Related
I have about two weeks experience with Android OS and as a software developer I will be interested to know the technical details behind the Android OS.
I have already noticed this is possible to upgrade applications ported with the handset's ROM i.e. the Market app. This raised the question to me why can't I uninstall applications from the ROM without rooting or risking my handset's warranty to achieve this?
Is my expectation as a user of computers for 20 years unreasonable to think in 2010 with all software development and technological advances the uninstall feature should have been in Android OS from day one?
This is not exactly like Google is the first company in the world developed an OS to just the lack of experience with what users would want. From what I have seen so far in world of Android is that, the first thing users would want to know how to root their handset to remove packages that they have no use for.
My guess is that Google doesn't want users removing Systems apps. I'm assuming that they think that these applications are core and thus don't want you removing them. Remove the market, no more apps... or way to get it back etc.
Applications installed by you can be uninstalled, I'm just thinking it is the same as in windows, you can't uninstall the task manager etc (Bad example but meh =P)
Very simple - to prevent lay users from removing critical components.
Can you imagine the service costs involved in reparing devices that that have been damaged by people trying to remove bloatware?
They still give you the option to restore.
OK DISREGUARD THIS AS I MISSED THE PART ABOUT NEEDING TO ROOT!
They can be removed but its not recommended to do so without know EXACTLY what your removing and weather is vital to your phones operating system.
BUT in order to do so your phone needs root access, and root explorer installed. There are several forums on just about all android support sites that explain how to root, install the manager, and which apps/files NOT to remove.
J_HaX said:
They can be removed but its not recommended to do so without know EXACTLY what your removing and weather is vital to your phones operating system.
BUT in order to do so your phone needs root access, and root explorer installed. There are several forums on just about all android support sites that explain how to root, install the manager, and which apps/files NOT to remove.
Click to expand...
Click to collapse
Ye u can remove almost every stock app but this may affect the stability of your phone, modifying your phone always comes with the option restoring it back to default. If something goes wrong with moding (something really hard and extraordinary rare ) u can restore it. Browsing through Xda might solve many questions, we all didn't wanted stock rom (not because it was bad, because we can have s omething better. This community has VERY VERY good developers.
Androids own!!!
One thing I still don't get is...
How can Google upgrade Market app without the su privilage but the rest of the world has to root their phones to remove bloatware such as 'amazon mp3'?
@ftgg99: How much bloatware in Windows cost Microsoft or PC manufacturers? None in fact they get paid to include them with your hardware. However, I see an issue with mobile devices. You have already paid for the ROM storage, the bigger ROM size is the more expensive your handset would be, then the manufacturer uses your already paid ROM to make even more money by installing bloatware. I would be a fool to think manufacturers would pass on a percentage of the bloatware earnings by reducing the cost of their products to the consumers in this model.
The way I see it, the burden has been put on the communities such as xda. Users wouldn't ask the manufacturers how to root their handsets and this is left to the dedicated individuals to overcome the mess compnies normally leave us with. I'm not going to say the mess is a cost saving measure by companies.
The thing is that there are a lot more people buy and use phones than computers. After someone buys a smart phone with intention to use for calls, text, web and to use some apps, they realize the possibilities of the smart phone, they start digging in to the files, therefore Google blocked the root folder from modifying, otherwise Google would have to repair warrantied phones that didn't have to end up there just because people didn't know or care what they did. But if you got passed ROOTING, you must know what you are doing and from this point you can modify files and apps, but now ROOTING becomes too easy.
Basically just because too many juveniles got their hands on the equipment.
CSharpHeaven said:
One thing I still don't get is...
How can Google upgrade Market app without the su privilage but the rest of the world has to root their phones to remove bloatware such as 'amazon mp3'?
Click to expand...
Click to collapse
I'm also very interested to read the answer for this one!
CSharpHeaven said:
One thing I still don't get is...
How can Google upgrade Market app without the su privilage but the rest of the world has to root their phones to remove bloatware such as 'amazon mp3'?
Click to expand...
Click to collapse
RAMMANN said:
I'm also very interested to read the answer for this one!
Click to expand...
Click to collapse
The answer, from my point of view, is quite simple: they just upgrade the application on /data/app ON TOP of the /system/app default Market version. So, you can always go back to your "default" version just by "uninstalling updates".
Summary: they do not upgrade the Market form ROM, just install the new version on top.
CSharpHeaven said:
I have about two weeks experience with Android OS and as a software developer I will be interested to know the technical details behind the Android OS.
I have already noticed this is possible to upgrade applications ported with the handset's ROM i.e. the Market app. This raised the question to me why can't I uninstall applications from the ROM without rooting or risking my handset's warranty to achieve this?
Is my expectation as a user of computers for 20 years unreasonable to think in 2010 with all software development and technological advances the uninstall feature should have been in Android OS from day one?
This is not exactly like Google is the first company in the world developed an OS to just the lack of experience with what users would want. From what I have seen so far in world of Android is that, the first thing users would want to know how to root their handset to remove packages that they have no use for.
Click to expand...
Click to collapse
Have you tried to work with iPhone(don't know about iPhone 4)? They build fortress around their system and even the apps you install cannot be uninstalled until you gailbrake it and use 3rd party installer to uninstall. And not talking about the "MONOPLY" they run with AT&T.
Hey guys, new here, sorry can't post in recoveries section.
I recently bought a Pixel off ebay and the guy that sold it to me bought it off Gumtree. The original seller left all his stuff on it and the guy i bought it off couldn't even access the phone because it had a passcode lock on it. He tried contacting the owner but he never responded (yayyy).
Then there's me, because I'm smart and was like I CAN JUST FACTORY RESET IT, which kicked in the FRP. Unfortunately Google has had fun developing this phone to be super secure and although I no longer have a passcode to worry about, I can't bypass the FRP and I don't know the original owner's account details.
Here's some details:
USB Debugging is OFF
Only option I have on ADB is sideload
Bootloader is LOCKED
Phone is NOT ROOTED
Currently running 7.1.1
Phone is CARRIER unlocked (I can receive calls and use my data when trying to log into my gmail, which doesnt work because I have to use original account).
Is there any solution to bypass this? Much appreciated. I tried to go through google because I bought the phone off ebay and so the FRP prevents them as I didn't buy it directly off google. Am trying to track down the original owners details via my ebay seller to hopefully force the owner to comply. Any way I can get around this would be amazing.
josiedalek said:
Hey guys, new here, sorry can't post in recoveries section.
