hackers have got my phone Hijacked I need Help to get rid of them! - T-Mobile Samsung Galaxy S7 Questions & Answers

For some time now, many years, I have experienced problems with my cellular telephone that I could not explain or rectify. I know I am being hacked and no matter how many times I factory reset the phone the problems still exist. My phone has been lost and stolen in which insurance has replaced the phone and in no time or immediately I experience the exact same problems. My videos and pictures are altered, deleted or hidden. All the programs or applications seem to be altered or customized with options that are not the genuine developer or creator options and images. The graphics associated with the applications and web pages are not the genuine images and I am sure that violates trademark, copyright, intellectual property rights and other laws I am not aware of. Web pages information, contact information, address information, and content are altered and changed which can affect all sorts of areas such as personal safety, product safety, access to information is blocked, altered or displayed in ways that make it impossible to get directions, product availability, law enforcement help, legal help and information. When I use Google Maps for directions, it will take me down one way streets the opposite direction toward oncoming traffic,, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. I tried to order cleaning gloves and masks today, and no store in my city was in stock, and delivery was not until July the 5th, 2020. I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units. I did a screen recording of the applications on my phone, and the about phone section. I know from that it is apparent that my phone is hacked and under control of some other party or person. Someone is either maliciously attacking me with the purpose to cause extreme harm for reasons of personal enjoyment, or my name, reputation and activities have been purposely misled and lied about in a gross manner where a cellular telephone developer, or a technology hacker, or information pirate or mercenary developed and/or gave someone or some group a program and knowledge on how to capture my phone and all other electronics and hold it hostage. I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success. I am attaching the screen capture video- it is 20+ minutes and will show the extent of the hacking. Someone is perverting and illegally using developers tools, programs, applications and code in ways that were never intended and can only lead to extreme problems of which in all honesty death or terminal scenarios are all real possibilities. I am hoping to identify these people with your help, and bring them to justice and alleviate my life problems that this has caused and stop the illegal and intentional perversion of the original intent for cellular development which is the fruitful search for knowledge and advancement of useful and legal technology. Please help me in this battle to which all operations on my device are unsuccessful, disheartening, and uncontrollable. Thank you in advance and if this should be posted in another area or forum please advise, however I am posting it in a few that I think are relevant. I live in Houston, Texas- so if there is a group of developers, or some people that can help me combat this locally please message me their contact information. Take care. - Dale-
Screenshots attached and a link to the video of my phone and it’s contents.
Here is the link to the screenshots of applications, programs and phone information: wwwdotdrive.google.com/drive/folders/1OImrdp64ndMzJGN74v7K4G6H4zc2DzV9?usp=sharing
Here is the link with the video of the screen shots and a little narration: wwwdotdrive.google.com/file/d/1i7GU9TVUnqfJvgyLq5roaaPR08EkBf0z/view?usp=sharing

Hi shooterd,
Everything is fine with your phone. I've seen both your screenshots and screen recording. What you're seeing under settings/apps list are all the system apps as well as the user apps. Most phones have at least 300+ system apps to keep it running. Granted most of them are bloatware and crap which is why there are threads with "how to debloat your phone." I'm going to go over some of system apps that you've scrolled through and tried to disabled.
Adapt Sound is found under settings/sounds, it's sort of an equalizer for all the audio on your phone.
Android Easter Egg is a built in mini-game that Google included with every system. You can do a quick search to figure out how to activate it. Most times, you go to Settings/About Phone and tap the "Android Version" block rapidly until the game loads.
ANT Radio Services are bloatware/crap.
Application Installer installs apk that you want to sideload or apps from Play Store.
CaptivePortalLogin handles the "Sign in as a guest" when you join open wifi networks such as those in cafes or hospitals.
ChocoEUKor (along with a few others, they share the same icon) is part of the stupid font bundle from Samsung.
Again a lot of these are necessary for your phone to run and is completely normal. The other 100 are removable bloatware which you can find a list of by doing a web search. It would be easier if you root your phone and then use Titanium Backup to debloat.
"My videos and pictures are altered, deleted or hidden."
You haven't shown any proof of this but if you keep reseting your phone, you'll lose internal storage data which might be what happened.
"All the programs or applications seem to be altered or customized with options that are not the genuine developer or creator options and images."
They all look fine to me, if the icons are weird, it could be your Android version or home launcher theme. I use Nova Launcher so if I go to Settings/Look & Feel, it gives you options for the icon theme including round, squircle (which is what yours currently is), rounded square, flower, adapative, legacy, etc...
"When I use Google Maps for directions, it will take me down one way streets the opposite direction toward oncoming traffic, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. "
This is either bad GPS or bad Google Maps data. Try Waze. Although it's own by Google, it has better routes in my experience. It also sounds like you're dealing with some cognitive impairment*
"I tried to order cleaning gloves and masks today, and no store in my city was in stock, and delivery was not until July the 5th, 2020."
Short supplies, I remember it being the case everywhere. I couldn't order hand soap for two months.
"I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units."
Where? How? You haven't shown any proof.
"I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success."
It's hard in general. And if you've updated your phone pass whatever ****ty unprotected bootloader version is necessary to root your phone, it will be impossible to root your phone. This may be the case based on your Software Information section. Check the thread requirements and make sure your phone meets those.
*I've mentioned cognitive impairment early because you sound paranoid. Are you experiencing a lot of stress, trouble sleeping, etc? And this may be odd but do you have a lot of bug bites? Bed bags are known to cause paranoia. Sorry if this isn't what you want to hear but your phone is perfectly fine.
To protect your privacy, you should probably take down your screen recording. And if you need to talk, I'll check here more frequently for the next couple days. Good luck.

