Help with Data Recovery - General Questions and Answers

Hi guys,
I'm a new user, I have a problem to which, when talking to a friend, he recommended me to register here and ask about my issue, as there seems to be plenty Android Experts that may be able to provide me a straight answer or give me hope.
My dad just passed away, I still can't believe it happened, given the fact that he wasn't too old... but going back on topic, his phone is a Redmi Note 4 that I ordered him around two years ago, he lived abroad and was a regular user, he never messed up with settings or anything, just stock MIUI with the updates that were sent as far as he mentioned me last time we could speak about his phone. What I would like to know is if it would be possible to recover his phone data, what me and my sisters care for the most are his pictures, we want to recover them and save them in a place where we have access to.
However, while searching on many websites, there are many Android Data Recovery software but they always request me to enable the USB debugging, but it is impossible for me, as the phone has a Pattern/Fingerprint lock.
Also, found several software that claim to remove your screen lock without deleting the device contents but when I'm going to the unlock step, there is a prompt that I have to confirm to delete all the information. And I've downloaded more than five software for each, the last one I downloaded is called Dr. Fone from Wondershare; I sent an email to them asking if I have to purchase the product to get that feature but I have not received any reply yet.
Basically, the phone is locked without USB Debugging, and I cannot access the files in the phone which is all we want.
Does anyone knows of a way to unlock it?
I'd even pay if it is necessary, I just haven't purchased the software mentioned above because I can't find if they are real or are just scam, there isn't like much information about them. Or has anyone purchased or successfully used any of those softwares?
The model is a Redmi Note 4 I believe it was the Global Version, with MIUI 8.1, but I'm not sure.
I'm getting a bit frustrated, maybe my dad doesn't want us to unlock his phone and that is why I cannot find a way, but I would like to know if it is possible.
I really appreciate your time, I'm sorry for the long text, if there is anything that maybe I'm missing, please let me know.
Thanks in advance
Javier

Thjavo said:
Hi guys,
I'm a new user, I have a problem to which, when talking to a friend, he recommended me to register here and ask about my issue, as there seems to be plenty Android Experts that may be able to provide me a straight answer or give me hope.
My dad just passed away, I still can't believe it happened, given the fact that he wasn't too old... but going back on topic, his phone is a Redmi Note 4 that I ordered him around two years ago, he lived abroad and was a regular user, he never messed up with settings or anything, just stock MIUI with the updates that were sent as far as he mentioned me last time we could speak about his phone. What I would like to know is if it would be possible to recover his phone data, what me and my sisters care for the most are his pictures, we want to recover them and save them in a place where we have access to.
However, while searching on many websites, there are many Android Data Recovery software but they always request me to enable the USB debugging, but it is impossible for me, as the phone has a Pattern/Fingerprint lock.
Also, found several software that claim to remove your screen lock without deleting the device contents but when I'm going to the unlock step, there is a prompt that I have to confirm to delete all the information. And I've downloaded more than five software for each, the last one I downloaded is called Dr. Fone from Wondershare; I sent an email to them asking if I have to purchase the product to get that feature but I have not received any reply yet.
Basically, the phone is locked without USB Debugging, and I cannot access the files in the phone which is all we want.
Does anyone knows of a way to unlock it?
I'd even pay if it is necessary, I just haven't purchased the software mentioned above because I can't find if they are real or are just scam, there isn't like much information about them. Or has anyone purchased or successfully used any of those softwares?
The model is a Redmi Note 4 I believe it was the Global Version, with MIUI 8.1, but I'm not sure.
I'm getting a bit frustrated, maybe my dad doesn't want us to unlock his phone and that is why I cannot find a way, but I would like to know if it is possible.
I really appreciate your time, I'm sorry for the long text, if there is anything that maybe I'm missing, please let me know.
Thanks in advance
Javier
Click to expand...
Click to collapse
I understand your situation, I lost my father a few years ago. It is possible to recover the data from your dad's phone, but, unfortunately, it is against the forum rules here to help with cracking a phone to retrieve data that does not belong to you. The reason why it is against the rules, even in your unfortunate situation, is because anything we tell you could be seen and used by other people to break into devices that do not belong to them.
Another factor is, we don't know if what you tell us is actually true or not. That does not mean that you are deceiving us, it just means we have no way of knowing and we can't just take your word for it.
These reasons make it unacceptable for anyone in this forum to help you. It's all about security and maintaining security, regardless of the situation, and it is somewhat a legal issue. Helping crack the device could be a liability against XDA or the members helping you. A member or user can choose to compromise their own security but we can't help with devices that are not theirs.
It is best if you didn't ask this question here and it is pointless for you to try making another thread about this issue with different wording because all of your threads and posts can be viewed from your user profile page. It is also pointless to try making another username to post this issue again with different wording because the moderators and Admin can see that it is still you with a different name.
I know it sucks, but anyone that helps you will be violating the forum rules. I'm not saying that you can't get this done, I'm just saying no one HERE can legitimately help you. I would try linking you to other places that can help you, but even that might be pushing the rules a bit.
Sent from my SM-S767VL using Tapatalk

