Related
Hey guys, long time lurker, first time post here.
I just got off the phone after a nightmare of random reboots and so on and so forth. VZW send me a text today saying an update to my phone was available. Thinking I'd find out if it was simply to disable mobile tether or not I called in. The tech was surprised, but said he did see the notes on my account that the message was sent.
He said it was NOT 2.3, but another maintenance release, approved today for push tomorrow. All of this can be dismissed, however he did say something quite interesting. He said he couldn't fully help me because my phone was rooted. Obviously I denied that, and he said look man, I know it is. I said how? He replied that he could see that I was running DASbamf 2.1, which I am. Explained that it was part of the new system for the 4g phones. Believe me or not, I just wanted to put it out there that VZW can apparently tell, his words were that more than likely, it's pulled from when the phone is activated. Has anyone else heard of either of these? This is also posted on droid forums, just putting that out these to avoid the duplicate talks.
I always thought they knew, just can't do much about it. However, if they start using that information to deny certain services, it would be a major problem.
We need one of the nifty Verizon employees that frequent here to comment on this.
that is interesting. In theory, they could use that to deny warranty claims.
or the devs could just change the listing and fake the rom info right?
Well, thats my thought / hope. He read right back to me saying I was running a custom rom. I got to talking with him and he admitted he was rooted as well, and additionally stated that as a whole VZW doesn't pursue the issue. it just tripped me out, that he read it out. He had a very "don't bull**** me" tone. haha
tricky verizon.... they are catchin on!
if their phones didn't come with so much bloatware i wouldn't feel the need to root.
The screen cap was from today, obviously. What do you guys think of that?
son0fthunder said:
The screen cap was from today, obviously. What do you guys think of that?
Click to expand...
Click to collapse
i think you need to charge your phone
i think you should download that and drop it on xda early for all of us.
I agree,I believe a charge is in order
1.21 giggawatts Thunder™
nrfitchett4 said:
that is interesting. In theory, they could use that to deny warranty claims.
Click to expand...
Click to collapse
Anyone dumb enough to return a rooted phone deserves to be denied.
Sent from my ADR6400L using XDA App
Haha, all warranty-implications aside, that's pretty cool that he could tell you what rom you were running.
Jcase has said before that they can tell, a big give away is you radio/baseband version. Do they care if you're rooted? Probably not unless your stealing services ,in which they are starting to act on and try to eliminate.
I root because I like to tinker with computers, I like the customization and speed that rooting gives us.
No flame please.
Sent from my ThunderBolt using XDA Premium App
son0fthunder said:
Hey guys, long time lurker, first time post here.
I just got off the phone after a nightmare of random reboots and so on and so forth. VZW send me a text today saying an update to my phone was available. Thinking I'd find out if it was simply to disable mobile tether or not I called in. The tech was surprised, but said he did see the notes on my account that the message was sent.
He said it was NOT 2.3, but another maintenance release, approved today for push tomorrow. All of this can be dismissed, however he did say something quite interesting. He said he couldn't fully help me because my phone was rooted. Obviously I denied that, and he said look man, I know it is. I said how? He replied that he could see that I was running DASbamf 2.1, which I am. Explained that it was part of the new system for the 4g phones. Believe me or not, I just wanted to put it out there that VZW can apparently tell, his words were that more than likely, it's pulled from when the phone is activated. Has anyone else heard of either of these? This is also posted on droid forums, just putting that out these to avoid the duplicate talks.
Click to expand...
Click to collapse
Hi. I just bought a Thunderbolt after having problems with Sprint. I was told the same thing and when I mentioned it in the forum from a thread I posted, I was called a liar, among other things. I was told, as you can see from my post, that they also know every site you visit and whether you are paying for the Mobile Hot Spot. Sorry to hear your story, but glad that it validates what I was told from Sprint.
Schedonnardus said:
i think you need to charge your phone
Click to expand...
Click to collapse
That was a great reply!! Hilarious!
Sent from my ThunderBolt using XDA App
I do it to get rid of crapware
Sent from my ADR6400L using XDA App
Well I'll just jump on over to Sprint if they terminate my contract! The developer support is the reason I have an Android phone. I'm sure the devs could come up with something to block this though.
Honestly... I think terminating contracts over rooted phones would be one of the dumbest moves a cellular company could make.
It takes a certain technical know-how to root a phone, even with "easy root" phones such as the Google Nexus series. These technical people are also the people that are likely to be in positions of IT buying power in major organizations. If one of these people were to loose service over the rooting their personal phone, they may make the case to organizational management to move the organizational fleet of phones away from that carrier. In turn, the termination of one contract leads to the eventual termination of an entire fleet of phones. This "Mutually Assured Destruction" scenario prevents the cellular carriers from taking any large scale averse action against rooted phones. Furthermore, these technical people frequently talk to each other through rapid dissemination means (i.e. these forums). This sets up another scenario where the cancellation of one person's service may lead to the loss of many current and future subscribers.
These two factors leads to an environment where rooting is tolerated but not encouraged by the carriers. Carriers do not want to encourage rooting because it allows people to get rid of money making applications (i.e. City ID). However, they can not take averse action against rooted phones as that would launch the "mutually assured destruction" scenario discussed above. Carriers have turned to the method of locking down the phones as much as possible to prevent casual rooting of the devices. However, once a device is rooted, it is out of the carrier's control.
I fell asleep shortly after this thread was posted, I will however post updated pics once phone is charged.
I am not a developer, while I seem to have more knowledge than the daily user, I do not have the knowledge base to attempt the project that I am curious about. I work for a local tow company as AAA tow truck driver. AAA has provided all its contract stations with an android device that runs an app that is basically a native interface for a web based portal for dispatching the calls. To make a long story short if I were to log into the web interface from my E4GT I can view the dispatched calls ok and the office seems to be able to track me ok, but the native app on the AAA device seems to be able to update statuses while the web interface doesn't seem to actually send the information. I got a hold of the native app apk file and it installed ok, however it asks for a user name that the web interface does not ask for. I assume that this is to prevent people (like me ) from installing on devices that weren't approved by AAA. I was wondering if perhaps there was a way to modify the program to skip this step and allow me to move right in to the log in. If anyone can point me in the direction of someone who may be able to undertake this project for me, I know several people who would rather use their own devices than the AAA device which we are held financially responsible for if it ever is broken or lost. If I were able to run it on my device I could toss their device in a drawer where it will stay safe until I need to return it. Please help. I included the .apk file if anyone is interested in giving this a go.