Related

Security does matter![Updated 25th. Jan]

Introduction
I have not seen much talk about security in XDA, and not at all on Neo Section.
SO here's just one informative link talking about using and developing apps and security risks involved
http://www.technologyreview.com/computing/25921/?mod=related
Any bug in software could potentially be used as a security loophole to gain access to private information, spy on you, get your credit card info(should you do such things on phone).
What is kind of unsettling is that everyone seems fine with modding, tweaking, developing and using those ROMs made in XDA without worrying if there could be that kind of bug in your made or used ROM.
You don't need a malicious app only to have risks. Most people use Windows so they should know that it is OP systems bugs and vulnerabilities that allow for unwanted access to your files, data, etc.
Android itself is having very non-foolproof security system. All apps on unrooted phone are in sandbox. That's no security measure at all. It doesn't limit app from stealing your private info at all, it only cant delete the whole ROM. That's just idiotic security system, for it is the only thing beside encrypting shut off phone on 3.0 and 4.0. So that means Android on it's own has no security measures while it's working. Even Windows has... some... but not too much... so you could pay for antivirus and antispyware software ofc.
It has always been the goal of big corporations to make money from insecurity, be they software developers, arms dealers and you name it. They all benefit from insecurities existing. Same is with Google and it's Android. But the good news is that we the users can modify Android. We could all say "Au revoir security bugs and loopholes!" if we would care about developing ROMs designed to make Android more secure... alas that's not happening yet!
Overview of Linux/Android security issues.
It's a short condensed description just to get you interested in the topic. There's lots of material on net, you only need to search, read, watch videos.
Linux becomes more vulnerable with more applications with different permissions installed. Same is true for Android.
Say your Phone Exporer has root access, that means it has root access to whole Android. To remove unnecessary risks, this app's root access should be limited to only most necessary functions it needs to operate.
Currently for Android there is no such solution. For Linux there is Apparmor.
http://en.wikipedia.org/wiki/AppArmor
Total root access is obvious vulnerability, but it is at least known one. Let's look at possibility of apps having hidden permissions and what that could mean to you.
Blade Buddy from Market.
On market it does not list permission to "Unique Device ID"(IMEI for GSM and MEID; ESN for CDMA) for free nor for paid version.
That means the author of BB has left the code from free version in paid one. This permission is used by ads to track you. It's not necessary code for ads, but it helps the dev know who clicked on the add and generated him some money. To see your money generating zombie empire stretch across the whole globe.... quite a thrill, isn't it?
So it's a latent code, with no benefit to user and an exploit only calling to be abused.
Unique Device ID allows you to be tracked on net and also where you are physically. GPS is just one way to find you, police for example have scanners to locate your devices physical location by the IMEI code. You can count on the "bad guys" having this technology as well, for it's quite a tool for burglars and other criminals.
The risks of your home being marked as the next dungeon to be looted by some raiders, I mean criminals(or perhaps WoW players sleepwalking and sleepraiding?) or getting your ID and bank details stolen by trojan/hacker is random. Yet the threat would not exist without apps having so flagrant hidden permissions.
Next app with ludicrous permissions
Brightest Flashlight
It does list many permissions, among them "Hardware controls - take pictures and videos ". No, it does not need a permission to take photos through cameras to operate the flashlight. But it's fun nonetheless for the dev to see his trusty peasants, or maybe he just likes to observe people like some watch fish in aquarium or hamsters in cage( "Look at that dork!", "You're one ugly m...f...er","ummm a couple kissing in dark with ma flashlight, what are they searching?", "what's that you eat, mr Korean, brains?" "hey show me that document again.")
You don't even need to run the app yourself. It can be triggered by hacker on background and take a snapshot of you.
On top of this little needless permission it has following hidden permissions:
1. Unique IMSI, read about here http://en.wikipedia.org/wiki/IMSI
2. MCC+MNC (CDMA)
3. Unique Devide ID
4. Cell Tower Name.
That's a lot of needless permissions for flashlight, these are there just to track you the app user and have nothing to do with your comfortable use of the app.
These are just 2 apps with totally needless permissions for their intended functioning. If you don't want your Windows and Linux have such security holes then why do you want your Android have them?! You don't want, that's the point and these apps would not be so popular if people would really know and care about their phone being secure.
It can be stated for sure that above exemplified permissions not listed on market are more useful for pranksters, criminals or someone plainly looking-down-on-all-the-dumb-sheep and not at all for any legitimate, user or customer friendly purposes.
There are very few tools to check for security and privacy problems in apps. That gives a sense that majority of devs do not want Android to be secure and private, because Android is another revenue generating platform through Google ads business of course. Were people more educated about the matter then Google ads business would shrink down as well. A private and secure Android can't be tracked or annoyed with ads. No ads, no profit. No security therefore means profit. Unfortunately this lack of security can be exploited by anyone with criminal or malignant intentions so very easily.
The most important thing is to read the permissions before installing.
If you had read the article I linked. Those permissions don't matter anything really if stuff developers use doesn't reveal what it does, or developer itself doesn't disclose what the app does.
We can safely say that those permissions asked are just to make ordinary users of Android think that all is under their control.
I use Privacy Blocker app and it keeps finding app permissions that are not listed. Even that app doesn't find those permissions which Cyanogenmod permission manager shows. And I've sanitized all my apps, still I find my phone connecting to some odd servers while using certain paid and seemingly legit apps. I even found shapshots from front camera made by some app... and I am checking all permissions I can, even for those not listed.
What seems harmless but could reveal your IP address and potentially other data about you is... advertisements used by apps.
Ads can be far more than just a little annoyance that slows your device. Any file, picture loaded from some location in internet can be used to locate you.
I had a problem of getting phone call bills for calls lasting 10 to 20 secs that I never made after using a slew of market apps, flashlights, fun stuff, etc.
I paid two months for such calls trying to find out which app did it and still don't know which one it was. Skype(phone app has fake IP of Holland but actual connection goes to Moscow... oh come one what is this? Why such hiding? Like anyone would trust their phone's Skype connection stream through Moscow... no thank you! Then wonder still if the phone gets so slow and Skype call quality is so bad even over wifi while Windows Skype does just fine?), Brighest flashlight, some photo editors, and slew of other garbage I've already forgotten about cause I don't use any of it anymore.
First post updated
How about the new 4.3 update..in includes some security and privacy control..will this thing prevent you had mentioned?
Is there any way to reactivate this post? maybe start working on a security enhanced android ROM? I'm agree, Security does matter!

