s960 usqu9fue1 FRP PLZ HELP - General Questions and Answers

I've tried it all making my own combo rom downloading's from multiple sources multiple odin versions nothing is working it is literally costing me money and sleep i need this phone to work asap i cant find the right forum or am to stupid to know what the right one is would really really appreciate an answer asap on this like my whole show is depending on it and I'm failing badly id love a step by step for dummies concerning frp removal or bypass for this modal its s9 Verizon on 10 usqu9fue1 please thankyou

To disable / remove FRP lock you
either
delete your Google account on phone
or
do a Factory Reset

jwoegerbauer said:
To disable / remove FRP lock you
either
delete your Google account on phone
or
do a Factory Reset
Click to expand...
Click to collapse
Factory reset doesn't remove FRP lock, that actually puts the device in a state of being FRP locked if FRP/Find My Device hasn't been disabled BEFORE doing the factory reset.

Droidriven said:
Factory reset doesn't remove FRP lock, that actually puts the device in a state of being FRP locked if FRP/Find My Device hasn't been disabled BEFORE doing the factory reset.
Click to expand...
Click to collapse
Wtfanyone that actually has a clue care to help me out....wow just....wow

jwoegerbauer said:
To disable / remove FRP lock you
either
delete your Google account on phone
or
do a Factory Reset
Click to expand...
Click to collapse
No why are u answering questions fr like....wtf

Jessicad89 said:
Wtfanyone that actually has a clue care to help me out....wow just....wow
Click to expand...
Click to collapse
Not all devices are equal, therefore, the fix to this varies from one device to the next. Also, giving you the solution also makes the solution available to people that are trying to find a way to remove FRP lock from devices that are not rightfully theirs, such as stolen devices. To avoid potentially aiding someone in gaining access to devices and personal data that is not theirs, we typically don't answer. We also don't know if the device you are trying to access is actually yours, I mean, it isn't like we can take your word for it because you could be lying to us and we wouldn't know, not that you are, just saying that it is an uncertain scenario. It isn't specifically against the forum rules but its kind of an unspoken rule because it is a grey area that is best to stay out of.

Droidriven said:
Not all devices are equal, therefore, the fix to this varies from one device to the next. Also, giving you the solution also makes the solution available to people that are trying to find a way to remove FRP lock from devices that are not rightfully theirs, such as stolen devices. To avoid potentially aiding someone in gaining access to devices and personal data that is not theirs, we typically don't answer. We also don't know if the device you are trying to access is actually yours, I mean, it isn't like we can take your word for it because you could be lying to us and we wouldn't know, not that you are, just saying that it is an uncertain scenario. It isn't specifically against the forum rules but its kind of an unspoken rule because it is a grey area that is best to stay out of.
Click to expand...
Click to collapse
that is an asinine approach and a terrible mentality why wuld you even take the time to tell me that load of hogwash, is isnt my fault thaat production companies are struggling ith security and have terrible answers i provide the information needed to identify the correct procedure u know...the modal number build ect. i am somewhat appalled by this response as it has wasted both of our time, i live in America where your innocent till proven guilty not assumed potentially guilty at all times i will find an answer regardless of your counterproductive rathole ideology concerning information. heres whos fault it is if a device is stolen...the owners security is my responsibility concerning my things and that goes across the board worldwide. but i do appreciate well nothing about what you've said here. quite the opposite google its he evil empire and the "solution" of frp is absolutely a wash but thanks anyways

Wondering why you not simply do a Google search for it, if the answer given here isn't what you expected to be, instead of ranting around here?
BTW:
The Factory Reset Protection (FRP) is regulated in the US via the Smartphone Theft Prevention Act of 2015. The Act requires device manufacturers to feature a so-called "kill switch". The purpose of the kill switch was to discourage smartphone theft by dramatically reducing resale value of stolen devices.

Jessicad89 said:
that is an asinine approach and a terrible mentality why wuld you even take the time to tell me that load of hogwash, is isnt my fault thaat production companies are struggling ith security and have terrible answers i provide the information needed to identify the correct procedure u know...the modal number build ect. i am somewhat appalled by this response as it has wasted both of our time, i live in America where your innocent till proven guilty not assumed potentially guilty at all times i will find an answer regardless of your counterproductive rathole ideology concerning information. heres whos fault it is if a device is stolen...the owners security is my responsibility concerning my things and that goes across the board worldwide. but i do appreciate well nothing about what you've said here. quite the opposite google its he evil empire and the "solution" of frp is absolutely a wash but thanks anyways
Click to expand...
Click to collapse
Just because it isn't the reply that you wanted, does not make it hogwash. If you can't understand the logic of what I said, that's your failing, not mine. I don't care what you appreciate or don't, that has nothing to do with anything. Thinking like that only makes you the one with the personal problem, not us. FRP exists for a very good reason, one that is understandably inconvenient for you in the current circumstances. It has nothing to do with guilt, no one labeled you or assumed you to be guilty, don't take it personal and drop the attitude.
But, hey, nevermind the fact that FRP exists for a reason, let's just ignore that just for you since it is you and you are so special that we should help you while at the same time making it easier for actual thieves to be able to use and resale devices that they've stolen, let's enable criminal activity just to help you since you're so special, right? Get real!