The likelihood is that modifying this original app in any way works break the law.
AAA obviously paid for the app to be developed and they will own the rights to it.
I suspect that your request breaks the rules of XDA.
The app was downloaded fire free with no copyright permissions agreed to at this location. (I tried to post a link but I guess in too new, I have it tho if you need evidence] therefore I would assume no laws were broken. That web page is the web based program and allows you to download the app without agreeing to anything.
Sent from my SPH-D710 using xda app-developers app
Mark1537 said:
The app was downloaded fire free with no copyright permissions agreed to at this location. (I tried to post a link but I guess in too new, I have it tho if you need evidence] therefore I would assume no laws were broken. That web page is the web based program and allows you to download the app without agreeing to anything.p
Click to expand...
Click to collapse
You can post a link by sticking it in as clear text, with no 'http://' if you really need to.
Just because you are able to download it for free doesn't mean there are no inherent copyright and licences - you will often find them as part of the installation procedure.
OK here's the link. d3me.ersace.com/d3me/htmls/index.jsp
The AAA servers have been having issues over the last couple days so the website seems to be down right now. It actually has been making with really tough because all or calls are being dispatched late and customers aren't happy. But there were no permissions on the installation either. It installed fast and asked for a user ID that I'm assuming belongs to someone in their tech dept. That's all.
After that it should go straight to the contract station and driver log in.
Sent from my SPH-D710 using xda app-developers app
The website is up again. Feel free to check it out. I've been trying to get a hold of someone from AAA to talk about getting me a log on, but I have no response. I can't see how they could object to me using software that they want me to use. I just don't want to risk the device that they are holding me responsible for. Aside from the fact that I don't want to carry multiple devices around. I don't want to break any laws, but there doesn't seen to be any restrictions on this particular app.
Sent from my SPH-D710 using xda app-developers app
Mark1537 said:
The website is up again. Feel free to check it out. I've been trying to get a hold of someone from AAA to talk about getting me a log on, but I have no response. I can't see how they could object to me using software that they want me to use. I just don't want to risk the device that they are holding me responsible for. Aside from the fact that I don't want to carry multiple devices around. I don't want to break any laws, but there doesn't seen to be any restrictions on this particular app.
Click to expand...
Click to collapse
The website seems to be back down again, at least as far as I can tell.
I just checked it this moment. And it's up.
Sent from my SPH-D710 using xda app-developers app
Mark1537 said:
I just checked it this moment. And it's up.
Click to expand...
Click to collapse
Yeah, just discovered that it's an https:// not an http:// link
By pressing ACCEPT, you agree not to use this application while operating a motor vehicle, and agree to the other limitations with respect to the use of this application as described in the accompanying materials.
Click to expand...
Click to collapse
That would be implicit to the software as well, so I would assume that the 'accompanying materials' probably includes their restrictions of use.
Regardless, I can't see you getting anywhere without the username and password. I reckon that social engineering is likely to be more successful than hacking the app, but I may be proved wrong.
I'm finally getting some response from AAA, it was a handbook given during the training for the software. I have read through it and an struggling to find anything regarding the licensing or copyright infringement. I don't deny the ethical gray area that I am standing in, I am just trying to make my working life easier. If I can accomplish the task through the proper means by acquiring a log in of my own I will do that, I was just wondering if the same results could be achieved through alternative means.
Sent from my SPH-D710 using xda app-developers app
Mark1537 said:
I'm finally getting some response from AAA, it was a handbook given during the training for the software. I have read through it and an struggling to find anything regarding the licensing or copyright infringement. I don't deny the ethical gray area that I am standing in, I am just trying to make my working life easier. If I can accomplish the task through the proper means by acquiring a log in of my own I will do that, I was just wondering if the same results could be achieved through alternative means.
Sent from my SPH-D710 using xda app-developers app
Click to expand...
Click to collapse
Hi I know this is a little old but my station just up graded to the tablets also so I am in the same boat now and was wondering if you where able to get any further with this
nope
bearclaw001 said:
Hi I know this is a little old but my station just up graded to the tablets also so I am in the same boat now and was wondering if you where able to get any further with this
Click to expand...
Click to collapse
Noboy was willing to help either here or at AAA, however; if you are a reliable driver that doesn't need to be tracked everywhere that you go, justmake sure that your dispatch tells you when they send you a call and the web link will work. It will even track you if you leave it runnng. But there is no alert sound. So if dispatch just sends calls and doesn't tell you, its no good. Luckily I have been able to just deal with it for now. I'm extra careful with their device, and hopefully nothing will happen. But the tablets...... that sems pricey.
Mark1537 said:
Noboy was willing to help either here or at AAA, however; if you are a reliable driver that doesn't need to be tracked everywhere that you go, justmake sure that your dispatch tells you when they send you a call and the web link will work. It will even track you if you leave it runnng. But there is no alert sound. So if dispatch just sends calls and doesn't tell you, its no good. Luckily I have been able to just deal with it for now. I'm extra careful with their device, and hopefully nothing will happen. But the tablets...... that sems pricey.
Click to expand...
Click to collapse
To say "Noboy was willing to help either here or..." is rather unfair. Nobody here would have any benefit from modifying the application to do what you wished, even if they did want to get involved in the legal gray area, and you can't exactly expect a developer to simply spend hours or days taking an app apart in the hope of modifying it when there is no real reason for them to do so.
Your best bet always was, and still is, to go back to AAA and ask them. If enough of the drivers start doing so they may consider allowing installation on a different device - although they may demand the device by sent to them first for the installation so they can pre-enter the required log-on information.
not an insult.
SimonTS said:
To say "Noboy was willing to help either here or..." is rather unfair. Nobody here would have any benefit from modifying the application to do what you wished, even if they did want to get involved in the legal gray area, and you can't exactly expect a developer to simply spend hours or days taking an app apart in the hope of modifying it when there is no real reason for them to do so.
Your best bet always was, and still is, to go back to AAA and ask them. If enough of the drivers start doing so they may consider allowing installation on a different device - although they may demand the device by sent to them first for the installation so they can pre-enter the required log-on information.
Click to expand...