This program was used as spyware on my phone

I found this, xprivacy, android n developer and more on my phone which has been rooted, without my knowledge or permission. I need to find out who did this so i can have peace of mind and to prosecute. I am not computer literate at all. Please help
Randumblonde said:
I found this, xprivacy, android n developer and more on my phone which has been rooted, without my knowledge or permission. I need to find out who did this so i can have peace of mind and to prosecute. I am not computer literate at all. Please help
Click to expand...
Click to collapse
Lmao
Sent with the send button at the right.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
****ers.
Android police. Denver dics, 81's and a ***** with a vendetta. Laugh it up, chuckles.
Randumblonde said:
Android police. Denver dics, 81's and a ***** with a vendetta. Laugh it up, chuckles.
Click to expand...
Click to collapse
Well, you kinda have us doing this.
And this
Because the improbability and absurdity of what you posted is a little ..... beyond words.
At the minimum you should have at least said what kind of phone you have. You provided absolutely NO information for anyone to even attempt to try and help you.
Pretend like im an idiot....easily done by all you smart mutha ****as..... and step by step tell me bx i am not even trying to act a little like i know what im talking about
First off, I don't think it's really necessary to pretend.
Secondly, calling people names is no way to get help. But it is a good way to get hammered by the moderators.
Xprivacy is an xposed module that is for protecting your privacy. I use it as do many others. It's a great app. It's not spyware.
What phone do you have? Carrier? Rooted? Custom rom? Xposed?
It is incredibly unlikely that an xposed module just appeared on your phone. You might have accidently clicked it at some point while looking on the xposed repository?
And even if there are apps and spyware on your phone that you didn't put there, there is no way you're going to be able to prosecute anyone. Kinda comes with the territory of having technology.
Don't like it...get an iPhone.
---------------------------
VZW LG G4
Rooted
Android 5.1
Stock ROM
Stock Kernel
I appreciate your stating what is most likely considered the obvious.
I must say, i do not believe that, simply bx i live in the year 2016 and own a smartphone, something like this should be not only expected, but commonplace and laughable. My faux pas while asking for help was to not include obvious key indicators that would help my problem get solved faster, and help me not look like such a twit . The real issue here, imho, is..... is no one concerned about what is a clear and blatant invasion of privacy? I appreciate the fact that anyone using this app, or on this forum is light years ahead of me in terms of my computer knowledge, and, yes, i stumbled upon double apps, files that dont make sense, draining battery, just things that refuse to fit in to logic, by a very novice mistake. Then as i looked further, i began to fit the pieces together.
I can't believe that with technology such as rooting, rebuilding and controlling a phone, all hidden from the primary user/account holder, there is no way to track someone who is committing such a crime.
I am willing to do the work. I just need to know where to start.
I am a daughter, a sister, a mother, a girlfriend, a friend. Please put me in the shoes of someone who fills one of those roles for you and think of your reaction when this story is presented to you from their life experience.
Im asking for a little help to protect myself from the fear, anger, unknown use of my personal info, and just plain creepiness that accompanies this predatory hack.
Any help is appreciated.
I appreciate your stating what is most likely considered the obvious.
I must say, i do not believe that, simply bx i live in the year 2016 and own a smartphone, something like this should be not only expected, but commonplace and laughable. My faux pas while asking for help was to not include obvious key indicators that would help my problem get solved faster, and help me not look like such a twit . The real issue here, imho, is..... is no one concerned about what is a clear and blatant invasion of privacy? I appreciate the fact that anyone using this app, or on this forum is light years ahead of me in terms of my computer knowledge, and, yes, i stumbled upon double apps, files that dont make sense, draining battery, just things that refuse to fit in to logic, by a very novice mistake. Then as i looked further, i began to fit the pieces together.
I can't believe that with technology such as rooting, rebuilding and controlling a phone, all hidden from the primary user/account holder, there is no way to track someone who is committing such a crime.
I am willing to do the work. I just need to know where to start.
I am a daughter, a sister, a mother, a girlfriend, a friend. Please put me in the shoes of someone who fills one of those roles for you and think of your reaction when this story is presented to you from their life experience.