Droidriven said:
Just because it isn't the reply that you wanted, does not make it hogwash. If you can't understand the logic of what I said, that's your failing, not mine. I don't care what you appreciate or don't, that has nothing to do with anything. Thinking like that only makes you the one with the personal problem, not us. FRP exists for a very good reason, one that is understandably inconvenient for you in the current circumstances. It has nothing to do with guilt, no one labeled you or assumed you to be guilty, don't take it personal and drop the attitude.
But, hey, nevermind the fact that FRP exists for a reason, let's just ignore that just for you since it is you and you are so special that we should help you while at the same time making it easier for actual thieves to be able to use and resale devices that they've stolen, let's enable criminal activity just to help you since you're so special, right? Get real!
Click to expand...
Click to collapse
i care so little about what you have to say i didn't even read that dribble and will continue that policy throughout our relationship ill get it either way thought i would give xda a shot if your representative of the body of knowledge and attitude here it as a mistake to be certain

Jessicad89 said:
i care so little about what you have to say i didn't even read that dribble and will continue that policy throughout our relationship ill get it either way thought i would give xda a shot if your representative of the body of knowledge and attitude here it as a mistake to be certain
Click to expand...
Click to collapse
Do you think your opinion matters to anyone here? Do you think your attitude makes you superior somehow? It actually achieves quite the opposite, but please, continue proving me right, I know you've got more big talk in there somewhere because that is all you have, which is nothing.

Related

T-Mobile *trick* to lock root?

Just curious, but let's say that we go to the market and find a cool new program.
Turns out, while it installs something such as a new IM client, it locks the phone up.
Is it possible? Can they change firmware from a software title? Just a random paranoid thought
Not quite sure by what you mean "locks the phone up" but if you mean make changes to the settings because you have root and left it open, yes. This has been addressed and if you have root, you should have already secured it. If not, you have 2 choices, a: realise you might not be a user in need of root, or b: go read how to secure root (with a password).
I have been an advocate of root on the G1 from the start, even while everyone was saying "users do not need root". I am recently starting to notice a lot of issues with users having root and blindly running apps they do not know about, or bricking their phones because they are running complex system commands without knowing what it is doing. Keep in mind, root = god as far as the phone is concerned. You can and probably will kill your phone if you are not careful. I would advise you obtain root, secure it and do not touch it unless you know what you are doing. This will give you the ability to use things in the future that require root while still keeping you somewhat safe.
Also, this is not directed only at the author of this post, but anyone who has posted in the last few days who is making changes they do not fully understand, running programs that require root without knowing what access they are giving it, or anyone who follows my advice and upgraded to root "just incase" but doesnt know what to do with it.
I do not want to see a massive rush of users returning "rooted" G1's to tmobile and getting refunds/exchanges and have tmobile suddenly think this is an epidemic and start really working hard to secure the phone. That would not be good for anyone, but that is where were are headed.
Technically, yes...
Just like nuuneoi's Orientation program runs as superuser without letting you know...
I don't see them being that sneaky, though... It probably would provide ground for a class-action suit if it comes from T-Mo.
how can we sue? i didn't read the fine print, but i would imagine flashing a modded version of android would break their TOS
d0nkey said:
how can we sue? i didn't read the fine print, but i would imagine flashing a modded version of android would break their TOS
Click to expand...
Click to collapse
I'm just speculating... It just seems sneaky and evil...
I assume the TOS relates to the actual "service" (haven't read it, either). They can ban me from T-Mobile, but they better not maliciously install their poop-infested code in phone.
P.S. People are gang-bang suing for the early cancellation fees, even though they all signed the contract.
npace said:
I'm just speculating... It just seems sneaky and evil...
I assume the TOS relates to the actual "service" (haven't read it, either). They can ban me from T-Mobile, but they better not maliciously install their poop-infested code in phone.
P.S. People are gang-bang suing for the early cancellation fees, even though they all signed the contract.
Click to expand...
Click to collapse
Um...the fact is, Google is allowed to kill any software they think is "bad". This has been public a year before the phone's release.
Now, I have downloaded the patch and installed it (to have a pop-up asking if it's ok to run root)
However, many of us are new to nix commands as I am myself. How do you assign a password to root?
momentarylapseofreason said:
Um...the fact is, Google is allowed to kill any software they think is "bad". This has been public a year before the phone's release.
Now, I have downloaded the patch and installed it (to have a pop-up asking if it's ok to run root)
However, many of us are new to nix commands as I am myself. How do you assign a password to root?
Click to expand...
Click to collapse
Code:
su
passwd
God mode for my phone? Yes please.
Stop with the fear tactics regarding the dangers of root access. People actually going through the trouble of figuring out how to do are aware of the risks. It will never be an issue of phones returned, because an unlocked phone return is an immediate dealbreaker, warranty void, and most people understand that.
But the desire for freedom. Maybe I have to move to another country but this lock down bullsh*t on U.S. phones in particular is a real nuisance.