each device has a google account (and maybe a xiaomi account). you can check from PC if there is the google password saved in browser. if not, each google account has a fallback email address where you may be able to request a (google) password reset. from google you can lock the phone with temporary password, then unlock the screen with temporary password. if you recently changed the google password before, you need to wait at least 72 hours with internet connection. besides this you can check photos.google.com or drive.google.com for any backups.
without knowing the google account, you still can try to bruteforce the pattern with Teensy or Hak5 USB Rubber Ducky microcontroller connected via USB OTG adapter. if the phone does not support USB OTG there are more expensive solutions like XPIN Clip (this is just a common hint, the important part is the code for microcontroller which i don't share here). also there might be a chance to flash TWRP custom recovery in EDL Mode without unlocking the bootloader or factory reset via exploit, and TWRP might be able to decrypt userdata partition with default_password

deleted

Related

Phone hacked need advise and guidance

Hi
I know that this will sound like another hacked story but I know what to do.
My phone got hacked couple of months back.i didnt know it was untill the hacker started to leave clues. It was then that i started really payibg attention to everything going on. but keeping quiet abort it so that he or she thinks i didn't know
I know of 3 incidents that may have conpronised my security coupled by the fact that I did not practice password hygiene or unique ones for all accounts. I know that its totally my fault and i am not goings to blane Android os. So please dont think of this as one of tjose posts
What i now need is help in understanding what tondo next.
Little details on what happens, lets say i get search for some one on Facebook. The same is Charles smith, I Finish off my search and open Instagram boom i see a pictures where recommended shows a google search page where Charles is written and the Google auto complete is giving options .
Happened twice
I tumlr and I don't really post anything in fact My blog is totally blank. Suddenly i have people followings me and they tend of hame my nick name as their user id .the id displays my WhatsApp status updates.
These and just two examples i have more but i think everyone gets whats going on.
things i have done to prevent such occurences factory formatting the phones mac abd router. Gotten new routers and ready to flash a custom firmware for them.
Password changes .everything.wps2 aes wifi password with random numbers upper case lower case n symbols
Passwords are written on paper without a electronic backup and under lock and key.
I thought that maybe its a key logger but i took my moto x2 n moto e2 to the service center and got them to re load official software.
Two days later bam the same thing.
Any suggestion on where the weakness is ?
The problem is that I am kind of tired if thi
Sent from my XT1092 using XDA Forums
Check account sync settings if it is on more applications can use various private data.
Sent from my A0001 using XDA Free mobile app
i dont understand?
can u explain , i have sync on should I not have it
on different note does anyone suggest rooting and installing something that can isolate and restrict data from being accessed. now i know that exposed does that and marshmallow will work that out. but any other guidance ?
Did you use a virus or malware scanner?
Are there any apps you didn't install on your phone?
If i were you, i would start with doing the following steps by their exact order to get rid of the hacker and operate on a "safe" system.
1- Backup personal files to pc and deep scan them with virus scanner, make sure they're clean.
2- Unlock the bootloader of device and flash every image manually with fastboot from stock factory image.
3- After flashing the images, go to stock recovery and wipe data / factory reset and wipe cache for a complete, untouched system.
4- Change account passwords with stuff that are unrelated to you. I mean if you made a google search for firedance, don't include dance or fire in any your passwords.
* also change the " forgot my password " questions and their answers.
5- Once you boot the system, download any ota packages from the manufacturer to be sure you'd be on a safer and patched software for security.
For future securtity, be sure to check apps permissions before installing anything from google play or external places. Don't root your device and don't enable USB Debugging in developer options. Hope it helps.
Semseddin said:
If i were you, i would start with doing the following steps by their exact order to get rid of the hacker and operate on a "safe" system.
1- Backup personal files to pc and deep scan them with virus scanner, make sure they're clean.
2- Unlock the bootloader of device and flash every image manually with fastboot from stock factory image.
3- After flashing the images, go to stock recovery and wipe data / factory reset and wipe cache for a complete, untouched system.
4- Change account passwords with stuff that are unrelated to you. I mean if you made a google search for firedance, don't include dance or fire in any your passwords.
* also change the " forgot my password " questions and their answers.
5- Once you boot the system, download any ota packages from the manufacturer to be sure you'd be on a safer and patched software for security.
For future securtity, be sure to check apps permissions before installing anything from google play or external places. Don't root your device and don't enable USB Debugging in developer options. Hope it helps.
Click to expand...
Click to collapse
Don't Root your device? Don't check USB debugging? Seriously? That is your answer? Wow, do you work for Verizon or AT&T by some chance? Sorry, but with Root and some nicely placed Xposed modules, this persons phone or tablet would be more safe than anything g Verizon or AT &THE could conjure up. You are a dope! Lol! Seriously, go away. Bother another community. ?
Sent from my SM-N910V using Tapatalk
Jaytronics said:
Don't Root your device? Don't check USB debugging? Seriously? That is your answer? Wow, do you work for Verizon or AT&T by some chance? Sorry, but with Root and some nicely placed Xposed modules, this persons phone or tablet would be more safe than anything g Verizon or AT &THE could conjure up. You are a dope! Lol! Seriously, go away. Bother another community. ?
