I quickly created a password for my phone, then set it down and now i forgot it. Can anyone help??
hard reset will do the job....
tvos
I cant hard reset because I cant even turn on the phone without entering a password. Is there some software where i can explore the contents on the phone through my computer and find it that way?
you hard reset from the phone being off. with the phone off i believe you hold volume down and the center button then press the power button.
hard reset with phone OFF
with the phone off, press and hold the VOLUME DOWN and ENTER keys first, and and then press and hold the POWER key until you see a screen messageabout losing all date etc.. Then you release the VOLUME down key and the ENTER key and then press the VOLUME UP key to perform the hart reset OR press any other button to cancel the reset.
Hope this helps- it is on pg. 82 in the TP Manual.
Any other way to get pass the lock without doing a hard reset? I'm having the same problem but I do NOT want to lose my data. Please, if you can help, let me know.
I doubt anyone here would assist in circumventing a password on a ppc... it's something akin to asking how to get around a password on a regular computer. We don't know you from Adam, and you might have just stolen the device only to find it locked by password. Here's a hint, go to your carrier's store and ask them how to do it, that way they can verify you are the proper owner of the device.
I understand your concern Jye, but I assure you, this phone is mine. On the prompt, it has my name and my phone number on it. If I were to show you this phone in person, there would be no doubt. I would post a picture, but I'm not exactly keen on posting my name and phone number on the internet. As for the carrier, I tried that already, said they couldn't help me.
It may well be yours, and your question may well be legit. (Even if you were to post a picture of your screen, how is anyone to know that it is yours unless they know exactly who you are personally? Just like you can take someone elses credit card and say, "it's really mine, and I am the person that this card belongs to, I assure you")
However, there are MANY people cruising these forums for ways to get around the system. If someone were to post instructions on how to circumvent security applications, then whomever is on here can exploit that. If someone you know on here would like to send you a PM regarding a way to get around your own password protection, then that is up to them. However, you can see the concern with posting that info in a public forum, I am sure.
But as I said before, and I'm sure others will agree, your best bet is to go to the carrier store and have them unlock it for you once they verify it's yours via your account.
I understand Jye75 100% and what you're saying is what I expected. I am hoping that someone will do just that (PM me) with some help. If necessary, I can get on webcam for whoever wants to help and hold up the phone (with my name and number) and a photo ID. Or they could just call the number and it'll go to my G1. Either way, I'm willing to prove the legitimacy of my problem if someone is willing to help me.
Jye75 said:
I doubt anyone here would assist in circumventing a password on a ppc... it's something akin to asking how to get around a password on a regular computer. We don't know you from Adam, and you might have just stolen the device only to find it locked by password. Here's a hint, go to your carrier's store and ask them how to do it, that way they can verify you are the proper owner of the device.
Click to expand...
Click to collapse
Jye75 said:
It may well be yours, and your question may well be legit. (Even if you were to post a picture of your screen, how is anyone to know that it is yours unless they know exactly who you are personally? Just like you can take someone elses credit card and say, "it's really mine, and I am the person that this card belongs to, I assure you")
However, there are MANY people cruising these forums for ways to get around the system. If someone were to post instructions on how to circumvent security applications, then whomever is on here can exploit that. If someone you know on here would like to send you a PM regarding a way to get around your own password protection, then that is up to them. However, you can see the concern with posting that info in a public forum, I am sure.
But as I said before, and I'm sure others will agree, your best bet is to go to the carrier store and have them unlock it for you once they verify it's yours via your account.
Click to expand...
Click to collapse
Well, no offense, but I totally disagree with this,
At the way you are going, we should stop providing any help to anybody on xda, for the same reason:
"Maybe the device is stolen, and the software is being illegally installed on A stolen device!" (Don't forget that some software can even brick the device!)