I recently bought a Pixel off ebay and the guy that sold it to me bought it off Gumtree. The original seller left all his stuff on it and the guy i bought it off couldn't even access the phone because it had a passcode lock on it. He tried contacting the owner but he never responded (yayyy).
Then there's me, because I'm smart and was like I CAN JUST FACTORY RESET IT, which kicked in the FRP. Unfortunately Google has had fun developing this phone to be super secure and although I no longer have a passcode to worry about, I can't bypass the FRP and I don't know the original owner's account details.
Here's some details:
USB Debugging is OFF
Only option I have on ADB is sideload
Bootloader is LOCKED
Phone is NOT ROOTED
Currently running 7.1.1
Phone is CARRIER unlocked (I can receive calls and use my data when trying to log into my gmail, which doesnt work because I have to use original account).
Is there any solution to bypass this? Much appreciated. I tried to go through google because I bought the phone off ebay and so the FRP prevents them as I didn't buy it directly off google. Am trying to track down the original owners details via my ebay seller to hopefully force the owner to comply. Any way I can get around this would be amazing.
Click to expand...
Click to collapse
If I understand your situation correctly, you have e a rough road ahead of you. The Google kill switch can only be disabled by the legitimate Google account holder, before the phone was reset.
If this was easily unlocked, it wouldn't be an option worthwhile. Basically, if you get it unlocked then Google has wasted their time on developing that feature.
I don't think you'll be getting into that phone and honestly, I hope you don't because then that means mine is less likely to be stolen since it is worthless without my credentials
For years, we've all learned to disable Find My iPhone before we sell an IOS device. Similarly, we have to deactivate Google's kill switch prior to factory reset a Marshmallow or Nougat device. It's really a good anti-theft implementation by Google. It's too bad that many sellers, for whatever reason, don't do it before selling.
I can enter the full OS, but can not enable ADB nor add a new account. Any insight?
Bypass tut not tested on Android 7 but works on marshmallow
https://www.youtube.com/watch?v=7OldC6kzuYk
http://rootjunkysdl.com/files/Apps/FRP/com.rootjunky.frpbypass-1.0.apk
*$M3RT$* said:
Bypass tut not tested on Android 7
https://www.youtube.com/watch?v=7OldC6kzuYk
http://rootjunkysdl.com/files/Apps/FRP/com.rootjunky.frpbypass-1.0.apk
Click to expand...
Click to collapse
Scary, but the logic makes perfect sense. I can see it being very useful for honest people.
josiedalek said:
Hey guys, new here, sorry can't post in recoveries section.
I recently bought a Pixel off ebay and the guy that sold it to me bought it off Gumtree. The original seller left all his stuff on it and the guy i bought it off couldn't even access the phone because it had a passcode lock on it. He tried contacting the owner but he never responded (yayyy).
Then there's me, because I'm smart and was like I CAN JUST FACTORY RESET IT, which kicked in the FRP. Unfortunately Google has had fun developing this phone to be super secure and although I no longer have a passcode to worry about, I can't bypass the FRP and I don't know the original owner's account details.
Here's some details:
USB Debugging is OFF
Only option I have on ADB is sideload
Bootloader is LOCKED
Phone is NOT ROOTED
Currently running 7.1.1
Phone is CARRIER unlocked (I can receive calls and use my data when trying to log into my gmail, which doesnt work because I have to use original account).
Is there any solution to bypass this? Much appreciated. I tried to go through google because I bought the phone off ebay and so the FRP prevents them as I didn't buy it directly off google. Am trying to track down the original owners details via my ebay seller to hopefully force the owner to comply. Any way I can get around this would be amazing.
Click to expand...
Click to collapse
I came up with a way to remove FRP for this device. I currently have the only video up on youtube so it should be easy to find. I cant post links yet so just search google or youtube for "google pixel frp bypass" and it will come up. It involves the use of a USB-C OTG adapter and the dirtycow exploit. It actually works for a truly universal frp bypass for every device vulnerable to the device. The entire process is done on a bootloader locked, usb debugging off, no internet connection and no other device (besides the usb). Enjoy, it took me weeks to figure it out lol.
trjv said:
I came up with a way to remove FRP for this device. I currently have the only video up on youtube so it should be easy to find. I cant post links yet so just search google or youtube for "google pixel frp bypass" and it will come up. It involves the use of a USB-C OTG adapter and the dirtycow exploit. It actually works for a truly universal frp bypass for every device vulnerable to the device. The entire process is done on a bootloader locked, usb debugging off, no internet connection and no other device (besides the usb). Enjoy, it took me weeks to figure it out lol.
Click to expand...
Click to collapse
I'm curious to see if the OP will have luck with this
magnumtripod said:
I'm curious to see if the OP will have luck with this
Click to expand...
Click to collapse
I posted this in the dirtycow forums section but I figure it has relevance here as well. Sorry if this is considered double posting.
This method wont help you to root the device, just to bypass FRP. Since dirtycow doesn't persist after a reboot (I think) it wont help as far as gaining root. However it will help you to modify files on the device. I also realized that it only has the power to overwrite files that the current user has read access to, despite whether the filesystem is mounted read-only. With this in mind I was looking over my Nexus 6P and checking to see which files had read access as user and realized that GoogleLoginService.apk and GoogleLoginService.odex both fall under this category. The files are located at /system/priv-app/GoogleLoginService and associate with Google Account Manager when installed as a system app. When the data is corrupted you can install Google Account Manager as a user app, which changes the location and file names to /data/app/com.google.gsf.login-1/base.apk and base.odex. If you corrupt these files at this point then try to disable and uninstall and select replace with the factory version it wont have anything to "replace with the factory version" and tell you that uninstall failed. Once this happens you can reinstall GoogleAccountManager.apk which will again install as a user app, which will then let you perform a full successful uninstall of Google Account Manager. At this point you have full control to be able to downgrade to a previous version of Google Account Manager without it telling you that "data is corrupted" and from there perform the web sign in activity. I've tested on multiple devices and multiple versions and this works on every single device on every version of Android including the latest 7.1.1 as long as it is not on the most recent December 5 2016 security patch since dirtycow was removed with those updates.
trjv said:
I posted this in the dirtycow forums section but I figure it has relevance here as well. Sorry if this is considered double posting.