Sent from my SM-N910V using Tapatalk
Click to expand...
Click to collapse
Pardon me but where does that come from ? Made me laugh. Since this is security forum, the first priority is security not your "nicely put xposed modules whatever that means". It is said many times by security experts rooting an android device removes a big portion of layer of security. I unfortunately don't work for AT&T or Verizon but i wish i worked for them for a nice salary.
This one is coming from the recognized developer and moderator of XDA Android Security forum. Someone who have exploited devices and found vulrenabiliies that you can't even dream of. Lets say i am a "dope" and you're the smart guy. Are jcase, steve kondik dopes as well ?
http://securitywatch.pcmag.com/secu...-have-android-settings-from-a-security-expert
http://www.dailytech.com/CyanogenMod+Creator+Tells+Android+Users+to+Rethink+Rooting/article33058.htm ( yeah, even steve kondik doesn't approve rooting for general users.
https://blog.kaspersky.com/rooting-and-jailbreaking/1979/ " Kasperksky a security platform well known for years are also against rooting.
Think again if you can who is the dope, now, go bother in your nicely put xposed modules forums for the sake of security. :good:
Semseddin said:
Pardon me but where does that come from ? Made me laugh. Since this is security forum, the first priority is security not your "nicely put xposed modules whatever that means". It is said many times by security experts rooting an android device removes a big portion of layer of security. I unfortunately don't work for AT&T or Verizon but i wish i worked for them for a nice salary.
This one is coming from the recognized developer and moderator of XDA Android Security forum. Someone who have exploited devices and found vulrenabiliies that you can't even dream of. Lets say i am a "dope" and you're the smart guy. Are jcase, steve kondik dopes as well ?
http://securitywatch.pcmag.com/secu...-have-android-settings-from-a-security-expert
http://www.dailytech.com/CyanogenMod+Creator+Tells+Android+Users+to+Rethink+Rooting/article33058.htm ( yeah, even steve kondik doesn't approve rooting for general users.
https://blog.kaspersky.com/rooting-and-jailbreaking/1979/ " Kasperksky a security platform well known for years are also against rooting.
Think again if you can who is the dope, now, go bother in your nicely put xposed modules forums for the sake of security. :good:
Click to expand...
Click to collapse
For a dope, I suppose that Root is a security risk. But, just because a device is not Rooted, does not mean it is secure by any stretch of the imagination. Truthfully, they are more unsecured if locked out from the user. That is, if the person is not a dope. What I am saying is that your advice, for the OP to take every update and not Root, was not really that helpful. If the OP installed an app that was a risk, then all the updates and non Root, will not help them. Now, if you were to show them, that if they were to Root, and use certain apps and modules on their device. Then they could keep a better eye out for potential problems. But, even if they did as I just said. If the OP is being a dope, and installing apps that, let's say, they obtained from a torrent site. Then, well, dope would be a fitting title for them as well.
And, if those recognized developers stated that Root was not good at all. Then yes, dope would be a fitting application of the word. Root is only bad for those that are dopes.
I believe that you inadvertently called the OP a dope. You did not help them all that well. What you did was help them to get rid of the problem temporarily. Do we know who apps are on their device? It would be a good idea to know these things. Also, where did they get these apps from? Kind of a big deal there.
But, if you were wondering what it is that I am talking about in regards to xposed. Look it up.
http://repo.xposed.info/module/de.robv.android.xposed.installer
I suggest the OP do the same. As well as anyone else who is having g issues. Now, knowing about xposed and the modules that can accompany it. Will not fully protect anyone from blatant stupidity. Read, read, read. And practice safe device use. There are so many avenues to protecting g ones self. But a big one that anyone can do. Don't download from shady places. Though, it is even very possible to get in trouble from apps from the Play store. Knowing what apps are asking for what permissions is important. What bothered me about your post is that you in the same post, stated for them to unlock the bootloader and then, to not root. Verizon and AT&T are advocates of the no Root behavior. And that sickens me. As well as many others. Instead of helping g people to see the dangers. They are told to do the most simplest of tasks, not to Root. And that they would be fine. Absolutely and completely false and misleading. Now, and again, for a dope. I suppose this would be fine. Though, it is not helpful. Education into matters are. One needs to seek out the underlying issue first. Then attempt to educate. As far as calling you a dope, I do humbly apologize for my Choi e of words. You did not deserve that. It would have been just fine for me to build onto what you suggested. Which was good advice. So, I am sorry. And yes, I am very much a dope at times .
Sent from my SM-N910V using Tapatalk
Jaytronics said:
For a dope, I suppose that Root is a security risk. But, just because a device is not Rooted, does not mean it is secure by any stretch of the imagination. Truthfully, they are more unsecured if locked out from the user. That is, if the person is not a dope. What I am saying is that your advice, for the OP to take every update and not Root, was not really that helpful. If the OP installed an app that was a risk, then all the updates and non Root, will not help them. Now, if you were to show them, that if they were to Root, and use certain apps and modules on their device. Then they could keep a better eye out for potential problems. But, even if they did as I just said. If the OP is being a dope, and installing apps that, let's say, they obtained from a torrent site. Then, well, dope would be a fitting title for them as well.