They track us with the gps, FBI can listen in thru the mic even when the phone is off, they have the remote kill switch.... at least let me install the apps i want with root access for the love of Chr*st.
Give us the freedom we seek from a Linux OS.
F*cking FREEDOM!!!!!!!!!!!!!!!!
strangethingz said:
God mode for my phone? Yes please.
Stop with the fear tactics regarding the dangers of root access. People actually going through the trouble of figuring out how to do are aware of the risks. It will never be an issue of phones returned, because an unlocked phone return is an immediate dealbreaker, warranty void, and most people understand that.
But the desire for freedom. Maybe I have to move to another country but this lock down bullsh*t on U.S. phones in particular is a real nuisance.
They track us with the gps, FBI can listen in thru the mic even when the phone is off, they have the remote kill switch.... at least let me install the apps i want with root access for the love of Chr*st.
Give us the freedom we seek from a Linux OS.
F*cking FREEDOM!!!!!!!!!!!!!!!!
Click to expand...
Click to collapse
The warranty wouldn't be void so long as you flash back to RC29 or 30 without the mods (both avail online)... just FYI
Nice to know consumers and civilians still have a trick or two left up their sleeve in this over-controlled greed filled market.
strangethingz said:
God mode for my phone? Yes please.
Stop with the fear tactics regarding the dangers of root access. People actually going through the trouble of figuring out how to do are aware of the risks. It will never be an issue of phones returned, because an unlocked phone return is an immediate dealbreaker, warranty void, and most people understand that.
But the desire for freedom. Maybe I have to move to another country but this lock down bullsh*t on U.S. phones in particular is a real nuisance.
They track us with the gps, FBI can listen in thru the mic even when the phone is off, they have the remote kill switch.... at least let me install the apps i want with root access for the love of Chr*st.
Give us the freedom we seek from a Linux OS.
F*cking FREEDOM!!!!!!!!!!!!!!!!
Click to expand...
Click to collapse
You have just shown that your post count is probably even with your "read" count. If you had been reading this and other forums you will see that lots of users are installing root, running commands they find in random posts, installing apps without knowing what they do etc... For you to come in here saying everyone knows the risks is absurd. Also, if you had read anything here, you would see that numerous users are on their "new" or "second" G1 after having bricked it somehow and returned it for a replacement. At the time being tmo doesnt seem to know how to tell if a phone has been tweaked, but they will soon.
Spend some time upping your read/post ratio and then come back with your opinions.
Dude, come on... I appreciate the typical response about reading through the massive forum before posting...
The point is... We pay a lot for these things, we are monitored and we have control switches all over the place.... when it comes to tweaks, people want
FREEEEDOOOOM!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
And you speak against Freedom?
No, I am speaking against someone who makes a post about nothing using non factual bits of information and uses "FREEDOM!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!" and thinks that repeating that will bring him a following because its just such a cool word to use with all them purdy exclamation points!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!.
strangethingz said:
They track us with the gps, FBI can listen in thru the mic even when the phone is off, they have the remote kill switch.... at least let me install the apps i want with root access for the love of Chr*st.
Click to expand...
Click to collapse
And they steal food from your refrigerator when you're not looking!
JesusFreke said:
And they steal food from your refrigerator when you're not looking!
Click to expand...
Click to collapse
You have no idea what you are talking about... that is the NSA, so please only speak when you are sure about your answer.
Darkrift said:
You have no idea what you are talking about... that is the NSA, so please only speak when you are sure about your answer.
Click to expand...
Click to collapse
Sorry! I stand corrected
JesusFreke said:
And they steal food from your refrigerator when you're not looking!
Click to expand...
Click to collapse
So that's where that leftover slice of pizza went... CASE CLOSED!
strangethingz said:
God mode for my phone? Yes please.
Stop with the fear tactics regarding the dangers of root access. People actually going through the trouble of figuring out how to do are aware of the risks. It will never be an issue of phones returned, because an unlocked phone return is an immediate dealbreaker, warranty void, and most people understand that.
But the desire for freedom. Maybe I have to move to another country but this lock down bullsh*t on U.S. phones in particular is a real nuisance.
They track us with the gps, FBI can listen in thru the mic even when the phone is off, they have the remote kill switch.... at least let me install the apps i want with root access for the love of Chr*st.
Give us the freedom we seek from a Linux OS.
F*cking FREEDOM!!!!!!!!!!!!!!!!
Click to expand...
Click to collapse
They can listen in thru the mic even when the phone is off, first I've ever heard of that!!!
jashsu said:
So that's where that leftover slice of pizza went... CASE CLOSED!
Click to expand...
Click to collapse
Funny... I swear they like to mess with me and take something but leave something else. LOL I think I found your leftover pizza
strangethingz said:
GPeople actually going through the trouble of figuring out how to do are aware of the risks.
Click to expand...
Click to collapse
Dude. Do you HONESTLY believe that? Go to the Ubuntu forums and read the new header at the top of EVERY forum about not posting malicious commands, cos too many people said 'oh, run rm -rf to fix that!' and too many people who had no idea what that did RAN IT. People don't bother to check up on what stuff does before they run it, they just go 'oooo, this will do what I want? Cool!'

