help pleeeease i need some guidence - General Questions and Answers

hi, im new new and honestly I pretty much have no idea what I'm doing...I did tech support way way way back in the day for Apple but as far as mobile devices...I have learned a lot in the last couple months but ... well here is my dilemma. some person hacked into my home network and my and my preteen daughters phones I got completely new devices new service providers new sim cards gone through multiple phones, xfinity routers, and gmails and phone numbers and social media and every time I do not take anything from a previous phone or Google or social media account and weird things keep happening, like someone else is linked to my phone or cloned it or something and I keep digging and researching and I've noticed something fairly new...my exhusband with whom I've reconnected to try to work things out all the sudden has secret developer accounts and email addresses and I kept finding coding or embedding codes wrote on paper or in his phones clipboard. it appears my last couple of phones have had custom ROM installed on them. how do I fix my devices

Custom ROMs can't install themselves... it takes the phone, a PC and some time.
I know where my phone is 24/7... do you?
If true reflash to stock firmware.

"weird things keep happening, like someone else is linked to my phone or cloned it or something." How would you know any of this? Calls on your account that you didn't make? Linked? This is the only complaint you list.
Why would you be on his phone and how would you know about secret developer accounts (whatever they are)? Coding notes on paper and in his phone's clipboard? Custom roms that you don't know about?
I gotta tell you this doesn't seem like a real post. How can you know all that tech stuff but you don't know how to reset your phone and secure your network?

well as I said I'm brand new and don't know much at all thanks for your time to reply but no I don't always know I naively assumed with a passcode my phone would be safe and safe with those closest to me but i just don't know how to explain what's been going on and how I found my A51 magically stuck in Oden mode when I woke up one morning this is why I am here asking for help please have a little compassion for us mere peasants. I have also had thousands of dollars stolen from my card account and I feel its all related also my I phone did not have service yet I was waiting for payday to get it going and when I did go to activate it...majically it already had a passcode put on it. I just need to know what to look for and how to get my Samsung going again because when I did a factory reset and went to enter my code it was wrong then tried to use my google acct....bet you can't guess what happened next...my effing google password was wrong. I just can't afford to buy another phone and my girls phones have had the same things happen to theirs.

That's one hell of a run on sentence.
I don't bother trying to read poorly structured whatever it is.
Flash all phones to factory firmware Android 10 or higher.
Change all Google and Samsung if any passwords.
Flash latest update to router and reset password better yet don't use wifi.
Done

Arsenal420 said:
"weird things keep happening, like someone else is linked to my phone or cloned it or something." How would you know any of this? Calls on your account that you didn't make? Linked? This is the only complaint you list.
Why would you be on his phone and how would you know about secret developer accounts (whatever they are)? Coding notes on paper and in his phone's clipboard? Custom roms that you don't know about?
I gotta tell you this doesn't seem like a real post. How can you know all that tech stuff but you don't know how to reset your phone and secure your network?
Click to expand...
Click to collapse
I only know what I do because since all this crazyness started with my phone I started looking things up and reading. I know how to reset my phone but it wouldn't fully reset like I noticed it would say it was resetting and it would shut off and restart but nothing was really different. the only reason I know about his accounts is because one morning I woke up and strangely my email had been deleted from my Facebook and one of his emails added and made the primary and I tried to readd mine and delete his and my gmail password had been changed so I had to recover my google he had, excuse me, someone had also made his gmail the back up to my gmail! according to my calculations that gives whoever has access to his gmail, access to my gmail. and my facebook. right? and as far as me knowing what's on is phone well A. Its actually my phone an service he is using and B. when I found his email added on my phone I told him what I found on my phone and Facebook and i asked to see his phone. At first I didn't really know what i was looking at and as I read up on things I would be like ohhhh that's what that was. I found my social and acct numbers on his phone its just all so....so crazy I wouldn't in a million years have thought he would do anything like this. I would just love to be able to eliminate the possibility its he who did any of this I want to be wrong about this I just don't know how to figure any of it out at one point the first phone affected by this I had gone into settings to get my phone info because I was adding a service plan to my phone and the IMIE number and some other information were not correct I was on the phone with a Rep so I reported it to her I don't know what she did with the info. I would google something click on it and it was like I was going in circles just redirected and redirected, I wild also notice my screen would like do this really quick like flash, or like the edges would flash or something. and right now when I try to do the lake recover and set up it looks like there is another screen or homepage underneath super faint but I can see it around the edges. I just want to know how to secure everything so this doesn't keep happening it feels so violating. I don't do any banking period anymore on my phone and I don't put my social security on any online forms anymore. I would like to be able to use my Samsung again i had only used it a couple weeks before got my iPhone which I got only because I was told how great their security was. within 24 hours it was showing me logged in my Apple acct in other countries and states

I've gone to more malware infested sites then I can count, have plenty of mortal enemies, some them hackers.
But in over 10 years of using stock Samsung Androids many times with outdated firmware never had to do a factory reset let alone a reflash due to malware.
It's reasonable secure unless you do something stupid.
Perhaps the enemy is within... I gave you a viable solution for any firmware or security breach.
Unfortunately you can't change who you are and you can only trust someone to be themselves.
Perhaps a flip phone with no internet connection would get it for you.

blackhawk said:
I've gone to more malware infested sites then I can count, have plenty of mortal enemies, some them hackers.
But in over 10 years of using stock Samsung Androids many times with outdated firmware never had to do a factory reset let alone a reflash due to malware.
It's reasonable secure unless you do something stupid.
Perhaps the enemy is within... I gave you a viable solution for any firmware or security breach.
Unfortunately you can't change who you are and you can only trust someone to be themselves.
Perhaps a flip phone with no internet connection would get it for you.
Click to expand...
Click to collapse
Can I show you screenshots of stuff I just found on this phone and you can tell me what I'm looking at and if its normal and the only reason I found out this phone is running a custom ROM is because I clicked on Google help for something the other day and it said "Note: You're using a custom Android version. If these steps don't work for you, check with your device manufacturer" I've never had issues like this before and I just don't know what to do.

The screenshots I took are from settings and in legal information and Third party licenses. I just want someone with way more skills and knowledge than I to see what I'm seeing and tell me "yeah someones jacked with your phone" or "nope this stuff is all normal looks good you're just paranoid"

blackhawk said:
That's one hell of a run on sentence.
I don't bother trying to read poorly structured whatever it is.
Flash all phones to factory firmware Android 10 or higher.
Change all Google and Samsung if any passwords.
Flash latest update to router and reset password better yet don't use wifi.
Done
Click to expand...
Click to collapse
I truly appreciate you and your time to answer my post. How do I do what you have told me? Should I attempt it myself or should I take the phones to someone to have this done?

For this issue, find cops.
Don't factory reset, don't connect to internet, don't use WIFI, don't use bluetooth, don't use microSD cards, don't put a SIM card, take the cards out of the phones. Disconnect everything that will make the phone has internet. Charging battery is allowed. Turn off your home WIFI router, shutoff all electricity of your house.
The phone itself is the proof of illegal acts if what you said someone hijack your belongings are true.

Just in case if you really follow what I wrote.
If you can't live without electricity, turn electricity back on.

pl1992aw said:
Just in case if you really follow what I wrote.
If you can't live without electricity, turn electricity back on.
Click to expand...
Click to collapse
Actually I did go to the police a while back because I was concerned for my girls safety because we were having screen shots of our screens pop up on our devices...they're girls and young and I just wanted to make sure they're protected and there was documentation. I'm surmising by your response I must be sounding crazy and dumb, I don't know I just know what we have had happen and I can't explain it and we've never had issues like this ever before. Maybe it's just best if I ignore what's going on and what we see and continue using our phones like nothing ever happened and just don't save any passwords or enter any sensitive info. I do thank you for taking your time to respond to my post and assisting me.