Im asking for a little help to protect myself from the fear, anger, unknown use of my personal info, and just plain creepiness that accompanies this predatory hack.
Any help is appreciated.
Randumblonde said:
I appreciate your stating what is most likely considered the obvious.
I must say, i do not believe that, simply bx i live in the year 2016 and own a smartphone, something like this should be not only expected, but commonplace and laughable. My faux pas while asking for help was to not include obvious key indicators that would help my problem get solved faster, and help me not look like such a twit . The real issue here, imho, is..... is no one concerned about what is a clear and blatant invasion of privacy? I appreciate the fact that anyone using this app, or on this forum is light years ahead of me in terms of my computer knowledge, and, yes, i stumbled upon double apps, files that dont make sense, draining battery, just things that refuse to fit in to logic, by a very novice mistake. Then as i looked further, i began to fit the pieces together.
I can't believe that with technology such as rooting, rebuilding and controlling a phone, all hidden from the primary user/account holder, there is no way to track someone who is committing such a crime.
I am willing to do the work. I just need to know where to start.
I am a daughter, a sister, a mother, a girlfriend, a friend. Please put me in the shoes of someone who fills one of those roles for you and think of your reaction when this story is presented to you from their life experience.
Im asking for a little help to protect myself from the fear, anger, unknown use of my personal info, and just plain creepiness that accompanies this predatory hack.
Any help is appreciated.
Click to expand...
Click to collapse
This is a lot better. As a father of four daughters, and brother of three sisters, I can appreciate your concern.
Regardless of that. I stand by my first statement of the impossibility of this all. I have been doing this for quite awhile.
First off, did you root? If not it is impossible to do without physical possession of your phone. IMPOSSIBLE,
Second, you still have not said what kind of phone you have. Some phones are not possible to root.
Third, If you indeed have Android N Preview, again physical access to your phone is required.
It is impossible to install double apps. It can't be done. Icons may look the same, but applications duplicated, impossible.
If Xprivacy is installed, XPrivacy can prevent applications from leaking privacy sensitive data. It requires another application called Xposed Framework. Xprivacy as stated is a good thing.
Bottom line, nothing could have been done to your phone remotely. It would have to be done with at least 30-60 minutes of physical access to your phone.
With someone with knowledge about such things. If you know someone like that, guess you don't have to look to far.
dicksteele said:
This is a lot better. As a father of four daughters, and brother of three sisters, I can appreciate your concern.
Regardless of that. I stand by my first statement of the impossibility of this all. I have been doing this for quite awhile.
First off, did you root? If not it is impossible to do without physical possession of your phone. IMPOSSIBLE,
Second, you still have not said what kind of phone you have. Some phones are not possible to root.
Third, If you indeed have Android N Preview, again physical access to your phone is required.
It is impossible to install double apps. It can't be done. Icons may look the same, but applications duplicated, impossible.
If Xprivacy is installed, XPrivacy can prevent applications from leaking privacy sensitive data. It requires another application called Xposed Framework. Xprivacy as stated is a good thing.
Bottom line, nothing could have been done to your phone remotely. It would have to be done with at least 30-60 minutes of physical access to your phone.
With someone with knowledge about such things. If you know someone like that, guess you don't have to look to far.
Click to expand...
Click to collapse
I could have sworn i stated that my phone is a sprint Samsung g s5. Yes, i am very aware of who has had possession of my phone. I just need the proof. So, i included uploads of a bug report, and several screen shots noting the phone has been rooted and the fake and real starts to apps, etc. In the bug report there is an account number but i dont know to what account and its on page, like, 6000 or something.
So, my g s5 has 2 chromes, 3 clock apps, 2 context somethings, 4 bluetooth test apps, a bunch of stuff idk, new files, etc. My hidden files suddenly say 'root' numerous times, also say things like fake-this and hidden sharing, lots of libstagefright, libtoolbox, lib audio, this is just the very beginning of pages upon pages of allshares, content readers, on and on. So, yes, i imagine xprivacy is to keep the hacker safe, i do have android n, telephony, all sorts of back up data apps, clouds, 3 different launchers, 1 is mine, there's chameleon and easy something too, i mean, i know im not nuts. The camera apps and audio apps lead me to believe i can be watched and heard at any given moment. The lengths that this hacker went to to remain unidentified is absurd. But the real absurdity is that i have discovered all of this, so now i need to be able to prove , with no room to weasel out, that the hacker has done this purposefully and with only one intent.