This method wont help you to root the device, just to bypass FRP. Since dirtycow doesn't persist after a reboot (I think) it wont help as far as gaining root. However it will help you to modify files on the device. I also realized that it only has the power to overwrite files that the current user has read access to, despite whether the filesystem is mounted read-only. With this in mind I was looking over my Nexus 6P and checking to see which files had read access as user and realized that GoogleLoginService.apk and GoogleLoginService.odex both fall under this category. The files are located at /system/priv-app/GoogleLoginService and associate with Google Account Manager when installed as a system app. When the data is corrupted you can install Google Account Manager as a user app, which changes the location and file names to /data/app/com.google.gsf.login-1/base.apk and base.odex. If you corrupt these files at this point then try to disable and uninstall and select replace with the factory version it wont have anything to "replace with the factory version" and tell you that uninstall failed. Once this happens you can reinstall GoogleAccountManager.apk which will again install as a user app, which will then let you perform a full successful uninstall of Google Account Manager. At this point you have full control to be able to downgrade to a previous version of Google Account Manager without it telling you that "data is corrupted" and from there perform the web sign in activity. I've tested on multiple devices and multiple versions and this works on every single device on every version of Android including the latest 7.1.1 as long as it is not on the most recent December 5 2016 security patch since dirtycow was removed with those updates.
Click to expand...
Click to collapse
Yeah so I'm Zhythe on YouTube I was actually already talking to you on there before I checked this thread. I have Dec 5 security patch is there anything you can do to get around it that doesn't involve dirtycow? :/
josiedalek said:
Yeah so I'm Zhythe on YouTube I was actually already talking to you on there before I checked this thread. I have Dec 5 security patch is there anything you can do to get around it that doesn't involve dirtycow? :/
Click to expand...
Click to collapse
oh hey whats up! nice to see you here as well im still trying to fix my pixel since it bricked when trying to update it haha. Been a little distracted though this morning since phonlab hase stolen my method and now he and rootjunky are passing it off as if they found it first without giving me credit for it and charging to teach the method. serious backstabbing right there. but once i get this pixel up and running again i'll find a method and host it from my website so no copycats rip me off.
trjv said:
oh hey whats up! nice to see you here as well im still trying to fix my pixel since it bricked when trying to update it haha. Been a little distracted though this morning since phonlab hase stolen my method and now he and rootjunky are passing it off as if they found it first without giving me credit for it and charging to teach the method. serious backstabbing right there. but once i get this pixel up and running again i'll find a method and host it from my website so no copycats rip me off.
Click to expand...
Click to collapse
Hey! Yeah that's such a dog move by both of them seriously... not cool. No worries I'll keep an eye on your website for updates Best of luck!
Check this out!!
See what I mean? Haha idk why I ever wanted to be a part of this place anyways lol. Nothin but disrespect since the moment I posted the method.
trjv said:
See what I mean? Haha idk why I ever wanted to be a part of this place anyways lol. Nothin but disrespect since the moment I posted the method.
Click to expand...
Click to collapse
Yeah I totally ignored it :/ dw you're so much better and obviously smarter cause you did it before them
NBreunig3 said:
Check this out!!
Click to expand...
Click to collapse
Hi @NBreunig3!
trjv said:
See what I mean? Haha idk why I ever wanted to be a part of this place anyways lol. Nothin but disrespect since the moment I posted the method.
Click to expand...
Click to collapse
You could report that YouTube video and show/link to your source of where you first posted the method. Get them to take them down!
Frp google pixel
can be reseted with XTC2CLIP if u have unlocked bootloader i tested on my device.
warrior26ro said:
can be reseted with XTC2CLIP if u have unlocked bootloader i tested on my device.
Click to expand...
Click to collapse
@warrior26ro I stated clearly the bootloader was locked. XTC2CLIP is also for HTCs. Please don't post unless you've read the question properly.
Technically the Google Pixel is an HTC device since they are the manufacturers of them. Not that that helps the situation any more or less to know just figured I'd mention it lol. You can even issue some proprietary HTC fastboot commands on Pixel devices, but I haven't gotten them to do anything special from using them. Commands such as fastboot oem rebootRUU makes the phone reboot but not into anything special that I've noticed, just reboots the phone. I'm sure there are others but that one in particular is definitely HTC only lol.
On a side note I'm still diligently working on a method for the newer devices every day. It's only a matter of time before I get it lol. While on the subject at least here's a couple thoughts if anybody has any insight...
I've been looking at other binary commands to gain a foothold of, sort of like the whole idea behind run-as that the dirtycow peeps use. After installing Nethunter on my 6P I noticed that there is another command with potential privilege abuse called "procmem". It doesn't need superuser privileges to use nor does it only respond to ROOT or SHELL users, so its basically universally allowed from "untrusted app" users (i.e. termux, terminal emulator, material terminal, etc.). The only thing is that I'm pretty sure that command is only installed with a proper busybox installation, and further it only has the proper setuid bit needed + standard user permissions (that I've seen) when installed into /system/xbin. So basically my idea is to leverage a modified procmem binary to gain (insert something here) that might lead to (insert something else here) lol. Not really a whole plan but I figure if I can find a way to get procmem into /system/xbin on a non-rooted device then at least I have something to work with lol. Otherwise I've also been looking into a way to become SHELL user without using "adb shell". I know that with the Moto 360 there was some fancy adb command to enable native adb support but I can't seem to remember how to go about it. So yeah, thats all I've got so far lol.
Okay so ive been battling this for sometime. I'm starting to get a little more knowledgeable but still don't know what to do with all this.I experienced this first back in 2015 then I completely made a switch. Well now I'm back to same issues.
The problems I'm experiencing is it's happening on all the devices I have. The phone I'm on now bought brand new from metropcs. and not even a day 30minutes later I get an update for the phone. I new not to install or download. But it inventively did. Now it's sitting on my storage wanting me to move files to root.
LET ME MAKE THIS CLEAR. NON OF MY DEVICES ARE ROOTED.
to make this short. My devices seem to have a Bluetooth admin. And connects to any Bluetooth device without me knowing.
So far from what I see chromium and stage fright is a big part of what I'm seeing.
I'm attaching some pictures to give more detail look. And it's not just my Android devices it's my Xbox one S as well.
looking to completely remove. I'm not trying to waste money on switching networks or completly going Mia.