Phone hacked need advise and guidance

Hi
I know that this will sound like another hacked story but I know what to do.
My phone got hacked couple of months back.i didnt know it was untill the hacker started to leave clues. It was then that i started really payibg attention to everything going on. but keeping quiet abort it so that he or she thinks i didn't know
I know of 3 incidents that may have conpronised my security coupled by the fact that I did not practice password hygiene or unique ones for all accounts. I know that its totally my fault and i am not goings to blane Android os. So please dont think of this as one of tjose posts
What i now need is help in understanding what tondo next.
Little details on what happens, lets say i get search for some one on Facebook. The same is Charles smith, I Finish off my search and open Instagram boom i see a pictures where recommended shows a google search page where Charles is written and the Google auto complete is giving options .
Happened twice
I tumlr and I don't really post anything in fact My blog is totally blank. Suddenly i have people followings me and they tend of hame my nick name as their user id .the id displays my WhatsApp status updates.
These and just two examples i have more but i think everyone gets whats going on.
things i have done to prevent such occurences factory formatting the phones mac abd router. Gotten new routers and ready to flash a custom firmware for them.
Password changes .everything.wps2 aes wifi password with random numbers upper case lower case n symbols
Passwords are written on paper without a electronic backup and under lock and key.
I thought that maybe its a key logger but i took my moto x2 n moto e2 to the service center and got them to re load official software.
Two days later bam the same thing.
Any suggestion on where the weakness is ?
The problem is that I am kind of tired if thi
Sent from my XT1092 using XDA Forums
Check account sync settings if it is on more applications can use various private data.
Sent from my A0001 using XDA Free mobile app
i dont understand?
can u explain , i have sync on should I not have it
on different note does anyone suggest rooting and installing something that can isolate and restrict data from being accessed. now i know that exposed does that and marshmallow will work that out. but any other guidance ?
Did you use a virus or malware scanner?
Are there any apps you didn't install on your phone?
If i were you, i would start with doing the following steps by their exact order to get rid of the hacker and operate on a "safe" system.
1- Backup personal files to pc and deep scan them with virus scanner, make sure they're clean.
2- Unlock the bootloader of device and flash every image manually with fastboot from stock factory image.
3- After flashing the images, go to stock recovery and wipe data / factory reset and wipe cache for a complete, untouched system.
4- Change account passwords with stuff that are unrelated to you. I mean if you made a google search for firedance, don't include dance or fire in any your passwords.
* also change the " forgot my password " questions and their answers.
5- Once you boot the system, download any ota packages from the manufacturer to be sure you'd be on a safer and patched software for security.
For future securtity, be sure to check apps permissions before installing anything from google play or external places. Don't root your device and don't enable USB Debugging in developer options. Hope it helps.
Semseddin said:
If i were you, i would start with doing the following steps by their exact order to get rid of the hacker and operate on a "safe" system.
1- Backup personal files to pc and deep scan them with virus scanner, make sure they're clean.
2- Unlock the bootloader of device and flash every image manually with fastboot from stock factory image.
3- After flashing the images, go to stock recovery and wipe data / factory reset and wipe cache for a complete, untouched system.
4- Change account passwords with stuff that are unrelated to you. I mean if you made a google search for firedance, don't include dance or fire in any your passwords.
* also change the " forgot my password " questions and their answers.
5- Once you boot the system, download any ota packages from the manufacturer to be sure you'd be on a safer and patched software for security.
For future securtity, be sure to check apps permissions before installing anything from google play or external places. Don't root your device and don't enable USB Debugging in developer options. Hope it helps.
Click to expand...
Click to collapse
Don't Root your device? Don't check USB debugging? Seriously? That is your answer? Wow, do you work for Verizon or AT&T by some chance? Sorry, but with Root and some nicely placed Xposed modules, this persons phone or tablet would be more safe than anything g Verizon or AT &THE could conjure up. You are a dope! Lol! Seriously, go away. Bother another community. ?
Sent from my SM-N910V using Tapatalk
Jaytronics said:
Don't Root your device? Don't check USB debugging? Seriously? That is your answer? Wow, do you work for Verizon or AT&T by some chance? Sorry, but with Root and some nicely placed Xposed modules, this persons phone or tablet would be more safe than anything g Verizon or AT &THE could conjure up. You are a dope! Lol! Seriously, go away. Bother another community. ?
Sent from my SM-N910V using Tapatalk
Click to expand...
Click to collapse
Pardon me but where does that come from ? Made me laugh. Since this is security forum, the first priority is security not your "nicely put xposed modules whatever that means". It is said many times by security experts rooting an android device removes a big portion of layer of security. I unfortunately don't work for AT&T or Verizon but i wish i worked for them for a nice salary.
This one is coming from the recognized developer and moderator of XDA Android Security forum. Someone who have exploited devices and found vulrenabiliies that you can't even dream of. Lets say i am a "dope" and you're the smart guy. Are jcase, steve kondik dopes as well ?
http://securitywatch.pcmag.com/secu...-have-android-settings-from-a-security-expert
http://www.dailytech.com/CyanogenMod+Creator+Tells+Android+Users+to+Rethink+Rooting/article33058.htm ( yeah, even steve kondik doesn't approve rooting for general users.
https://blog.kaspersky.com/rooting-and-jailbreaking/1979/ " Kasperksky a security platform well known for years are also against rooting.
Think again if you can who is the dope, now, go bother in your nicely put xposed modules forums for the sake of security. :good:
Semseddin said:
Pardon me but where does that come from ? Made me laugh. Since this is security forum, the first priority is security not your "nicely put xposed modules whatever that means". It is said many times by security experts rooting an android device removes a big portion of layer of security. I unfortunately don't work for AT&T or Verizon but i wish i worked for them for a nice salary.
This one is coming from the recognized developer and moderator of XDA Android Security forum. Someone who have exploited devices and found vulrenabiliies that you can't even dream of. Lets say i am a "dope" and you're the smart guy. Are jcase, steve kondik dopes as well ?
http://securitywatch.pcmag.com/secu...-have-android-settings-from-a-security-expert
http://www.dailytech.com/CyanogenMod+Creator+Tells+Android+Users+to+Rethink+Rooting/article33058.htm ( yeah, even steve kondik doesn't approve rooting for general users.
https://blog.kaspersky.com/rooting-and-jailbreaking/1979/ " Kasperksky a security platform well known for years are also against rooting.
Think again if you can who is the dope, now, go bother in your nicely put xposed modules forums for the sake of security. :good:
Click to expand...
Click to collapse