And how do we dare telling him and other people how to erase data or how to do A Hard Reset?! if the device is stolen (poor owner, lol),
Sorry, but I think that this is absolutely none sense!
if you are using exchange 2k7 you can reset the password via OWA. https://mai.company.com/owa
then options
then mobile devices
display recover password
once you have your displayed password at the lock screen choose password reset
then u will be prompted to change your pw.
then you will be asked to type in a super long numeric string that will authenticate back you your mail server and your pw will be changed. I just confirmed this works by using my own phone.
pinny said:
Well, no offense, but I totally disagree with this,
At the way you are going, we should stop providing any help to anybody on xda, for the same reason:
"Maybe the device is stolen, and the software is being illegally installed on A stolen device!" (Don't forget that some software can even brick the device!)
And how do we dare telling him and other people how to erase data or how to do A Hard Reset?! if the device is stolen (poor owner, lol),
Sorry, but I think that this is absolutely none sense!
Click to expand...
Click to collapse
No offense taken, you are entitled to your opinion. But your opinion carries the same weight regardless of font size or color.
Sure, this site is about helping others, and modifying your xda's, but it also will not tolerate people asking for serials to paid software either. So where is the line drawn on "help"? It's one thing to help someone get out of a jam when their device needs to be hard-reset... (plausible deniability), but quite another to put out there a how-to on bypassing password security to access a device without hard-resetting it. The difference is, and I'm surprised you don't get it, that if the device does not belong to that person, they will have no access to the private information on that device, which is why they would want to get around the password in the first place. Not everybody who owns a PPC gets online to see what can be done with their device, just like not everyone who has a device stolen necessarily knows it's stolen immediately. (thus they can become victims) Computer security is no joke, and a lack of it has led to many problems for many people.
vegasman said:
with the phone off, press and hold the VOLUME DOWN and ENTER keys first, and and then press and hold the POWER key until you see a screen messageabout losing all date etc.. Then you release the VOLUME down key and the ENTER key and then press the VOLUME UP key to perform the hart reset OR press any other button to cancel the reset.
Hope this helps- it is on pg. 82 in the TP Manual.
Click to expand...
Click to collapse
This is your best bet for fixing your problem. Thread closed.
Related
HI,
I used to have an XDA/Walaby but I lost it.
I posted a topic about making an option in the rom for the device to send it's network position for it to be retrievable.
Now that I've got a MDA II / Hymalaya I am wodnering if this is something that can be done for this devide.
I'm sorry but I'm no expert programmer, just a regular user with little in-depth knowledge, so please forgive me for my bad explenation and terms.
What I was thinking about having something built into the bootrom that would check a certain website everytime it connects with GPRS or WIFI to the internet.
Hidden and 'in stealth' ofcourse, without knowing of the 'new' owner.
On this website there would be a code, normally stating 'green' meaning the devide is in good hands.
When the device is lost or stolen, the original user change this code to 'red' by a password protected email, login/change setting or something like that.
When the devide connects to the site and finds it's code turned to 'red'it should send a log file with information on witch netwerk point it is connected, WiFi point, Current SIM (plus mobile number and owner-) information and so on.
Maybe it's even possible with just SMS messages so the devide doesn't even has to connect ot the internet but a normal GSM signal would do.
With all this information it should be possible to go to the authorities and get the device back, or atleast give prove of theft for insurance purposes.
And since this function should run from the bootrom, a normal update would not affect it's functionality.
Again, I am absolutely no programmer but I would really like to see if people find this an interesting feature. I would be more than happy to assist in anyway possible in developing.
Greetz,
Lx
Interesting idea
You may be interested in this also: http://wiki.xda-developers.com/wiki/IIWPO
Yeah, that was the thread that came after I wondered about retrieval options for my XDA.
I will be testing IIWPO asap.
Still I think a lot more information could/should be send, especially since insurance companies won't do anything unless you have 'prove'of theft.
Someone else's SIM info and wherabouts seem hard to dismiss in a theft-quiry.
Maybe someone could give some comment on this?
Well I was just reading a thread about someone buying a Vibrant from someone who "found" it and this person was looking for a way to bypass WaveSecure.
We all know that with a little know how that it is possible with Recovery Mode.
The question I have is there a way to prevent even a Recovery Mode reflash? To absolutely stop someone from touching the ROM at all?
I know the Security Apps out right now can track you from GPS, wipe the phone remotely, etc... But can it stop someone from reflashing a ROM?