I have already been educated about how illegal immigrants steal the numbers off phones and use them to commit crimes, by bouncing ip addresses, etc, this knowledge came to me shortly after i began focusing on my phone issues. So, i am now playing with scorching hot fire to beat the clock and get answers b4 something happens to not only the files and info i carry with me, but i have become afraid of what might happen to me, as well.... so.... if i am at all off base, i will tuck my tail and retreat from this point, i do not believe with any slight random bit of my overactive imagination that i am wrong. If you need more file names or copies of, i am happy to provide.
Please forgive my attitude earlier. I am in a panic and no one has listened, much yet taken me seriously, and i just dont know what the end result will uncover. Thank you, thank you
Randumblonde said:
I could have sworn i stated that my phone is a sprint Samsung g s5. Yes, i am very aware of who has had possession of my phone. I just need the proof. So, i included uploads of a bug report, and several screen shots noting the phone has been rooted and the fake and real starts to apps, etc. In the bug report there is an account number but i dont know to what account and its on page, like, 6000 or something.
So, my g s5 has 2 chromes, 3 clock apps, 2 context somethings, 4 bluetooth test apps, a bunch of stuff idk, new files, etc. My hidden files suddenly say 'root' numerous times, also say things like fake-this and hidden sharing, lots of libstagefright, libtoolbox, lib audio, this is just the very beginning of pages upon pages of allshares, content readers, on and on. So, yes, i imagine xprivacy is to keep the hacker safe, i do have android n, telephony, all sorts of back up data apps, clouds, 3 different launchers, 1 is mine, there's chameleon and easy something too, i mean, i know im not nuts. The camera apps and audio apps lead me to believe i can be watched and heard at any given moment. The lengths that this hacker went to to remain unidentified is absurd. But the real absurdity is that i have discovered all of this, so now i need to be able to prove , with no room to weasel out, that the hacker has done this purposefully and with only one intent.
I have already been educated about how illegal immigrants steal the numbers off phones and use them to commit crimes, by bouncing ip addresses, etc, this knowledge came to me shortly after i began focusing on my phone issues. So, i am now playing with scorching hot fire to beat the clock and get answers b4 something happens to not only the files and info i carry with me, but i have become afraid of what might happen to me, as well.... so.... if i am at all off base, i will tuck my tail and retreat from this point, i do not believe with any slight random bit of my overactive imagination that i am wrong. If you need more file names or copies of, i am happy to provide.
Please forgive my attitude earlier. I am in a panic and no one has listened, much yet taken me seriously, and i just dont know what the end result will uncover. Thank you, thank you
Click to expand...
Click to collapse
I've reread from the beginning and you have never stated model of phone. And not sure where you uploading bug reports and screenshots. It's not in this thread.
Since you have an S5, The Android N Developer Preview is available for Pixel C, Nexus 6P, Nexus 6, Nexus 9 and Nexus 5X.
I'm not sure you are going to find any legal precedence to do anything against anyone who had possession of your phone with your knowledge.
Personally I think you are overacting. But before you go off the rails, on a rant that I'm not helping.
My opinion of you overacting is based on your short term research. Yes there are things possible, but again highly unlikely.
Again, in my opinion your phone has not been hacked. You stated you knew someone had your phone. Someone installed applications on it, and the most possible way is, through the Google Play Store or through Samsung Apps. Which require accounts.....
It takes more knowledge to install them, which would require root access, manually.
From Wikipedia (not saying it's gospel) I don't know where you live, don't want to, but this "should" be reference enough regarding rooting in the US
United States
Under the Digital Millennium Copyright Act (DMCA) rooting is illegal in the United States except by exemption. The U.S. Copyright Office currently grants phones an exemption to this law "at least through 2015".[41]
In 2010, in response to a request by the Electronic Frontier Foundation, the U.S. Copyright Office explicitly recognized an exemption to the DMCA to permit rooting.[42][43] In their ruling, the Library of Congress affirmed on July 26, 2010 that rooting is exempt from DMCA rules with respect to circumventing digital locks. DMCA exemptions must be reviewed and renewed every three years or else they expire.