And, if those recognized developers stated that Root was not good at all. Then yes, dope would be a fitting application of the word. Root is only bad for those that are dopes.
I believe that you inadvertently called the OP a dope. You did not help them all that well. What you did was help them to get rid of the problem temporarily. Do we know who apps are on their device? It would be a good idea to know these things. Also, where did they get these apps from? Kind of a big deal there.
But, if you were wondering what it is that I am talking about in regards to xposed. Look it up.
http://repo.xposed.info/module/de.robv.android.xposed.installer
I suggest the OP do the same. As well as anyone else who is having g issues. Now, knowing about xposed and the modules that can accompany it. Will not fully protect anyone from blatant stupidity. Read, read, read. And practice safe device use. There are so many avenues to protecting g ones self. But a big one that anyone can do. Don't download from shady places. Though, it is even very possible to get in trouble from apps from the Play store. Knowing what apps are asking for what permissions is important. What bothered me about your post is that you in the same post, stated for them to unlock the bootloader and then, to not root. Verizon and AT&T are advocates of the no Root behavior. And that sickens me. As well as many others. Instead of helping g people to see the dangers. They are told to do the most simplest of tasks, not to Root. And that they would be fine. Absolutely and completely false and misleading. Now, and again, for a dope. I suppose this would be fine. Though, it is not helpful. Education into matters are. One needs to seek out the underlying issue first. Then attempt to educate. As far as calling you a dope, I do humbly apologize for my Choi e of words. You did not deserve that. It would have been just fine for me to build onto what you suggested. Which was good advice. So, I am sorry. And yes, I am very much a dope at times .
Sent from my SM-N910V using Tapatalk
Click to expand...
Click to collapse
Humble apology accepted.
You may not like AT&T and Verizon for their tight stance against rooting.I don't like that as well. They're filling their devices with their bloatware and excluding some very useful features from their customers like hotspot for free. However, Anyone who owns an operator variant of a specific device have already signed a contract with his operator already accepted their terms and that's why they get their bloated and controlled devices for cheaper prices in long term instead of paying full in cash. That said, i see nothing wrong with AT&T or Verizon's policy of keeping their devices locked to death since rooting would take a stake from their business and that was not their agreement with their customers. This is not the subject of this thread for sure. Should add, i see nothing wrong if a contracted owner a device wants to take full potencial out of it by rooting since it is the only way for them to get rid of bs in their devices. This is another discussion, not related to this thread.
I will use the word " regular user " instead of "dope" since nobody have to be knowledgeful about android security. Being someone without a clue of android security wouldn't make them a "dope". I currently sport a Moto Maxx, a bootloader unlockable variant of Verizon Droid Turbo sold in Brazil. I paid about 150$ more just to be free of Verizon Bloatware for the exact same hardware. I could have paid 150$ less and bought a Verizon Droid Turbo but i didn't just because i knew i would have Verizons' bs running in my phone every second. There used to be a time for me when rooting was a must with android because i used to own devices bloated with Motoblur, having low amount of ram and storage as well as unavailbility of disabling/deleting of unwanted apps. Now, i have 3gb of ram and 64gb storage with near Vanilla Android experience with my phone. I asked myself, what the heck do i need rooting for ? The answer was easy : nothing.
Lets say, android is an apartment, the root is the key to its door, xposed is the "watchdog" and hacker is the "thief". Would you keep the door unlocked and rely on a dog for its security ? I personally wouldn't do that cause the dogs can be fooled easily by a piece of meat and most importantly they have no responsibility at all. After all, It is just a dog serving for free without any responsibility. I couldn't ask for insurance as well cause i was the one who kept the door unlocked. I am also aware that any door can be opened without a key and the dog can be bypassed easily and the hacker can get whatever he wants. Things will happen if they're destined to be happen, we can't avoid some. Still, it is always our responsibility to keep the door locked in the first place and take counter measurements against. That was what i was pointing in my post.
Disabling USB debugging is the first thing one should do if there're concerns about security and this is not coming from a "dope" but security experts of android. :good:
Semseddin said:
Lets say, android is an apartment, the root is the key to its door, xposed is the "watchdog" and hacker is the "thief". Would you keep the door unlocked and rely on a dog for its security ? I personally wouldn't do that cause the dogs can be fooled easily by a piece of meat and most importantly they have no responsibility at all. After all, It is just a dog serving for free without any responsibility. I couldn't ask for insurance as well cause i was the one who kept the door unlocked. I am also aware that any door can be opened without a key and the dog can be bypassed easily and the hacker can get whatever he wants. Things will happen if they're destined to be happen, we can't avoid some. Still, it is always our responsibility to keep the door locked in the first place and take counter measurements against. That was what i was pointing in my post.
Disabling USB debugging is the first thing one should do if there're concerns about security and this is not coming from a "dope" but security experts of android. :good:
Click to expand...
Click to collapse
To show how ridiculously and persistently wrong you are, I am going to use your above example. If root is your key, then what you are doing is giving that key to Google and device manufacturer, while throwing your own copy away. In your own apartment, you are only allowed to go where google and verizon let you. This makes no sense whatsoever, unless the apartment owner is a real dope (no personal offence meant).