If there is a app out there like that please let me know, but if not, what would it take to create such a app.
What are YOUR thoughts??
What if this happens and then you brick for some reason need to reflash and it's locked. I would just bank on the fact that most people think that it's a "Droid" phone and don't know ****.
I was hoping for a question like that.
Either there is a security measure which at some point of using Recovery that it asks for a password or pin. Something that will allow you to access it securely and nobody else.
Yes, it is a droid, very true, but how many droids are out there now, are going to be out there, and with the new laws that allow you to unlock your device and pretty much do anything with it, more and more people are going to start playing around. Not only that, there is always somebody who knows someone, you know.
Personally myself, I would feel secure with having an implementation like this, everything else is pointless.
It's sort of like having a anti virus on your computer but not scanning for rootkits, only viruses.
The idea of that app sounds nice and all that but I seriously doubt that the average Android user would know about flashing ROMs and all that. But if it does get into the hands of somebody that does know how to do it then it can be a problem.
jzero88 said:
Yes, it is a droid, very true, but how many droids...
Click to expand...
Click to collapse
First of all these are android devices / android phones. I was mocking the people who call these phones "droid" phones.
Now on topic: All it takes to break this security is for one person to say, "I forgot my password on for the ==sUPERlOCKER== what do I do to get access?" Then all your worry is for nothing again.
What has been done can always be undone.
Sure, unlike me, I never forget my passwords. Especially for something this serious.
Second, of course something can be undo, but to what extent, after hearing your lack of concern makes me think you don't even have a lock on your phone
Again, would you rather have a password like "1234" that is easily guessed, or would you rather have something like "00LowJK54889$3%#". It's really a matter of personal security.
You sound like one of those people who would have Security Cameras, but never has the DVR on to record anything.
I'm saying your idea is bad. I have illustrated why. You have no counterpoint other than that I am 'relaxed' about my phone security.
How about this, keep your phone in your pocket or hand? 100% security.
This should be in general and not development
Sent from my Vibrant using xda app
This has been discussed a few times, you could compile your own recovery image and program in a password while at it, or you can accept that 90% of theives(or people who would find your phone) cannot get to recovery. If I found a phone then yeah I would go straight to recovery but I'm not your average user.
Sent from my T-Mobile myTouch 3G Slide using XDA App
I'm saying your idea is bad. I have illustrated why. You have no counterpoint other than that I am 'relaxed' about my phone security.
How about this, keep your phone in your pocket or hand? 100% security.
Click to expand...
Click to collapse
First, my idea is not bad, give it time, you will see.
Second, I do not have a counterpoint because my main point is stated in the first post. Read again.
Third, I don't care if you are relaxed about your security or not. This post obviously is not for you, another negative person who stunts development if they do not see a logical use for themselves.
I wish you the best and hope that you do not need to ever use such a tool or measure. Take it easy.
This has been discussed a few times, you could compile your own recovery image and program in a password while at it, or you can accept that 90% of theives(or people who would find your phone) cannot get to recovery. If I found a phone then yeah I would go straight to recovery but I'm not your average user.
Sent from my T-Mobile myTouch 3G Slide using XDA App
Click to expand...
Click to collapse
On the Vibrant forums? Haven't seen anything yet.
Also, I am not betting on a thief or someone who found the phone to be able to get to recovery, I'm worried about who these people might know. It's surprising to see how many people out here think that they are the only person in a 20 mile radius who knows how to do such mods... Maybe it's just the people I know but I know quite a few people who can easily google and find a way, easily.
I can bet that 90% of people here do not know anything except following directions, no pun intended to those who do. I definitely do not know half of what I should know, but again, is it really that hard?
Your own logic defeats what you are saying here. Don't you understand OP?
If there is a security measure, there will be a work around it? So why have more than ONE thing for the uneducated masses and stop there?
If the person who steals your phone knows someone who could get around WaveSecure, or any other security application. Then that same person can get around ANY AND ALL other types and forms of theft deterrent. If not, they will know someone, ask on forums, etc. UNTIL they gain access.
zaduma
Then why have any security on anything at all?
