Cert install and pattern screen lock not available - SM-G900T - 4.4.2 - Android Q&A, Help & Troubleshooting

Rooted SM-G900T. Need to run a SIP client connected to a back-end SIP gateway, by using a specific cert. The cert installation only works with PIN as screen lock, not pattern. Pattern gets disabled as option in settings, after cert install. Clearing the credentials - of course - makes the pattern available again, but that is not what I want
Found this article, which I am planning to try next, unless someone here has some other ideas on how to make the pattern work AFTER the normal cert install, rather than the instructions in the article I am referencing here. Maybe my search patterns tried so far did not capture the right articles, but I am little surprised about not having some related issues in these forums - so pointers or RTFF(orum) with appropriate links will be appreciated, also, if I missed such.

Related

[Q] Location-aware lock screen?

Is anyone aware of a location-aware app to enable and disable the lock screen? I'd actually prefer to trigger it based on WiFi availability, but I'd consider other location schemes.
Via e-mail, I have potentially sensitive business information on my phone.
However, I primarily work from a home office which makes the code-based lock screen a minor hassle. (I don't use the pattern, the finger marks on the screen make it too easy to guess.)
So obviously I'd love it if my lock would kick-in when I head to lunch or need to physically visit the "real" office or whatever -- but not when I'm at home.
Any ideas?
I've no suggestions but I've thought of the exact same thing. I'd love for it pattern lock when I'm anywhere but my home.
I would even pay for that app.
I would recommend looking into Tasker. I haven't personally used it, but I have heard many great things about it. On their website it lists some examples of what you can use it for, one of them is changing phone settings based on location. You can download a free 7 day trial from their website. It costs 3.49 GBP direct from their website or 3.99 GBP in the market.
tasker. dinglisch. net (I can't post links to outside websites, remove the spaces)
Forgot all about Tasker. Good idea.
I've used Setting Profiles to do the same.
When I'm at work the pattern gets set, but when I'm at home, it's not on.
I just downloaded Settings Profiles, but none of the security settings can be adjusted in a profile (at least, not in the Lite version). I'd prefer something more straightforward like that, but none of the profile apps I checked have that setting available.
It appears Tasker can do this with the aid of a plugin:
http://groups.google.com/group/tasker/browse_thread/thread/35f0c3d6dcf4a644/964318b8f77810fc
Haven't tried it yet, though.
Ah. Apparently this is never going to be possible as of 2.2 and higher.
Google blocked programmatic access to the Secure Settings provider as of Froyo.
<sigh>
First we lose GPS control. Now this. Hell, by the time Android 4.0 is out, we'll probably have to check with the Google front desk just to place a call.
(Yes I understand why... but it seems like they could provide some kind of authorization mechanism in case, you know, we pesky old users consciously decided to give access to those settings to a particular application...)
It wouldn't be difficult to add a way for a service or application to communicate
with the lock screen, like Settings can choose which lock screen to display.
the application would at least have to be installed to /system/app but may
have to be signed with the same key as the ROM, if that is the case then
files could be used instead of the system settings db.
this would only protect from a casual attack like some nosy person picking up the phone
and browsing through your stuff, Odin is the ultimate root kit, so a prepared attacker could
probably get what they want in 5-10 min.
Yeah, but vulnerability to ODIN is going to be the case no matter what. I'm a lot more worried about "Some Random Idiot in a Bar" than I am about the several hundred people across the country who can actually use ODIN well enough to go all Wargames on my phone.

WidgetLocker question

Hello,
I've seen a couple of threads regarding WL on here and also through general Google search, but I'm still not able to do what I want with this, nor to determine if it's possible.
I'm using the rooted version of the latest NC system, so I believe I have Froyo, but I'm not sure about the Android names. Anyway, I want to have a lock screen where I have access to a couple of frequently-used, non-threatening applications, and then require entry of the lock code to get general access to the normal launcher (I'm using Launcher Pro). For example, I go to a lot of foreign language conversation groups. I'd like to be able to access the off-line dictionary directly from the start up screen without entering a code, but - obviously - keep contacts, etc behind the security screen.
So ... I installed WidgetLocker and put some of those apps on the screen, but - despite having fiddled with the settings for hours - I can't get it to not ask for the security code for my apps (like offline dictionary) on the WidgetLocker screen. The ONE exception to this is Owner Info. That one app will launch from the WidgetLocker screen and display my personal info without requesting a security code. But I can't get that to work for the others where I want that (like offline dictionary, but also a radio station and some other selected apps).
Can anyone help me to either:
a) Tell me which settings I need to do this?
or
b) Let me know that this isn't possible?
Thanks much.