On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office refused to extend this exemption to tablets, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.[44][45][46] The Copyright Office also renewed the 2010 exemption for unofficially unlocking phones to use them on unapproved carriers, but restricted this exemption to phones purchased before January 26, 2013.[45]
Tim Wu, a professor at Columbia Law School, argued in 2007 that jailbreaking is "legal, ethical, and just plain fun."[47] Wu cited an explicit exemption issued by the Library of Congress in 2006 for personal unlocking, which notes that locks "are used by wireless carriers to limit the ability of subscribers to switch to other carriers, a business decision that has nothing whatsoever to do with the interests protected by copyright" and thus do not implicate the DMCA.[48] Wu did not claim that this exemption applies to those who help others unlock a device or "traffic" in software to do so.[47] In 2010 and 2012, the U.S. Copyright Office approved exemptions to the DMCA that allow users to root their devices legally.[49] It is still possible to employ technical countermeasures to prevent rooting or prevent rooted phones from functioning.[50] It is also unclear whether it is legal to traffic in the tools used to make rooting easy.[50]
At minimum from what have experienced and understand, you root you're phone you void your warranty. From what I have read from people that have jacked up there phone from rooting or a process that was available because it was rooted, they just got a new phone.
Myself included.
Based on what you have written, again I believe you are overacting without personally looking at the phone. Some of the apps and files you describe, some are the base software. libstagefright, libaudio, whatever are part of the Android operating system.
Camera, clock apps etc. are easily installed, with an account on Google or Samsung App stores. Now is it illegal from someone that has physical possession of your phone to install an account on there to install apps.... Don't know, probably not. But malicious intent would have to be proven I imagine.
Also based on what read, I said I believe you are overreacting.
But this statement --->"So, i am now playing with scorching hot fire to beat the clock and get answers b4 something happens to not only the files and info i carry with me, but i have become afraid of what might happen to me, as well"
I'm not sure what this means.
I'm not trying to diminish or ignore your concerns.
BUT
Since you say you know who had the phone, and hopefully I have made you understand that anything on it, had to be done with the phone in their possession, my suggestion is YOU stop messing with it and take it someone qualified to investigate what is on it.
The very first thing that is done is make an exact copy of it.
If you are not going to do that, not sure how far you are going to get with what you seek.
How to find accounts that were used to install apps
http://www.androidcentral.com/how-set-accounts-samsung-galaxy-s5
If the account is not on your phone, without it, proving what was installed is difficult. Google keeps a record. Logging into the account will show what was installed and when. But only with the account name and password.
BUT AGAIN
The more you mess with it, the less chances there are to "prove" the purpose or intent of the person that had YOUR phone, installing these apps.
reset the phone to factory settings
and choose another account with Google
I've never heard of this
Save only your important data to your computer. Like photos and documents.
Then go into settings and look for the option to reset your phone. Reset it to factory. If it gives you an option to format your SD card do that too.
Go to your Google account and reset your password and any security questions.
Check your device or app activity and disconnect anything you don't recognize.
Then sign in to your Google account on your phone.
If your phone is somehow rooted this probably won't unroot it. To be sure download an app from the Play Store called root checker and run it. It will tell you if you're rooted or not. You can uninstall root checker once you've verified your root status.
If you're not rooted then you're good to go and can start redownloading your apps and putting all your files back on your SD card (make sure to format the card via your phone).
If you're rooted look for an app on your phone called super user or supersu or something similar. In the settings of supersu is an option to unroot your phone. Once unrooted then set your phone back up how you like.
Only install apps from a source your know, like the play store, and make sure you have all the security settings enabled like verify apps. Also make sure to not allow third party app installation.
These are some steps to get you going in the right direction.
As far as pursuing any guilty parties, if you're afraid of what might happen then leave it alone and don't put yourself back in a position to repeat the situation. If it's someone you know then confront them and take whatever actions you deem necessary.