Fast responses please.
Sincerly,
-Desperate androidian
BLEEDCOLORYOU said:
Okay so ive been battling this for sometime. I'm starting to get a little more knowledgeable but still don't know what to do with all this.I experienced this first back in 2015 then I completely made a switch. Well now I'm back to same issues.
The problems I'm experiencing is it's happening on all the devices I have. The phone I'm on now bought brand new from metropcs. and not even a day 30minutes later I get an update for the phone. I new not to install or download. But it inventively did. Now it's sitting on my storage wanting me to move files to root.
LET ME MAKE THIS CLEAR. NON OF MY DEVICES ARE ROOTED.
to make this short. My devices seem to have a Bluetooth admin. And connects to any Bluetooth device without me knowing.
So far from what I see chromium and stage fright is a big part of what I'm seeing.
I'm attaching some pictures to give more detail look. And it's not just my Android devices it's my Xbox one S as well.
looking to completely remove. I'm not trying to waste money on switching networks or completly going Mia.
Fast responses please.
Sincerly,
-Desperate androidian
Click to expand...
Click to collapse
The Android community isn't what it used to be that's for sure. No help, no suggestions. Just nothing.
BLEEDCOLORYOU said:
Okay so ive been battling this for sometime. I'm starting to get a little more knowledgeable but still don't know what to do with all this.I experienced this first back in 2015 then I completely made a switch. Well now I'm back to same issues.
The problems I'm experiencing is it's happening on all the devices I have. The phone I'm on now bought brand new from metropcs. and not even a day 30minutes later I get an update for the phone. I new not to install or download. But it inventively did. Now it's sitting on my storage wanting me to move files to root.
LET ME MAKE THIS CLEAR. NON OF MY DEVICES ARE ROOTED.
to make this short. My devices seem to have a Bluetooth admin. And connects to any Bluetooth device without me knowing.
So far from what I see chromium and stage fright is a big part of what I'm seeing.
I'm attaching some pictures to give more detail look. And it's not just my Android devices it's my Xbox one S as well.
looking to completely remove. I'm not trying to waste money on switching networks or completly going Mia.
Fast responses please.
Sincerly,
-Desperate androidian
Click to expand...
Click to collapse
I'm no expert but I'm struggling to see your exact issue you seem to think you have, is it just t your Bluetooth is switching on. All those licences, security certs, file locations etc look normal to me (without checking numbers or being able to compare to same phone os etc) though I have disabled many of those certs eg the Turkish ones etc & my Bluetooth files are different but I can find ref hill those locations online eg Xieomi phones
You appear to have a ZTE, please give model number and current OS & rev (must be stock I suppose). ZTE was found with a backdoor in older phones, sending data to China, so it's possible, & some Chinese phones also update their apps without notification. But as you say your whole network appears compromised so the source may be something else, like your router/modem, or Bluetooth as you think (though some apps require Bluetooth admin permission legitimately, you can disable it as an Admin). Tell us what behaviors you are seeing that you believe are malicious. New phone update soon after you turn on is quite common, as I'm sure you know.
When I had a quick look at your log it did have a lot of activity going to the US DOD, would you expect this, as well as the usual google & Facebook connections. Though (perhaps) strangely also to a server from a small marketing company here in Australia, but I'm no expert even if I looked at your log line by line I wouldn't understand it all.
Ref his other post
https://forum.xda-developers.com/general/security/security-global-family-credientals-t3665851
Things to try. Run a reputable antivirus. Boot into safe mode, so only system apps run, is it still happening? Can you turn off anything that is listed as a device admin? Try run a root checker app. Even if it all comes back negative you may still have a problem as a port may already have been opened and malicious app self deleted or something. Use an app like Fing to see if any device you don't recognise are connected to your network.
You may be able to block some activity if it's not going through root with a firewall eg NetGuard no root firewall, start with everything blocked.
Above are just some general hints, without knowing specifics I can only suggest you backup any stuff you want to keep then factory reset everything & change ALL passwords to strong ones (no good just adding a number on the end of your old ones!), better still reflash all firmware (updates if available) to overwrite everything. This incl your internet access points eg router, and only reconnect to the net/networks after you have done them all (one at a time preferably then you may be able to identify source of problems)
That turned out a lot longer than I intended!
IronRoo said:
I'm no expert but I'm struggling to see your exact issue you seem to think you have, is it just t your Bluetooth is switching on. All those licences, security certs, file locations etc look normal to me (without checking numbers or being able to compare to same phone os etc) though I have disabled many of those certs eg the Turkish ones etc & my Bluetooth files are different but I can find ref hill those locations online eg Xieomi phones
You appear to have a ZTE, please give model number and current OS & rev (must be stock I suppose). ZTE was found with a backdoor in older phones, sending data to China, so it's possible, & some Chinese phones also update their apps without notification. But as you say your whole network appears compromised so the source may be something else, like your router/modem, or Bluetooth as you think (though some apps require Bluetooth admin permission legitimately, you can disable it as an Admin). Tell us what behaviors you are seeing that you believe are malicious. New phone update soon after you turn on is quite common, as I'm sure you know.
When I had a quick look at your log it did have a lot of activity going to the US DOD, would you expect this, as well as the usual google & Facebook connections. Though (perhaps) strangely also to a server from a small marketing company here in Australia, but I'm no expert even if I looked at your log line by line I wouldn't understand it all.
Things to try. Run a reputable antivirus. Boot into safe mode, so only system apps run, is it still happening? Can you turn off anything that is listed as a device admin? Try run a root checker app. Even if it all comes back negative you may still have a problem as a port may already have been opened and malicious app self deleted or something. Use an app like Fing to see if any device you don't recognise are connected to your network.
You may be able to block some activity if it's not going through root with a firewall eg NetGuard no root firewall, start with everything blocked.
Above are just some general hints, without knowing specifics I can only suggest you backup any stuff you want to keep then factory reset everything & change ALL passwords to strong ones (no good just adding a number on the end of your old ones!), better still reflash all firmware (updates if available) to overwrite everything. This incl your internet access points eg router, and only reconnect to the net/networks after you have done them all (one at a time preferably then you may be able to identify source of problems)
That turned out a lot longer than I intended!
Click to expand...
Click to collapse
Thank-you. Now for a better visual. There's to many apps.