Click to collapse
My post was not meant as an insult, just a statement of fact. I always aknowledged the legal gray area, and more than understand why nobody would get involved. I guess I was hoping somebody might point me in the right direc,tion to accomplish the task on my own. I have since given up the task as I have stated already, and continue to utilize the various recources this site provides. I'm sorry you were offended, but once agan, it was not an insult. Have a nice day.
simple
Guys i know this is kinda a dead post but AAA locks the tablet to go to the one website only.. that is when you click on the "app" on the tablet, it is just opening the web page. its your shop number, password, truck id and user id.. no install needed.
If you install this on your own device (only some clubs allow "bring your own device") you need to enter the location url for your particular club usually http://spp.aaa.com/d3me*** where the *'s are your club number. Then you have to have an application username which is simply a password that gives you access rights to install the application. You will never see this on a club owned device like a cell phone or tablet provided by the club you are contracted for because it is preinstalled. So as "simple" as stated that is all you need on a club device but if you are trying to install on your device (which likely runs much faster and better anyway) then you need a club that allows BYOD to get the application installer password. (And no I wont post the installer password!)
I ran into this article today and I wanted to see what the people on XDA think about it. This company is working on a Android phone that it's primary purpose is to protect the users privacy.
Here's the link: http://mobile.theverge.com/2014/1/1...nn-silent-circle-geeksphone-blackphone-launch
Read the article, watch the video and let me know what you think.
Sent from GNote 3 rooted with kingo.
Saw news about this and came here to seek out does any1 have opinions about it.
i wonder, does the safety come from hardware or is it the OS what makes this so safe.. if it is the OS, i hope some1 smart enough makes custom rom for this.
I really don't see how this phone is gonna change anything. Apps and websites have keyloggers, You still need a carrier to get service from and they have control of all your traffic. What about radio frequencies that can be intercepted, IP addresses, GPS chips sending signals to satellites, baseband and firmware are connected thru the cell towers of the carrier. I'm starting to think this phone is a scam.
They said nothing about how they're dealing with all this. They are probably using the whole NSA scandal momentum to fool people into believing they are safe if they buy this phone.
Sent from GNote 3 rooted with kingo.
I saw an article about this venture also. This is a good thing. If he gets press about this phone, maybe other venders will take notice and start building in privacy features as well. :good:
I don't see the need for new hardware here. If they really want to secure something, they could create a mod for Android, that could be installed on a variety of devices for example.
Besides, if they encrypt telephony, messages and stuff, they will need to be decrypted again - but the question is where and how? I bet they won't have any hardware encryption module and even if they do, it will make communication with other phones impossible. Software encryption means other phones will need to install some additional software to communicate with the Blackphone and it might be a bit inconvenient.
orangek3nny said:
I don't see the need for new hardware here. If they really want to secure something, they could create a mod for Android, that could be installed on a variety of devices for example.
Besides, if they encrypt telephony, messages and stuff, they will need to be decrypted again - but the question is where and how? I bet they won't have any hardware encryption module and even if they do, it will make communication with other phones impossible. Software encryption means other phones will need to install some additional software to communicate with the Blackphone and it might be a bit inconvenient.
Click to expand...
Click to collapse
That's a good point. how a non blackphone device is gonna decipher the encryption? how is it going to get the key? How can a non blackphone device even a establish the same "secure" connection?
Sent from GNote 3 rooted with kingo.
Andronote3 said:
That's a good point. how a non blackphone device is gonna decipher the encryption? how is it going to get the key? How can a non blackphone device even a establish the same "secure" connection?
Sent from GNote 3 rooted with kingo.
Click to expand...
Click to collapse
I think you are missing the point. As you or I may not NEED this kind of security, I'm sure you can think of someone who does.
Obviously, there would be two levels of privacy/security... Connections between 2 black phones and everything else. So who utilize a black phone? How about corporations and governments? Law offices, professional sports teams, or doctors and hospitals.
Now, even though I do not NEED this, if it was affordable, I would heavily consider it.
Sent from my Nexus 5 using XDA Premium 4 mobile app
JamieFL said:
I think you are missing the point. As you or I may not NEED this kind of security, I'm sure you can think of someone who does.
Obviously, there would be two levels of privacy/security... Connections between 2 black phones and everything else. So who utilize a black phone? How about corporations and governments? Law offices, professional sports teams, or doctors and hospitals.
Now, even though I do not NEED this, if it was affordable, I would heavily consider it.
Sent from my Nexus 5 using XDA Premium 4 mobile app
Click to expand...
Click to collapse
I understand what you are saying and I completely agree with you. It looks like a device that corporations and the government would "benefit" more than regular users. Either way, It won't fix 90% of all the problems people face when it comes to staying safe against privacy/security breaches. I truly believe that they are using the whole NSA scandal momentum to make people believe that they are safe/secured if they buy this phone.
P.S: Nice quotes.
I saw this phone.
It isn't an answer to every privacy issue.
What its an answer to is, not having to agree to an android apps permissions to gain access to the app.
These apps don't make their money off the app sales, they make their money sending information to retailers.
Retailers own the world.
The question I still pose is... What's wrong with retailers knowing where you are?
There's nothing you can do about the government. They won't let us make things that are government proof, nor would they (The retailers ) want to.
But, what's wrong with these apps fine tuning my specific desires to my Location?
You can't stop people from stealing your identity. The hacker/firewall paradox is, for every walk you build, they will build a taller ladder.
The only thing really close to full privacy in data sending is, that light source that sends data. It's a light bulb, and the light has data in it, a sensor receives it. It can be held within the walls of a room. But that only effects a closed circuit type system. If that light source is connected to the Internet, then game over.
Why do you think record companies and movie companies keep their computer systems offline and deal in only physical media? A hacker will get into anything I'd you give him the tools and time.
This phone gives a sense of security that is non existant
You've Just Been Tapatold ♧♢dbombROMv3.4♤♡
My Theme ( Taking Requests )
http://forum.xda-developers.com/showthread.php?t=2658527
SaintCity86 said:
I saw this phone.
It isn't an answer to every privacy issue.
What its an answer to is, not having to agree to an android apps permissions to gain access to the app.
These apps don't make their money off the app sales, they make their money sending information to retailers.
Retailers own the world.
The question I still pose is... What's wrong with retailers knowing where you are?
There's nothing you can do about the government. They won't let us make things that are government proof, nor would they (The retailers ) want to.
http://forum.xda-developers.com/showthread.php?t=2658527
Click to expand...
Click to collapse
nailed it
The problem is Android itself. Thanks to Xprivacy, it's a lot easier to control what leaks out of your device. Personally I'd rather see more encryption mechanisms than this. FFOS seems to be on the right path
There Is nothing you can do to stop identity theft.
