Security related question - General Questions and Answers

Just a small question. Im fairly new to the custom rom scene. Im wondering, if any, what are the odds of having a rom on here with spyware related software hidden inside it? Now im not ssying theres is but im just curious.
I remember reading somewhere that security related to your personnal data cant be garanteed on custom/third party roms. Im just wondering to what extent.
Thanks
Sent from my SM-G960W using Tapatalk

Ridingmac said:
Just a small question. Im fairly new to the custom rom scene. Im wondering, if any, what are the odds of having a rom on here with spyware related software hidden inside it? Now im not ssying theres is but im just curious.
I remember reading somewhere that security related to your personnal data cant be garanteed on custom/third party roms. Im just wondering to what extent.
Thanks
Sent from my SM-G960W using Tapatalk
Click to expand...
Click to collapse
Security can't be guaranteed on any device that has an unlocked bootloader, whether it is still on stock or a custom ROM.
But, yes, there is the "possibility" that there may be spyware/malware built into a custom ROM. But, it isn't likely that such a ROM will be found at XDA because part of the process of posting a ROM is that the poster must provide access to the source code used to build the ROM so that it can be inspected by the Moderator team for anything suspicious or anything that violates the XDA rules or licensing and the ROM files themselves are usually thoroughly inspected by members here to make sure they don't contain anything illegal/suspicious.
Sent from my SM-S767VL using Tapatalk

Droidriven said:
Security can't be guaranteed on any device that has an unlocked bootloader, whether it is still on stock or a custom ROM.
But, yes, there is the "possibility" that there may be spyware/malware built into a custom ROM. But, it isn't likely that such a ROM will be found at XDA because part of the process of posting a ROM is that the poster must provide access to the source code used to build the ROM so that it can be inspected by the Moderator team for anything suspicious or anything that violates the XDA rules or licensing and the ROM files themselves are usually thoroughly inspected by members here to make sure they don't contain anything illegal/suspicious.
Sent from my SM-S767VL using Tapatalk
Click to expand...
Click to collapse
Gotcha, thanks for a great answer. Im usually not worried about open sourced stuff but i figuered id ask.
I just flashed my older sm-805 with an unofficial LineageOS. And with the number of replys on that thread and from xda approved Developpers i wasnt to worried but i figuered id have nothing to loseto just ask
Sent from my SM-G960W using Tapatalk