Samsung Galaxy 7 Under attack and can't get free. Need Help ASAP!

For some time now, many years, I have experienced problems with my cellular telephone that I could not explain or rectify. I know I am being hacked and no matter how many times I factory reset the phone the problems still exist. My phone has been lost and stolen in which insurance has replaced the phone and in no time or immediately I experience the exact same problems. My videos and pictures are altered, deleted or hidden. All the programs or applications seem to be altered or customized with options that are not the genuine owners options. The graphics associated with the applications and web pages are not the genuine images and I am sure that violates trademark, copyright, intellectual property rights and other laws I am not aware of. Web pages information, contact information, address information, and content are altered and changed which can affect all sorts of areas such as personal safety, product safety, access to information is blocked, altered or displayed in ways that make it impossible to get directions, product availability, law enforcement help, legal help and information. When I use Google Maps for directions, it will take me down one way streets, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. I tried to order cleaning gloves and masks today, and no place in my city was in stock, and delivery was not until July the 5th, 2020. I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units. I did a screen recording of the applications on my phone, and the about phone section. I know from that it is apparent that my phone is hacked and under control of some other party or person. Someone is either maliciously attacking me with the purpose to cause extreme harm for reasons of personal enjoyment, or my name, reputation and activities have been purposely misled and lied about in a gross manner where a cellular telephone developer, or a technology hacker, or information pirate or mercenary developed and/or gave someone or some group a program and knowledge on how to capture my phone and all other electronics and hold it hostage. I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success. I am attaching the screen capture video- it is 20+ minutes and will show the extent of the hacking. Someone is perverting and illegally using developers tools, programs, applications and code in ways that were never intended and can only lead to extreme problems of which in all honesty death or terminal scenarios are all real possibilities. I am hoping to identify these people with your help, and bring them to justice and alleviate my life problems that this has caused and stop the illegal and intentional perversion of the original intent for cellular development which is the fruitful search for knowledge and advancement of useful and legal technology. Please help me in this battle to which all operations on my device are unsuccessful, disheartening, and uncontrollable. Thank you in advance and if this should be posted in another area or forum please advise, however I am posting it in a few that I think are relevant. I live in Houston, Texas- so if there is a group of developers, or some people that can help me combat this locally please message me their contact information. Take care. - Dale-
Screenshots attached and a link to the video of my phone and it’s contents.
Here is the link to the screenshots of applications, programs and phone information: wwwdotdrive.google.com/drive/folders/1OImrdp64ndMzJGN74v7K4G6H4zc2DzV9?usp=sharing
Here is the link with the video of the screen shots and a little narration: wwwdotdrive.google.com/file/d/1i7GU9TVUnqfJvgyLq5roaaPR08EkBf0z/view?usp=sharing
0

My Galaxy 7 ihas been Hijacked and I can not Stop It- I need help!

For some time now, many years, I have experienced problems with my cellular telephone that I could not explain or rectify. I know I am being hacked and no matter how many times I factory reset the phone the problems still exist. My phone has been lost and stolen in which insurance has replaced the phone and in no time or immediately I experience the exact same problems. My videos and pictures are altered, deleted or hidden. All the programs or applications seem to be altered or customized with options that are not the genuine developer or creator options and images. The graphics associated with the applications and web pages are not the genuine images and I am sure that violates trademark, copyright, intellectual property rights and other laws I am not aware of. Web pages information, contact information, address information, and content are altered and changed which can affect all sorts of areas such as personal safety, product safety, access to information is blocked, altered or displayed in ways that make it impossible to get directions, product availability, law enforcement help, legal help and information. When I use Google Maps for directions, it will take me down one way streets the opposite direction toward oncoming traffic,, have ludicrous directions, unnecessary turns, wrong speed limits, and out right wrong directions or even switch my end point without my knowledge. I tried to order cleaning gloves and masks today, and no store in my city was in stock, and delivery was not until July the 5th, 2020. I am also experiencing the same things with all my electronics such as my computer, smart televisions, printers and gps units. I did a screen recording of the applications on my phone, and the about phone section. I know from that it is apparent that my phone is hacked and under control of some other party or person. Someone is either maliciously attacking me with the purpose to cause extreme harm for reasons of personal enjoyment, or my name, reputation and activities have been purposely misled and lied about in a gross manner where a cellular telephone developer, or a technology hacker, or information pirate or mercenary developed and/or gave someone or some group a program and knowledge on how to capture my phone and all other electronics and hold it hostage. I have tried to root the phone in order to put a custom rom on it, but my searches and efforts are blocked and never get any traction or success. I am attaching the screen capture video- it is 20+ minutes and will show the extent of the hacking. Someone is perverting and illegally using developers tools, programs, applications and code in ways that were never intended and can only lead to extreme problems of which in all honesty death or terminal scenarios are all real possibilities. I am hoping to identify these people with your help, and bring them to justice and alleviate my life problems that this has caused and stop the illegal and intentional perversion of the original intent for cellular development which is the fruitful search for knowledge and advancement of useful and legal technology. Please help me in this battle to which all operations on my device are unsuccessful, disheartening, and uncontrollable. Thank you in advance and if this should be posted in another area or forum please advise, however I am posting it in a few that I think are relevant. I live in Houston, Texas- so if there is a group of developers, or some people that can help me combat this locally please message me their contact information. Take care. - Dale-
Screenshots attached and a link to the video of my phone and it’s contents.
Here is the link to the screenshots of applications, programs and phone information: wwwdotdrive.google.com/drive/folders/1OImrdp64ndMzJGN74v7K4G6H4zc2DzV9?usp=sharing
Here is the link with the video of the screen shots and a little narration: wwwdotdrive.google.com/file/d/1i7GU9TVUnqfJvgyLq5roaaPR08EkBf0z/view?usp=sharing

EDITED [Q] Why is /u0026 in the names of my apps? How am I being hacked & tracked?!? Total N00b needs help!