You my friend make no sense, good day!
jzero88 said:
Then why have any security on anything at all?
Click to expand...
Click to collapse
Ok, I will lay it out as simply as I can man. I do not want to argue, but you are missing why this is impossible to accomplish.
The existing security layers can be compromised by lets say... 10% of the population, seeing as most people who are thieves do not talk about it, most people dislike thieves.
So effectively 90% of people will be stopped dead in their tracks by having WaveSecure, etc.
The 10% who are not stopped however, can not be stopped by any means. None. They are the people who read these forums, have technical ability, etc.
Therefore having one layer of security means 90% of people are stopped from using your device. But it has ridiculously diminishing returns. With two layers, say stopping access to recovery, 10% are now stopped. Just boot into download mode and flash with odin. Stop download mode? First of all how? Second of all, there has to be a workaround for people who forget their passwords and stuff. And guess what, those 10% will know about that as well.
So please, address these issues and resolve them somehow, and your idea has merit. Without doing so you are wasting your time.
Also, much to your liking I will assume, I will no longer be posting in this thread due to your constant elevation of flaming.
Any security pro will tell you, if you have physical access to a computer, you can make it usable for you. The only real security you can hope for its to prevent access to your data by the thief. That's what full disk encryption and such is about. For our phones, we could achieve this much with a custom kernel perhaps, but how would you enter the password? No keyboard at that level.
The cellular providers can prevent the stolen phone from getting on their networks, and some do, but that's about as far as it goes.
Its like having a lock on your front door.. Its only going to keep out the honest people... Thats what they are made for, honest people, because dishonest people will just kick the door in.. And the good thieves can pick a dead bolt...
Sent from my SGH-T959 using XDA App
I'm starting to think this request/question is for the wrong crowd, truly it is...
If you build it they will hack it... Hands down... Look at the droid x, the unhackable phone, it took 5 weeks..
Sent from my SGH-T959 using XDA App
I agree, never did I not. This thread wasn't to debate whether a security measure could be hacked or not, the thread was created to see what we could do to implement such a measure.
I am totally aware of that. I know that if there is a will there is a way.
PERSONALLY, that is something I wouldn't mind having. Though some of you disagree and have a right to your own opinion, that is beyond the point. I am trying to see if a) is it possible. and b) what it would take to do so, and possibly c) if anyone was interested in trying or helping out.
So feel free to express your opinion. Mine is that you can never have enough protection cuz I would never bring a knife to a gun fight. But that's just me...
BTW, those who hacked the unhackable phone I would consider being part of the .01%.
jzero88 said:
I'm starting to think this request/question is for the wrong crowd, truly it is...
Click to expand...
Click to collapse
If you mean people that know how things work, I suppose. It's the same problem as drm. When you understand why that's not possible, you will understand this. Read up on jtag as well, you can't protect against that. 90% is about as good as it gets.
pixel 6 january 2022 FRP bypass solution?
the sim card pin method is not an option so idk what to do and there's NOTHING online.. anywhere...
Unless you know the account and password you're screwed. FRP bypass options went by the wayside around Android 8, last time I checked.
Regardless, since there is no way to verify ownership of the device in question I won't be helping anyone with attempts to bypass Google security features.
Strephon Alkhalikoi said:
Unless you know the account and password you're screwed. FRP bypass options went by the wayside around Android 8, last time I checked.
Regardless, since there is no way to verify ownership of the device in question I won't be helping anyone with attempts to bypass Google security features.
Click to expand...
Click to collapse
And since this usually portends a stolen or lost device that has been sold I suggest the mods lock this thread before it goes off the rails.
Strephon Alkhalikoi said:
Unless you know the account and password you're screwed. FRP bypass options went by the wayside around Android 8, last time I checked.
Regardless, since there is no way to verify ownership of the device in question I won't be helping anyone with attempts to bypass Google security features.
Click to expand...
Click to collapse
frp bypass solutions have been a thing forever, where have u been?
it is my phone. i'm just locked out of it.
Snapple391 said:
frp bypass solutions have been a thing forever, where have u been?
it is my phone. i'm just locked out of it.