Disabling usb debugging also sounds like an aria from the same opera. If the device is on your person, this provides no additional security at all, as usb debugging is only relevant when your phone is connected to computer. If someone physically takes your device, it would take 10 seconds to enable debugging.
Root provides you an opportunity to control your device and restrict system apps, thereby reducing possibilities for hackers to take over your phone... As I have already mentioned before, every operating system provides root access to users. The only reason it is not done on smart phones is becase manufacturers, carriers and OS providers want to turn users into walking advertising beacon-dopes. Again, no offence meant...
optimumpro said:
To show how ridiculously and persistently wrong you are, I am going to use your above example. If root is your key, then what you are doing is giving that key to Google and device manufacturer, while throwing your own copy away. In your own apartment, you are only allowed to go where google and verizon let you. This makes no sense whatsoever, unless the apartment owner is a real dope (no personal offence meant).
Disabling usb debugging also sounds like an aria from the same opera. If the device is on your person, this provides no additional security at all, as usb debugging is only relevant when your phone is connected to computer. If someone physically takes your device, it would take 10 seconds to enable debugging.
Root provides you an opportunity to control your device and restrict system apps, thereby reducing possibilities for hackers to take over your phone... As I have already mentioned before, every operating system provides root access to users. The only reason it is not done on smart phones is becase manufacturers, carriers and OS providers want to turn users into walking advertising beacon-dopes. Again, no offence meant...
Click to expand...
Click to collapse
I see your point, respect it but disagree. Your example doesn't really work with my logic since you're putting players like Google/Verizon in the same league with an hacker. Yes, they for sure have control over their software since they're the one who created Android and offered the hardware along with an oem in the first place. These big companies are not like 3rd party devs who are irresponsible for any their actions.. If you happen to have sensetive privacy trust issues with Google, leave any android device out, you wouldn't even use google search in your pc.
A hacker having pyshical access to a device who would enable USB debugging in 5 seconds. is this what we're really talking about ? Anyone who have a device in hand doesn't need to be a hacker to get data from it. Have a coffee with the target sitting next to to him, memorize his passcode Done. Another way is to flash twrp and give some adb shell commands to bypass any lockscreen code. Done. USB debugging ON help with apk rooters and computer based root exploits as well.They rely on usb debugging to be on. You're hacked in no time.
I just can't trust any 3rd party dev more than my device manufacturer / operating system provider and network provider. I think the same for you like you're persistently and ridiciolusly wrong by giving too much credit to some unknown sources instead of those who have an actual business address. :good:
Just kiss each other already or dont say anything.
This thread is made by someone who needs help and you two both are taking it off topic instead of helping him. Now out of respect for that user, stop this endless conversation.
Semseddin said:
I see your point, respect it but disagree. Your example doesn't really work with my logic since you're putting players like Google/Verizon in the same league with an hacker. Yes, they for sure have control over their software since they're the one who created Android and offered the hardware along with an oem in the first place. These big companies are not like 3rd party devs who are irresponsible for any their actions.. If you happen to have sensetive privacy trust issues with Google, leave any android device out, you wouldn't even use google search in your pc.
A hacker having pyshical access to a device who would enable USB debugging in 5 seconds. is this what we're really talking about ? Anyone who have a device in hand doesn't need to be a hacker to get data from it. Have a coffee with the target sitting next to to him, memorize his passcode Done. Another way is to flash twrp and give some adb shell commands to bypass any lockscreen code. Done. USB debugging ON help with apk rooters and computer based root exploits as well.They rely on usb debugging to be on. You're hacked in no time.
I just can't trust any 3rd party dev more than my device manufacturer / operating system provider and network provider. I think the same for you like you're persistently and ridiciolusly wrong by giving too much credit to some unknown sources instead of those who have an actual business address. :good:
Click to expand...
Click to collapse
This is not about respect, disrespect or disagreements. The facts (not opinions) remain: every operating system on Earth provides root or administrative privileges to users. However, it is not given to the same user when he turns to a smartphone. There is no security reason whatsoever why a user has root on computer and no root on a smartphone.
As I have already said, there are plenty of non-security reasons for the above: the main one being to prevent the user from removing advertising junk and spying malware inserted there by manufacturers, carriers and software providers. Kids love it (above three) and Mother (NSA) approves...
Every argument against root invalidates itself when applied to computer OS: remember the user is the same.
@its the peanut
Please stop patronizing. This is a security discussion thread and we discuss security, which is beneficial to the poor guy, the OP... :silly:
Semseddin, what do you do to stop fastboot?
rooting and knowledge go hand in hand, the OP states device is rooted, but sounds like hasn't got the interest to know what's behind the process. that is why we don't have the slightest piece of evidence that his device has been compromised. just the users opinion that it has.
having su and adb debugging at least allows them to logcat.