And if u can give me links to apps that will help.
And on my oneplus one the Bluetooth thing says :1002 sharing or midi or something.
BLEEDCOLORYOU said:
Thank-you. Now for a better visual. There's to many apps.
And if u can give me links to apps that will help.
And on my oneplus one the Bluetooth thing says :1002 sharing or midi or something.
Click to expand...
Click to collapse
And code.auroa? What is this
BLEEDCOLORYOU said:
Thank-you. Now for a better visual. There's to many apps.
And if u can give me links to apps that will help.
And on my oneplus one the Bluetooth thing says :1002 sharing or midi or something.
Click to expand...
Click to collapse
I don't have that phone so can't really tell what is a suspect app or not, especially just from screen shots.
Here use this app to run on demand scans against the virustotal database (this is not an "antivirus app" like Avast so offers no protection, it only scans apps on demand, so you should run a good antivirus also)
https://play.google.com/store/apps/details?id=com.funnycat.virustotal
it should flag any suspect apps and you can submit any unknown ones you are worried about.
---------- Post added at 05:12 AM ---------- Previous post was at 05:02 AM ----------
BLEEDCOLORYOU said:
And code.auroa? What is this
Click to expand...
Click to collapse
edit: not Firefox then.
org.codeaurora.bluetooth is a legit part of Bluetooth .... Well unless it's flagged by virustotal then it probably is a malicious app just given a common name to try and hide
IronRoo said:
I don't have that phone so can't really tell what is a suspect app or not, especially just from screen shots.
Here use this app to run on demand scans against the virustotal database (this is not an "antivirus app" like Avast so offers no protection)
https://play.google.com/store/apps/details?id=com.funnycat.virustotal
it should flag any suspect apps and you can submit any unknown ones you are worried about.
Click to expand...
Click to collapse
Okay but what is provisioning? Code auroa smartcard services googleplay for instance apps and
And IV never encrypted this phone.
BLEEDCOLORYOU said:
Okay but what is provisioning? Code auroa smartcard services googleplay for instance apps and
And IV never encrypted this phone.
Click to expand...
Click to collapse
And alot of the overlay apps n simtoolkit are all questionmarked
BLEEDCOLORYOU said:
And alot of the overlay apps n simtoolkit are all questionmarked
Click to expand...
Click to collapse
ser my edit above re aurora
sometimes virustotal will have 2 or 3 antiivirus companies flag a file, these are probably false positives so probably nothing to worry about (though could just be a new submission, other companies should soon update if real malicious code, check back in a day or two). If lots of companies flag an apk then you haven a problem.
It looks like you have a problem whit overlays (unless it's an app your phone company installs for that function, not sure what you mean). You should install a proper antivirus app like Avast, malwarebytes etc as a first step, hopefully it can remove malicious apk
---------- Post added at 05:51 AM ---------- Previous post was at 05:37 AM ----------
BLEEDCOLORYOU said:
And IV never encrypted this phone.
Click to expand...
Click to collapse
Doesn't matter, encrypting phone only protects unauthorised access to your data. Once it is unlocked anyone can view your stuff. And once a malicious app is on your system it can shall read all your data even if you had encrypted it as it's unencrypted when you use it
IronRoo said:
ser my edit above re aurora
sometimes virustotal will have 2 or 3 antiivirus companies flag a file, these are probably false positives so probably nothing to worry about (though could just be a new submission, other companies should soon update if real malicious code, check back in a day or two). If lots of companies flag an apk then you haven a problem.
It looks like you have a problem whit overlays (unless it's an app your phone company installs for that function). You should install a proper antivirus app like Avast, malwarebytes etc as a first step, hopefully it can remove malicious apk
---------- Post added at 05:51 AM ---------- Previous post was at 05:37 AM ----------
Doesn't matter, encrypting phone only protects unauthorised access to your data. Once it is unlocked anyone can view your stuff. And once a malicious app is on your system it can shall read all your data even if you had encrypted it as it's unencrypted when you use it
Click to expand...
Click to collapse
Okay so now I'm trying to post screenshots of when I'm connected to wifi and it's not letting me
Pairwise cyphers and
Group cyphers
Sim_num
?
BLEEDCOLORYOU said:
And alot of the overlay apps n simtoolkit are all questionmarked
Click to expand...
Click to collapse
Tap those with question marks to submit to virustotal for analysis
IronRoo said:
Tap those with question marks to submit to virustotal for analysis
Click to expand...
Click to collapse
/sys/fs/selinux/class/appletalk_socket/perms
Not suspious?
BLEEDCOLORYOU said:
/sys/fs/selinux/class/appletalk_socket/perms
Not suspious?
Click to expand...
Click to collapse
Now I'm not stupid, this is facts. I just need defined and solution!!!
No these are normal library files. Stagefright "the malicious exploits" were called this as it was the stagefright framework it exploited. Everyone has these files, here are mine below.
You need to use tools like antivirus to identify bad files but even that is no guarantee as there is the possibility the original malicious file could have self deleted and, for example, just left open ports which would not be found as a "virus" but still allow remote access to your device.
If you cannot identify the actual exploit on your phone then the best solution is probably to just reflash the stock rom as this will wipe & overwrite everything. But if a malicious file is left on your SD card or another networked device you could soon be infected/compromised again. That is why I said before if you can't identify the source of your infection you really need to factory reset or reinstall all OS on all devices affected including your home router etc (or maybe it's your work or public network) and change all passwords.
IronRoo said:
No these are normal library files. Stagefright "the malicious exploits" were called this as it was the stagefright framework it exploited. Everyone has these files, here are mine below.
You need to use tools like antivirus to identify bad files but even that is no guarantee as there is the possibility the original malicious file could have self deleted and, for example, just left open ports which would not be found as a "virus" but still allow remote access to your device.
If you cannot identify the actual exploit on your phone then the best solution is probably to just reflash the stock rom as this will wipe & overwrite everything. But if a malicious file is left on your SD card or another networked device you could soon be infected/compromised again. That is why I said before if you can't identify the source of your infection you really need to factory reset or reinstall all OS on all devices affected including your home router etc (or maybe it's your work or public network) and change all passwords.
Click to expand...
Click to collapse
I'm on a video bridge network I got the direct TV setup with 2 wireless setups. Both secure from what I know.