Click to expand...
Click to collapse
Were you to search my posts from the last five years or so you'd find that my answer is consistent on this topic. I don't deny FRP bypass solutions exist, but haven't seen or heard any in at least four years.
It doesn't matter to me whose device it is. It could very well be yours but it could also be a lost or stolen device. FRP exists to prevent reuse of lost or stolen devices. Since it's not possible to prove ownership my answer to everyone is the same: remember your username or password.
If you chose to use a throwaway account in setting up your phone, then this will be a very expensive lesson for you about why that isn't a great idea.
Ok Streph, I get it, you're smarter than me and you want this entire thread to be aware of it.
So now that this guy is satisfied, let's get back to the point of the thread...
ANYONE WHO KNOWS HOW TO BYPASS FRP ON PIXEL 6 JANUARY 2022 PLEASE GET IN TOUCH!
Snapple391 said:
Ok Streph, I get it, you're smarter than me and you want this entire thread to be aware of it.
So now that this guy is satisfied, let's get back to the point of the thread...
ANYONE WHO KNOWS HOW TO BYPASS FRP ON PIXEL 6 JANUARY 2022 PLEASE GET IN TOUCH!
Click to expand...
Click to collapse
Now that you have insulted a senior member with a childish attack why don't you go to a hacking site where you can find out how to break into a phone that probably is blacklisted in the US and more than likely lost or stolen. Then you can sell it again. You won't get help here. Maybe all caps will get you the attention you crave.
bobby janow said:
Now that you have insulted a senior member with a childish attack why don't you go to a hacking site where you can find out how to break into a phone that probably is blacklisted in the US and more than likely lost or stolen. Then you can sell it again. You won't get help here. Maybe all caps will get you the attention you crave.
Click to expand...
Click to collapse
I did it! Without anybody's help!
Sorry I got you all upset Bobby, cry to someone else' CAUSE I DID IT!!!! WHOOOOOOOOO
SOLUTION:
OKAY SO YOU START BY GOING TO THE TALKBACK MENU AND THEN YOU ACTIVATE TALKBACK, THEN YOU DO THE L SHAPE, DOWN INTO THE RIGHT, THEN YOU SELECT THE BRAILLE KEYBOARD, THEN YOU TURN TALKBACK OFF BY HOLDING DOWN THE VOLUME UP IN THE VOLUME DOWN BUTTONS AND THEN YOU CLICK ON SET UP BRAIL KEYBOARD, THEN CLICK NOTIFICATION THAT COMES UP IN THE LINK WHERE IT SAYS GBOARD, THIS TAKES YOU TO THE PLAY STORE, ONCE YOU'RE IN THE PLAY STORE YOU GO TO THE NOTIFICATIONS IN THE THREE DOTS MENU, THE NOTIFICATIONS BRING YOU TO NOTIFICATION SETTINGS AND SO ON AND SO FORTH.
I KNOW THAT THAT MIGHT BE HARD TO FOLLOW, I REALLY DON'T HAVE TIME FOR THIS THOUGH, I HAVE PHONE CALLS TO MAKE HA.
IF YOU WANT MORE INFORMATION OR YOU NEED MY HELP JUST LET ME KNOW
Hello all,
In my circle of friends there was a suicide case and I was asked by the family if I would be able to remove a screen lock from a Samsung Galaxy S21. The family can't explain why their son killed himself and would like answers to all their questions. They assume that there is information on the phone or reasons for the suicide.
Are there any serious ways to get around such a block? I don't have much information about the device yet, nor do I currently have it with me. Maybe there are exploits or bruteforce toolkits to bypass the lockscreen. Programs like Tenorshare 4uKey or PassFab Android Unlocker are probably scam or?
I will get the device in the next week and could provide more information then.
Currently the following information is available:
Device Model: Samsung Galaxy S21 5G | Samsung SM-G991B | Android 11 | One UI 3.1
Mobile contract: active
SMS PIN & PUK: available
Google account credentials: available and valid and linked to the device but no backups available in Google Drive
Samsung account credentials: present and valid but not associated with the device so no backups available
Does the approach via Kali Nethunter and a HID keyboard attack work with a current Android Samsung Galaxy S21 bruteforcing or do you always get into the temporally increasing lock?