Nothing.
And there is nothing you can do to do the government from tapping your lines.
You want a safer form of communicating, send Voice recordings over text.
That's an entirety separate warrant, and harder to get. Other than that. It's hopeless
You've Just Been Tapatold ♧♢dbombROMv3.4♤♡
My Theme ( Taking Requests )
http://forum.xda-developers.com/showthread.php?t=2658527
d1rX said:
FFOS seems to be on the right path
Click to expand...
Click to collapse
I think you mean FOSS[1] = Free and Open Source Software. Anyway, I fully agree, in fact, that is the ONLY way. Closed source encryption programs can't be 100% trusted by definition. There might be security flaws, intentional or not.
Anyway. the NSA has backdoors to every operating system[2], so if you're really a target, they get you. Also, there are more than enough security holes in the layers under the operating system[3].
I think what these phones are supposed to do is bring end-to-end encryption for e.g. industry users so they don't get spied on. The NSA and the US government can get their hands on encryption keys for servers like in Lavabits case[4]. But this is the transport encryption. The data is, if not otherwise secured, available in plain text on the servers of providers. This also means, the officials can decrypt ANY data that comes in, not just the one of actual targets.
Now, end-to-end encryption makes sure even the provider can't see your data in plain text because you encrypt and decrypt it on your device. What Blackphone does is, it uses the apps from Silent Circle, a closed source encryption programm for VoIP and messages. Although the owner of that company is the well trusted cryptographer Phil Zimmerman, one can never be sure.
That's a good point. how a non blackphone device is gonna decipher the encryption? how is it going to get the key? How can a non blackphone device even a establish the same "secure" connection?
Click to expand...
Click to collapse
You can install and use Silent Circle on any(ok, a lot of) phone(s). Just make sure you don't have additional malicious software installed. Any yes, it costs $100/year or so. And you get a subscription for SpiderOak, sort of a Dropbox but they encrypt the data before uploading. Any you get a better overview over what app uses what permissions. A few extra tweaks basically.
Alternative: Android Phone with CyanogenMod/Replica. TextSecure for messages, RedPhone for VoiP and owncloud for files. Way cheaper too, and open source, also made by well respected cryptographers like Moxie Marlinspike[5]
[1] de.wikipedia.org/wiki/Free/Libre_Open_Source_Software
[2] zerohedge.com/news/2013-09-08/nsa-has-full-back-door-access-iphone-blackberry-and-android-smartphones-documents-re"]backdoors to every operating system
[3] forum.xda-developers.com/showthread.php?t=2530044
[4] techdirt.com/articles/20131002/17443624734/lavabit-tried-giving-feds-its-ssl-key-11-pages-4-point-type-feds-complained-that-it-was-illegible.shtml
[5] thoughtcrime.org
if they want to spy on us they can ... that's it...
More info?
Hi all - looking for more info on this phone - just joined XDADev to post this.
Specifically, what brands might this hardware be found under? Know it's a Tinno S8515 but have yet to find out anything about that; seems like Tinno generally makes phones for other companies?
Any help is appreciated!
Best,
-Cx
:cyclops::cyclops::cyclops:
The greatest challenge to securing a phone is not the OS or the apps running on it, it's the baseband. We have known for well over 30+ yeasr how to harden a *nix based system (like AOS), but we haven't even started to question WTF is going on in the closed source 10-100 MB baseband RTOS, which have fulll access to your entire FS and the most important phone operations, like SIM, RF, EMMC etc etc.
Only forcing the corrupt modem OEM's to release the sources of the Baseband firmware could improve the situation. This will never happen, unless there is another baseband Snowden out there somewhere...
We already know that the BP/CP FW is extremely insecure, and relies almost solely on obscurity as their main mechanism of protection. If this was not the case, the iPhone unlock developers would have been fekked long time ago, and the rest of us would sit around with SIM/network locked bricks filling up our bookshelves.
Unfortunately the greatest majority of the millions of XDA members are completely carefree about this issue and are only happy as long as they can "tweak some ROMs". So this will never be the place to find/see any serious baseband reversing, no matter how important it would be from a security standpoint.
So to summarize, your Qualcomm baseband will continue to send your exact GPS coordinates to the network provider at will, without you ever knowing, and without anyone (here) caring. So goes for the FM transmitter that is part of the baseband FW in both Intel and Qualcomm based phones. Do you have control over that? Never.
Only a serious long term spectrum analysis study could reveal whats going on there, where and when you're not (able) to watch.
This phone is the biggest scam lol.
hyshys said:
Saw news about this and came here to seek out does any1 have opinions about it.
i wonder, does the safety come from hardware or is it the OS what makes this so safe.. if it is the OS, i hope some1 smart enough makes custom rom for this.
Click to expand...
Click to collapse
I was wondering this too. If it is only the rom (just like the $1300 pwnphone). It should be port-able
iliass01 said:
I was wondering this too. If it is only the rom (just like the $1300 pwnphone). It should be port-able
Click to expand...
Click to collapse
Blackphone. - no hardware security, just software, and most of it is NOT open source. Some here (@SaintCity86 , @repat) has their points, and they are mostly right! If you want some security (and I said some!!!), then get rid of most of your apps (permission check and some common sense), all Google apps (yes, all of them), install a paid (not free) and high quality VPN software, don't use the phone feature (only data sim-prepaid), get an internet phone number (with no personal details), use end to end encrypted apps to make calls and send and receive texts, install Xposed and Xprivacy (or any other variant) and limit even more the apps you have on your phone. Don't use it as your only phone, but as a secure device and share your number and other infos with trusted people! In this case, maybe, you will be able to add some layer of security and actually be able to use it. And most important, don't give your phone in the hands of anyone! It is a bit paranoid, but it's the only way! But, don't be fooled! You can have some security, only if you stay under the radar, and don't gain some attention. If yes, then you have no luck! Personally, I have seen the Blackphone, and tested it for some time, and I am not really convinced it can be trusted.
Good luck!
Andronote3 said:
I really don't see how this phone is gonna change anything. Apps and websites have keyloggers, You still need a carrier to get service from and they have control of all your traffic. What about radio frequencies that can be intercepted, IP addresses, GPS chips sending signals to satellites, baseband and firmware are connected thru the cell towers of the carrier. I'm starting to think this phone is a scam.