BLEEDCOLORYOU said:
Pairwise cyphers and
Group cyphers
Sim_num
?
Click to expand...
Click to collapse
These are for encryption of your connection, not your phone
BLEEDCOLORYOU said:
I'm on a video bridge network I got the direct TV setup with 2 wireless setups. Both secure from what I know.
Click to expand...
Click to collapse
I'm no coding/security guru, but I have worked on telecoms, military electronics, etc but my coding & network security knowledge is limited.
I would run this app Fing to check your local network, are there any unknown devices connected?
https://play.google.com/store/apps/details?id=com.overlook.android.fing
note: this only finds currently connected devices, so you'd want to do this several times & especially when you see suspect behavior.
Also check for open ports, easiest way is probably this site, it will scan the first 1000 ports or so (select all)
https://www.grc.com/
go to shields up
but you really need to scan ALL possible ports with a tool like Zenmap (for PC) if you think you are compromised
https://nmap.org/zenmap/
However it's not clear to me if you ever installed a proper antivirus and whether it found and deleted anything? Virustotal seemed to find some suspect apks, I had a quick look at Trendmicro database but it didn't list details of the one it found in your screenshot, but the fact some of those antivirus companies called the suspect apk names with "joke" in it may suggest it's just a joke app your mate has installed, though probably not a joke app if your other devices are really also compromised, from memory there is also real malware with that name which may be able to infect other devices. Running a proper antivirus should easily find and clean any "joke" app on your phone & hopefully any real malware. If you've done this and still seeing indications you are compromised then do what I suggested above. (Also repeat malware checks on other devices and removable storage media)
You should also log into your router as admin and check settings, are you using a secure router password? Is firmware up to date. Is firewall set up correctly? Also close any open ports that you don't use. Turn off remote admin, if router has it. Etc etc what do your router logs show (turn on more detailed logging if necessary) Factory reset or reinstall firmware if you think changes have been made to your router by someone else.
Hi I am having same issues. Exact same behaviors regardless of new phones new carrier and all accounts being unconnected in name. Google etc. This is extreme. Its via bluetooth I agree something with esims or virtual sims for use of wifi access and or signal piracy for media. The DOD files are also something I am familier with seeing. Code Aurora was also a govt project way back. Its Interesting thst I have Verizon files loading on at & t phones and sprint loading on Verizon. Whatever this is has managed to infiltrate my computers as well. Its relentless. Its impressive and sophisticated. Please please help.
Spidder77 said:
Hi I am having same issues. Exact same behaviors regardless of new phones new carrier and all accounts being unconnected in name. Google etc. This is extreme. Its via bluetooth I agree something with esims or virtual sims for use of wifi access and or signal piracy for media. The DOD files are also something I am familier with seeing. Code Aurora was also a govt project way back. Its Interesting thst I have Verizon files loading on at & t phones and sprint loading on Verizon. Whatever this is has managed to infiltrate my computers as well. Its relentless. Its impressive and sophisticated. Please please help.
Click to expand...
Click to collapse
I'm having the same issmy ues. Did anyone ever resolve or figure out what is happening? I think I'm under investigation by the DOD and they own my devices. My uploads/downloads are blocked, internet searches filtered, pics/screenshots of evidence deleted off my phone, etc.
It's been a while since I rooted an Android device. And I've never rooted a phone. So, questions. I'd like to do everything possible to have the phone ready before contacting Verizon to get on their network. I'm guessing my steps should be:
a) root
b) TWRP
c) Magisk
d) latest Oxygen
e) all Play Store updates
f) move SIM (there are two slots?? which one??)
g) work w/Verizon to get voice & messaging working
h) use OP's app to migrate apps & data from Pixel2XL
i) figure out a VOWIFI and 3g calling option
I've found the great thread on steps a) - d) and assume all will be straightforward and easy. All of the Google Play Store updates will be easy, I've done all of that already just to test a favorite game (a primary reason I wanted to upgrade the phone to begin with).
I understand there are two SIM slots. Does it matter which I put the SIM in from my P2XL? Am I better off going to the Verizon store and having them put a new SIM in? If I remove the SIM from the P2XL can it still perform emergency calls?
Working with Verizon seems the trickiest part. I know I want to make certain it's activated for CDMA-less (found a great thread here on this, too). Are there any other things I need to request or make sure I test before assuming I'm good to go with Verizon? I won't have any issues because the phone is rooted, will I?
Is the right time to use the OnePlus app to migrate apps and data after successful Verizon activation? I'm not opposed to installing all (there are a LOT) of my apps one by one if it's going to work better and/or has some benefit.
I understand voice won't work over 3g (when LTE's not avialable). Is that correct? And I'm thinking this is related to VOWIFI? I'm sorry if I'm conflating two issues. But a workaround, at least for the latter, has been mentioned here that uses Google Hangouts and some Google app that acts like a phone, but it requires a number? Can someone shine some more light on this for me?
Otherwise, this is my current impression of what needs to be done. Please let me know if you agree, disagree, have suggestions, etc.! Thank you!
... anyone?
Based on your first sentence, you should really, really do some research before attempting any modifications at all.
dr_rick13 said:
Based on your first sentence, you should really, really do some research before attempting any modifications at all.
Click to expand...
Click to collapse
Are you saying that the guides here aren't adequate? I've had great success with Android tablets in the past following what's here. Perhaps you could be a bit less vague?
Hello
whats about custom recovery and custom rom like Pocophone F1--------------- for Z Flip 3 .....release?????
Regards
Zipfelino said:
Hello
whats about custom recovery and custom rom like Pocophone F1--------------- for Z Flip 3 .....release?????
Regards
Click to expand...
Click to collapse
Not sure about a custom recovery, but Samsung has posted the required files to build the source if you want to make a custom ROM.
twistedumbrella said:
Not sure about a custom recovery, but Samsung has posted the required files to build the source if you want to make a custom ROM.
Click to expand...
Click to collapse
TThat,s not polite. If he were a developer he wouldn't ask for one. Zipfelino didnt offend any body. He and me and thousands other members may have the same question. But the brave one had the guts to ask and found a rude answer
luisnica98 said:
TThat,s not polite. If he were a developer he wouldn't ask for one. Zipfelino didnt offend any body. He and me and thousands other members may have the same question. But the brave one had the guts to ask and found a rude answer
Click to expand...