A data recovery $pecialist might be able to, ask the police for assistance.
Find the password for the lockscreen, or maybe through their Gmail or Samsung accounts, again passwords needed.
I think if they wanted you in the phone they would have unlocked it...
blackhawk said:
A data recovery $pecialist might be able to, ask the police for assistance.
Find the password for the lockscreen, or maybe through their Gmail or Samsung accounts, again passwords needed.
I think if they wanted you in the phone they would have unlocked it...
Click to expand...
Click to collapse
This is not a helpful answer.
The police in this country does not help in such matters if it is assumed that no outside influence was involved.
A data recovery specialist also only executes toolkits or exploits. I am also able to do this if someone gives me a hint which toolkits or exploits would come into question for this model. I work as a sysadmin myself and therefore I am not completely untalented technically. I just lack information about which approach would be the best.
This is a community of people who like to hack their phones, not hack into other people's phones... which is considered unethical.
Are you serious?
You really think it's unethical when a 21 year old boy takes his own life overnight and the family just wants to know why their son did it? Sure, the boy was of age at 21 and can do with his life what he wants. Nevertheless, any clear-thinking person can understand that the family wants to know why the son did that.
I have no bad intentions and I am only trying to help the family. This is not about hacking a stolen cell phone. Then I would just do a factory reset and use the phone normally and not write this post here.
Yes, well... be that as it may.
With a screen lock in place you can't simply factory reset as you still be locked out.
I believe my original response was valid. It's not an easy nut to crack... by design.
Hello, i own a phone repair shop and i'm a relation with a person specialized in unlocking phones. He said me that he can bypass the lock screen and keep data on all samsung phones and he can do it remotly. Being in this business i don't trust him a lot about keeping data. One of my customer's son is dead and his family want to access his phone, they gave me his phone and they are agree to loose data if things dont go good so i'm gonna try with this guy and if you want i will give you a feedback.
Hi sorry to hear that this terrible situation happened around you.
I am in a similar situation. My cousin died suddenly and his sister asked be to recover pictures and videos because he filmed himself before try to end his life and she would like to find if there is any video that could help us understand better.
I'm trying to find ways to do that and so far I haven't but I wanted to share some information in case it could be helpful to someone.
I tried the iMobie Data Extractor. It is supposed to help recover data from "broken phone". I guess it's the closest thing I found that didn't look scammy and could work. After about a month of back and forth with their support person, I managed to replaced the OS using Odin (because the official software left my phone in a non-bootable state) replacing all partitions except User Data. Unfortunately, that didn't remove the lock (PIN). I'm not surprised since I didn't wipe the User Data.
From a security perspective, it is good that it is hard (impossible) to access data of a locked phone, but from a family emotional perspective, it is hard to have to tell my family that I failed.
I wish you good luck and please post here if you find a way.
be safe
Touftaf said:
Hello, i own a phone repair shop and i'm a relation with a person specialized in unlocking phones. He said me that he can bypass the lock screen and keep data on all samsung phones and he can do it remotly. Being in this business i don't trust him a lot about keeping data. One of my customer's son is dead and his family want to access his phone, they gave me his phone and they are agree to loose data if things dont go good so i'm gonna try with this guy and if you want i will give you a feedback.
Click to expand...
Click to collapse
What happened
I don't have easy-to-hear information for you. But I offer these words as a way to think about this situation.
I believe Samsung intentionally builds phones which are extremely hard to break into. This is a conscious design decision they make. Why? Because so many users do things like credit card payments, banking, and social media, where, if you lost your phone and a bad person found it, an easy-to-break-into device would have potentially catastrophic results. Aside from the harm to a user who lost a phone, Samsung themselves would be subjected to great reputational damage, too. It's bad press when it's easy to break into and steal something.