For a dope, I suppose that Root is a security risk. But, just because a device is not Rooted, does not mean it is secure by any stretch of the imagination. Truthfully, they are more unsecured if locked out from the user. That is, if the person is not a dope. What I am saying is that your advice, for the OP to take every update and not Root, was not really that helpful. If the OP installed an app that was a risk, then all the updates and non Root, will not help them. Now, if you were to show them, that if they were to Root, and use certain apps and modules on their device. Then they could keep a better eye out for potential problems. But, even if they did as I just said. If the OP is being a dope, and installing apps that, let's say, they obtained from a torrent site. Then, well, dope would be a fitting title for them as well.
And, if those recognized developers stated that Root was not good at all. Then yes, dope would be a fitting application of the word. Root is only bad for those that are dopes.
I believe that you inadvertently called the OP a dope. You did not help them all that well. What you did was help them to get rid of the problem temporarily. Do we know who apps are on their device? It would be a good idea to know these things. Also, where did they get these apps from? Kind of a big deal there.
But, if you were wondering what it is that I am talking about in regards to xposed. Look it up.
http://repo.xposed.info/module/de.robv.android.xposed.installer
I suggest the OP do the same. As well as anyone else who is having g issues. Now, knowing about xposed and the modules that can accompany it. Will not fully protect anyone from blatant stupidity. Read, read, read. And practice safe device use. There are so many avenues to protecting g ones self. But a big one that anyone can do. Don't download from shady places. Though, it is even very possible to get in trouble from apps from the Play store. Knowing what apps are asking for what permissions is important. What bothered me about your post is that you in the same post, stated for them to unlock the bootloader and then, to not root. Verizon and AT&T are advocates of the no Root behavior. And that sickens me. As well as many others. Instead of helping g people to see the dangers. They are told to do the most simplest of tasks, not to Root. And that they would be fine. Absolutely and completely false and misleading. Now, and again, for a dope. I suppose this would be fine. Though, it is not helpful. Education into matters are. One needs to seek out the underlying issue first. Then attempt to educate. As far as calling you a dope, I do humbly apologize for my Choi e of words. You did not deserve that. It would have been just fine for me to build onto what you suggested. Which was good advice. So, I am sorry. And yes, I am very much a dope at times .
Sent from my SM-N910V using Tapatalk
Jaytronics said:
For a dope, I suppose that Root is a security risk. But, just because a device is not Rooted, does not mean it is secure by any stretch of the imagination. Truthfully, they are more unsecured if locked out from the user. That is, if the person is not a dope. What I am saying is that your advice, for the OP to take every update and not Root, was not really that helpful. If the OP installed an app that was a risk, then all the updates and non Root, will not help them. Now, if you were to show them, that if they were to Root, and use certain apps and modules on their device. Then they could keep a better eye out for potential problems. But, even if they did as I just said. If the OP is being a dope, and installing apps that, let's say, they obtained from a torrent site. Then, well, dope would be a fitting title for them as well.
And, if those recognized developers stated that Root was not good at all. Then yes, dope would be a fitting application of the word. Root is only bad for those that are dopes.
I believe that you inadvertently called the OP a dope. You did not help them all that well. What you did was help them to get rid of the problem temporarily. Do we know who apps are on their device? It would be a good idea to know these things. Also, where did they get these apps from? Kind of a big deal there.
But, if you were wondering what it is that I am talking about in regards to xposed. Look it up.
http://repo.xposed.info/module/de.robv.android.xposed.installer
I suggest the OP do the same. As well as anyone else who is having g issues. Now, knowing about xposed and the modules that can accompany it. Will not fully protect anyone from blatant stupidity. Read, read, read. And practice safe device use. There are so many avenues to protecting g ones self. But a big one that anyone can do. Don't download from shady places. Though, it is even very possible to get in trouble from apps from the Play store. Knowing what apps are asking for what permissions is important. What bothered me about your post is that you in the same post, stated for them to unlock the bootloader and then, to not root. Verizon and AT&T are advocates of the no Root behavior. And that sickens me. As well as many others. Instead of helping g people to see the dangers. They are told to do the most simplest of tasks, not to Root. And that they would be fine. Absolutely and completely false and misleading. Now, and again, for a dope. I suppose this would be fine. Though, it is not helpful. Education into matters are. One needs to seek out the underlying issue first. Then attempt to educate. As far as calling you a dope, I do humbly apologize for my Choi e of words. You did not deserve that. It would have been just fine for me to build onto what you suggested. Which was good advice. So, I am sorry. And yes, I am very much a dope at times .
Sent from my SM-N910V using Tapatalk
Click to expand...
Click to collapse
Humble apology accepted.
You may not like AT&T and Verizon for their tight stance against rooting.I don't like that as well. They're filling their devices with their bloatware and excluding some very useful features from their customers like hotspot for free. However, Anyone who owns an operator variant of a specific device have already signed a contract with his operator already accepted their terms and that's why they get their bloated and controlled devices for cheaper prices in long term instead of paying full in cash. That said, i see nothing wrong with AT&T or Verizon's policy of keeping their devices locked to death since rooting would take a stake from their business and that was not their agreement with their customers. This is not the subject of this thread for sure. Should add, i see nothing wrong if a contracted owner a device wants to take full potencial out of it by rooting since it is the only way for them to get rid of bs in their devices. This is another discussion, not related to this thread.
I will use the word " regular user " instead of "dope" since nobody have to be knowledgeful about android security. Being someone without a clue of android security wouldn't make them a "dope". I currently sport a Moto Maxx, a bootloader unlockable variant of Verizon Droid Turbo sold in Brazil. I paid about 150$ more just to be free of Verizon Bloatware for the exact same hardware. I could have paid 150$ less and bought a Verizon Droid Turbo but i didn't just because i knew i would have Verizons' bs running in my phone every second. There used to be a time for me when rooting was a must with android because i used to own devices bloated with Motoblur, having low amount of ram and storage as well as unavailbility of disabling/deleting of unwanted apps. Now, i have 3gb of ram and 64gb storage with near Vanilla Android experience with my phone. I asked myself, what the heck do i need rooting for ? The answer was easy : nothing.
Lets say, android is an apartment, the root is the key to its door, xposed is the "watchdog" and hacker is the "thief". Would you keep the door unlocked and rely on a dog for its security ? I personally wouldn't do that cause the dogs can be fooled easily by a piece of meat and most importantly they have no responsibility at all. After all, It is just a dog serving for free without any responsibility. I couldn't ask for insurance as well cause i was the one who kept the door unlocked. I am also aware that any door can be opened without a key and the dog can be bypassed easily and the hacker can get whatever he wants. Things will happen if they're destined to be happen, we can't avoid some. Still, it is always our responsibility to keep the door locked in the first place and take counter measurements against. That was what i was pointing in my post.
