Related
Last week on a business trip to Rome, my XDA got stolen..
Offcourse I had it blocked as soon as possible and have password protection on it, but resetting it would make it usable for anyone.
If anyone sees a secondhand XDA for sale from Italy (where they are not sold) please remember me....
IMEI: 350312010049224
S/N : HT220CC15367
P/N : 99HJ00007-00
So... when is this new model XDA comming on the market?!
We thought of a program to stick into ROM which would, after cold-boot, send one SMS to a pre-determined number. Could be a friend's number, or possibly even a web-service, where you can look up all the phone numbers of all SIMs ever in that phone at cold-boot. You could even wait a few days to see if the owner field was ever filled out...
Please go into that, as I will buy an XDA again but feel quite bad about this one stolen and would very much want something to have a little more protection/means of getting it back.
I saw an advertisement on www.thinkgeek.com about a software that would automatically send emails with IP adresses when a stolen laptop is connected to internet.
Something like that could possibly be an option in a theft-recovery program?
Thanks,
Lx
Great idea XDA developer Peter Poelman...you guys should definitly do that!!
XDA developer Peter Poelman, that is one of the best ideas I have heard of!! If there were a server you could register your XDA on, then install the 'tracking' software it would be very cool.
Would it even be possible to get a fix on the location by picking up the nodes that the XDA is near? Effectively your XDA would text you its location, name of the new owner and new number to server where you could pickup the info. Hay-presto, you can inform the provider and authorities and maybe even get it back. I bet you could even sell the software to the providers!!
Gil.
Hold on guys, if you developed such a ROM, it should be clearly stated that it is doing that. I can imagine, if people started offering ROMS, that made unsolicited calls to premium rate numbers, that would be a great, and illegal, business venture.
Anything, that works behind the scenes must be clearly highlighted if trust is to be maintained in a public community
Sounds good though. If i could find all the people that have stolen bits and pieces from me, revenge would be sweet!
I guess that watching out for ROMs that have spy-wearz or nasty apps in the background ARE possible, there could be something about now. Let’s face it the ROM tool is not that hard to understand. And if someone was really that nasty they could make a lot of money in a very short period. After all a premium rate text number has no price cap. But lets not get in to that right now.
The answer to this, like a lot of things in IT is A trust in the developer, B trust that is has not been hackled – as above and C you have noting to hide.
The provider can already see al the calls and text that the sent from your phone. So the only thing for them to see would be your ROM version.
If this was made a voluntary process and secure I can see it doing a lot more good than harm.
Also another though on the spy wear bit, it would be good to have an app that watches the activity on you device and allow you to see it.
Sorry for the rant, Gil.
Oh yeah, we've thought of nasty things one could do. Possibly more scary still: if you have this Action Engine framework, someone holding a private key somewhere can remotely update your ROM, without telling you.
perhaps thats how o2 intended to upgrade in the future?
is it easy to place the AE exe file back onto the xda? its just the one file right?
No, it's a whole bunch of files. They were installed from the operator section of the ROM, though AutoConfig.exe, into device RAM.
I'm not really into the programming stuff, but I was just thinking...
If such a thing was to be implemented, you would not want it to be active until your device actually got lost. So how do you tell your device (that probably has a different SIM card in it) that it should start to broadcast it's location and new SIM information? And where to?
I was thinking of a site where you should register, very securely and only upon activating the 'tracking' program from this secure site that a constantly updated log file of all nodes where the device is connected to a GSM/GPRS network would state the deveice's location.
With this list (and possibly the information of the new SIM card) it should definatly be possible to retrieve the device, with collaboration from the provider/authorities ofcourse.
Also I heard a provider can locate any GSM down to 5meters accuratly when the phone is being used, about 100 meters when the device is on stand-by. Don't know for shure if this is true though.
If things like these could be incorporated, this would be the best software/ROM update ever to be made in my opinion. If there is any way in wich I could be of any help I would gladly be of service!
Two complimentary options would be:
the XDA sends a message to a server whenever the SIM card is changed, unless you enter a particular password first.
Send a specifically crafted sms to the XDA that causes it to realize that it is stolen. This starts it sending location info to the server.
I think you could switch XDA in to stolen mode using a broadcast directly to the PIN on the phone. This is how P2P works in the US instead of SMS. This could be done from a web site and the user of the stolen phone would not know until it was too late.
But then again I may be wrong?