[Q] Application tracing to find network paths

Hi all, I usually dont post on here as I am usually able to figure most things out myself including rooting, harware replacements, app installs using apks and data, generally overall quite proficient but I find myself lost on this one. Thats where the wonderful brains of XDA come in. Basically I have an issue where a certain application uses a login at launch. The application actually redirects to a website to verify the username and password combo. During the first login attempt, it will produce a username and password error. If you close the application and attempt to log in again, same issue. The username/password error is produced in a pop up window with an ok option on it to acknowledge error. Heres where things get a little interesting. If you do not exit the application and hit ok on the error window, you then have the option to try to log in again without relaunching app. This will work every single time. So basically what I am trying to figure out is a way to trace the app on both instances to verify where the application may be failing along the network and using the second instance where it works to cross reference to see failure point. I have tried packet sniffer to no avail. Any other suggestions would be greatly appreciated!

Mobile Iron, BYOD - fully remove ?

My wife's work recently gave employees the option to access various resources, mainly email and calendar, on their mobile devices. They use BYOD (Bring Your Own Device) and Mobile Iron. As part of it (healthcare industry), they require add'l security to be enabled - in this case a PIN, password, and pattern for the lock screen. That alone was annoying enough to my wife that she wants to remove it (she doesn't HAVE to access mail, etc outside of work and probably just wanted to try it). Also, some co-worker pointed out that their IT department has the ability to wipe their phones remotely.
Anyway, the first step in uninstalling is to remove "Mobile Iron" or something similar from the Device Admins listing, which I did. That allowed me to uninstall the Mobile Iron app. I rebooted for good measure, tried to change the lock screen security, and still couldn't. In the device admin screen, there's also an email "user" that mentions enhanced security, i.e. Exchange security policies, so I removed that as well. Rebooted again and still can't change the lock screen.
What else needs done to clean this stuff up ?

Secure compromised device

Hi everyone! This is my first post, but I have used the search tool already without success. I am just a user, not developer and quite noob regarding mobiles and security.
Situation
1. I've got hacked, total control (photos, emails, camera, contacts, whatsapp, screen etc) of my unrooted android phone (xiaomi redmi note 7).
It was a targetted attack, no manual app installed, no unsafe 3rd party apps allowed. Attackers only had my gmail account (linked to android) and telephone number. I know them personally, and they leaked personal information to people at work (who enjoy it between them but won't help me at all).
No high consumption of battery/data. Just leeching information, launching some apps eventually, and few interactions with the screen minimizing etc.
2. I Installed antimalware (e.g malwarebytes), antivirus (avg, esset etc). No positive results. I also installed "Noroot firewall" to control programs accessing internet, nothing strange.
3. I've changed emails(new), SIM + Telephone. Got hacked again. I suspect my own wifi was compromised.
Additionally, added 2 step verification to emails, changed passwords, encrypted the device etc. I have found no IP from them in the emails log, nor alert from gmail. Only once a session from Linux device (not mine). I believe they have accessed through the device.
4. I want to restore the device somehow and avoid getting hacked again.
One of the problems I face is taht that now I'm not in the same circle of people from which I gathered most of the info on the leaked information, so I can't get to know if the actions I am taking got rid of the hack, besides some punctual actions they may do (launch app etc). So I have to act quite paranoid and do the most secure action.
Question
1. Any idea on how they managed to do that? how can I prevent it or prove it? a reset would get rid of any proof, but I kinda prefer it if it is once and for all.
2. A hard reset only formats one partition (user data), so if there is a trojan located in /system it would be pointless. With an unrooted device I can only get rid of /cache and /data.
Should I install another ROM?(my phone has always been unrooted) which one? (restoring the stack ROM would probably be pointless if the vulnerability is due to android...
3. Is there any other measure I could take?
I'd appreciate any help.
Thank you!

Categories

Resources