Stolen phone

My wife just called me on a landline to say her Samsung Galaxy S2 I9100 has gone missing. She was working in a tiny charity bookshop, so it was easy to check that it wasn't just dropped, and it goes straight to voicemail. It was double PIN protected on both device and SIM.
It was on Android 4.0.1 - I know, I know, she wouldn't allow me to upgrade it.
Question - I know from experience of flashing a new ROM that Google insists on entering the Google account details again to verify proper ownership. Is this a general Android security procedure, or does it work only on Lollipop/Marshmallow?
Just asking because it will be of some small comfort to know that the thieving scum has a paperweight rather than a phone...
dahawthorne said:
I know from experience of flashing a new ROM that Google insists on entering the Google account details again to verify proper ownership.
Click to expand...
Click to collapse
Incorrect.
I was hoping for something a bit more concrete than that. And it is correct. When I've done a full reset of my phone to flash a new ROM I get "This device has been reset. Please enter your Google credentials" or words to that effect.
I'm happy to have the response, but can someone please give me a sensible one based on knowledge and not guesswork?
dahawthorne said:
I was hoping for something a bit more concrete than that. And it is correct. When I've done a full reset of my phone to flash a new ROM I get "This device has been reset. Please enter your Google credentials" or words to that effect.
I'm happy to have the response, but can someone please give me a sensible one based on knowledge and not guesswork?
Click to expand...
Click to collapse
Oh hey look... no Google account!
You're the one operating on guesswork assuming a Google account is mandatory to use an Android device.
Look, guy, if you have no useful advice to offer me then quit wasting my time...
"Friends
Wakamatsu has not made any friends yet
Befriend Wakamatsu"
Well, am I surprised? I think I'll pass on that offer...
You asked about when a security measure was introduced in Android. I informed you that no such security measure exists.
There is a disconnect between what you want to believe and the reality. First, you refused to accept it. Now, you're angry at me because you have no choice but to accept it.
You want reassurances because of your situation? There is none to be offered here.
dahawthorne said:
My wife just called me on a landline to say her Samsung Galaxy S2 I9100 has gone missing. She was working in a tiny charity bookshop, so it was easy to check that it wasn't just dropped, and it goes straight to voicemail. It was double PIN protected on both device and SIM.
It was on Android 4.0.1 - I know, I know, she wouldn't allow me to upgrade it.
Question - I know from experience of flashing a new ROM that Google insists on entering the Google account details again to verify proper ownership. Is this a general Android security procedure, or does it work only on Lollipop/Marshmallow?
Just asking because it will be of some small comfort to know that the thieving scum has a paperweight rather than a phone...
Click to expand...
Click to collapse
Unless your carrier has a service that allows imei blacklisting, there is nothing you can do. Even if they do, you'll need a solid proof of ownership and that the phone wasn't just lost. If your wife lost her phone, in most cases there is no obligation on the part of the finder to return it. Any other measure won't do anything, as the device could be wiped clean of everything.
Thanks. optimumpro. My service provider has blocked the phone and the SIM, so with any luck the scumbag will get no joy from it. It's also reported with its IMEI on a website (immobilise.com) which the police refer to when items are recovered.
As to my original question, I believe that the function I mentioned started with Android 5.1, so if the thief has the tech knowledge he/she can probably wipe it and install a new ROM, though I hope the IMEI block will prevent use even with other providers.
Pity - it was a nice little phone - my first smartphone.
And thanks for providing a sensible answer - appreciated.
dahawthorne said:
Thanks. optimumpro. My service provider has blocked the phone and the SIM, so with any luck the scumbag will get no joy from it. It's also reported with its IMEI on a website (immobilise.com) which the police refer to when items are recovered.
As to my original question, I believe that the function I mentioned started with Android 5.1, so if the thief has the tech knowledge he/she can probably wipe it and install a new ROM, though I hope the IMEI block will prevent use even with other providers.
Pity - it was a nice little phone - my first smartphone.
And thanks for providing a sensible answer - appreciated.
Click to expand...
Click to collapse
You may want to check ebay, because the phone can be sold to someone from another country. So, with luck you may catch the guy...