Related

Rooting

I am curious to know as to what exploit the G2X uses to gain privilege escalation aka root.
Sent from my LG-P999 using xda premium
codecaine21 said:
I am curious to know as to what exploit the G2X uses to gain privilege escalation aka root.
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
Use NVFlash to flash CWM. That's all you really need.
And you're probably gonna get bashed for posting in this section, so just make sure you don't do it again.
mackster248 said:
Use NVFlash to flash CWM. That's all you really need.
And you're probably gonna get bashed for posting in this section, so just make sure you don't do it again.
Click to expand...
Click to collapse
I'm already rooted! Your misunderstanding my question. I wanna know what local exploit the devs use when writing the rooting software. Is it a buffer overflow? Stack based? Heap based? Integer overflow? What program or process is exploited? I just want tobknow just in case ibwanna have a crack at writing one. Also, I figured this post should go here cuz it is a question for developers not general users.
Sent from my LG-P999 using xda premium
Ahhh, I see. My bad then. In that case I hope a dev can help you out!
Rageagainstthecage
Sent from my Galaxy Nexus using xda premium
Still doesn't belong here IMO
Sent from my LG-P999 using xda premium
I don't believe that there is an 'exploit' the lack of root on stock is one thing, root on a custom ROM just is, no security to protect some precious stock ROM with it's 'super secret special' crap. Otherwise unless one of the devs here has compiled a ROM straight from Google source, as opposed to CM source, they are a better authority. And if I wasn't clear enough, this is my opinion, something I am welcome to as a living breathing person, if you don't like what I say and want to try it, try it, see how far you get.
Sent from my LG-P999 using xda premium
Волк said:
I don't believe that there is an 'exploit' the lack of root on stock is one thing, root on a custom ROM just is, no security to protect some precious stock ROM with it's 'super secret special' crap. Otherwise unless one of the devs here has compiled a ROM straight from Google source, as opposed to CM source, they are a better authority. And if I wasn't clear enough, this is my opinion, something I am welcome to as a living breathing person, if you don't like what I say and want to try it, try it, see how far you get.
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
@Волк, I was referring to stock rom. After you flash CWM, you use a root zip file to gain root on your device. I was curious as to how the zip file rooted the stock rom.
Something along these lines ---> http://www.quora.com/What-are-the-e...-against-the-cage-and-z4root-Android-exploits
@M3TG, no one asked for your opinion.
Sent from my LG-P999 using xda premium
codecaine21 said:
@Волк, I was referring to stock rom. After you flash CWM, you use a root zip file to gain root on your device. I was curious as to how the zip file rooted the stock rom.
Something along these lines ---> http://www.quora.com/What-are-the-e...-against-the-cage-and-z4root-Android-exploits
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
I believe you just answered your own question.
buru898 said:
I believe you just answered your own question.
Click to expand...
Click to collapse
Ik lol
Sent from my LG-P999 using xda premium
Shouldn't questions be in questions and answers
Sent from my LG G2x using Tapatalk 2
codecaine21 said:
@Волк, I was referring to stock rom. After you flash CWM, you use a root zip file to gain root on your device. I was curious as to how the zip file rooted the stock rom.
Something along these lines ---> http://www.quora.com/What-are-the-e...-against-the-cage-and-z4root-Android-exploits
@M3TG, no one asked for your opinion.
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
lol wowh there buddy...
first off, mt3g is right, this does not belong in development. just read the sticky at the top if you need a reference.
second, i think rageaginstthecage was not working on the gb 2.3.3 IIRC, and i think it was always just put into roms (even stock-ish ones) outside of the phone. (im most likely horribly wrong here, i never really looked into how root is accomplished)
either way, that link you posted pretty much answers your question
codecaine21 said:
@Волк, I was referring to stock rom. After you flash CWM, you use a root zip file to gain root on your device. I was curious as to how the zip file rooted the stock rom.
Something along these lines ---> http://www.quora.com/What-are-the-e...-against-the-cage-and-z4root-Android-exploits
@M3TG, no one asked for your opinion.
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
The root zip just contains the necessary files that allow access to /system and any root functions. No exploit. CWM is basically another OS that is meant to modify the primary OS directly.
tahahawa said:
The root zip just contains the necessary files that allow access to /system and any root functions. No exploit. CWM is basically another OS that is meant to modify the primary OS directly.
Click to expand...
Click to collapse
I know the zip contains the necessarry files. That's obvious lol I'm not asking about CWM. I already know what it is, how it works, what it does. But I am pretty sure there is an exploit! How else is the program going to bypass the security precautions the system uses to prevent the user from accessing the system in the first place. I figured it was the same as a local privilege escalation on a Linux box.
But if rat in the cage doesn't work for GB. Then my question would be what exploit are the devs using when they write the root zip?
Sent from my LG-P999 using xda premium
codecaine21 said:
I know the zip contains the necessarry files. That's obvious lol I'm not asking about CWM. I already know what it is, how it works, what it does. But I am pretty sure there is an exploit! How else is the program going to bypass the security precautions the system uses to prevent the user from accessing the system in the first place. I figured it was the same as a local privilege escalation on a Linux box.
But if rat in the cage doesn't work for GB. Then my question would be what exploit are the devs using when they write the root zip?
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
Nope, no exploit. Basically all the zip does is add the files required to switch users. The security is simply lack of binaries required to switch to root user.
Rageagainstthecage does work on GB. So do other methods. What exploits do you think superoneclick injects? The g2x bootloaders come factory unlocked
Sent from my LG-P999 using xda premium
kwes1020 said:
Rageagainstthecage does work on GB. So do other methods. What exploits do you think superoneclick injects? The g2x bootloaders come factory unlocked
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
i know it works with gb, but i thought something broke it on the g2x?
kwes1020 said:
Rageagainstthecage does work on GB. So do other methods. What exploits do you think superoneclick injects? The g2x bootloaders come factory unlocked
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
RATC works on GB? Oh, I was just going off what klathmon said, sorry.
Why does everyone keep saying no exploit is used kwes? Im positive one is definitely used. Just like Linux, you can't just add a root account with a regular user account! You need to be root in the first place! Just like RATC does. What other exploits are used kwes?
I didn't know the bootloaders come factory unlocked. Guess that's why there's no need for the s-off process with the G2X. Good to know!
Sent from my LG-P999 using xda premium
DJLamontagneIII said:
Shouldn't questions be in questions and answers
Sent from my LG G2x using Tapatalk 2
Click to expand...
Click to collapse
Come on you two, really, android police? This forum has bigger fish to fry than a Guy asking a very intelligent question. At least he's not asking for mission donations. Mt3g, you're kinda on my team, but bro., I'm saying this as a friend, you do spout off at the mouth a lot. It just don't look good, you're not the mod, nor I or anyone else in here. Leave it to them, if I was the mod and i just saw your post I would purposely leave the thread here. It's human nature. With everyone rudely playing mod around here, I'm sure the mods just sit back and laugh at the immaturity. When a mod steps in and says "hey, this don't belong here, don't do it again or you're banned! " nobody says a word and the op obeys. When you or anyone else does it, the flamethrowers come out and we get another 50 posts of wannabe tough guys talking ****. DOC stepped in at the right time with owain and hell and handled it professionally, the mods are doing their jobs when there isn't 10 primadonnas pulling rank and making citizen arrests. I'm sure the flamethrowers will be lit after this post, hey, continue embarrassing yourselves.
[email protected]
codecaine21 said:
RATC works on GB? Oh, I was just going off what klathmon said, sorry.
Why does everyone keep saying no exploit is used kwes? Im positive one is definitely used. Just like Linux, you can't just add a root account with a regular user account! You need to be root in the first place! Just like RATC does. What other exploits are used kwes?
I didn't know the bootloaders come factory unlocked. Guess that's why there's no need for the s-off process with the G2X. Good to know!
Sent from my LG-P999 using xda premium
Click to expand...
Click to collapse
Root account is there, just inaccessible normally. If you make a Linux box login to a regular user by default and remove su and sudo, you cannot really access the root account. The zip adds su back. Cwm is an external os that has full access to the all parts of the Android os, allowing for this to be placed in the $PATH. (/system/bin).
The exploit methods find ways to become root (glitch in graphics card driver on sensation) and place the binaries.