Scrolling through the apps installed on my phone, and it is hit or miss on which of the Android and/or Google apps have \u0026 in the middle of their names. Not all, but it seems the important ones do, that downloaded and installed in the middle of the night hours or days after the initial purchase and set up of the phone. Isn't Gmail, Chrome, Android Web View, Device Unlock, Calculator, Device Health Services, and most Google services already installed in Android phones? It's even in some of the apps I installed later on, but not all. I have looked it up, both here and using different search engines. Not too excited with the results, nor do I have the IT brains to understand all the jargon. Would someone here please explain it in layman's terms? BTW, I know I have been hacked/tracked by my ex for a while now. Would \u0026 happen to be a way to remote access and monitor my phone usage?
EDIT: Nothing was synced to old phones, devices, or accounts. This isn't the first new device he has gained access to. There have been several brands and models, phones and laptops. Your guess is as good as mine, and the police, as to how it is being done. Sometimes he leaves "<rooted>" on the screen or turns on 911 only it locks up the phone a few hours after bringing it into the house. He works in the tech industry. No, this isn't my device I've asked this on. This really hasn't been as fun as it sounds.
Thank you all in advance!
I will put my tin foil hat on while anxiously waiting your replies.
(I know, funny not funny. Either has been having to live with his BS.)
Checking back and bumping. There was just one reply on another thread. Please, someone has to know of this Google and Android system hacking apps combo floating around in Google Developer and Firebase. It's a real thing, and my nightmare now. I will not censure if you developed it or are using it on someone other than me. However, I beg you to reconsider if you are. There are days that I feel that worrying about the safety of my kids and if he does show up somewhere I'm at with a grudge to settle is too much to handle. Not everyone has the ability to get through that. I did not deserve his controlling abuse when we were together and there seems to be no way to get out from under his thumb currently. The local cyber cops have been of no help. They either do not believe this happening, these types of apps exist and what they do are possible (One said, "Those kind of things are just in James Bond movies"), or they think there is no imminent threat because there aren't bruises and the little I do have in the bank has not been touched after closing and opening numerous accounts to keep him out. I make just enough to support my kids and myself. Banking, online shopping, and social media are impossible, and the time is now spent trying to end this on my own. Please, help is needed. One of the members on here has to know what the hell this is.
Thank you again.
ripppani said:
\u0026 seems to be the escape sequence of the Unicode character &. \u0026 cannot do any damage by itself, but it can be and probably is a result of incorrect encoding or decoding of text strings, which in turn could be caused by hacking. If you don't know what Unicode is, here is the Wikipedia article.
I am not sure whether the "<rooted>" really represents that the device is rooted, but you generally don't want someone untrusted to root your device, as rooting it allows the one who rooted it to have unrestricted access to the device.
Click to expand...
Click to collapse
He has had remote unrestricted access to my devices. The <rooted> is one of his reminders he is there, as well as <bootloadermode>, or the locking up or turning on 911 calls only. This hasn't been fun, either having it happen en use or waking up to it. I do not allow this. New devices, new Google accounts, never syncing, and never logging into old accounts. However, no one seems to be able to figure out how he gets into new devices once they enter the house. New routers, modems, entire internet accounts, he still weasels his way in. The hacking apps are Google Developer based, this I know. Try getting info on that out of Google without a warrant. Cyber cops have brushed this under the rug since there has been no physical or financial harm, as of yet.
He lived with me when we were dating. Is there a device that may be in my home that could hi-jack my wifi, allow him to sign into my device, and show it as my device while VPN-ing an address even after all the changes? (I seems to travel all over the place on occasion according to my IP addresses that show up) The location tracking and call/text monitoring is real, as he has shown up or had let things said in my private (ha!) conversations with others slip. Of course he has nothing to do with this. (ha! again)
Any help or input on this would be greatly appreciated. I have looked things up at the library until my eyes bled. I can only comprehend so much without an IT background. I do not have the money for a cyber forensic investigator, and I know the local police probably have me on the Crazy Crying Wolf list. Which is just as embarrassing as knowing that having a complete lack of privacy in my life is a total nightmare.
Thank you again.

Categories

Resources