Disabling USB debugging is the first thing one should do if there're concerns about security and this is not coming from a "dope" but security experts of android. :good:
Semseddin said:
Lets say, android is an apartment, the root is the key to its door, xposed is the "watchdog" and hacker is the "thief". Would you keep the door unlocked and rely on a dog for its security ? I personally wouldn't do that cause the dogs can be fooled easily by a piece of meat and most importantly they have no responsibility at all. After all, It is just a dog serving for free without any responsibility. I couldn't ask for insurance as well cause i was the one who kept the door unlocked. I am also aware that any door can be opened without a key and the dog can be bypassed easily and the hacker can get whatever he wants. Things will happen if they're destined to be happen, we can't avoid some. Still, it is always our responsibility to keep the door locked in the first place and take counter measurements against. That was what i was pointing in my post.
Disabling USB debugging is the first thing one should do if there're concerns about security and this is not coming from a "dope" but security experts of android. :good:
Click to expand...
Click to collapse
To show how ridiculously and persistently wrong you are, I am going to use your above example. If root is your key, then what you are doing is giving that key to Google and device manufacturer, while throwing your own copy away. In your own apartment, you are only allowed to go where google and verizon let you. This makes no sense whatsoever, unless the apartment owner is a real dope (no personal offence meant).
Disabling usb debugging also sounds like an aria from the same opera. If the device is on your person, this provides no additional security at all, as usb debugging is only relevant when your phone is connected to computer. If someone physically takes your device, it would take 10 seconds to enable debugging.
Root provides you an opportunity to control your device and restrict system apps, thereby reducing possibilities for hackers to take over your phone... As I have already mentioned before, every operating system provides root access to users. The only reason it is not done on smart phones is becase manufacturers, carriers and OS providers want to turn users into walking advertising beacon-dopes. Again, no offence meant...
optimumpro said:
To show how ridiculously and persistently wrong you are, I am going to use your above example. If root is your key, then what you are doing is giving that key to Google and device manufacturer, while throwing your own copy away. In your own apartment, you are only allowed to go where google and verizon let you. This makes no sense whatsoever, unless the apartment owner is a real dope (no personal offence meant).
Disabling usb debugging also sounds like an aria from the same opera. If the device is on your person, this provides no additional security at all, as usb debugging is only relevant when your phone is connected to computer. If someone physically takes your device, it would take 10 seconds to enable debugging.
Root provides you an opportunity to control your device and restrict system apps, thereby reducing possibilities for hackers to take over your phone... As I have already mentioned before, every operating system provides root access to users. The only reason it is not done on smart phones is becase manufacturers, carriers and OS providers want to turn users into walking advertising beacon-dopes. Again, no offence meant...
Click to expand...
Click to collapse
I see your point, respect it but disagree. Your example doesn't really work with my logic since you're putting players like Google/Verizon in the same league with an hacker. Yes, they for sure have control over their software since they're the one who created Android and offered the hardware along with an oem in the first place. These big companies are not like 3rd party devs who are irresponsible for any their actions.. If you happen to have sensetive privacy trust issues with Google, leave any android device out, you wouldn't even use google search in your pc.
A hacker having pyshical access to a device who would enable USB debugging in 5 seconds. is this what we're really talking about ? Anyone who have a device in hand doesn't need to be a hacker to get data from it. Have a coffee with the target sitting next to to him, memorize his passcode Done. Another way is to flash twrp and give some adb shell commands to bypass any lockscreen code. Done. USB debugging ON help with apk rooters and computer based root exploits as well.They rely on usb debugging to be on. You're hacked in no time.
I just can't trust any 3rd party dev more than my device manufacturer / operating system provider and network provider. I think the same for you like you're persistently and ridiciolusly wrong by giving too much credit to some unknown sources instead of those who have an actual business address. :good:
Just kiss each other already or dont say anything.
This thread is made by someone who needs help and you two both are taking it off topic instead of helping him. Now out of respect for that user, stop this endless conversation.
Semseddin said:
I see your point, respect it but disagree. Your example doesn't really work with my logic since you're putting players like Google/Verizon in the same league with an hacker. Yes, they for sure have control over their software since they're the one who created Android and offered the hardware along with an oem in the first place. These big companies are not like 3rd party devs who are irresponsible for any their actions.. If you happen to have sensetive privacy trust issues with Google, leave any android device out, you wouldn't even use google search in your pc.
A hacker having pyshical access to a device who would enable USB debugging in 5 seconds. is this what we're really talking about ? Anyone who have a device in hand doesn't need to be a hacker to get data from it. Have a coffee with the target sitting next to to him, memorize his passcode Done. Another way is to flash twrp and give some adb shell commands to bypass any lockscreen code. Done. USB debugging ON help with apk rooters and computer based root exploits as well.They rely on usb debugging to be on. You're hacked in no time.
I just can't trust any 3rd party dev more than my device manufacturer / operating system provider and network provider. I think the same for you like you're persistently and ridiciolusly wrong by giving too much credit to some unknown sources instead of those who have an actual business address. :good:
Click to expand...
Click to collapse
This is not about respect, disrespect or disagreements. The facts (not opinions) remain: every operating system on Earth provides root or administrative privileges to users. However, it is not given to the same user when he turns to a smartphone. There is no security reason whatsoever why a user has root on computer and no root on a smartphone.
As I have already said, there are plenty of non-security reasons for the above: the main one being to prevent the user from removing advertising junk and spying malware inserted there by manufacturers, carriers and software providers. Kids love it (above three) and Mother (NSA) approves...
Every argument against root invalidates itself when applied to computer OS: remember the user is the same.
@its the peanut
Please stop patronizing. This is a security discussion thread and we discuss security, which is beneficial to the poor guy, the OP... :silly:
Semseddin, what do you do to stop fastboot?
rooting and knowledge go hand in hand, the OP states device is rooted, but sounds like hasn't got the interest to know what's behind the process. that is why we don't have the slightest piece of evidence that his device has been compromised. just the users opinion that it has.
having su and adb debugging at least allows them to logcat.