Gil.
this is all good and well, but there will be always someone out there that says this is a privacy thing and they do not want people knowing where they are using their XDA
What should be developed is a Rom that once the owner name has changed, the XDA will then send a message to a server(if the XDA is registered) informing of the new number of the inserted SIM, the IMEI number and all other numbers/contacts straight to your provider. they then contact the new provider for information on the new owner. send the bissies round and reclaim your XDA.
this would be big money to phone service providers as it would reduce the amount of insuance claims and hastle.
if it can be done, then I will be buying it (once i own the XDA !!)
cheets
I quickly created a password for my phone, then set it down and now i forgot it. Can anyone help??
hard reset will do the job....
tvos
I cant hard reset because I cant even turn on the phone without entering a password. Is there some software where i can explore the contents on the phone through my computer and find it that way?
you hard reset from the phone being off. with the phone off i believe you hold volume down and the center button then press the power button.
hard reset with phone OFF
with the phone off, press and hold the VOLUME DOWN and ENTER keys first, and and then press and hold the POWER key until you see a screen messageabout losing all date etc.. Then you release the VOLUME down key and the ENTER key and then press the VOLUME UP key to perform the hart reset OR press any other button to cancel the reset.
Hope this helps- it is on pg. 82 in the TP Manual.
Any other way to get pass the lock without doing a hard reset? I'm having the same problem but I do NOT want to lose my data. Please, if you can help, let me know.
I doubt anyone here would assist in circumventing a password on a ppc... it's something akin to asking how to get around a password on a regular computer. We don't know you from Adam, and you might have just stolen the device only to find it locked by password. Here's a hint, go to your carrier's store and ask them how to do it, that way they can verify you are the proper owner of the device.
I understand your concern Jye, but I assure you, this phone is mine. On the prompt, it has my name and my phone number on it. If I were to show you this phone in person, there would be no doubt. I would post a picture, but I'm not exactly keen on posting my name and phone number on the internet. As for the carrier, I tried that already, said they couldn't help me.
It may well be yours, and your question may well be legit. (Even if you were to post a picture of your screen, how is anyone to know that it is yours unless they know exactly who you are personally? Just like you can take someone elses credit card and say, "it's really mine, and I am the person that this card belongs to, I assure you")
However, there are MANY people cruising these forums for ways to get around the system. If someone were to post instructions on how to circumvent security applications, then whomever is on here can exploit that. If someone you know on here would like to send you a PM regarding a way to get around your own password protection, then that is up to them. However, you can see the concern with posting that info in a public forum, I am sure.
But as I said before, and I'm sure others will agree, your best bet is to go to the carrier store and have them unlock it for you once they verify it's yours via your account.
I understand Jye75 100% and what you're saying is what I expected. I am hoping that someone will do just that (PM me) with some help. If necessary, I can get on webcam for whoever wants to help and hold up the phone (with my name and number) and a photo ID. Or they could just call the number and it'll go to my G1. Either way, I'm willing to prove the legitimacy of my problem if someone is willing to help me.
Jye75 said:
I doubt anyone here would assist in circumventing a password on a ppc... it's something akin to asking how to get around a password on a regular computer. We don't know you from Adam, and you might have just stolen the device only to find it locked by password. Here's a hint, go to your carrier's store and ask them how to do it, that way they can verify you are the proper owner of the device.
Click to expand...
Click to collapse
Jye75 said:
It may well be yours, and your question may well be legit. (Even if you were to post a picture of your screen, how is anyone to know that it is yours unless they know exactly who you are personally? Just like you can take someone elses credit card and say, "it's really mine, and I am the person that this card belongs to, I assure you")
However, there are MANY people cruising these forums for ways to get around the system. If someone were to post instructions on how to circumvent security applications, then whomever is on here can exploit that. If someone you know on here would like to send you a PM regarding a way to get around your own password protection, then that is up to them. However, you can see the concern with posting that info in a public forum, I am sure.
But as I said before, and I'm sure others will agree, your best bet is to go to the carrier store and have them unlock it for you once they verify it's yours via your account.
Click to expand...
Click to collapse
Well, no offense, but I totally disagree with this,
At the way you are going, we should stop providing any help to anybody on xda, for the same reason:
"Maybe the device is stolen, and the software is being illegally installed on A stolen device!" (Don't forget that some software can even brick the device!)