Factory Reset Protection - Locked Out

My mother got a Note 7, and gave me her Note Edge to replace the Note 4 I left on the bus. The first thing I did was a factory reset, and I regret it. Reactivation Lock = On.
I can't find a single YouTube video for bypassing this, and this isn't a common subject in specific phone threads on XDA because it's always in instructions to make sure this lock is off in advance.
I'm just hoping that members of this community might have some insight into recent developments to help me here. I still haven't ordered another phone but if it's looking bleak today, then I might have to let this brick sit around a while.
It's on BPC1, I believe? Can't access Accessibility Settings from the getgo, the OTG USB doesn't get a response from it, doesn't show up on ODIN. Some of ya'll r wizards tho so eh, I wont get my hopes up.
Thanks!
sduffy89 said:
My mother got a Note 7, and gave me her Note Edge to replace the Note 4 I left on the bus. The first thing I did was a factory reset, and I regret it. Reactivation Lock = On.
I can't find a single YouTube video for bypassing this, and this isn't a common subject in specific phone threads on XDA because it's always in instructions to make sure this lock is off in advance.
I'm just hoping that members of this community might have some insight into recent developments to help me here. I still haven't ordered another phone but if it's looking bleak today, then I might have to let this brick sit around a while.
It's on BPC1, I believe? Can't access Accessibility Settings from the getgo, the OTG USB doesn't get a response from it, doesn't show up on ODIN. Some of ya'll r wizards tho so eh, I wont get my hopes up.
Thanks!
Click to expand...
Click to collapse
Hi, why not ask your mother for typing in her password to reactivate it? After that you shoult disable reactivation lock an factory reset. Found that:
"If anyone performs the factory reset via the recovery, the phone is more or less inoperable until the original owner signs into his or her Google account on reboot. This means that you have basically no extra steps to factory reset your own device for your own reasons, but a common thief can't do much of anything without knowing your password. "
Ughh. Nobody remembers their login credentials to anything. Everybody's a bunch of goddamn dummies. So much so its also not overlooked that i may have forgotten some basic stuff myself, right?.
I already went thru every frustration of trying to get my mother to remember something. Ends up it's an old email address of my little sister who can't remember the details. Why? I have no clue. smdh
The rightful owners have gifted me this device. Let there be no doubt.
Perhaps you have the address on one of your computers?
Sent from my SM-N915W8 using XDA-Developers mobile app
The Radius Kid said:
Perhaps you have the address on one of your computers?
Sent from my SM-N915W8 using XDA-Developers mobile app
Click to expand...
Click to collapse
Hey, thanks for taking the time to reply. I do appreciate it. Samsung gave the first few characters of the email address. My sister gave us the rest, and the password. And the message response from Samsung at this point is the same as when I enter my own Samsung account email and password. It's not an invalid User ID/Password error, its "Processing Failed", or something, rather.
So she has more email accounts or something. I gave up man. A guy said he could unlock it over Skype, and my father things Samsung will unlock it for him if he has it in his hands next time he's on the phone with him. So I'll just get it back to em. I got a new Note 4 in the mail today, and also finally reported my other one as lost/stolen.
Its as taken care of as it's going to get i suppose.

My sister ran away, but she left her old phone.