They said nothing about how they're dealing with all this. They are probably using the whole NSA scandal momentum to fool people into believing they are safe if they buy this phone.
Sent from GNote 3 rooted with kingo.
Click to expand...
Click to collapse
Would just like to correct this common misconception, GPS is one way.
GPS receivers as found in your phones, or navigation systems, receives GPS signals only. Nothing gets sent to satellites in this process, the algorithm is purely one way.
Hi
I know that this will sound like another hacked story but I know what to do.
My phone got hacked couple of months back.i didnt know it was untill the hacker started to leave clues. It was then that i started really payibg attention to everything going on. but keeping quiet abort it so that he or she thinks i didn't know
I know of 3 incidents that may have conpronised my security coupled by the fact that I did not practice password hygiene or unique ones for all accounts. I know that its totally my fault and i am not goings to blane Android os. So please dont think of this as one of tjose posts
What i now need is help in understanding what tondo next.
Little details on what happens, lets say i get search for some one on Facebook. The same is Charles smith, I Finish off my search and open Instagram boom i see a pictures where recommended shows a google search page where Charles is written and the Google auto complete is giving options .
Happened twice
I tumlr and I don't really post anything in fact My blog is totally blank. Suddenly i have people followings me and they tend of hame my nick name as their user id .the id displays my WhatsApp status updates.
These and just two examples i have more but i think everyone gets whats going on.
things i have done to prevent such occurences factory formatting the phones mac abd router. Gotten new routers and ready to flash a custom firmware for them.
Password changes .everything.wps2 aes wifi password with random numbers upper case lower case n symbols
Passwords are written on paper without a electronic backup and under lock and key.
I thought that maybe its a key logger but i took my moto x2 n moto e2 to the service center and got them to re load official software.
Two days later bam the same thing.
Any suggestion on where the weakness is ?
The problem is that I am kind of tired if thi
Sent from my XT1092 using XDA Forums
Check account sync settings if it is on more applications can use various private data.
Sent from my A0001 using XDA Free mobile app
i dont understand?
can u explain , i have sync on should I not have it
on different note does anyone suggest rooting and installing something that can isolate and restrict data from being accessed. now i know that exposed does that and marshmallow will work that out. but any other guidance ?
Did you use a virus or malware scanner?
Are there any apps you didn't install on your phone?
If i were you, i would start with doing the following steps by their exact order to get rid of the hacker and operate on a "safe" system.
1- Backup personal files to pc and deep scan them with virus scanner, make sure they're clean.
2- Unlock the bootloader of device and flash every image manually with fastboot from stock factory image.
3- After flashing the images, go to stock recovery and wipe data / factory reset and wipe cache for a complete, untouched system.
4- Change account passwords with stuff that are unrelated to you. I mean if you made a google search for firedance, don't include dance or fire in any your passwords.
* also change the " forgot my password " questions and their answers.
5- Once you boot the system, download any ota packages from the manufacturer to be sure you'd be on a safer and patched software for security.
For future securtity, be sure to check apps permissions before installing anything from google play or external places. Don't root your device and don't enable USB Debugging in developer options. Hope it helps.
Semseddin said:
If i were you, i would start with doing the following steps by their exact order to get rid of the hacker and operate on a "safe" system.
1- Backup personal files to pc and deep scan them with virus scanner, make sure they're clean.
2- Unlock the bootloader of device and flash every image manually with fastboot from stock factory image.
3- After flashing the images, go to stock recovery and wipe data / factory reset and wipe cache for a complete, untouched system.
4- Change account passwords with stuff that are unrelated to you. I mean if you made a google search for firedance, don't include dance or fire in any your passwords.
* also change the " forgot my password " questions and their answers.
5- Once you boot the system, download any ota packages from the manufacturer to be sure you'd be on a safer and patched software for security.
For future securtity, be sure to check apps permissions before installing anything from google play or external places. Don't root your device and don't enable USB Debugging in developer options. Hope it helps.
Click to expand...
Click to collapse
Don't Root your device? Don't check USB debugging? Seriously? That is your answer? Wow, do you work for Verizon or AT&T by some chance? Sorry, but with Root and some nicely placed Xposed modules, this persons phone or tablet would be more safe than anything g Verizon or AT &THE could conjure up. You are a dope! Lol! Seriously, go away. Bother another community. ?
Sent from my SM-N910V using Tapatalk
Jaytronics said:
Don't Root your device? Don't check USB debugging? Seriously? That is your answer? Wow, do you work for Verizon or AT&T by some chance? Sorry, but with Root and some nicely placed Xposed modules, this persons phone or tablet would be more safe than anything g Verizon or AT &THE could conjure up. You are a dope! Lol! Seriously, go away. Bother another community. ?
Sent from my SM-N910V using Tapatalk
Click to expand...
Click to collapse
Pardon me but where does that come from ? Made me laugh. Since this is security forum, the first priority is security not your "nicely put xposed modules whatever that means". It is said many times by security experts rooting an android device removes a big portion of layer of security. I unfortunately don't work for AT&T or Verizon but i wish i worked for them for a nice salary.
This one is coming from the recognized developer and moderator of XDA Android Security forum. Someone who have exploited devices and found vulrenabiliies that you can't even dream of. Lets say i am a "dope" and you're the smart guy. Are jcase, steve kondik dopes as well ?
http://securitywatch.pcmag.com/secu...-have-android-settings-from-a-security-expert
http://www.dailytech.com/CyanogenMod+Creator+Tells+Android+Users+to+Rethink+Rooting/article33058.htm ( yeah, even steve kondik doesn't approve rooting for general users.
https://blog.kaspersky.com/rooting-and-jailbreaking/1979/ " Kasperksky a security platform well known for years are also against rooting.
Think again if you can who is the dope, now, go bother in your nicely put xposed modules forums for the sake of security. :good:
Semseddin said:
Pardon me but where does that come from ? Made me laugh. Since this is security forum, the first priority is security not your "nicely put xposed modules whatever that means". It is said many times by security experts rooting an android device removes a big portion of layer of security. I unfortunately don't work for AT&T or Verizon but i wish i worked for them for a nice salary.