And how do we dare telling him and other people how to erase data or how to do A Hard Reset?! if the device is stolen (poor owner, lol),
Sorry, but I think that this is absolutely none sense!
if you are using exchange 2k7 you can reset the password via OWA. https://mai.company.com/owa
then options
then mobile devices
display recover password
once you have your displayed password at the lock screen choose password reset
then u will be prompted to change your pw.
then you will be asked to type in a super long numeric string that will authenticate back you your mail server and your pw will be changed. I just confirmed this works by using my own phone.
pinny said:
Well, no offense, but I totally disagree with this,
At the way you are going, we should stop providing any help to anybody on xda, for the same reason:
"Maybe the device is stolen, and the software is being illegally installed on A stolen device!" (Don't forget that some software can even brick the device!)
And how do we dare telling him and other people how to erase data or how to do A Hard Reset?! if the device is stolen (poor owner, lol),
Sorry, but I think that this is absolutely none sense!
Click to expand...
Click to collapse
No offense taken, you are entitled to your opinion. But your opinion carries the same weight regardless of font size or color.
Sure, this site is about helping others, and modifying your xda's, but it also will not tolerate people asking for serials to paid software either. So where is the line drawn on "help"? It's one thing to help someone get out of a jam when their device needs to be hard-reset... (plausible deniability), but quite another to put out there a how-to on bypassing password security to access a device without hard-resetting it. The difference is, and I'm surprised you don't get it, that if the device does not belong to that person, they will have no access to the private information on that device, which is why they would want to get around the password in the first place. Not everybody who owns a PPC gets online to see what can be done with their device, just like not everyone who has a device stolen necessarily knows it's stolen immediately. (thus they can become victims) Computer security is no joke, and a lack of it has led to many problems for many people.
vegasman said:
with the phone off, press and hold the VOLUME DOWN and ENTER keys first, and and then press and hold the POWER key until you see a screen messageabout losing all date etc.. Then you release the VOLUME down key and the ENTER key and then press the VOLUME UP key to perform the hart reset OR press any other button to cancel the reset.
Hope this helps- it is on pg. 82 in the TP Manual.
Click to expand...
Click to collapse
This is your best bet for fixing your problem. Thread closed.
Does anyone know how to do it on the Droid?
Is there a single honorable reason why you would be interested in doing this?
I sure can't think of one.
well as soon as wifi packet injection works on android i am switching.
¿GotJazz? said:
Is there a single honorable reason why you would be interested in doing this?
I sure can't think of one.
Click to expand...
Click to collapse
Vulnerability testing... an auditor who wants to do bluetooth related pen test with his/her phone?
archangelugp said:
Vulnerability testing... an auditor who wants to do bluetooth related pen test with his/her phone?
Click to expand...
Click to collapse
Lets go with that . So I'm guessing theres no way yet?
alienware777 said:
Lets go with that . So I'm guessing theres no way yet?
Click to expand...
Click to collapse
Nope. Not yet.
I don't see why it matters to anyone why someone wants this.
I want this too. I don't have to explain to anyone as to why I want it. Because, it is absolutely none of your business. If you don't know how to implement it, then don't post.
Lol. This is a public forum. Of course you don't have to explain why you want something. Equally, if someone who could help doesn't want to, because they suspect you're up to no good, they don't have to justify their actions either, let alone help you. Blessed be.
cauli said:
Lol. This is a public forum. Of course you don't have to explain why you want something. Equally, if someone who could help doesn't want to, because they suspect you're up to no good, they don't have to justify their actions either, let alone help you. Blessed be.
Click to expand...
Click to collapse
Touché. I'll admit it. The main reason I want this is to mess with my friends. Nothing actually detrimental. Same reason I like sms bombers, and caller id fakers.
But still, this would be great to add on to my list
This would be so awesome..just from a security standpoint to be able to show and explain to friends and family to not there guards down when it comes to cyber theft and to turn off your radios when not in use
I never quite understand answers like this. This forum is for the exchange of information, not personal opinions. People that think their some kind of 'ethics police' need not be on this type of site. This site is for the exploration, hacking and development of our phones. Rooting & custom firmware is frowned upon by security researchers and manufacturers alike, but because your into it, it's morally correct?
supern0va said:
I never quite understand answers like this. This forum is for the exchange of information, not personal opinions. People that think their some kind of 'ethics police' need not be on this type of site. This site is for the exploration, hacking and development of our phones. Rooting & custom firmware is frowned upon by security researchers and manufacturers alike, but because your into it, it's morally correct?
Click to expand...