BettyDont said:
Actually I did go to the police a while back because I was concerned for my girls safety because we were having screen shots of our screens pop up on our devices...they're girls and young and I just wanted to make sure they're protected and there was documentation. I'm surmising by your response I must be sounding crazy and dumb, I don't know I just know what we have had happen and I can't explain it and we've never had issues like this ever before. Maybe it's just best if I ignore what's going on and what we see and continue using our phones like nothing ever happened and just don't save any passwords or enter any sensitive info. I do thank you for taking your time to respond to my post and assisting me.
Click to expand...
Click to collapse
The screen shots that showed up on our phones were not taken by us or our phones I got a barrage of those for a few days. That doesn't really happen much anymore, now I get what feels like tons of prompts to verify or sign in.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
is this normal I've never had a warning like that before but I'm also new to this site so I don't know and thought I would ask

BettyDont said:
Actually I did go to the police a while back because I was concerned for my girls safety because we were having screen shots of our screens pop up on our devices...they're girls and young and I just wanted to make sure they're protected and there was documentation. I'm surmising by your response I must be sounding crazy and dumb, I don't know I just know what we have had happen and I can't explain it and we've never had issues like this ever before. Maybe it's just best if I ignore what's going on and what we see and continue using our phones like nothing ever happened and just don't save any passwords or enter any sensitive info. I do thank you for taking your time to respond to my post and assisting me.
Click to expand...
Click to collapse
Buy new phones from local official shops for better privacy. Change system. If you were using Android now, change to Apple. Security between OS is different and hard to replicate hijack or something.
Online account is a bit complicated, but can still be dealt with cops.
Write your importance in priority order, so you know how to judge what you can give up and what you cannot. Also you will be able to plan according to importance.
For example:
Girls' safety > your safety > Privacy > Phone > Money
(Write it yourself, I'm not you.)
When people are in extreme emotions/state, one can forget basic things. Don't look at the past peaceful days, you can't change the past.
Even wondering why you trust someone online rather than cops. The person can be among us, and can have been reading till now.

pl1992aw said:
Buy new phones from local official shops for better privacy. Change system. If you were using Android now, change to Apple. Security between OS is different and hard to replicate hijack or something.
Online account is a bit complicated, but can still be dealt with cops.
Write your importance in priority order, so you know how to judge what you can give up and what you cannot. Also you will be able to plan according to importance.
For example:
Girls' safety > your safety > Privacy > Phone > Money
(Write it yourself, I'm not you.)
When people are in extreme emotions/state, one can forget basic things. Don't look at the past peaceful days, you can't change the past.
Even wondering why you trust someone online rather than cops. The person can be among us, and can have been reading till now.
Click to expand...
Click to collapse
A- I couldn't give a single F if he is among us reading...its a good possibility even.
2- The cops in this town are the last people to be trusted... Unless of course your a fellow officer who murdered your wife...then your good. I'll take my chances with you guys.
C- I recovered one of my phones today got it all fresh and clean. I properly secured it and now am more aware and have acquired a little more knowledge. You are absolutely correct about prioritizing, so simple and basic yet easy to jumble up when you feel frantic or threatened. Just had to slow down take a breath pull myself together and now I feel pretty confidant my girls are safe, that is my number one priority. I feel I come across as simpleton to some of you. yes I may lack the knowledge and technical skills you and many others here have, I do however have perseverance and absolute willingness to learn and ability to be taught so in my eyes I'm alright man. I accomplished some goals today and with thanks to you guys here even though some of you come across as condescending, I still like yous anyway.

Children lack the social and technical wherewithal to use these devices safely.
That's why they are called children... they have a lot to learn.
It's your job to control the heat and keep it survivable even if it means no unsupervised internet usage.
I know a lot of good LEOs, many more good than bad. To bunch them together is a huge lapse in judgement with far reaching consequences.
It will not serve you well... learn to walk in the other man's shoes.

blackhawk said:
Children lack the social and technical wherewithal to use these devices safely.
That's why they are called children... they have a lot to learn.
It's your job to control the heat and keep it survivable even if it means no unsupervised internet usage.
I know a lot of good LEOs, many more good than bad. To bunch them together is a huge lapse in judgement with far reaching consequences.
It will not serve you well... learn to walk in the other man's shoes.
Click to expand...
Click to collapse

I hear what your saying and am listening as well. Man I got my answers this morning.. Not the answer I was hoping for. Sadly I wish I wasn't in my own shoes right now. Once again i thank you all. It felt at times like this all was never going to end and I was going to end up with a land line, a mac 184k and a straight jacket. You guys have a good day.