Stolen phone

My wife just called me on a landline to say her Samsung Galaxy S2 I9100 has gone missing. She was working in a tiny charity bookshop, so it was easy to check that it wasn't just dropped, and it goes straight to voicemail. It was double PIN protected on both device and SIM.
It was on Android 4.0.1 - I know, I know, she wouldn't allow me to upgrade it.
Question - I know from experience of flashing a new ROM that Google insists on entering the Google account details again to verify proper ownership. Is this a general Android security procedure, or does it work only on Lollipop/Marshmallow?
Just asking because it will be of some small comfort to know that the thieving scum has a paperweight rather than a phone...
dahawthorne said:
I know from experience of flashing a new ROM that Google insists on entering the Google account details again to verify proper ownership.
Click to expand...
Click to collapse
Incorrect.
I was hoping for something a bit more concrete than that. And it is correct. When I've done a full reset of my phone to flash a new ROM I get "This device has been reset. Please enter your Google credentials" or words to that effect.
I'm happy to have the response, but can someone please give me a sensible one based on knowledge and not guesswork?
dahawthorne said:
I was hoping for something a bit more concrete than that. And it is correct. When I've done a full reset of my phone to flash a new ROM I get "This device has been reset. Please enter your Google credentials" or words to that effect.
I'm happy to have the response, but can someone please give me a sensible one based on knowledge and not guesswork?
Click to expand...
Click to collapse
Oh hey look... no Google account!
You're the one operating on guesswork assuming a Google account is mandatory to use an Android device.
Look, guy, if you have no useful advice to offer me then quit wasting my time...
"Friends
Wakamatsu has not made any friends yet
Befriend Wakamatsu"
Well, am I surprised? I think I'll pass on that offer...
You asked about when a security measure was introduced in Android. I informed you that no such security measure exists.
There is a disconnect between what you want to believe and the reality. First, you refused to accept it. Now, you're angry at me because you have no choice but to accept it.
You want reassurances because of your situation? There is none to be offered here.
dahawthorne said:
My wife just called me on a landline to say her Samsung Galaxy S2 I9100 has gone missing. She was working in a tiny charity bookshop, so it was easy to check that it wasn't just dropped, and it goes straight to voicemail. It was double PIN protected on both device and SIM.
It was on Android 4.0.1 - I know, I know, she wouldn't allow me to upgrade it.
Question - I know from experience of flashing a new ROM that Google insists on entering the Google account details again to verify proper ownership. Is this a general Android security procedure, or does it work only on Lollipop/Marshmallow?
Just asking because it will be of some small comfort to know that the thieving scum has a paperweight rather than a phone...
Click to expand...
Click to collapse
Unless your carrier has a service that allows imei blacklisting, there is nothing you can do. Even if they do, you'll need a solid proof of ownership and that the phone wasn't just lost. If your wife lost her phone, in most cases there is no obligation on the part of the finder to return it. Any other measure won't do anything, as the device could be wiped clean of everything.
Thanks. optimumpro. My service provider has blocked the phone and the SIM, so with any luck the scumbag will get no joy from it. It's also reported with its IMEI on a website (immobilise.com) which the police refer to when items are recovered.
As to my original question, I believe that the function I mentioned started with Android 5.1, so if the thief has the tech knowledge he/she can probably wipe it and install a new ROM, though I hope the IMEI block will prevent use even with other providers.
Pity - it was a nice little phone - my first smartphone.
And thanks for providing a sensible answer - appreciated.
dahawthorne said:
Thanks. optimumpro. My service provider has blocked the phone and the SIM, so with any luck the scumbag will get no joy from it. It's also reported with its IMEI on a website (immobilise.com) which the police refer to when items are recovered.
As to my original question, I believe that the function I mentioned started with Android 5.1, so if the thief has the tech knowledge he/she can probably wipe it and install a new ROM, though I hope the IMEI block will prevent use even with other providers.
Pity - it was a nice little phone - my first smartphone.
And thanks for providing a sensible answer - appreciated.
Click to expand...
Click to collapse
You may want to check ebay, because the phone can be sold to someone from another country. So, with luck you may catch the guy...

My sister thinks her phone is hacked, and she's being tormented by the hacker(s)