This one is coming from the recognized developer and moderator of XDA Android Security forum. Someone who have exploited devices and found vulrenabiliies that you can't even dream of. Lets say i am a "dope" and you're the smart guy. Are jcase, steve kondik dopes as well ?
http://securitywatch.pcmag.com/secu...-have-android-settings-from-a-security-expert
http://www.dailytech.com/CyanogenMod+Creator+Tells+Android+Users+to+Rethink+Rooting/article33058.htm ( yeah, even steve kondik doesn't approve rooting for general users.
https://blog.kaspersky.com/rooting-and-jailbreaking/1979/ " Kasperksky a security platform well known for years are also against rooting.
Think again if you can who is the dope, now, go bother in your nicely put xposed modules forums for the sake of security. :good:
Click to expand...
Click to collapse
For a dope, I suppose that Root is a security risk. But, just because a device is not Rooted, does not mean it is secure by any stretch of the imagination. Truthfully, they are more unsecured if locked out from the user. That is, if the person is not a dope. What I am saying is that your advice, for the OP to take every update and not Root, was not really that helpful. If the OP installed an app that was a risk, then all the updates and non Root, will not help them. Now, if you were to show them, that if they were to Root, and use certain apps and modules on their device. Then they could keep a better eye out for potential problems. But, even if they did as I just said. If the OP is being a dope, and installing apps that, let's say, they obtained from a torrent site. Then, well, dope would be a fitting title for them as well.
And, if those recognized developers stated that Root was not good at all. Then yes, dope would be a fitting application of the word. Root is only bad for those that are dopes.
I believe that you inadvertently called the OP a dope. You did not help them all that well. What you did was help them to get rid of the problem temporarily. Do we know who apps are on their device? It would be a good idea to know these things. Also, where did they get these apps from? Kind of a big deal there.
But, if you were wondering what it is that I am talking about in regards to xposed. Look it up.
http://repo.xposed.info/module/de.robv.android.xposed.installer
I suggest the OP do the same. As well as anyone else who is having g issues. Now, knowing about xposed and the modules that can accompany it. Will not fully protect anyone from blatant stupidity. Read, read, read. And practice safe device use. There are so many avenues to protecting g ones self. But a big one that anyone can do. Don't download from shady places. Though, it is even very possible to get in trouble from apps from the Play store. Knowing what apps are asking for what permissions is important. What bothered me about your post is that you in the same post, stated for them to unlock the bootloader and then, to not root. Verizon and AT&T are advocates of the no Root behavior. And that sickens me. As well as many others. Instead of helping g people to see the dangers. They are told to do the most simplest of tasks, not to Root. And that they would be fine. Absolutely and completely false and misleading. Now, and again, for a dope. I suppose this would be fine. Though, it is not helpful. Education into matters are. One needs to seek out the underlying issue first. Then attempt to educate. As far as calling you a dope, I do humbly apologize for my Choi e of words. You did not deserve that. It would have been just fine for me to build onto what you suggested. Which was good advice. So, I am sorry. And yes, I am very much a dope at times .
Sent from my SM-N910V using Tapatalk
Jaytronics said:
For a dope, I suppose that Root is a security risk. But, just because a device is not Rooted, does not mean it is secure by any stretch of the imagination. Truthfully, they are more unsecured if locked out from the user. That is, if the person is not a dope. What I am saying is that your advice, for the OP to take every update and not Root, was not really that helpful. If the OP installed an app that was a risk, then all the updates and non Root, will not help them. Now, if you were to show them, that if they were to Root, and use certain apps and modules on their device. Then they could keep a better eye out for potential problems. But, even if they did as I just said. If the OP is being a dope, and installing apps that, let's say, they obtained from a torrent site. Then, well, dope would be a fitting title for them as well.
And, if those recognized developers stated that Root was not good at all. Then yes, dope would be a fitting application of the word. Root is only bad for those that are dopes.
I believe that you inadvertently called the OP a dope. You did not help them all that well. What you did was help them to get rid of the problem temporarily. Do we know who apps are on their device? It would be a good idea to know these things. Also, where did they get these apps from? Kind of a big deal there.
But, if you were wondering what it is that I am talking about in regards to xposed. Look it up.
http://repo.xposed.info/module/de.robv.android.xposed.installer
I suggest the OP do the same. As well as anyone else who is having g issues. Now, knowing about xposed and the modules that can accompany it. Will not fully protect anyone from blatant stupidity. Read, read, read. And practice safe device use. There are so many avenues to protecting g ones self. But a big one that anyone can do. Don't download from shady places. Though, it is even very possible to get in trouble from apps from the Play store. Knowing what apps are asking for what permissions is important. What bothered me about your post is that you in the same post, stated for them to unlock the bootloader and then, to not root. Verizon and AT&T are advocates of the no Root behavior. And that sickens me. As well as many others. Instead of helping g people to see the dangers. They are told to do the most simplest of tasks, not to Root. And that they would be fine. Absolutely and completely false and misleading. Now, and again, for a dope. I suppose this would be fine. Though, it is not helpful. Education into matters are. One needs to seek out the underlying issue first. Then attempt to educate. As far as calling you a dope, I do humbly apologize for my Choi e of words. You did not deserve that. It would have been just fine for me to build onto what you suggested. Which was good advice. So, I am sorry. And yes, I am very much a dope at times .
Sent from my SM-N910V using Tapatalk
Click to expand...
Click to collapse
Humble apology accepted.
You may not like AT&T and Verizon for their tight stance against rooting.I don't like that as well. They're filling their devices with their bloatware and excluding some very useful features from their customers like hotspot for free. However, Anyone who owns an operator variant of a specific device have already signed a contract with his operator already accepted their terms and that's why they get their bloated and controlled devices for cheaper prices in long term instead of paying full in cash. That said, i see nothing wrong with AT&T or Verizon's policy of keeping their devices locked to death since rooting would take a stake from their business and that was not their agreement with their customers. This is not the subject of this thread for sure. Should add, i see nothing wrong if a contracted owner a device wants to take full potencial out of it by rooting since it is the only way for them to get rid of bs in their devices. This is another discussion, not related to this thread.
I will use the word " regular user " instead of "dope" since nobody have to be knowledgeful about android security. Being someone without a clue of android security wouldn't make them a "dope". I currently sport a Moto Maxx, a bootloader unlockable variant of Verizon Droid Turbo sold in Brazil. I paid about 150$ more just to be free of Verizon Bloatware for the exact same hardware. I could have paid 150$ less and bought a Verizon Droid Turbo but i didn't just because i knew i would have Verizons' bs running in my phone every second. There used to be a time for me when rooting was a must with android because i used to own devices bloated with Motoblur, having low amount of ram and storage as well as unavailbility of disabling/deleting of unwanted apps. Now, i have 3gb of ram and 64gb storage with near Vanilla Android experience with my phone. I asked myself, what the heck do i need rooting for ? The answer was easy : nothing.