Related

Anti-theft set-up

First of all, why don't I just write this in an existing thread? Because I don't want this post to get buried. I think I've come up with a perfect anti-theft setup.
(1) Go to google and setup a new account. Password for this account should be something easy for you to remember. Do not add this account to your tablet. You also do not want to use this account for your everyday emailing.
(2) Go to market and buy the app "gotya". It's only $2 or so. Come on, morning coffee costs more than this.
(3) Go into gotya and setup so that gotya will email a picture and gps coordinate every time the tablet is turned on or brought out of sleep. Delay taking a picture by a few seconds to make sure the user is looking into the tablet.
(4) Put the email account you just setup into gotya. This email is a complete record of who's been using the tablet. Most of the time, it will be you. But if your tablet is ever stolen or lost, all you have to do is go into this email account and look at the last time it was turned on for picture of user and location.
(5) Don't forget to password protect gotya.
(6) DO NOT password or lock your tablet. The point of this setup is you want the thief to be able to log into your tablet so he can log into wifi so gotya can email the info to you. If the thief is logged out, he can simply nvflash, factory reset, hard reset, or sell it at a pawn shop. You want to encourage him (or her) to use the tablet at least once so you can get a good picture and gps coordinate of the thief for the police.
(7) The app gotya will run quietly in the background for all times. It consumes the absolute minimal resources. In fact, your tablet can even go into deep sleep. Gotya really is a well written app.
(8) Again, do not put the gotya email into your email account to sync on your tablet. You don't want the thief to know you're keeping track of his whereabouts and his face.
hmm. this may be cool to setup in the future. my tf doesnt leave the house at all really so theres no need quite yet. lol good post though OP!
very interesting, thanks for sharing. Would be interested in what fellow xoomers or eepaders have to say about this setup
definitely getting this for my tablet
cerberus is pretty much the same as this and as alot of nice features
salbalboa said:
cerberus is pretty much the same as this and as alot of nice features
Click to expand...
Click to collapse
Please elaborate.
locks the device,emails you the location and takes pictures also can wipe data all from a web page. i use this on my phone aswell as the tf.
salbalboa said:
locks the device,emails you the location and takes pictures also can wipe data all from a web page. i use this on my phone aswell as the tf.
Click to expand...
Click to collapse
How does it know when to lock the device?
It wouldn't stop the thief to boot into recovery right away and wipe the device, would it? So, it might be a nice protection against a crime of opportunity, but nothing against someone who knows what he's doing.
pypen said:
It wouldn't stop the thief to boot into recovery right away and wipe the device, would it? So, it might be a nice protection against a crime of opportunity, but nothing against someone who knows what he's doing.
Click to expand...
Click to collapse
Just for kicks, I've been asking random people the past 5 days or so if they know how to boot into recovery on an android device. So far, no one has said yes.
What are the chances that the thief would know how to wipe the device?
Any security system can be bypassed if you have the know-how. This doesn't prevent we have security systems all over the place. Why? Because not many have the know-how.
goodintentions said:
I think I've come up with a perfect anti-theft setup.
Click to expand...
Click to collapse
I think your name fits you well. It is obvious you have the best of intentions. However, a thief that knows ANYTHING about tech would open it up, and then before doing anything else (such as connecting to wifi) would just factory reset it. At least that is what I would do with any stolen tech I took (assuming I would...and if our economy keeps tanking I might have to become a thief). Even with open wifi, if you don't already have that SSID setup, it wouldn't connect without input.
So unless the person was dumb enough to not only open it up, but then connect to a wifi source first, this would never work. Your best bet would be to hope they were either really stupid in general, or a really stupid identity thief that would want your personal data intact while using it.
Basically, your best anti-theft practices would be to always keep your **** with you. Don't leave it in the car, don't leave it sitting on a table at a coffee shop while you go take a piss, etc. Mine never leaves my side when I'm out and about with it. So the only way someone is getting it from me is either by gunpoint or magic.
I have a story to tell. So, a long time ago in another life I worked as a cop. Patrolled along the highway during the nighttime. One night, and it was a boring slow night, I decided to pull over a car that was going about 15 or so over and was going to give him a warning. Nothing else to do. When I walked up to him, the first thing I saw was him eating something. As we talked, I could see weed all over his teeth. The guy ate a bag of weed. Told him to step out. A bag of rock cocaine fell out of his pocket.
I walked away from my law enforcement career knowing most criminals out there are stoopid. And no matter how tough or tough looking they are, they all cry once busted. Sure, there are some brilliant ones out there. But I'm sure chances are you will lose your TF to a dumb one. The odds are against a smart criminal stealing your TF.
Anyway, you are absolutely right. My method isn't fool proof. But think about it for a moment. The email account for this purpose will have a detail record of who and where turns the TF on or bring it out of sleep. All it takes is a connection to wifi and the app will email all its records.
That said, my TF doesn't leave my side either LOL.
I really wish they would enable wireless/GPS tracking right into the ROM so you can look it up based on serial number. I wonder if I should patent the idea so I can sue Apple and others when they finally get around to implementing it on tablets... Hmmm....
Not sure if it works on tablets, but my wife lost her Android phone and I used Android Track to get it back - I even installed it after the phone was lost. It does quite a bit like location tracking, remote wipe, takes pictures, records audio, will say something using text-to-speech, can view the call log, etc. Free too
-- Sent from my HP TouchPad using Communities
ExploreMN said:
I really wish they would enable wireless/GPS tracking right into the ROM so you can look it up based on serial number. I wonder if I should patent the idea so I can sue Apple and others when they finally get around to implementing it on tablets... Hmmm....
Click to expand...
Click to collapse
Isnt that already in the iphone? They had that big invasion of privacy thing on the news.
If you made it an optional etc though that would be cool and different.
Sent from my tf101 using xda premium 1.54Ghz
A good companion for this is App Locker. It pops up a fake FC screen. You can lock stuff you don't want them to see. pic/mail/ect. It has a feature that if you unlock one app, they all unlock, then locks when screen turns off/on.
Check it out.
https://market.android.com/details?id=net.xdevelop.protector&hl=en
I like the OP's idea. I also think this thread betrays some peoples naiveity. If you are going to steal someones computer: go for broke. See what data of value you can scavenge out of it, THEN do a factory reset. You might find more ROI on the risk of having stole the darn thing, and hey, if you're gonna be a thief, may as well do it right lol.
Does anyone else wonder if ICS's face unlock stuff can handle beards or just photo prints? LOL. Edit: Looks like the photo-print idea has already been tested.
Sent from my Transformer TF101 using Tapatalk

HACKED!!!