Click to collapse
Yep, one man's "not needed" is another man's necessity. This is no less needed than say someone thinking they need a ps3 controller (or wiimote) working with their phone, but no one really complains about that.
here's a very legitimate reason for you so if you know how PM me
Hi,
A friend of mine has an older mobile with a broken touchscreen - the phone no longer has a SIM or a RAM card and is in "Music Sync" mode when it connects to a PC via USB.
They are currently in a court case and need to get their old SMS's off the broken phone - all the "forensic" mobile software out there (from $500 up to $5000!!!) require that the phone is in PC-Suite (or PC-Sync) mode. This can't be changed on the phone as the touchscreen doesn't work.
The only way to get to the SMS's is by Bluesnarfing, so if you know of a PC program or a WinMo 6.5 program that will let me access their phone PM me.
Thanks.
Why is there always that one person that offers no assistance, takes up bandwidth questioning your motives...
For those that don't know:
"Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking, although both exploit others’ Bluetooth connections without their knowledge. Any device with its Bluetooth connection turned on and set to “discoverable” (able to be found by other Bluetooth devices in range) can be attacked. By turning off this feature you can be protected from the possibility of being Bluesnarfed. Since it is an invasion of privacy, Bluesnarfing is illegal in many countries."
Thread closed
Heyyo heyyo. "I've got an Android G5 running 7.0 software, it's a LGUS992 and the carrier is under US Celluar.
I know this is going to sound like some tinfoil hat **** and someone who's hearing things, hallucinating, etc but without a doubt. 100 %. someone in my community has access to my phone [and my Chromebook, actually] I'm not very computer savvy but I know there are means through which you /might/ be able to do this kind of thing- stealing wifi, malware or spyware, keylogging, some kind of physical device, etc
I've heard people mention things as specific as individual songs I'm listening to, passwords I've used, things I've typed, etc. Like literally /everything and anything/ I'll do on my phone, I know people have access to and I absolutely need to know how this is being done and how I could stop it, I've been a phone addict for years, use mine for both professional and personal purposes, and since I live out of state from most of my family and friends it's literally the /only/ way I can talk to 99 % of the people I know. My life is already in the dumps, so to lose my main access to a ton of the important people and things in my life is soul crushing and whoever does this doesn't care at all.
It's not just something that could be from my Gmail account being linked through my devices and then hacked. I've heard mention of texts, etc. Phone only, offline stuff. Does this sound like something that could be done and if so, evaded somehow? I even considered that the park I live in might have cameras inside the places but that wouldn't explain why I hear about **** I'm doing no matter where it's done
I've changed my phone password, Gmail password, Skype password, Youtube password, put on a PIN, put on fingerprint access for my phone, blocked off unfamiliar MAC addresses on my router and this has still continued. Someone in the Galaxy S5 forum said I could try "resetting the whole thing - meaning all partitions on it - to stock configuration via a special tool." but like I said, I'm not computer or phone savvy so I wouldn't know how to or if this'd even fix the problem
Hello all,
In my circle of friends there was a suicide case and I was asked by the family if I would be able to remove a screen lock from a Samsung Galaxy S21. The family can't explain why their son killed himself and would like answers to all their questions. They assume that there is information on the phone or reasons for the suicide.
Are there any serious ways to get around such a block? I don't have much information about the device yet, nor do I currently have it with me. Maybe there are exploits or bruteforce toolkits to bypass the lockscreen. Programs like Tenorshare 4uKey or PassFab Android Unlocker are probably scam or?
I will get the device in the next week and could provide more information then.
Currently the following information is available:
Device Model: Samsung Galaxy S21 5G | Samsung SM-G991B | Android 11 | One UI 3.1
Mobile contract: active
SMS PIN & PUK: available
Google account credentials: available and valid and linked to the device but no backups available in Google Drive
Samsung account credentials: present and valid but not associated with the device so no backups available
Does the approach via Kali Nethunter and a HID keyboard attack work with a current Android Samsung Galaxy S21 bruteforcing or do you always get into the temporally increasing lock?
A data recovery $pecialist might be able to, ask the police for assistance.
Find the password for the lockscreen, or maybe through their Gmail or Samsung accounts, again passwords needed.
I think if they wanted you in the phone they would have unlocked it...
blackhawk said:
A data recovery $pecialist might be able to, ask the police for assistance.
Find the password for the lockscreen, or maybe through their Gmail or Samsung accounts, again passwords needed.
I think if they wanted you in the phone they would have unlocked it...
Click to expand...
Click to collapse
This is not a helpful answer.
The police in this country does not help in such matters if it is assumed that no outside influence was involved.
