Ok so to start off my ultimate goal is to be able to install chainfires systemless root to be able to install xposed systemless framework to then install the hide mock location program.
All of this is (most probably already know) in an attempt to be able to gps spoof in pokemon go without being banned. The only reason I am doing it is because I live in an extremely rural area with literally no pokemon around. I don't plan on taking over any random stuff gyms or doing anything else to infringe on any other players. Just find some pokemon and collect from some stops.
I have already attempted this only using a gps spoofing app but as expected I have been soft banned many times.
Basically, I'm just trying to find out if it is safe to root my S7 G930A. I have already looked at this thread:
http://forum.xda-developers.com/att-galaxy-s7/how-to/root-s7-att-g930a-g935a-t3410538
Will this method (that seems like the only working method for the AT&T) erase everything on my phone? Is there an increased risk of bricking my phone using this method than anyone using the normal chainfire method?
With all that being said if there was an easier way to not be soft banned or to not have to cheat at all outside of driving a couple of hours to a decent location I would love to hear it. As far as the gps spoofing goes I don't see much of an issue with it as long as I'm not taking over gyms, which I don't plan to. I'm pretty sure that I am being soft banned because they are detecting that my ip address is clearly not an ip address anywhere near where I am changing my gps. I have looked into vpns to attempt to bypass this but I haven't found much luck.
Anyone have any ideas or suggestions. I know I shouldn't cheat but I feel like this is my only option at the moment. Oh and if this is just completely not the place for this kind of question you can tell me that too haha
Related
Hello wizards of XDA, I currently face an issue.
As some of you may know, google had the """""brilliant""""" idea to change what used to be called mock locations to mock location app. The problem is, the apps I have are from the before times, While it is confirmed that the mock location app does work, this new sorcery is poorly crafted and chaotic, it does not work with the techno teleportation features of the old apps. Some of these apps are no longer in development so waiting for new releases isn't an option. What I need, is the old option: "mock location." I have no idea how to achieve this, but I do have some theories that will hopefully inspire more knowledgeable users to find a solution. Im running a G930A (at&t s7) with root, though functionality is rather limited as I'm using the root method that was released less than a week ago. Please keep in mind, this is the first time I've ever rooted a device, so i wont understand a 3 word tutorial.
Theory 1: Some Custom Rom: Wondering if a custom rom would have that option, I would want to go with something people who used the same root method as me are having success with. I've heard a number of people had success with Xposed. Also performance is a slight issues, after rooting, myself and several others have had issues with lag and our phones getting abnormally hot.
Theory 2: Do something with custom rom toolkit to make it work
Theory 3: use the terminal in custom rom toolkit perhaps some adb commands to make it work
Theory 4: steal a time machine from the us government, travel back in time and punch the ceo of samsung in the face
Theory 5: mock location is for scrubs, build a teleportation device and make it happen. DONT LET YOUR DREAMS BE DREAMS!
Theory 6: Take a journey with Schrodinger's cat into a dimension where a solution to this problem already exists
Theory 7: Why are you still reading these
Theory 8lease answer my question now
I have come across a few tutorials claiming this app can get root, but I've never heard of it and so I will not try it fit fear of breaking my phone. Just wondering if this is known malware or at least semi legit? I stress that no one actually try it unless you're ready to not be able to use that phone again, but if any brave soul is willing to take the risk I'd be interested in any info.
It's not in any way legit as far as I can tell. I ran across it while looking for an easy way to root my phone and the APK turned out to be PUP adware that tried to gain device admin privs. At first I wondered if I just got a bad package, but I was never able to find a legit version. I did test the APK I had (out of pure curiosity), and it didn't actually install a launchable application at all. Just a hidden app that runs as a device admin and randomly launches the web browser and redirects to various ads. (Malwarebytes can detect and remove what seems to be all traces of it.)
Thank you in advance. First of all I am still a beginner in knowledge here. My Alcatel fierce 4 TCL 5056N seems to have been hacked and is now being remotely accessed and controlled by an unauthorized 3rd party. I may be way off base but I think my phone may have been exposed to a R.A.T.. Temporarily rooted long enough for someone to modify the kernel and other system coding, which I cannot access myself with an unrooted phone, installing some sort of sub-OS with limited user setting options and a completely different named storage platform,( I.e. emulated, bdef55, self), and not even factory resetting my device helps because it reboots into the sub-OS they installed. They are screen overlaying buttons, and toggles are being reversed in real time before my eyes, settings and options are disappearing from one minute to the next and I've somehow found myself poking around in some windows software on a PC that is used to develop Android software, maybe sdk, not sure but was Linux coding and looked like it was meant for me. I was on the other end of this hack for a few minutes tho but my lack of knowledge made this useless to me. I have downloaded many an app trying to combat this issue but to no avail. Although unsuccessful I have seen a few thing I don't understand but could possibly be helpful for you to identify exactly what my issue is. One thing is an app I downloaded said that a trust cert has enabled a malicious trust agent and my system is being remotely accessed by a third party. The rest is beyond my understanding but I'm going to list a few tidbits you may recognize. LIB, Kinguser, kingroot, persist, unremovable/???/xxx, code Aurora, bootstrap something, libnfc, system/framework/Apache/xml, bin, user value=0 or 1/2, managed provisioning, also a .base ext. on a bunch of sytem apps below the same app without and a few of others. I don't know if that's helpful but it's all I can remember. Symptoms are apps closing on their own, microphone and camera being remotely enabled, unable to update Google play services or store and being forced to use an obviously older and modified version with possible replica apps with restrictions, unexpected reboots, in settings/apps/permissions apps like gallery, when you click battery and then the little i button for info, it says it's a system app and all of the sudden the disable and force close buttons become un-highlighted and unusable and so on and so forth. Lastly, my home wifi is infected I think as well because my roommate is having the same issues. I've tried(unsuccessfully) to root my phone so I could manually remove some of these apps and extra coding and such but it seems impossible because of a locked bootloader. Tried about 10 different ways without success so I've just about given up and smashed the damn thing but then you geniuses popped into my head so I beg of you, please help me or if nothing else, tell me to proceed with the smashing...lol! Thank you very much for your time. P. s. I'm new to XDA dev website so maybe drop me a line at [email protected] with directions back to this thread. Had a bit if trouble navigating here. Thanks again and have a great day! -Spencer
Here is a wild theory or two..