so this is just a general message to all android users. something everyone SHOULD know about but most (non-tech) smartphone users fall short and victim to... the reason im posting this is because the wifes phone has been acting wierd lately, by wierd i mean apps have been opening up by themselves, internet browsers opened to websites that she would never go to, wallpapers keep getting changed, phone randomly being turned off, all of this happening most of the time while shes at work. now just so we know her wasnt rooted till two days ago which i did to see if maybe there was just something wrong with the stock crap that she had. turns out this wasnt the case. so i decided to post this just to make people more aware and hopefully prevent this from happening to anyone else.
what you can do to prevent this invasion
first and foremost PUT A PASSWORD ON YOUR PHONE!!! even if you have nothing to hide this will help from major things like bank accounts and passwords from emails getting stolen!
make the password hard to guess by this i dont mean use your kids names or birthdays but something no one would ever guess and use a combination of numbers and letters and never use the same password twice!
change your password atleast once a week! this will help to keep potential hackers guessing and make it harder for them to figure it out and hey if they figure it out this week they may not next week.
try to stay off of unsecured wifi networks, most routers these days have a firewall built in and if the network is protected by a password this will make it that much harder for a hacker to get into your files!
make sure you have your bluetooth set up so that other devices can only see you if they are paired or just keep it turned off when its not being used! same goes for NFC, Smart Beam, Bump, things of that nature...
dont let browsers like firefox, google chrome, e.g. save password this will also help to prevent the hacker from getting access to your email's and bank accounts! also a good idea to make sure you sign out of apps when you close them instead of leaving them open.
i hope this helps anyone else who may have had or has a problem with this from it ever happening again!
Common sense, that's all you need.
Changing your password once a week is a bit drastic in my opinion.
Sent from my SGH-T999 using xda premium
Just don't install wonky apps and dont connect to public networks. As simple as that.
Does setting a password really block remote access to your phone? I thought it only blocked a user from operating the device. I think you have to set up full encryption to protect yourself from invasions. Also. Google offers 2 step verification from the play store, which makes your accounts more secure.
So how did someone get remote access to the device? Maybe if you told us the cause and how it happened it would help the rest of us to not get caught in that situation.
if this is happening mainly at work is it possible she's using there wifi and if she is how do you know a fellow employee is not hacking in to her phone.
phatmanxxl said:
So how did someone get remote access to the device? Maybe if you told us the cause and how it happened it would help the rest of us to not get caught in that situation.
Click to expand...
Click to collapse
Unfortunatly I dont know the answer to this question as its her phone. I know she doesnt have any "remote access" apps installed.
biker4033 said:
if this is happening mainly at work is it possible she's using there wifi and if she is how do you know a fellow employee is not hacking in to her phone.
Click to expand...
Click to collapse
no she has confermed that she doesnt use the wifi at work doesnt even have it in her connection list so no fellow employee is doing it even though I suspect this one guy that seems to sit up there all day just for the free wifi, even though wifi isnt the only way a hackwr can get into ur files its just easier.
sauprankul said:
Just don't install wonky apps and dont connect to public networks. As simple as that.
Does setting a password really block remote access to your phone? I thought it only blocked a user from operating the device. I think you have to set up full encryption to protect yourself from invasions. Also. Google offers 2 step verification from the play store, which makes your accounts more secure.
Click to expand...
Click to collapse
setting a password doesnt block total access no but it would help to detur hackers and yes encryptions would prolly be better! Disnt even thing about that!!!
Da Kine said:
Common sense, that's all you need.
Changing your password once a week is a bit drastic in my opinion.
Exactly common sense... unfortunatly the world is filles with retards which was the main point of this post. Smartphones where made for "unfortunatly" stupid people... yes changing the password may be a bit drastic but maybe it would detur said hacker long enough to bore him with trying to figure it out and make him leave u alone... :/
Sent from my SGH-T999 using xda premium
Click to expand...
Click to collapse
This message was sent from the a satellite in the sky.
Most of it is just common sense. Who leaves open connections unattended, anyway? Bloody hell, I turn 3G off when I'm not using it... (Mainly for battery life and the near border, but the fact stands.)
As for the passwords. Once a week is more than a bit paranoid, once every three months is a better aim.
And Don't use ridiculous sentimental passwords, such as your pets or family names and birth dates. A quick Facebook search and some logical thinking is all that's needed to figure out your password. You do not wish to know how many times I've had to do it for people who've forgotten theirs or when I needed access to a computer without the owner present. It's laughably easy, people are far too simple for their own good.
Another stupid thing I've seen people do: Leave their phone unattended in good faith or sheer negligence. Leaving your phone on your desk, or in your bag near your desk, when you go grab a new cup of tea, print something, speak with someone or visit the loo is just asking for someone else to mess with your phone. People can't be trusted. Nobody! Also, do not lend it to someone without supervision, Do Not Let It Out Of Your Sight!
I suspect that is also how your wife got her phone hacked; she probably left it in her bag or on her desk for a few minutes as she went to do something out of the line of sight.
I don't know if someone has stated this already but something that can also help out a lot and I know that a lot of people do it including myself on one or two occasions is staying legit. Meaning do not go online looking for an app for free to save yourself a dollar or so. Just pay for the app because it took time to develope and the creator deserves the donation, not to mention the apk could contain malware!
Sent from my SAMSUNG-SGH-I317 using xda premium
ShadowLea said:
Most of it is just common sense. Who leaves open connections unattended, anyway? Bloody hell, I turn 3G off when I'm not using it... (Mainly for battery life and the near border, but the fact stands.)
As for the passwords. Once a week is more than a bit paranoid, once every three months is a better aim.
And Don't use ridiculous sentimental passwords, such as your pets or family names and birth dates. A quick Facebook search and some logical thinking is all that's needed to figure out your password. You do not wish to know how many times I've had to do it for people who've forgotten theirs or when I needed access to a computer without the owner present. It's laughably easy, people are far too simple for their own good.
Another stupid thing I've seen people do: Leave their phone unattended in good faith or sheer negligence. Leaving your phone on your desk, or in your bag near your desk, when you go grab a new cup of tea, print something, speak with someone or visit the loo is just asking for someone else to mess with your phone. People can't be trusted. Nobody! Also, do not lend it to someone without supervision, Do Not Let It Out Of Your Sight!
I suspect that is also how your wife got her phone hacked; she probably left it in her bag or on her desk for a few minutes as she went to do something out of the line of sight.
Click to expand...
Click to collapse
This was already stated.... you basicly reiterated
what I already said but made it sound smarter... and she works at a fast food joint so it stays in her pocket or in the locked car when charging...
XBearingArmsX said:
I don't know if someone has stated this already but something that can also help out a lot and I know that a lot of people do it including myself on one or two occasions is staying legit. Meaning do not go online looking for an app for free to save yourself a dollar or so. Just pay for the app because it took time to develope and the creator deserves the donation, not to mention the apk could contain malware!
Sent from my SAMSUNG-SGH-I317 using xda premium
Click to expand...
Click to collapse
I must admit I am one of rhose people that downloads the .apk but not to one up google play or the dev but simply cus google doesnt give u but 15 mins to get a refund and lets face it thats no where near enough time to test an app to see if its something that will suit ones needs, so I download the apk file to see if its something that I would wanna keep and if it is then I go back whrn I have the extra cash to buy said apps...
This message was sent from the a satellite in the sky.
Rookie407 said:
I must admit I am one of rhose people that downloads the .apk but not to one up google play or the dev but simply cus google doesnt give u but 15 mins to get a refund and lets face it thats no where near enough time to test an app to see if its something that will suit ones needs, so I download the apk file to see if its something that I would wanna keep and if it is then I go back whrn I have the extra cash to buy said apps...
This message was sent from the a satellite in the sky.
Click to expand...
Click to collapse
This is probably where your malware came from. I'd suggest doing a factory reset and stop downloading pirated apps. If you want a refund after the 15 minute trial period just email Google or the developer, they are usually pretty good at giving refunds.
Sent from my SGH-I747M using xda app-developers app
gc84245 said:
This is probably where your malware came from. I'd suggest doing a factory reset and stop downloading pirated apps. If you want a refund after the 15 minute trial period just email Google or the developer, they are usually pretty good at giving refunds.
Sent from my SGH-I747M using xda app-developers app
Click to expand...
Click to collapse
I know it wasnt the downloading of apps as my wife is one of those non-techy people ive been talking about... it could have however been from her dl'ing music from unreliable websites.
This message was sent from the a satellite in the sky.
If anything suspicious was happening to my phone I would immediately wipe/flash a new rom.
Banking apps are pretty risky too if they are easily logged into.
nmur said:
If anything suspicious was happening to my phone I would immediately wipe/flash a new rom.
Banking apps are pretty risky too if they are easily logged into.
Click to expand...
Click to collapse
Sadly if you were hacked you would need to do alittle more then just wipe and reflash, u would need to delete all email accounts tied to said phone and apps used in the past + get a new number basicly start EVERYTHING new!
This message was sent from the a satellite in the sky.
If u happen to know the hackers ip address and or phone number you could always call your provider and have them block it also
This message was sent from the a satellite in the sky.
I could recommend to you wifi protector against hackers via wifi.. and also an antivirus for safety purpose
Wifi protector is available here in xda..
Sent from my A618 TV Duo using xda app-developers app
FROST_wyrm said:
I could recommend to you wifi protector against hackers via wifi.. and also an antivirus for safety purpose
Wifi protector is available here in xda..
Sent from my A618 TV Duo using xda app-developers app
Click to expand...
Click to collapse
Didnt know there was an app like that ty for this post! And we have lookout so we are covered on the anti virus part...
This message was sent from the a satellite in the sky.
That app was actually an anti.wifikill and for other apps that will try to access your phone just like hacking your fb account and others.
Sent from my A618 TV Duo using xda app-developers app
Thanks
nice tip..gona take ur advice
Talking about being hacked, I fell victim to this too a year ago and I was able to put a stop to it. But first I'll explain my ordeal. One night I started getting calls from friends very pissed off that I kept calling them at 1 and 2 in the morning and waking them up and hanging up the phone. I kept telling them I swear I never called you. This went on to the point I lost a few friends until I saw it happen right before me eyes. Bet I know what your thinking, Pocket dialing? NOPE. My phone was dialing on it's own while sitting on the table at night charging.
So here it is 1 AM in the morning and I notice the light on my LG Optimus's screen coming on. I walked over and took a look, and to my surprise!! The darn thing was opening up the dial pad, moving to callers on my list and calling each one. This freaked me out. I thought I had ghost in the house. haha.
I reported this to Virgin and yea right, not much help. They must of thought I was on drugs. I decided to research this and low and behold, others were having this same problem with all models of phones. So someone did something about this and written an App called, "Called Confirmed Code." Nice thing was every time my phone attempted to make a phone call on its own, a password box appears asking for the pin number. Wrong pin rejects the call and closes the dial-er.
So I installed in hopes to find out if this is a glitch in Froyo 2.2.1 or a hacker. It happened once again. Phone woke up on its own that night and I watched in horror as the password box came up and someone was attempting to guess the pin number. each time he failed, the dial-er closed. I knew now someone was in my phone.
Did more research and read that there are open ports used a remote OTA Virgin uses to update your software over the air was being exploited and allowing hackers to fool my phone into thinking I had updates and allowing software to install on the phone. I took my phone to my local police dept and have a detective look into it and sure enough, it was a piece of software that got into the phone through the OTA port. Another words, What I though was a legit security update was nothing more then a backdoor installed.
So, I made copies of the police reports and faxed everything to Virgin's headquarters and weeks later, said there is no proof such a thing can happen.
WHAT!! Weather or not this is possible guys, it happen to me and that's what pushed me to root and flash my phone. Never did update through the OTA again. That's o.k. because Virgin Mobile did away with OTA updates because why??? Exploits. They still wont admit it today. And it doesn't stop there. That's my story how I got hacked. Maybe your's is different.
Do you always turn your wifi on?
hackers can only hack you if you are connected
No harsh feelings please, smile ka din