Fixed

fixed
Anyone have any ideas??
I am also interested in an answer to this question. I also installed CM7 on my Bravo, and now I'm a little nervous. I don't keep anything of value on my Google account, but still...
I don't think cm7 is the cause of this. No way would it have virus'
Sent from my HTC Desire S using xda premium
The CM's developers are an unbelievable organisation.CM is used by lots of people..A lot I mean. I'm not much into all that stuff but I think that the 7 version of CM is considered as an original android development.Do you think they would jeopardize that for some random email? I dont think so..Maybe it is a coincidence, maybe it is not.I'm almost sure that it aint a virus..but you could never know.If you have any doubts about them you can change your rom, but there's no way imo that they have stolen your account..Good luck.
Did you download CM7 from the official sites?
Wipe all and make a fresh install of the rom.
And change your gmail account password!
The rom was downloaded from the Bravo dev section and is the only CM7 rom available for the phone. It is not officially supported and therefore not on CM7's site
jtdroid said:
The rom was downloaded from the Bravo dev section and is the only CM7 rom available for the phone. It is not officially supported and therefore not on CM7's site
Click to expand...
Click to collapse
It won't be the issue. I don't think you should blame CM.
Sent from my HTC Desire S using xda premium
As said earlier, the official CMteam don't, and wouldn't backdoor their ROM. Other parties (those who make unofficial variants/other ROMs) don't have the reputation to protect. This is why, when I install a ROM from a not so renown team, I make a phony gmail account during the signup.
You could try an install the gapps bundle from CyanogenMod wiki (I can't post links as I'm new, but google "cyanogenmod gapps" and it's the first result)
I'm not blaming CM. I was just asking what might have caused this. I just found it strange that it happened within hours of installing the ROM. I have never had my email hacked.
olyloh6696 said:
It won't be the issue. I don't think you should blame CM.
Sent from my HTC Desire S using xda premium
Click to expand...
Click to collapse

Skyrocket may be affected with the brick bug?