Don't have a computer with me right now, however I have a crazy idea.
https://www.xda-developers.com/unlock-bootloader-verizon-google-pixel-xl/
Could this possibly be a weak point with our devices, no matter what version of the bootloader Samsung is using?
This would be quite a bit different than the Pixel devices.
Disable everything security related. This includes that abortion called Knox and all the little things that go with it. Even Bixby. Take everything labeled with the Samsung name and disable it. At its core, it's still Android. Of course this will be the next patch.
Number 2
I wish we could still have towelroot around, but would it be possible to get a oem unlock code and insert it into the system UI?
Or like we used to do it, cook and hide a magisk module or su apk renamed into the system. Whether it be at the bootloader or Kernel level that would pass the damn safety test without tripping anything?
I'm not looking forward to picturing the result if we can't get past people who have no idea what this phone is capable of doing and placing a ball gag on the bootloader.
"The more they overtake the plumbing, the easier it is to stop up the drain"
-Montgomery Scott - USS Enterprise.
Good luck and good hunting!
emod0705 said:
Here is a wild theory or two..
Don't have a computer with me right now, however I have a crazy idea.
https://www.xda-developers.com/unlock-bootloader-verizon-google-pixel-xl/
Could this possibly be a weak point with our devices, no matter what version of the bootloader Samsung is using?
This would be quite a bit different than the Pixel devices.
Disable everything security related. This includes that abortion called Knox and all the little things that go with it. Even Bixby. Take everything labeled with the Samsung name and disable it. At its core, it's still Android. Of course this will be the next patch.
Number 2
I wish we could still have towelroot around, but would it be possible to get a oem unlock code and insert it into the system UI?
Or like we used to do it, cook and hide a magisk module or su apk renamed into the system. Whether it be at the bootloader or Kernel level that would pass the damn safety test without tripping anything?
I'm not looking forward to picturing the result if we can't get past people who have no idea what this phone is capable of doing and placing a ball gag on the bootloader.
"The more they overtake the plumbing, the easier it is to stop up the drain"
-Montgomery Scott - USS Enterprise.
Good luck and good hunting!
Click to expand...
Click to collapse
...okay, a thought...we're always trying to gain root access, usually through boot-loader but not always right?
This may be a repeat or already tried method, and apologies...
Kustom Live Wallpaper and widget enable you to access the ENTIRE file system...all the way to RIL in private-app...could an exploit ride on it's coat tails?
Once it's there, can it make use of being there?
Hi, I am not new to computers phones and development but it's been years and a lot has changed. I went to school for software design and I learned on Visual Studio 6.0. So for anyone in there 30's and older you all remember how 6.0 was. Well alot has changed since 6.0 but regardless I know when someone has been messing with my phone a s or computer. I am going to try and post all of my syslog that I have saved and any new that I see. Also ibam going to try and post what open source software that I notice my phone now has licenses for. I am on a Samsung Note 10 plus 5G. And I am almost positive that my girl is responsible for the modifications done to my phone but she screams that she only knows how to play games call and text. I need someone to review my information and any information that anyone needs and tell me if my phone has been modified and if everything could have been done remotely. My ultimate question is could this all have been done remotely or would any of it and I mean even the smallest thing have to be done locally on the phone. If every single modification could all have been done remotely then maybe she's telling the truth but if just one thing had to of been done locally then she's responsible somehow. And then I need to know how to fix all of this and set up secure to prevent it from happening again.
you claim you're developer but provide logs as screenshots... seriously, if you can't trust your girlfriend what you need help is a couble care course or psychotherapist.
I doubt your Samsung Galaxy Note10+ bootloader locked device secured by Knox is tampered in any kind at all
What i'm seeing here is you using your phone with samsung packages working. It's mostly sounds running, you unlocking the device, setting an alarm ect.
Bare in mind google and apps use location alot so the location is i would say the norm. The more apps the more times location is called.
if you are concerned get dmr checker and check security levels, has the device been rooted and displays the true code? Really worried check all your apps then disable location or use odin to fully wipe the device but from what i can tell this is possibly paranoia
Whether your girlfriend can be trusted or not is not the problem. Maybe she is really hacking your phone or maybe you are just paranoid, I can't tell. Either way you two should break up before you break each other.
.. or just a week digital detox