[Q] (not) Unique Situation - Have 2 Galaxy S3 Verizon and Need Guidance

Hi:
I started writing a thread the other day but stopped as it was full of drama and detail not important. This is what happened (when there is drama I will insert [D] with no detail so the context is maintained a bit.
I was minding my own business when one day last week my Samsung Galaxy G3 (I535) suddenly lost the ability to make/receive calls. I was on 4.1.2 and rooted, bootloader unlocked via ODIN. I thought I had loaded software that caused the problem. Couldn't resolve. Called Verizon [D] [D] to level 2, no problem, let me check a few things, OK, cool, do you have 2nd SIM? Yes! OK, it must be the phone, let's get you a replacement.. (Saturday, Phone arrives Tues).
New phone, powers up, no updates, authentication nightmare. Will not auth. Call Verizon...just wait a while?...OK.
Some hours later, authenticated. Very odd problems: charge isn't indicated on several chargers, then it is, then it isn't, charger independent? Keyboard exhibits over 1000 ms delay on press; unusable. Several other odd problems. Confused, I look online: Verizon Galaxy G3 4.4.2 update slow. First two hits happen to be Verizon's own "self-support" boards. All my symptoms and more. Lot's of Verizon's taking customers through the swamp looking for snipe. Reboot, Sim pull/insert, Factory Reset. Called Verizon back, hold times 4x previous call. Getting to Level 2 very difficult, CS rep actually states: "I know most of our phones and I haven't heard this set of problems". I refered him to Verizon's web site, grudingly sends me to Level 2. Extremely long hold time, and upon answer that group is not busy at all but relaxing talking together. Guy is grumpy, "Let me check something", back without hold in about 10 mins. "What ROM did you flash on the phone!?" first thing he said to me.
I've never flashed a ROM on any phone, for the record. I told him I knew what was and didn't do that. He insisted that he "couldn't read the software on the phone" [D] [D]!
I maintained polite, and focused on a solution, but he would not hear of that. I also offered to do a Factory Reset at least twice. "The Custom ROM will still be there after Factory Reset!" Perhaps, but then that would prove what I did and didn't do, maybe? Finally, I told him that I was very tired, and we weren't solving anything. Could I have an problem ticket number or incident number for reference. "We don't use those anymore". "You can have my employee ID and my phone number." Sorry if this is not PC, but it felt like a rapist giving his victim his contact information, should victim want to be in touch. I said, no, I'll just call back.
Immediately upon termination the new phone (replacement) displayed "Safe Mode" no apps, and the inabilty to unselect "screen mirroring" a new feature to me, but now turned on. I pull the SIM and factory reset, even though I had loaded many apps back (Inclulding Towelroot, which I had found and implemented). Although no idication of root before, the phone showed rooted and customer or modified, I don't remember the fields. Next day called back, long holds, CS OK, everyone had read Level 2 notes. Sent me up to Level 2. Long hold time, over 30 minutes. Cold response. I asked why the replacement of a non-functioning device had branched into, after receiving said device, two separate issues, to me it was one, getting my service back. Cold, "what do you want us to do?" Not knowing, I said, "I don't know, I just want the phone to work". Finally he went to talk to the boss, came back at 0 deg. Kelvin, through clenched teeth: You can take your phone to Best Buy, they will flash it back (I presumed to 4.1.2), after factory reboot and confirm no....[D] Thanks, I terminated.
At this point I had no working phone for several days, and I felt very upset about the entire situation, especially how I'd been treated by the last two guys. The first after the replacement was so out of line he should have been sanctioned, and an appology directed at me by manager, unless....
This is what they intended to happen. Because the OTA updates hadn't taken, perhaps, they disabled the G3 connection on the device (and it was unprovisioned on their server), knew this would lead to the likely steps above, and were so intent on getting me under their control with 4.4.2 (which I knew nothing about, in terms of root, etc), they had manipulated me to 4.4.2? I am a long time customer with unlimited data, a withdrawn discount, and paying over $200 for two lines with shared limited minutes and txt. No contract.
Whatever the case I still have my 4.1.2 G3 (no voice) and the 4.4.2 replacement. Obviously, I cannot consider staying at Verizon (likely what they want, apparently). Which do I keep? How do I prep the other for return to them? Know any good class action attorney? Obviously, Verizon is too big to care about me and, like so many huge corporations, no one dares attempt to regulate them.
Thanks for any advice. For infomormation on any technical steps to support the above paragraph, please simply refer me to the thread or post and I'll take it from there. I am not super technical, and had to re-do the original ODIN process about 3 times before it took, so any existing process instructions targeted at the Stupid User level would be appropriate and very much appreciated.
Sorry this is so long, I honestly left out a few calls because it just dawned on me, after I called V back today to figure out next steps, the guy listened (read the notes), said I was very poorly handled, I deserved better, would go talk to manager, be right back, 20 minutes later, manager still busy, can he call me back? Sure, gave info. Not a single call or attempt. That was the "It's not us, it's you response" but made to sound the other way round. Apparently they want me to walk away with a useless device, and since it's old and I'm not under contract, but love the phone, I can't understand why they would destroy my property and tell me to f-off, other than they feel like it.
If this sounds like paranoia, you might be surprised what big companies will do to you if they can. And so far, I'm the only one harmed, since they probably expected me to stop days ago. In any event, I have to send back a phone to them and hopefully keep one that works somewhere else. Please help me with the steps I need to take.
If you like history, or want to see how the big guys got a stranglehold on the US after the Civil War, then were forced back into decency by Teddy Roosevelt, W. Wilson, and FDR check out the Roosevelt 7 part documentrary recently appearing on PBS. I'm up to Episode 4, and already knew much of the story, but the detailed focus on their private and public lives and how they matured and developed is moving, enlightening, and awe-inspiring.
Thank You in Advance,
Mark
I really should say I'm surprised but in reality I'm not. Your right when you say they don't care because I've experienced it for myself and with my gf over the phone and my mom for that matter. The sad part is they are getting way too big for even themselves and like most companies don't have very good customer service. I'm unlocked as well and have never had issues with voice calls on this phone, only my first phone with a weird rom. It's not there business to ask you if you've installed a custom rom or not. I wouldn't even of answered the question myself.
Personally i would dump verizon if they treated me like that. I was in the store yesterday with my gf and she is a looooong time VZW customer. I'm taking 14 plus years and she went to best buy to get a phone because VZW doesn't know how to take care of customers at all.
It's a sad trend but the bigger the company the worse the customer service is
From my Wicked S3 on SOKP
mrbonine said:
Hi:
I started writing a thread the other day but stopped as it was full of drama and detail not important. This is what happened (when there is drama I will insert [D] with no detail so the context is maintained a bit.
I was minding my own business when one day last week my Samsung Galaxy G3 (I535) suddenly lost the ability to make/receive calls. I was on 4.1.2 and rooted, bootloader unlocked via ODIN. I thought I had loaded software that caused the problem. Couldn't resolve. Called Verizon [D] [D] to level 2, no problem, let me check a few things, OK, cool, do you have 2nd SIM? Yes! OK, it must be the phone, let's get you a replacement.. (Saturday, Phone arrives Tues).