A little bit of back story. Last year my sisters Instagram account was hacked. Following that she believes that they have worked their way into her phone. She has told me they: intercept her calls and voicemails, when she calls Verizon tech support they are intercepting the call to stop her from getting help, they've accessed her camera and speakers turning them on at all hours of the night, cloned her number to respond to her texts, overrode her pictures with a picture of the laughing emoji, cloned her fingerprint to bypass the lock screen, Installed their own version of android to have complete control, etc.
I do not know what I believe, but she believes it whole heartedly. She sent me a whole bunch of phone system logs and screenshots of her system info, but I have only basic knowledge. Can anyone help me read these? To me they look normal, but I'm not an expert. I'm hoping that of I can prove one way or another we can get her help. Either with the hackers, or with her other issues. I don't want to just upload the screenshots because I don't know what personal information they contain, but I can send them to anyone who can analyze them, and is willing to help me.
Thanks in advance
vanishedsarah said:
A little bit of back story. Last year my sisters Instagram account was hacked. Following that she believes that they have worked their way into her phone. She has told me they: intercept her calls and voicemails, when she calls Verizon tech support they are intercepting the call to stop her from getting help, they've accessed her camera and speakers turning them on at all hours of the night, cloned her number to respond to her texts, overrode her pictures with a picture of the laughing emoji, cloned her fingerprint to bypass the lock screen, Installed their own version of android to have complete control, etc.
I do not know what I believe, but she believes it whole heartedly. She sent me a whole bunch of phone system logs and screenshots of her system info, but I have only basic knowledge. Can anyone help me read these? To me they look normal, but I'm not an expert. I'm hoping that of I can prove one way or another we can get her help. Either with the hackers, or with her other issues. I don't want to just upload the screenshots because I don't know what personal information they contain, but I can send them to anyone who can analyze them, and is willing to help me.
Thanks in advance
Click to expand...
Click to collapse
So she has enough tech know how to produce "logs" but doesn't know how to remove the malware, because if your story is true that whats we're talking about here, malware which can be removed very easily.
The level of control your talking about is only possible via the like of the CIA, FBI or a government backed security service. Then you would have to ask yourself, why your sister? Is she a politician? A spy? Someone with the cure for cancer on her phone?
Why doesn't she factory reset the phone? Go to the police? Install a custom ROM even?
I'm sorry to say i think your sister has mental health issues or is just making it up. What your talking about is practically impossible even for the best hackers on the planet.
cooltt said:
So she has enough tech know how to produce "logs" but doesn't know how to remove the malware, because if your story is true that whats we're talking about here, malware which can be removed very easily.
The level of control your talking about is only possible via the like of the CIA, FBI or a government backed security service. Then you would have to ask yourself, why your sister? Is she a politician? A spy? Someone with the cure for cancer on her phone?
Why doesn't she factory reset the phone? Go to the police? Install a custom ROM even?
I'm sorry to say i think your sister has mental health issues or is just making it up. What your talking about is practically impossible even for the best hackers on the planet.
Click to expand...
Click to collapse
I understand what you're saying, and I get it completely. She has gotten a new phone and claims that as soon as she has activated it she got a call from a local number and her system updated when she answered it, there was no one on the line. She believes it could be a group of hackers (target of "gang stalking") or it could be the government (That she is a "targeted individual "). Believe me, I understand how crazy this sounds, and it's completely unbelievable. However, it is also an epidemic that thousands, if not tens of thousands, of people across the globe believe they're a target of. I understand full well that it could be all in her head, but I don't know how to read the system logs she is sending me to be absolutely 100% sure. That's why I'm asking for help. I tried to get her to report it to the local FBI offices cyber crimes unit, but she won't do it in fear that the government is involved or the hacker(s) will retaliate.
I understand that this is completely unbelievable to anyone with a sound and logical mind, but regardless of that, SHE and thousands of American citizens believe this is true, and I don't have the know how to prove/disprove her
Carbon monoxide poisoning can lead to delirium and is more common that you'd expect, otherwise she's got some other kind of mental illness.
Also lot's of people believing something doesn't make it true, and thousands of people is still pretty small compared to the larger population. I'd honestly wager thousands of people are more likely to have paranoia or an undiagnosed mental issue than actually be targeted by group hackers to the accuracy and complexity you've described.
Beanvee7 said:
Carbon monoxide poisoning can lead to delirium and is more common that you'd expect, otherwise she's got some other kind of mental illness.
Also lot's of people believing something doesn't make it true, and thousands of people is still pretty small compared to the larger population. I'd honestly wager thousands of people are more likely to have paranoia or an undiagnosed mental issue than actually be targeted by group hackers to the accuracy and complexity you've described.
Click to expand...
Click to collapse
I agree with you completely, it's most likely a mental illness. Possibly some type of paranoid schizophrenia , but that doesn't make it less real to her. The issue I'm having is explaining the logs to her as normal. I can Google most of the information, but some times I can't find the right answer, that why I was hoping someone could help me read them. I don't know how else to get through to her, other than disproving her theories. I know most likely it won't help, but it's something. She is relating to all these people who believe they're being targeted for one reason or another. Her reasoning is her Instagram name, which apparently is a thing. People het their Instagram hacked so the hacker can sell the OG name. That's how it all started at least, but it has spiralled out of control. I can't disprove her without the knowledge of reading these endless logs she's sending me. I'm trying to approach this with a scientific mindset, if I let it get too personal then it's going to effect me more than I want it to
What you are talking about exists (or existed) on a pc, you could download some kind of trojan (usually found on torrent when you searched for porn or (game)hacks lol) and when you clicked it, that installed some files on your pc that could give someone total control over your pc.. What i talk about is from is maybe 20 years or longer ago. I think most virus scanners or even windows itself instantly recognise these kind of trojans now and remove them before you can click them.
But something like that on a phone?? that would blow my mind because that app would have to able to bypass every security system in android and go unnoticed.
Ask your sister if she downloads apk's from torrent or from suspicious/illegal sites
And like mentioned before in here, let her do factory reset. If she cannot reset to factory settings in her phone let her go to recovery and reset her phone, that uses hardware buttons at startup phone and is hardcoded into her phone.
And aks her how and where she got those logs, take a screenshot of a part of the log, look at it if her name shows up or private stuff and post it. You make it sound like science fiction and we don't even know what logs you are talking about

Friend may be screwed - bypass Factory Reset Protection ( FRP ) on Pixel 3

One of my coworkers who is a nice guy, and far too naive and trusting to be using craigslist, bought a Pixel 3. His coming from an iPhone 5 and I guess the sim cards are different sizes. He took the sellers word for it and bought the phone. When he got home and tried setting it up while on wi-fi, it said that the phone was factory reset and needed to be signed in by the previous user. Naturally the guy has gone dark and is no longer responding to my coworker. After calling Google and having them turn him down for assistance, he prayed on it (I'm not even joking) and he remembered I routinely tinker with my phones.
I know it sounds sketchy whenever anyone asks how to bypass protections and I fully understand not wanting to help because others may see it. I have done searches on how to do this, but I am not having much luck. I do not know what version of Android this phone has on it, but I would assume Pie. I have't run stock for any longer than it takes to unlock the bootloader. I will provide any information I can. While I am not very active on the forum, I am a relatively long time member with no history of shady crap.
Any help or guidance would be very much appreciated!
It'll make a great paperweight at this point. The FRP is on there for a reason. Regardless weather he stole it, the seller stole it or you stole it, it still makes a great paperweight.
FilthyFord said:
It'll make a great paperweight at this point. The FRP is on there for a reason. Regardless weather he stole it, the seller stole it or you stole it, it still makes a great paperweight.
Click to expand...
Click to collapse
I was afraid of that.
He should turn in to police, with a description and whatever contact information he had for seller. Definitely stolen property.
It may not be stolen if FRP is tripped. That will happen if you reset the phone and don't remove the Google account first. Of course seller going dark is a big clue that it may be stolen.
MOD ACTION:
Thread closed.
Asking for help and helping to bypass security is not encouraged on XDA, especially since there is no way to ascertain if the request is genuine or not.

Categories

Resources