Lets say, android is an apartment, the root is the key to its door, xposed is the "watchdog" and hacker is the "thief". Would you keep the door unlocked and rely on a dog for its security ? I personally wouldn't do that cause the dogs can be fooled easily by a piece of meat and most importantly they have no responsibility at all. After all, It is just a dog serving for free without any responsibility. I couldn't ask for insurance as well cause i was the one who kept the door unlocked. I am also aware that any door can be opened without a key and the dog can be bypassed easily and the hacker can get whatever he wants. Things will happen if they're destined to be happen, we can't avoid some. Still, it is always our responsibility to keep the door locked in the first place and take counter measurements against. That was what i was pointing in my post.
Disabling USB debugging is the first thing one should do if there're concerns about security and this is not coming from a "dope" but security experts of android. :good:
Semseddin said:
Lets say, android is an apartment, the root is the key to its door, xposed is the "watchdog" and hacker is the "thief". Would you keep the door unlocked and rely on a dog for its security ? I personally wouldn't do that cause the dogs can be fooled easily by a piece of meat and most importantly they have no responsibility at all. After all, It is just a dog serving for free without any responsibility. I couldn't ask for insurance as well cause i was the one who kept the door unlocked. I am also aware that any door can be opened without a key and the dog can be bypassed easily and the hacker can get whatever he wants. Things will happen if they're destined to be happen, we can't avoid some. Still, it is always our responsibility to keep the door locked in the first place and take counter measurements against. That was what i was pointing in my post.
Disabling USB debugging is the first thing one should do if there're concerns about security and this is not coming from a "dope" but security experts of android. :good:
Click to expand...
Click to collapse
To show how ridiculously and persistently wrong you are, I am going to use your above example. If root is your key, then what you are doing is giving that key to Google and device manufacturer, while throwing your own copy away. In your own apartment, you are only allowed to go where google and verizon let you. This makes no sense whatsoever, unless the apartment owner is a real dope (no personal offence meant).
Disabling usb debugging also sounds like an aria from the same opera. If the device is on your person, this provides no additional security at all, as usb debugging is only relevant when your phone is connected to computer. If someone physically takes your device, it would take 10 seconds to enable debugging.
Root provides you an opportunity to control your device and restrict system apps, thereby reducing possibilities for hackers to take over your phone... As I have already mentioned before, every operating system provides root access to users. The only reason it is not done on smart phones is becase manufacturers, carriers and OS providers want to turn users into walking advertising beacon-dopes. Again, no offence meant...
optimumpro said:
To show how ridiculously and persistently wrong you are, I am going to use your above example. If root is your key, then what you are doing is giving that key to Google and device manufacturer, while throwing your own copy away. In your own apartment, you are only allowed to go where google and verizon let you. This makes no sense whatsoever, unless the apartment owner is a real dope (no personal offence meant).
Disabling usb debugging also sounds like an aria from the same opera. If the device is on your person, this provides no additional security at all, as usb debugging is only relevant when your phone is connected to computer. If someone physically takes your device, it would take 10 seconds to enable debugging.
Root provides you an opportunity to control your device and restrict system apps, thereby reducing possibilities for hackers to take over your phone... As I have already mentioned before, every operating system provides root access to users. The only reason it is not done on smart phones is becase manufacturers, carriers and OS providers want to turn users into walking advertising beacon-dopes. Again, no offence meant...
Click to expand...
Click to collapse
I see your point, respect it but disagree. Your example doesn't really work with my logic since you're putting players like Google/Verizon in the same league with an hacker. Yes, they for sure have control over their software since they're the one who created Android and offered the hardware along with an oem in the first place. These big companies are not like 3rd party devs who are irresponsible for any their actions.. If you happen to have sensetive privacy trust issues with Google, leave any android device out, you wouldn't even use google search in your pc.
A hacker having pyshical access to a device who would enable USB debugging in 5 seconds. is this what we're really talking about ? Anyone who have a device in hand doesn't need to be a hacker to get data from it. Have a coffee with the target sitting next to to him, memorize his passcode Done. Another way is to flash twrp and give some adb shell commands to bypass any lockscreen code. Done. USB debugging ON help with apk rooters and computer based root exploits as well.They rely on usb debugging to be on. You're hacked in no time.
I just can't trust any 3rd party dev more than my device manufacturer / operating system provider and network provider. I think the same for you like you're persistently and ridiciolusly wrong by giving too much credit to some unknown sources instead of those who have an actual business address. :good:
Just kiss each other already or dont say anything.
This thread is made by someone who needs help and you two both are taking it off topic instead of helping him. Now out of respect for that user, stop this endless conversation.
Semseddin said:
I see your point, respect it but disagree. Your example doesn't really work with my logic since you're putting players like Google/Verizon in the same league with an hacker. Yes, they for sure have control over their software since they're the one who created Android and offered the hardware along with an oem in the first place. These big companies are not like 3rd party devs who are irresponsible for any their actions.. If you happen to have sensetive privacy trust issues with Google, leave any android device out, you wouldn't even use google search in your pc.
A hacker having pyshical access to a device who would enable USB debugging in 5 seconds. is this what we're really talking about ? Anyone who have a device in hand doesn't need to be a hacker to get data from it. Have a coffee with the target sitting next to to him, memorize his passcode Done. Another way is to flash twrp and give some adb shell commands to bypass any lockscreen code. Done. USB debugging ON help with apk rooters and computer based root exploits as well.They rely on usb debugging to be on. You're hacked in no time.
I just can't trust any 3rd party dev more than my device manufacturer / operating system provider and network provider. I think the same for you like you're persistently and ridiciolusly wrong by giving too much credit to some unknown sources instead of those who have an actual business address. :good:
Click to expand...
Click to collapse
This is not about respect, disrespect or disagreements. The facts (not opinions) remain: every operating system on Earth provides root or administrative privileges to users. However, it is not given to the same user when he turns to a smartphone. There is no security reason whatsoever why a user has root on computer and no root on a smartphone.
As I have already said, there are plenty of non-security reasons for the above: the main one being to prevent the user from removing advertising junk and spying malware inserted there by manufacturers, carriers and software providers. Kids love it (above three) and Mother (NSA) approves...