New phone, powers up, no updates, authentication nightmare. Will not auth. Call Verizon...just wait a while?...OK.
Some hours later, authenticated. Very odd problems: charge isn't indicated on several chargers, then it is, then it isn't, charger independent? Keyboard exhibits over 1000 ms delay on press; unusable. Several other odd problems. Confused, I look online: Verizon Galaxy G3 4.4.2 update slow. First two hits happen to be Verizon's own "self-support" boards. All my symptoms and more. Lot's of Verizon's taking customers through the swamp looking for snipe. Reboot, Sim pull/insert, Factory Reset. Called Verizon back, hold times 4x previous call. Getting to Level 2 very difficult, CS rep actually states: "I know most of our phones and I haven't heard this set of problems". I refered him to Verizon's web site, grudingly sends me to Level 2. Extremely long hold time, and upon answer that group is not busy at all but relaxing talking together. Guy is grumpy, "Let me check something", back without hold in about 10 mins. "What ROM did you flash on the phone!?" first thing he said to me.
I've never flashed a ROM on any phone, for the record. I told him I knew what was and didn't do that. He insisted that he "couldn't read the software on the phone" [D] [D]!
I maintained polite, and focused on a solution, but he would not hear of that. I also offered to do a Factory Reset at least twice. "The Custom ROM will still be there after Factory Reset!" Perhaps, but then that would prove what I did and didn't do, maybe? Finally, I told him that I was very tired, and we weren't solving anything. Could I have an problem ticket number or incident number for reference. "We don't use those anymore". "You can have my employee ID and my phone number." Sorry if this is not PC, but it felt like a rapist giving his victim his contact information, should victim want to be in touch. I said, no, I'll just call back.
Immediately upon termination the new phone (replacement) displayed "Safe Mode" no apps, and the inabilty to unselect "screen mirroring" a new feature to me, but now turned on. I pull the SIM and factory reset, even though I had loaded many apps back (Inclulding Towelroot, which I had found and implemented). Although no idication of root before, the phone showed rooted and customer or modified, I don't remember the fields. Next day called back, long holds, CS OK, everyone had read Level 2 notes. Sent me up to Level 2. Long hold time, over 30 minutes. Cold response. I asked why the replacement of a non-functioning device had branched into, after receiving said device, two separate issues, to me it was one, getting my service back. Cold, "what do you want us to do?" Not knowing, I said, "I don't know, I just want the phone to work". Finally he went to talk to the boss, came back at 0 deg. Kelvin, through clenched teeth: You can take your phone to Best Buy, they will flash it back (I presumed to 4.1.2), after factory reboot and confirm no....[D] Thanks, I terminated.
At this point I had no working phone for several days, and I felt very upset about the entire situation, especially how I'd been treated by the last two guys. The first after the replacement was so out of line he should have been sanctioned, and an appology directed at me by manager, unless....
This is what they intended to happen. Because the OTA updates hadn't taken, perhaps, they disabled the G3 connection on the device (and it was unprovisioned on their server), knew this would lead to the likely steps above, and were so intent on getting me under their control with 4.4.2 (which I knew nothing about, in terms of root, etc), they had manipulated me to 4.4.2? I am a long time customer with unlimited data, a withdrawn discount, and paying over $200 for two lines with shared limited minutes and txt. No contract.
Whatever the case I still have my 4.1.2 G3 (no voice) and the 4.4.2 replacement. Obviously, I cannot consider staying at Verizon (likely what they want, apparently). Which do I keep? How do I prep the other for return to them? Know any good class action attorney? Obviously, Verizon is too big to care about me and, like so many huge corporations, no one dares attempt to regulate them.
Thanks for any advice. For infomormation on any technical steps to support the above paragraph, please simply refer me to the thread or post and I'll take it from there. I am not super technical, and had to re-do the original ODIN process about 3 times before it took, so any existing process instructions targeted at the Stupid User level would be appropriate and very much appreciated.
Sorry this is so long, I honestly left out a few calls because it just dawned on me, after I called V back today to figure out next steps, the guy listened (read the notes), said I was very poorly handled, I deserved better, would go talk to manager, be right back, 20 minutes later, manager still busy, can he call me back? Sure, gave info. Not a single call or attempt. That was the "It's not us, it's you response" but made to sound the other way round. Apparently they want me to walk away with a useless device, and since it's old and I'm not under contract, but love the phone, I can't understand why they would destroy my property and tell me to f-off, other than they feel like it.
If this sounds like paranoia, you might be surprised what big companies will do to you if they can. And so far, I'm the only one harmed, since they probably expected me to stop days ago. In any event, I have to send back a phone to them and hopefully keep one that works somewhere else. Please help me with the steps I need to take.
If you like history, or want to see how the big guys got a stranglehold on the US after the Civil War, then were forced back into decency by Teddy Roosevelt, W. Wilson, and FDR check out the Roosevelt 7 part documentrary recently appearing on PBS. I'm up to Episode 4, and already knew much of the story, but the detailed focus on their private and public lives and how they matured and developed is moving, enlightening, and awe-inspiring.
Thank You in Advance,
Mark
Click to expand...
Click to collapse
I don't really have any info to help you, so I apologize for that.
But out of curiosity, do you have the MyVerizon app (or whatever the name is) installed?
At one point the app requested root permission, which is EXTREMELY sketchy in my opinion. I wonder if you grant it, or even deny it (if they can detect the denial) if they ASSUMED that you installed a custom ROM, because a lot of those that root also install custom ROMs.
Maybe just try at a different time of day to maybe get a call center in a different state or country?
That is extremely unprofessional on their part though...
Sent from my SCH-I535 using XDA Free mobile app
XdrummerXboy said:
I don't really have any info to help you, so I apologize for that.
But out of curiosity, do you have the MyVerizon app (or whatever the name is) installed?
At one point the app requested root permission, which is EXTREMELY sketchy in my opinion. I wonder if you grant it, or even deny it (if they can detect the denial) if they ASSUMED that you installed a custom ROM, because a lot of those that root also install custom ROMs.
Maybe just try at a different time of day to maybe get a call center in a different state or country?
That is extremely unprofessional on their part though...
Sent from my SCH-I535 using XDA Free mobile app
Click to expand...
Click to collapse
Speaking of verizon and apps. My gf when she was on the phone was told by a rep that she had updated an app the previous day through Google play. Talk about sketchy! Yea I remember when the verizon app requested root permissions on my phone, that was it for verizon apps for me
From my Wicked S3 on SOKP
ShapesBlue said:
Speaking of verizon and apps. My gf when she was on the phone was told by a rep that she had updated an app the previous day through Google play. Talk about sketchy! Yea I remember when the verizon app requested root permissions on my phone, that was it for verizon apps for me
From my Wicked S3 on SOKP
Click to expand...
Click to collapse
Wow, that takes things to a whole new level....
Sent from my SCH-I535 using XDA Free mobile app
XdrummerXboy said:
Wow, that takes things to a whole new level....
Sent from my SCH-I535 using XDA Free mobile app
Click to expand...
Click to collapse