My sister ran away yesterday evening and she has no phone on her to track, but she left what appears to be a Samsung j3 behind that she used before she left. This could be what saves her life, I very much need XDAs help here. I have rooted and messed with phones and Odin around 5 years ago so I am very rusty with this stuff. Could someone please guide me on recovering her phones data and/or bypassing the lockscreen?
I S 3 5 0 said:
My sister ran away yesterday evening and she has no phone on her to track, but she left what appears to be a Samsung j3 behind that she used before she left. This could be what saves her life, I very much need XDAs help here. I have rooted and messed with phones and Odin around 5 years ago so I am very rusty with this stuff. Could someone please guide me on recovering her phones data and/or bypassing the lockscreen?
Click to expand...
Click to collapse
Specific model? A while ago on some models you could flash twrp and work to avoid it.
As for bypassing the lock screen, I would suggest not trying to unlock it, some people use the settings so that after enough wrong attempts to unlock the phone, it factory resets.
If the data inside the phone is a priority, take it to a specialist or the relevant authorities ASAP.
I do not suggest trying twrp as in this case, damaging the phone could bring serious
consequences
ThatLatinGuy said:
Specific model? A while ago on some models you could flash twrp and work to avoid it.
As for bypassing the lock screen, I would suggest not trying to unlock it, some people use the settings so that after enough wrong attempts to unlock the phone, it factory resets.
If the data inside the phone is a priority, take it to a specialist or the relevant authorities ASAP.
I do not suggest trying twrp as in this case, damaging the phone could bring serious
consequences
Click to expand...
Click to collapse
I would agree to hand it to the authorities, but the cops already existing 24 hour missing person rule has already killed so many children. I sincerely doubt the phone would find the right hands to access the data within a week, the professionals are right here on the internet across the world.
How do I find out the specific model? Would that be in a safe boot screen? For extra info, it has a removable rear cover and battery.
But what you are saying is there is no way to bypass the lock screen even with twrp?
Based on info I gathered from her search history on her school laptop, she could be on a greyhound. I've already told the authorities but they are quite slow at their job. Time is of the essence with this. Thank you for replying
I S 3 5 0 said:
I would agree to hand it to the authorities, but the cops already existing 24 hour missing person rule has already killed so many children. I sincerely doubt the phone would find the right hands to access the data within a week, the professionals are right here on the internet across the world.
How do I find out the specific model? Would that be in a safe boot screen? For extra info, it has a removable rear cover and battery.
But what you are saying is there is no way to bypass the lock screen even with twrp?
Based on info I gathered from her search history on her school laptop, she could be on a greyhound. I've already told the authorities but they are quite slow at their job. Time is of the essence with this. Thank you for replying
Click to expand...
Click to collapse
Turn the phone off , take the battery out , it should have something written on it like
smj30km
In some older models and versions you could use twrp to explore the contents of the phone , and even edit the system files to remove the lock , you cannot remove the google account this way mind you .
However given the stakes I again suggest against it as if something goes wrong , the phone will be wiped.
If you wish to do so anyway I will leave the links to the posts , but I will not be able to help if something goes wrong.
ThatLatinGuy said:
Turn the phone off , take the battery out , it should have something written on it like
smj30km
In some older models and versions you could use twrp to explore the contents of the phone , and even edit the system files to remove the lock , you cannot remove the google account this way mind you .
However given the stakes I again suggest against it as if something goes wrong , the phone will be wiped.
If you wish to do so anyway I will leave the links to the posts , but I will not be able to help if something goes wrong.
Click to expand...
Click to collapse
I forgot all the issues surrounding the google account. That pretty much leaves me with no options, I will have to just give it up to the authorities. Thank you for the good advice. Would it be appropriate to simply take this post down
I truly hope you cand find her , sorry if I came across as rude or not willing to help , but the fact that as you said , the phone is the only thing that may help you makes it difficult to recommend a twrp flash or even rooting the phone as this may damage it .
Wish you the best
ThatLatinGuy said:
Turn the phone off , take the battery out , it should have something written on it like
smj30km
In some older models and versions you could use twrp to explore the contents of the phone , and even edit the system files to remove the lock , you cannot remove the google account this way mind you .
However given the stakes I again suggest against it as if something goes wrong , the phone will be wiped.
If you wish to do so anyway I will leave the links to the posts , but I will not be able to help if something goes wrong.
Click to expand...
Click to collapse
I forgot all the issues surrounding the google account. That pretty much leaves me with no options, I will have to just give it up to the authorities. Thank you for the good advice. Would it be appropriate to simply take this post down

Used phone without pin code details

I've recently (thankfully without too much of a cost) bought a used Huawei Honor 8S phone.
I didn't get any details about the phone's previous owner (yes, I know that sounds dodgy AF) and have obviously come up against pin code verification issues, meaning i've got myself a very light-weight brick and being a 6 digit number, this would take a couple of lifetimes to crack
I have tried contacting Huawei (i'd make a terrible criminal), asking them if they could contact the original owner, so I could swap details but without any luck.
Of course, I can understand their position on this but I really don't think the phone was stolen and I certainly wouldn't have contacted them via my real email had I thought this was the case.
Anyway, I would of course like to get the phone going again. Is there any legitimate way of doing this or am I wasting my time?
My current phone (HTC One M9) hasn't allowed me to access the google play store for a couple of years now, neither will it connect to the internet via giffgaff, although it works fine from my home router.
Anyway, I thought the Huawei would be a fine replacement that wasn't too crap to be worth bothering with.
I'm not particularly technical but any help would be greatly appreciated.
Watch this video
jwoegerbauer said:
Watch this video
Click to expand...
Click to collapse
Thanks for replying but i've never found any of these vids that good. Have you watched it yourself and tried following along?
You'll be lost within the first few minutes.
What I really need is a comprehensive guide that allows me to ask questions when I come to stumbling blocks....which is inevitable.
Does anyone have such a link?
sijarvis said:
Does anyone have such a link?
Click to expand...
Click to collapse
Can anyone help me? Preferably in dumb layman's language so I can understand.

Categories

Resources