Every argument against root invalidates itself when applied to computer OS: remember the user is the same.
@its the peanut
Please stop patronizing. This is a security discussion thread and we discuss security, which is beneficial to the poor guy, the OP... :silly:
Semseddin, what do you do to stop fastboot?
rooting and knowledge go hand in hand, the OP states device is rooted, but sounds like hasn't got the interest to know what's behind the process. that is why we don't have the slightest piece of evidence that his device has been compromised. just the users opinion that it has.
having su and adb debugging at least allows them to logcat.
Hi guys,
I'm a new user, I have a problem to which, when talking to a friend, he recommended me to register here and ask about my issue, as there seems to be plenty Android Experts that may be able to provide me a straight answer or give me hope.
My dad just passed away, I still can't believe it happened, given the fact that he wasn't too old... but going back on topic, his phone is a Redmi Note 4 that I ordered him around two years ago, he lived abroad and was a regular user, he never messed up with settings or anything, just stock MIUI with the updates that were sent as far as he mentioned me last time we could speak about his phone. What I would like to know is if it would be possible to recover his phone data, what me and my sisters care for the most are his pictures, we want to recover them and save them in a place where we have access to.
However, while searching on many websites, there are many Android Data Recovery software but they always request me to enable the USB debugging, but it is impossible for me, as the phone has a Pattern/Fingerprint lock.
Also, found several software that claim to remove your screen lock without deleting the device contents but when I'm going to the unlock step, there is a prompt that I have to confirm to delete all the information. And I've downloaded more than five software for each, the last one I downloaded is called Dr. Fone from Wondershare; I sent an email to them asking if I have to purchase the product to get that feature but I have not received any reply yet.
Basically, the phone is locked without USB Debugging, and I cannot access the files in the phone which is all we want.
Does anyone knows of a way to unlock it?
I'd even pay if it is necessary, I just haven't purchased the software mentioned above because I can't find if they are real or are just scam, there isn't like much information about them. Or has anyone purchased or successfully used any of those softwares?
The model is a Redmi Note 4 I believe it was the Global Version, with MIUI 8.1, but I'm not sure.
I'm getting a bit frustrated, maybe my dad doesn't want us to unlock his phone and that is why I cannot find a way, but I would like to know if it is possible.
I really appreciate your time, I'm sorry for the long text, if there is anything that maybe I'm missing, please let me know.
Thanks in advance
Javier
Thjavo said:
Hi guys,
I'm a new user, I have a problem to which, when talking to a friend, he recommended me to register here and ask about my issue, as there seems to be plenty Android Experts that may be able to provide me a straight answer or give me hope.
My dad just passed away, I still can't believe it happened, given the fact that he wasn't too old... but going back on topic, his phone is a Redmi Note 4 that I ordered him around two years ago, he lived abroad and was a regular user, he never messed up with settings or anything, just stock MIUI with the updates that were sent as far as he mentioned me last time we could speak about his phone. What I would like to know is if it would be possible to recover his phone data, what me and my sisters care for the most are his pictures, we want to recover them and save them in a place where we have access to.
However, while searching on many websites, there are many Android Data Recovery software but they always request me to enable the USB debugging, but it is impossible for me, as the phone has a Pattern/Fingerprint lock.
Also, found several software that claim to remove your screen lock without deleting the device contents but when I'm going to the unlock step, there is a prompt that I have to confirm to delete all the information. And I've downloaded more than five software for each, the last one I downloaded is called Dr. Fone from Wondershare; I sent an email to them asking if I have to purchase the product to get that feature but I have not received any reply yet.
Basically, the phone is locked without USB Debugging, and I cannot access the files in the phone which is all we want.
Does anyone knows of a way to unlock it?
I'd even pay if it is necessary, I just haven't purchased the software mentioned above because I can't find if they are real or are just scam, there isn't like much information about them. Or has anyone purchased or successfully used any of those softwares?
The model is a Redmi Note 4 I believe it was the Global Version, with MIUI 8.1, but I'm not sure.
I'm getting a bit frustrated, maybe my dad doesn't want us to unlock his phone and that is why I cannot find a way, but I would like to know if it is possible.
I really appreciate your time, I'm sorry for the long text, if there is anything that maybe I'm missing, please let me know.
Thanks in advance
Javier
Click to expand...
Click to collapse
I understand your situation, I lost my father a few years ago. It is possible to recover the data from your dad's phone, but, unfortunately, it is against the forum rules here to help with cracking a phone to retrieve data that does not belong to you. The reason why it is against the rules, even in your unfortunate situation, is because anything we tell you could be seen and used by other people to break into devices that do not belong to them.
Another factor is, we don't know if what you tell us is actually true or not. That does not mean that you are deceiving us, it just means we have no way of knowing and we can't just take your word for it.
These reasons make it unacceptable for anyone in this forum to help you. It's all about security and maintaining security, regardless of the situation, and it is somewhat a legal issue. Helping crack the device could be a liability against XDA or the members helping you. A member or user can choose to compromise their own security but we can't help with devices that are not theirs.
It is best if you didn't ask this question here and it is pointless for you to try making another thread about this issue with different wording because all of your threads and posts can be viewed from your user profile page. It is also pointless to try making another username to post this issue again with different wording because the moderators and Admin can see that it is still you with a different name.
I know it sucks, but anyone that helps you will be violating the forum rules. I'm not saying that you can't get this done, I'm just saying no one HERE can legitimately help you. I would try linking you to other places that can help you, but even that might be pushing the rules a bit.
Sent from my SM-S767VL using Tapatalk
each device has a google account (and maybe a xiaomi account). you can check from PC if there is the google password saved in browser. if not, each google account has a fallback email address where you may be able to request a (google) password reset. from google you can lock the phone with temporary password, then unlock the screen with temporary password. if you recently changed the google password before, you need to wait at least 72 hours with internet connection. besides this you can check photos.google.com or drive.google.com for any backups.
without knowing the google account, you still can try to bruteforce the pattern with Teensy or Hak5 USB Rubber Ducky microcontroller connected via USB OTG adapter. if the phone does not support USB OTG there are more expensive solutions like XPIN Clip (this is just a common hint, the important part is the code for microcontroller which i don't share here). also there might be a chance to flash TWRP custom recovery in EDL Mode without unlocking the bootloader or factory reset via exploit, and TWRP might be able to decrypt userdata partition with default_password
deleted