http://forum.xda-developers.com/showthread.php?t=1621679
In this thread, OP states that his rom, and some others may be affected with the brickbug. I'm running Sky ICS, its a fairly recent version (from a few weeks ago)
I'm worried that my phone may be affected (I have the Rogers i727r). Can anyone confirm that my phone is in danger of dying on me? And if so, how can I avoid this.
I used Chainfires app and it said that my emmc chip is probably affected, but I'm reading that bricking occurs based on the the kernel I'm running
http://forum.xda-developers.com/showthread.php?t=1653022 (ROM I'm running)
http://forum.xda-developers.com/showthread.php?t=1693704 (Chainfires App)
No
So I'm safe?
Sent from my SAMSUNG-SGH-I727 using XDA
Yup
thatguy97 said:
So I'm safe?
Sent from my SAMSUNG-SGH-I727 using XDA
Click to expand...
Click to collapse
Did you read the threads you linked to? Or this one?
This post has some info.
It seems that the Skyrocket does have this problem, but the circumstances have to be perfect for it to occur.
Since the kernel source code for the ICS leaks for the Skyrocket is not available there is no way to know if the kernel is safe, from my understanding of the issue.
Reference post 1
Reference post 2
Your question and further discussion would be more appropriate in one of the already existing threads about this. Starting new threads on the same topic just fragments the discussion.
marvin02 said:
Did you read the threads you linked to? Or this one?
This post has some info.
It seems that the Skyrocket does have this problem, but the circumstances have to be perfect for it to occur.
Since the kernel source code for the ICS leaks for the Skyrocket is not available there is no way to know if the kernel is safe, from my understanding of the issue.
Reference post 1
Reference post 2
Your question and further discussion would be more appropriate in one of the already existing threads about this. Starting new threads on the same topic just fragments the discussion.
Click to expand...
Click to collapse
I think you are being hard on OP for no reason. This is a serious issue and I was very concerned. I have read the linked posts and additionally I did some research and here is what I get that applies to me
SGS2 Skyrocket IS impacted
[Edit] All SGS2 SkyRocket recoveries - including one I use Touch recovery to install ROM) are GB based. Source this post
My Kernel is NOT impacted since it is GB(I am on MHX superlite 3.1 GB rom)
.
cnewsgrp said:
I think you are being hard on OP for no reason. This is a serious issue and I am very concerned.
I have read the linked posts and here is what I get
SGS2 Skyrocket IS impacted
I have no idea what recovery I use (I know I use Touch recovery to install ROM) so I don't know if condition#2 is met
I have no idea if my Kernel is impacted (I am on MHX superlite 3.1 GB rom)
It would be a great help if some SGS2 Dev explained how it impacts SGS wrt its recovery and kernels. Which are safe and which are not.
Click to expand...
Click to collapse
Its an issue with the ICS leaks. You're on GB.
Sent from my SAMSUNG-SGH-I727 using Tapatalk 2
plwalsh88 said:
Its an issue with the ICS leaks. You're on GB.
Sent from my SAMSUNG-SGH-I727 using Tapatalk 2
Click to expand...
Click to collapse
Yes Thanks. Additionally most recoveries used except maybe Cyanogenmod ICS recoveries are GB based. So we are safe.
Thank you all for your explanation and help. I can rest easy knowing that I'm pretty much safe
Sent from my SAMSUNG-SGH-I727 using XDA
cnewsgrp said:
I think you are being hard on OP for no reason.. . . .
Click to expand...
Click to collapse
If not reading and searching are no reason then you are correct.
It is important that each user evaluate their own risk and they can only do that by reading the discussions and processing the information in them.
Yes. The i727 with hardware revision 0x12 could hardbrick with an mmc erase if the emmc chip is faulty. The portal has a full story about it, and Samsung appears to be working on a solution. I have been on several ICS roms now, including the oneclick version of the first leak, and have never had a single issue. Running Sky Ice as well, and it is very safe. I would stick to it, at least till Samsung releases the fix. No harm in being cautious till it is solved.
Sent from my SAMSUNG-SGH-I727 using xda premium
Agreed. risks are taken even with flashing. You can never know at this point.
Sent from my SAMSUNG-SGH-I727 using xda premium

Is using custom rom's/kernels safe?

Hi. I have got one (mayby stupid) question for you.
Is using custom rom's and kernels safe for my password's, Google Account, credit card's?
When I added credit card to my Google Account - I'm using only official firmwares, but I'm geting tired with it.
PS. I don't wanna to irritate anybody.
Cyanogenmod roms have improved security I think
Sent from my GT-I5800
No, no, no.
I will write it one more time.
Can developer of custom rom/kernel implement badware, or no?
Is using custom rom's safe? Can dev intercept my password's, credit card, or Google Account?
mosak said:
No, no, no.
I will write it one more time.
Can developer of custom rom/kernel implement badware, or no?
Is using custom rom's safe? Can dev intercept my password's, credit card, or Google Account?
Click to expand...
Click to collapse
I don't think they will do this. I have not seen any such cases, here almost every body around me uses custom ROMs.
Yeah but if some developer do it, he is not gonna tell you. Best way use ROMs which are pretty famous, and people are using them without complaints.
Regards,
:good::good:

Is this the forum for SCH-I705?

I have looked throughout these sub-forums and everything seems to be for the P3xxx devices. Where are all the custom ROMs and development help for the i705? Thanks.
Maybe coz there r none ?
Sent from my SAMSUNG-SGH-I337 using Tapatalk 4 Beta
terryfiedxda said:
I have looked throughout these sub-forums and everything seems to be for the P3xxx devices. Where are all the custom ROMs and development help for the i705? Thanks.
Click to expand...
Click to collapse
That's what I'm finding too. This really sucks.
There are a few things made for your device here but you MUST make sure that SGH-i705 is named in the title or description or else you'll flash something that will without a doubt brick your device, I'm not sure how much is on this forum for your tab, but i do recall seeing the Doubleshot rom for your tab, this rom includes an OC kernel too i think, since i own a GT-P3113 I don't know much on yours, if i were you I'd do a little digging and see what our XDA forum has for you Sorry if I'm not much help!!
Yeah not much out there for the VZW Tab 2 7.0. I've hoped for some AOSP development but nada.

Categories

Resources