Click to collapse
I suggest you read it again in a casual tone, not the one you used to troll me.
By the way, not every developer fills out the form for a title. It's pretty ignorant to assume someone isn't one because they asked if anyone else had released anything.
Hm... maybe to second the initial request as I understand it, even if it is too early at the moment since the device is merely two months in the market and from what little I understand building e.g. LOS for a new device is a lot of hard work: I am also looking forward (edit: which IMHO includes actively supporting the developer) to see someone more capable of this kind of voodoo than me release a custom ROM for this device before official support will be over
This thing here is the first Android mobile since the Sony XZ1 Compact that I deem "officially trouser pocket compatible" and with a price tag that might become okay for the average user
If you have a USA variant (snapdragon) then I'd suggest not getting your hopes up. Thanks to Verizon (even if they aren't your carrier) the US versions of Samsung phones since the note 8 (I think) haven't been able to be rooted.
d0x360 said:
If you have a USA variant (snapdragon) then I'd suggest not getting your hopes up. Thanks to Verizon (even if they aren't your carrier) the US versions of Samsung phones since the note 8 (I think) haven't been able to be rooted.
Click to expand...
Click to collapse
Yes, I learned this as well when I browsed through the Z Flip 3 section. Even if I don't know the details why it is like that, I think it's really weird that they managed to achieve such crap at all.
Thankfully I live in Germany and have the european version. I would not have bought this phone if I would have found any clue that you might be unable to unlock the bootloader. Been inside the golden cage with the bitten apple, got away, don't want to turn back
FFW said:
Yes, I learned this as well when I browsed through the Z Flip 3 section. Even if I don't know the details why it is like that, I think it's really weird that they managed to achieve such crap at all.
Thankfully I live in Germany and have the european version. I would not have bought this phone if I would have found any clue that you might be unable to unlock the bootloader. Been inside the golden cage with the bitten apple, got away, don't want to turn back
Click to expand...
Click to collapse
Turning back sucks lol. I always had rooted phones. It started with the HTC G1 the first android phone. I stuck with Google phones (Nexus 1 through the Pixel XL) or HTC phones like the HTC One M8.
Then I got a note 9 and soon after found out there was no root method for the snapdragon version. Then for some stupid reason I did it again and bought the note 10+...and again with the z Flip3 lol.
Next time I'm making sure I can root before I buy. Thankfully I can use Adguard (website version not store version) and package disabler to block ads, analytics etc at a system level, plus it can act as a firewall.
Then I'll use package disabler to truly disable the bloat and spyware. I wish I could just uninstall it but this is better than nothing.
One thing I really miss is custom roms and Kernel's. I'd love to be able to get rid of Samsung's horrible battery management system. It kills apps that it shouldn't including the alarm clock. Plus Samsung's apps are all pretty much terrible...sigh
d0x360 said:
Turning back sucks lol. I always had rooted phones. It started with the HTC G1 the first android phone. I stuck with Google phones (Nexus 1 through the Pixel XL) or HTC phones like the HTC One M8.
Then I got a note 9 and soon after found out there was no root method for the snapdragon version. Then for some stupid reason I did it again and bought the note 10+...and again with the z Flip3 lol.
Next time I'm making sure I can root before I buy. Thankfully I can use Adguard (website version not store version) and package disabler to block ads, analytics etc at a system level, plus it can act as a firewall.
Then I'll use package disabler to truly disable the bloat and spyware. I wish I could just uninstall it but this is better than nothing.
One thing I really miss is custom roms and Kernel's. I'd love to be able to get rid of Samsung's horrible battery management system. It kills apps that it shouldn't including the alarm clock. Plus Samsung's apps are all pretty much terrible...sigh
Click to expand...
Click to collapse
Whoa. My first Android was the Xperia XZ1 Compact since I finally decided to kick Apple out now when the first informations about iOS 11 got available. That one served me well, rooted and running Lineage from day one (and still does, big thanks @Flamefire), but the battery has degraded noticeably and Sony obviously built that phone starting with the battery as component no.1 which makes replacing it a royal PITA, which is why I searched for a new pocket compatible daily driver. So here I am...
I see your phone is more or less in the state mine is currently. I had it rooted initially but reset it and decided to try out NetGuard and ADB AppControl and see how far that gets me while keeping the OTA update alive as long as there is no custom ROM available.
Edit: with that nifty guide from @doggydog2 rooting might become more interesting again however, even without a custom ROM. Will need to dig through that one on of the next weekends...
FFW said:
Whoa. My first Android was the Xperia XZ1 Compact since I finally decided to kick Apple out now when the first informations about iOS 11 got available. That one served me well, rooted and running Lineage from day one (and still does, big thanks @Flamefire), but the battery has degraded noticeably and Sony obviously built that phone starting with the battery as component no.1 which makes replacing it a royal PITA.
which is why I searched for a new pocket compatible daily driver, so here I am...
I see your phone is more or less in the state mine is currently. I had it rooted initially but reset it and decided to try out NetGuard and ADB AppControl and see how far that gets me while keeping the OTA update alive as long as there is no custom ROM available.
Click to expand...
Click to collapse
I'm gonna check out adb appcontrol and see if it has any extra features over package disabler. I used to have an app like package disabler that would let me go into an apps services and receivers. Then I could disable specific parts of apps. It was fantastic but I can't remember it's name lol.
I have tried netguard and it's not bad but I definitely like Adguard better. It's better designed, works better, has more features etc... But it's not free. I think I paid $35 for 3 lifetime phone licenses during a sale. I also use Adguard on Windows now instead of adblocking extensions. I didn't pay for that one though, I signed up for a beta key, got one and then I just renew it every year.
d0x360 said:
I'm gonna check out adb appcontrol and see if it has any extra features over package disabler. I used to have an app like package disabler that would let me go into an apps services and receivers. Then I could disable specific parts of apps. It was fantastic but I can't remember it's name lol.
I have tried netguard and it's not bad but I definitely like Adguard better. It's better designed, works better, has more features etc... But it's not free. I think I paid $35 for 3 lifetime phone licenses during a sale. I also use Adguard on Windows now instead of adblocking extensions. I didn't pay for that one though, I signed up for a beta key, got one and then I just renew it every year.
Click to expand...
Click to collapse
No problem with "not free". I usually donate to the developers of my software unless they say they don't want (yes, this happens as well) - either by buying the enhanced version or by simply sending a donation every now and then, such as for every new released patch level of LOS or so.