Your telling me. She's not rooted or unlocked though but that's still messed up. She got her shiny new S5 yesterday, looks nice
From my Wicked S3 on SOKP
ShapesBlue said:
Your telling me. She's not rooted or unlocked though but that's still messed up. She got her shiny new S5 yesterday, looks nice
From my Wicked S3 on SOKP
Click to expand...
Click to collapse
Hmm.. I wonder how they knew that then
Nice! I wanted the S5 or Note4, but I'll be hanging onto the S3 for another year. I can't justify buying one when I have a baby on the way
Sent from my SCH-I535 using XDA Free mobile app
XdrummerXboy said:
Hmm.. I wonder how they knew that then
Nice! I wanted the S5 or Note4, but I'll be hanging onto the S3 for another year. I can't justify buying one when I have a baby on the way
Sent from my SCH-I535 using XDA Free mobile app
Click to expand...
Click to collapse
I hear that. I have mine until June next year. Not quite sure what I'm doing just yet. The Super power saving mode is quite a nice feature. It basically disables all apps but the essential ones. The battery life then goes way over a day plus on the S5
From my Wicked S3 on SOKP
Et tu Verizon
Thanks for the info. I did have the MyVerizon app installed, I believe. I don't remember it requesting root, but I sometimes click through those things without paying too much attention (since I'm fairly careful about what goes on the phone); the reason I install software requiring root is to access it (circular, I know) so, they are doing what they must to run. I appreciate the suggestions about other call centers, etc. I do have the contact information from the single most helpful and polite (funny how that goes together) person I talked to through this debacle. I'll drop him a quick note, but really, since they never even bothered to call back, it's clear to me that they want me to leave. Paying over $200 per month to be treated like crap is not something I could ever do. They are big, very profitable, and don't care about anything but extracting cash from people under contract, or too complacent to leave (I'm in the 2nd category until now). Being in a codependent relationship with Verizon is not only self-defeating, but irrational. Until we have some politicians owned by the people instead of corporations we have no chance of reigning these folks in. Sure, they employ lot's of people, but an army of good people working against the best interest of everyone is not good, it's an uncontrollable menace: just look at the banks that gambled with people's homes, lost their bets, then collateralized them when the bottom fell out of their own septic tank of greed. The entire world economy hit an air pocket, but we're still letting the same greed intoxicated pilots fly. My only regret is believing their lies as long as I did. I deserve better, and it's won't be particularly hard to find it. Since the 4.4.3 G3 (nor the 4.1.2 for that matter) are particularly compatible with the GSM carriers, and Samsung is the lookout for the felonious Verizon, I'll probably get a Nexus 5. I think the G5 is better for several reasons, but that's too bad. All of the tech and marketing in the world will not make me "grateful" to manufacturers or carriers that somehow feel controlling how you use the equipment you buy from them is somehow acceptable. The money Verizon cares about is the corporate contracts, since they can manage that process much better, the revenue is less volatile, and they don't have to take calls from subscribers, wasting the money that could be spent on acquisitions, and expanding their market oligarchy. Public utilities create natural monopolies. There are not 2 sets of power lines, or water lines, or sewers running into your home. And the idea that competition from fiber will for improvements from Comcast is false, prices may move, but service will not get better. Only when barriers of entry are low can new competitors help drive down the price of entrenched utilities. We could all create our own mobile system on meshes of unlicensed 5.0 Gig or other spectrum, but it would be very costly to do that and linking this metropolitan radio webs would be tricky. But probably, someone is already working on that. Ask a HAM radio enthusiast about how they handle phone calls over shortwave. They have licenses, yes, but the technology to connect 2-way voice wireless signals to PSTN phone calls has been around for many years. Big corporations exact huge profits and drag down anyone that needs the services, the trick is to find creative ways around them, most importantly by thinking outside of the feature/function cage they've placed around us. Soon, you'll be able to buy just the cable channels you want, perhaps. I have hundreds and I generally watch less than 10.
The accusation flung at me by the enraged employee is little more that hot air. It reflects a corporate culture of mendacity and blame. My fault was to allow him to take control of the conversation, for a millisecond. Whatever I've done to the software on the phone (which, as you noted, was not a ROM change) it's still my phone and not theirs. They don't even provide the "insurance" to replace the failed device, a third party does. I didn't stop my phone from working to get a new phone. Had the replacement worked as well or better as the one it replaced I would have been happy. Now, I'm going over a week with no phone and they will never get paid for that week. The longer it takes to resolve, the less on my final bill, which will be coming up soon. When folks have experiences like this it's best to communicate the problem to the FCC (as if they cared) and their state PUC. Not that they will do anything about it, but it's important to remember they have a duty to regulate whether this group of appointees cares or not. The only thing that affects Verizon is withdrawing my monthly gratuity and when that happens because of abuse, manipulation, and possible fraud, the regulators need to be informed, if only so they can't say they didn't know.
Thanks for the reminder that they have no business asking questions about rooted phones or ROMS. That lingering guilt that one may have done something Daddy Verizon doesn't approve of is there, for sure, but since what I was accused of I didn't do, it was easier to just say, no, I didn't do that.....when I offered to factory reset TWICE during the call and he pretended not to hear me I realized it was all just a manipulative game played by a bully. No, no lunch money for you today, dude. I think they actually hire volatile people and use them as scarecrows. If Verizon didn't want their customers to be exposed to abuse, they'd fire these guys. The second guy was so cold, trying to do the right thing, but hating it. If you've ever been to a time-share presentation and not purchased one, you are familiar with this game. It's not only wrong, but it reflects how truly manipulative and immoral the employers are, they are paying the guy to be insulting, intimidating, and thuggish. So many large companies act this way, it's amazing we let them get away with it. The only way to stop it is to stop paying them and tell them why. I worked in a small hardware store in a small town 30+ years ago. Even when customers were trying some trick, like returning something they didn't buy from us, or a more elaborate ruse (I'll bring the old stuff back tomorrow......), I just explained how it worked and enforced the process; I never shouted, "You are so busted...." These were customers, some making honest errors, some trying to take advantage, but there were none I didn't want to come back again, because it would be bad for business and likely make an enemy. After I leave Verizon I will never give them another dime ever, and I think they honestly don't believe that.
XdrummerXboy said:
I don't really have any info to help you, so I apologize for that.
But out of curiosity, do you have the MyVerizon app (or whatever the name is) installed?
At one point the app requested root permission, which is EXTREMELY sketchy in my opinion. I wonder if you grant it, or even deny it (if they can detect the denial) if they ASSUMED that you installed a custom ROM, because a lot of those that root also install custom ROMs.
Maybe just try at a different time of day to maybe get a call center in a different state or country?
That is extremely unprofessional on their part though...
Sent from my SCH-I535 using XDA Free mobile app
Click to expand...
Click to collapse