A data recovery specialist also only executes toolkits or exploits. I am also able to do this if someone gives me a hint which toolkits or exploits would come into question for this model. I work as a sysadmin myself and therefore I am not completely untalented technically. I just lack information about which approach would be the best.
This is a community of people who like to hack their phones, not hack into other people's phones... which is considered unethical.
Are you serious?
You really think it's unethical when a 21 year old boy takes his own life overnight and the family just wants to know why their son did it? Sure, the boy was of age at 21 and can do with his life what he wants. Nevertheless, any clear-thinking person can understand that the family wants to know why the son did that.
I have no bad intentions and I am only trying to help the family. This is not about hacking a stolen cell phone. Then I would just do a factory reset and use the phone normally and not write this post here.
Yes, well... be that as it may.
With a screen lock in place you can't simply factory reset as you still be locked out.
I believe my original response was valid. It's not an easy nut to crack... by design.
Hello, i own a phone repair shop and i'm a relation with a person specialized in unlocking phones. He said me that he can bypass the lock screen and keep data on all samsung phones and he can do it remotly. Being in this business i don't trust him a lot about keeping data. One of my customer's son is dead and his family want to access his phone, they gave me his phone and they are agree to loose data if things dont go good so i'm gonna try with this guy and if you want i will give you a feedback.
Hi sorry to hear that this terrible situation happened around you.
I am in a similar situation. My cousin died suddenly and his sister asked be to recover pictures and videos because he filmed himself before try to end his life and she would like to find if there is any video that could help us understand better.
I'm trying to find ways to do that and so far I haven't but I wanted to share some information in case it could be helpful to someone.
I tried the iMobie Data Extractor. It is supposed to help recover data from "broken phone". I guess it's the closest thing I found that didn't look scammy and could work. After about a month of back and forth with their support person, I managed to replaced the OS using Odin (because the official software left my phone in a non-bootable state) replacing all partitions except User Data. Unfortunately, that didn't remove the lock (PIN). I'm not surprised since I didn't wipe the User Data.
From a security perspective, it is good that it is hard (impossible) to access data of a locked phone, but from a family emotional perspective, it is hard to have to tell my family that I failed.
I wish you good luck and please post here if you find a way.
be safe
Touftaf said:
Hello, i own a phone repair shop and i'm a relation with a person specialized in unlocking phones. He said me that he can bypass the lock screen and keep data on all samsung phones and he can do it remotly. Being in this business i don't trust him a lot about keeping data. One of my customer's son is dead and his family want to access his phone, they gave me his phone and they are agree to loose data if things dont go good so i'm gonna try with this guy and if you want i will give you a feedback.
Click to expand...
Click to collapse
What happened
I don't have easy-to-hear information for you. But I offer these words as a way to think about this situation.
I believe Samsung intentionally builds phones which are extremely hard to break into. This is a conscious design decision they make. Why? Because so many users do things like credit card payments, banking, and social media, where, if you lost your phone and a bad person found it, an easy-to-break-into device would have potentially catastrophic results. Aside from the harm to a user who lost a phone, Samsung themselves would be subjected to great reputational damage, too. It's bad press when it's easy to break into and steal something.
Also, you may not be able to break into the device, even with the help of a commercial vendor. Exploits in Android, when found, are patched regularly. A very smart person might have had a way to crack into a phone last week, last month, or last year. But again, Samsung intends to continually patch the software to keep it secure. They make a point to telling people that Samsung phones are patched for several years, so users will feel confident their data will be secure.
One suspects certain governments have police or security organizations who likely could break in, but they are unlikely to help in a personal situation, as you described.
Although this doesn't seem to apply to you, it's worth saying that Samsung phones are also backed up (by default) to their "cloud." It's possible that a lawyer might be able, with proper documentation of the owner's death, to get access to Samsung's (or Google's) cloud backup(s). I don't think it's easy though. Google, at least in the USA, allows the owner of an account to specify how Google should handle their data if they stop accessing their accounts. (I think Google treats an idle account as "dead" and for reasons like this, if you no longer want to use a vendor like Samsung or Google, you should proactively delete your account, not merely let it go idle.)
Anyone reading this post, might want to consider having what can be an uncomfortable conversation with your friends and family: "How would you like your friends and family handle your electronic, financial, and social accounts in the event of your death?"
Please, forgive me if any of this sounds insensitive. My father worked in insurance and as part of his job he knew all to well that all people eventually die. And how hard it is for those left behind to pick up the pieces, especially when secrets are involved. My family knows where to find my keys.