ADB Appcontrol is quite nice since it is a PC program and also backs up any software you decide to remove.
AFAIK, Adguard is a DNS-based ad blocker comparable to Pi-Hole while Netguard is a firewall as e.g. AfWall+ (or mimicks that behaviour as much as possible as you can without root)? This would mean the logic behind the program would be different, such as being able to track and set what to block differently for each program.
I will take anotrher look at it though
FFW said:
No problem with "not free". I usually donate to the developers of my software unless they say they don't want (yes, this happens as well) - either by buying the enhanced version or by simply sending a donation every now and then, such as for every new released patch level of LOS or so.
ADB Appcontrol is quite nice since it is a PC program and also backs up any software you decide to remove.
AFAIK, Adguard is a DNS-based ad blocker comparable to Pi-Hole while Netguard is a firewall as e.g. AfWall+ (or mimicks that behaviour as much as possible as you can without root)? This would mean the logic behind the program would be different, such as being able to track and set what to block differently for each program.
I will take anotrher look at it though
Click to expand...
Click to collapse
Adguard does have DNS blocking options but it's so much more than that. I'm not sure if there is a free trial period but if there is definitely check it out, I think you will find it really nice. Also anytime you find any kind of issue whether it's a missed overlay on a website or a gap where the ad was you can report it through the app and it's usually fixed in a couple hours. Their response time is insane.
The adblocking options are extensive. It includes all the same filters in ublock origin and then some. You can also disable filters you don't want, make custom filters for literally anything. For example I made a filter that would remove search results for just polygon.com from Google. It also supports custom scripts like the greasemonkey extension.
The firewall aspect is like a genuine firewall. You can fully block an app from net access or set it so it can only use wifi or cell signal or both. There is also a log of every connection (incoming/outgoing) that tells you what app or service is trying to do something and what it's trying to connect to. You can click on an entry in the log and automatically block or whitelist it.
You can even block Google analytics and telemetry for Android itself which is fantastic because they collect tons of info..
In just the last 30 days Adguard has saved me 11.79 gigs of data, blocked 362,763 ads, 17,092 trackers and 2 threats. That's from Android, apps and browsers.
i know I sound like a salesman lol but I genuinely love this app and it has so many options and features that it can do pretty much everything a fully loaded (with necessary extensions) desktop browser can do.
They also have a free vpn that works with the app if you want another layer of privacy and protection.
d0x360 said:
Adguard does have DNS blocking options but it's so much more than that. I'm not sure if there is a free trial period but if there is definitely check it out, I think you will find it really nice. Also anytime you find any kind of issue whether it's a missed overlay on a website or a gap where the ad was you can report it through the app and it's usually fixed in a couple hours. Their response time is insane.
Click to expand...
Click to collapse
Thanks for the detailed answer
d0x360 said:
The adblocking options are extensive. It includes all the same filters in ublock origin and then some. You can also disable filters you don't want, make custom filters for literally anything. For example I made a filter that would remove search results for just polygon.com from Google. It also supports custom scripts like the greasemonkey extension.
Click to expand...
Click to collapse
Hm... Lets compare.... I use my compiled Pi-Hole list (which includes the AdBlock lists and some others btw) for NetGuard as well, so this is covered for me, even if not as comfortable when it comes to whitelisting for just one given domain (never needed that option until now though, but something to keep in mind)
d0x360 said:
The firewall aspect is like a genuine firewall. You can fully block an app from net access or set it so it can only use wifi or cell signal or both. There is also a log of every connection (incoming/outgoing) that tells you what app or service is trying to do something and what it's trying to connect to. You can click on an entry in the log and automatically block or whitelist it.
Click to expand...
Click to collapse
That seems pretty standard for an ad blocker. The question is: can I selectively block or allow a given connection (i.e. URL or IP address) for one single app as I can do with Netguard?
d0x360 said:
You can even block Google analytics and telemetry for Android itself which is fantastic because they collect tons of info..
Click to expand...
Click to collapse
I translate this to "can block system apps". That's the case for Netguard as well.
d0x360 said:
In just the last 30 days Adguard has saved me 11.79 gigs of data, blocked 362,763 ads, 17,092 trackers and 2 threats. That's from Android, apps and browsers.
Click to expand...
Click to collapse
I think that saved amount of data is more than I use at home and mobile in total in the same time
But yes, I use Pi-Hole at home and for any mobile device that uses my VPN, and its shows an awful lot of connections being blocked, so the basic savings should be the same. Additionally, each browser has its own uBlock Origin instance and some other plugins e.g. to block Youtube ads. Using a computer that does not have this is outright painful.
d0x360 said:
i know I sound like a salesman lol but I genuinely love this app and it has so many options and features that it can do pretty much everything a fully loaded (with necessary extensions) desktop browser can do.
They also have a free vpn that works with the app if you want another layer of privacy and protection.
Click to expand...
Click to collapse
That might explain why you get such fast response times in case of issues
Something else, apart from the question above: Can Adguard apply all its filters and then use my private WireGuard VPN Server (not some 3rd party VPN service!) on Android as its only way out into the internet? That is the one obvious downside of not having root at the moment - since Android allows only one VPN being active and Netguard does not interface the WireGuard App, I can only use either my VPN or NetGuard, not both at once as I could with AfWall+ and WireGuard.
Just to add my bucket - I will buy this phone as soon as bootloader unlock, root and custom roms are confirmed (an a working gcam mod). I simply can't imagine using the phone without the benefits of it. I really hope this phone gets support.
eVen123 said:
Just to add my bucket - I will buy this phone as soon as bootloader unlock, root and custom roms are confirmed (an a working gcam mod). I simply can't imagine using the phone without the benefits of it. I really hope this phone gets support.
Click to expand...
Click to collapse
The first two are done as long as you buy the european SM-F711B and not that crippled US version (model no. SM-F711U if I am not mistaken). That leaves a ROM (and the GCam mod you mentioned, but I have to admit I have no clue what that one is about). Let's see what the future brings.
Oh, one more thing: I hereby confirm I would happily contribute significantly to a donation for a developer who in turn wants to take the task of creating and maintaining a custom ROM for this phone that supports the outer display and the flip open/close phone function (maybe LOS or Havoc?) but needs money to buy the phone.