My sister thinks her phone is hacked, and she's being tormented by the hacker(s)

A little bit of back story. Last year my sisters Instagram account was hacked. Following that she believes that they have worked their way into her phone. She has told me they: intercept her calls and voicemails, when she calls Verizon tech support they are intercepting the call to stop her from getting help, they've accessed her camera and speakers turning them on at all hours of the night, cloned her number to respond to her texts, overrode her pictures with a picture of the laughing emoji, cloned her fingerprint to bypass the lock screen, Installed their own version of android to have complete control, etc.
I do not know what I believe, but she believes it whole heartedly. She sent me a whole bunch of phone system logs and screenshots of her system info, but I have only basic knowledge. Can anyone help me read these? To me they look normal, but I'm not an expert. I'm hoping that of I can prove one way or another we can get her help. Either with the hackers, or with her other issues. I don't want to just upload the screenshots because I don't know what personal information they contain, but I can send them to anyone who can analyze them, and is willing to help me.
Thanks in advance
vanishedsarah said:
A little bit of back story. Last year my sisters Instagram account was hacked. Following that she believes that they have worked their way into her phone. She has told me they: intercept her calls and voicemails, when she calls Verizon tech support they are intercepting the call to stop her from getting help, they've accessed her camera and speakers turning them on at all hours of the night, cloned her number to respond to her texts, overrode her pictures with a picture of the laughing emoji, cloned her fingerprint to bypass the lock screen, Installed their own version of android to have complete control, etc.
I do not know what I believe, but she believes it whole heartedly. She sent me a whole bunch of phone system logs and screenshots of her system info, but I have only basic knowledge. Can anyone help me read these? To me they look normal, but I'm not an expert. I'm hoping that of I can prove one way or another we can get her help. Either with the hackers, or with her other issues. I don't want to just upload the screenshots because I don't know what personal information they contain, but I can send them to anyone who can analyze them, and is willing to help me.
Thanks in advance
Click to expand...
Click to collapse
So she has enough tech know how to produce "logs" but doesn't know how to remove the malware, because if your story is true that whats we're talking about here, malware which can be removed very easily.
The level of control your talking about is only possible via the like of the CIA, FBI or a government backed security service. Then you would have to ask yourself, why your sister? Is she a politician? A spy? Someone with the cure for cancer on her phone?
Why doesn't she factory reset the phone? Go to the police? Install a custom ROM even?
I'm sorry to say i think your sister has mental health issues or is just making it up. What your talking about is practically impossible even for the best hackers on the planet.
cooltt said:
So she has enough tech know how to produce "logs" but doesn't know how to remove the malware, because if your story is true that whats we're talking about here, malware which can be removed very easily.
The level of control your talking about is only possible via the like of the CIA, FBI or a government backed security service. Then you would have to ask yourself, why your sister? Is she a politician? A spy? Someone with the cure for cancer on her phone?
Why doesn't she factory reset the phone? Go to the police? Install a custom ROM even?
I'm sorry to say i think your sister has mental health issues or is just making it up. What your talking about is practically impossible even for the best hackers on the planet.
Click to expand...
Click to collapse
I understand what you're saying, and I get it completely. She has gotten a new phone and claims that as soon as she has activated it she got a call from a local number and her system updated when she answered it, there was no one on the line. She believes it could be a group of hackers (target of "gang stalking") or it could be the government (That she is a "targeted individual "). Believe me, I understand how crazy this sounds, and it's completely unbelievable. However, it is also an epidemic that thousands, if not tens of thousands, of people across the globe believe they're a target of. I understand full well that it could be all in her head, but I don't know how to read the system logs she is sending me to be absolutely 100% sure. That's why I'm asking for help. I tried to get her to report it to the local FBI offices cyber crimes unit, but she won't do it in fear that the government is involved or the hacker(s) will retaliate.
I understand that this is completely unbelievable to anyone with a sound and logical mind, but regardless of that, SHE and thousands of American citizens believe this is true, and I don't have the know how to prove/disprove her
Carbon monoxide poisoning can lead to delirium and is more common that you'd expect, otherwise she's got some other kind of mental illness.
Also lot's of people believing something doesn't make it true, and thousands of people is still pretty small compared to the larger population. I'd honestly wager thousands of people are more likely to have paranoia or an undiagnosed mental issue than actually be targeted by group hackers to the accuracy and complexity you've described.
Beanvee7 said:
Carbon monoxide poisoning can lead to delirium and is more common that you'd expect, otherwise she's got some other kind of mental illness.
Also lot's of people believing something doesn't make it true, and thousands of people is still pretty small compared to the larger population. I'd honestly wager thousands of people are more likely to have paranoia or an undiagnosed mental issue than actually be targeted by group hackers to the accuracy and complexity you've described.
Click to expand...
Click to collapse
I agree with you completely, it's most likely a mental illness. Possibly some type of paranoid schizophrenia , but that doesn't make it less real to her. The issue I'm having is explaining the logs to her as normal. I can Google most of the information, but some times I can't find the right answer, that why I was hoping someone could help me read them. I don't know how else to get through to her, other than disproving her theories. I know most likely it won't help, but it's something. She is relating to all these people who believe they're being targeted for one reason or another. Her reasoning is her Instagram name, which apparently is a thing. People het their Instagram hacked so the hacker can sell the OG name. That's how it all started at least, but it has spiralled out of control. I can't disprove her without the knowledge of reading these endless logs she's sending me. I'm trying to approach this with a scientific mindset, if I let it get too personal then it's going to effect me more than I want it to
What you are talking about exists (or existed) on a pc, you could download some kind of trojan (usually found on torrent when you searched for porn or (game)hacks lol) and when you clicked it, that installed some files on your pc that could give someone total control over your pc.. What i talk about is from is maybe 20 years or longer ago. I think most virus scanners or even windows itself instantly recognise these kind of trojans now and remove them before you can click them.
But something like that on a phone?? that would blow my mind because that app would have to able to bypass every security system in android and go unnoticed.
Ask your sister if she downloads apk's from torrent or from suspicious/illegal sites
And like mentioned before in here, let her do factory reset. If she cannot reset to factory settings in her phone let her go to recovery and reset her phone, that uses hardware buttons at startup phone and is hardcoded into her phone.
And aks her how and where she got those logs, take a screenshot of a part of the log, look at it if her name shows up or private stuff and post it. You make it sound like science fiction and we don't even know what logs you are talking about

What type of hack is this?

Is this even possible?
I have strong suspicions to believe my andriod phone is hacked and there are people who are able to see what I do on my phone screen in the same house while using cellular data not even wifi(So obviously not casting).I know it's another tech noob post.I'd just ask you to brainstorm if this is possible as i'm not knowledgable enough?.The only other explanation would be a hidden camera.
I forgot to add i had my bootloader unlocked for a brief period while reflashing stock rom.
Sound more like you installed a custom rootkit
You rooted your phone and now you're worried about hidden cams?!
Reflash the stock image, change your Google password and be happy.
My phone isn't rooted I tried but I couldn't so I reflashed the stock firmware.The issues were there before reflashing the firmware.
Is what I said in the first paragraph possible?
I have known people who thought their TV was talking to them directly. So yes, you could be someone special.
Personally for me this line of thinking gets very tedious, very fast.
Factory reset then change Google password.
I have done it like ten times man.I'm not a mental case.I'm sure my phone is being spied on by someone in the same house.
The Litmus test I used is whenever I check explicit content someone has a weird or disgusted reaction and says look at what he's watching.
If you really believe what you're saying is true... stop using the phone and read a book.
Or just read threads here.
If someone is watching you they will soon get bored and find something else to amuse themselves with.
Asdert76 said:
I have done it like ten times man.I'm not a mental case.I'm sure my phone is being spied on by someone in the same house.
The Litmus test I used is whenever I check explicit content someone has a weird or disgusted reaction and says look at what he's watching.
Click to expand...
Click to collapse
Stop watching porn sites, disable front and back camera.
IMHO best thing you could do is to sell the phone at eBay.
People don't need to see what you are watching.
People have noses and ears.
jwoegerbauer said:
Stop watching porn sites, disable front and back camera.
IMHO best thing you could do is to sell the phone at eBay.
Click to expand...
Click to collapse
Yes he could sell it on eBay but the user who bought it will probably give it a bad review due to it being hacked
Nobody wants to buy a phone that's hacked not even me would do it
Austinredstoner said:
Yes he could sell it on eBay but the user who bought it will probably give it a bad review due to it being hacked
Nobody wants to buy a phone that's hacked not even me would do it
Click to expand...
Click to collapse
Used smart appliances too...
It's always the fridge... you know the tall silent type.

Categories

Resources