +++
Or if you have a tracking software that allows you to shut down your phone remotely... But in that case you may as well wipe your phone remotely.
I googled this and from what i read, so long as i log out of all services and set my lock screen to none, I then make sure that strong encryption is enabled then do a reset and this way it secure wipes?
Is this correct or am i best doing something else?
James
As I know, the best way to securly wipe s10+ to sell is using Samsung data eraser software. Such software can help us wipe all personal info on your S10+ phone without recovery. Then you can sell it without data leaked. Hope this will be your help.
The main way that data is stolen from wiped phones is because people fail to actually wipe them - as long as Strong Encryption on your S10 overwrites your entire storage then your data (Probably) no longer exists on that phone. Unless they can find the encryption key, but that would (should) be wiped on factory reset.
When you delete data, it isn't actually deleted, it's memory region is just marked as free real estate for new data to be written. Once it's replaced it's gone, otherwise its recoverable. Encryption should do the trick, as the data in memory marked as open will be scrambled without the key.
If you're feeling particularly paranoid however, you can also load dummy data onto your phone for an extra layer of protection, there are several tools for doing this, some of which are on the play store, before wiping it a second time.
Good luck with the sale!
(EDIT: Nazhais suggestion popped up as I was writing, but yes, data erasing software is probably the way to go.)
Hi all,
I'm looking to find a "kill switch" for android phones. I know android already erases data when the wrong password is entered either within android or on boot in some cases. But there is ways of recovering that.
I need to have data completely unrecoverable if a phone is lost or stolen due to business and client data. (Gdpr and all that)
does anyone know or have a solution? Even if the device itself is not usable ever again.
If you override the data in question with zeroes or random numbers then these data are really unrecoverable, IMHO.
jwoegerbauer said:
If you override the data in question with zeroes or random numbers then these data are really unrecoverable, IMHO.
Click to expand...
Click to collapse
I mean the entire phone data
With regards to a mobile my understanding of "data" is that this term is used for account info, settings, saved activity data, game scores, and whatever is need to be kept permanently.