Also, you may not be able to break into the device, even with the help of a commercial vendor. Exploits in Android, when found, are patched regularly. A very smart person might have had a way to crack into a phone last week, last month, or last year. But again, Samsung intends to continually patch the software to keep it secure. They make a point to telling people that Samsung phones are patched for several years, so users will feel confident their data will be secure.
One suspects certain governments have police or security organizations who likely could break in, but they are unlikely to help in a personal situation, as you described.
Although this doesn't seem to apply to you, it's worth saying that Samsung phones are also backed up (by default) to their "cloud." It's possible that a lawyer might be able, with proper documentation of the owner's death, to get access to Samsung's (or Google's) cloud backup(s). I don't think it's easy though. Google, at least in the USA, allows the owner of an account to specify how Google should handle their data if they stop accessing their accounts. (I think Google treats an idle account as "dead" and for reasons like this, if you no longer want to use a vendor like Samsung or Google, you should proactively delete your account, not merely let it go idle.)
Anyone reading this post, might want to consider having what can be an uncomfortable conversation with your friends and family: "How would you like your friends and family handle your electronic, financial, and social accounts in the event of your death?"
Please, forgive me if any of this sounds insensitive. My father worked in insurance and as part of his job he knew all to well that all people eventually die. And how hard it is for those left behind to pick up the pieces, especially when secrets are involved. My family knows where to find my keys.
We have been through five phones -Samsung Galaxy, then Motorola, two internet providers two cell phone providers, made so many calls I have lost count. He uses Chromebook and a Motorola Droid phone. He has even hacked my old home phone, tv, you name it, he has tried to own it . Oh, I forgot-my home security and ring doorbells also. I can change an app permission and I can see him go right in and change it back. I am sure he lives close in the neighborhood How do I get rid of this horrible person?
He grays out permissions, default apps, etc., Which keeps me from being able to delete an app, or change someone being able to access in the background. He has confiscated our emails (Gmail), prevents us from sending or receiving ones he doesn't like. He uses email for email on the web, advertising, chat, and many other things. He listens to phone calls steals all photos, maps addresses to companies or people in contacts, uses maps for ?? Xxx an anyone help me, or at least tell me how to reverse graying out on apps? This has become unbearable! Thank you!
How do you know it's a he?
It's always the girl next door.
Lol! I cannot prove it, but the big gamers nextdoor moved in when this started happening. Their best friend is an experienced IT guy who only appears when I have gone in and changed things. In those days, new changes happen, such as Ring doorbells hacker, etc. Not blaming, but coincidence?
blackhawk said:
How do you know it's a he?
It's always the girl next door.
Click to expand...
Click to collapse
Sorry. See reply in post.
Bro, I'm so sorry. My husband has been going through this VERY thing for the past year. They don't mess with mine. I just wanted to let you know even though I don't have any resolve for you, I hear you and know that it's not phony and we totally feel for you. Seriously, maybe you and my hubby can talk. I'm so sorry that you're going through it. Feel free to message me.
This sounds like a great fan fiction and will bookmark this to see how the story develops. Thank you for putting this in Moto G Power section right where it belongs!
Sounds like you might need to invest in a router with better security features.
Moosetears said:
This sounds like a great fan fiction and will bookmark this to see how the story develops. Thank you for putting this in Moto G Power section right where it belongs!
Sounds like you might need to invest in a router with better security features.
Click to expand...
Click to collapse
Definitely not fiction. It is a nightmare and could REALLY use some advice!
gunnshot81488 said:
Bro, I'm so sorry. My husband has been going through this VERY thing for the past year. They don't mess with mine. I just wanted to let you know even though I don't have any resolve for you, I hear you and know that it's not phony and we totally feel for you. Seriously, maybe you and my hubby can talk. I'm so sorry that you're going through it. Feel free to message me.
Click to expand...
Click to collapse
It has been a nightmare! They started with mine, and have now invaded my husband's phone also.
Scammed said:
It has been a nightmare! They started with mine, and have now invaded my husband's phone also.
Click to expand...
Click to collapse
Why are you posting on XDA? If you are this convinced that someone has unauthorized access to your devices, you need to be talking to law enforcement. The best advice we can offer you is to change all your passwords immediately, enable 2 factor authentication, and if possible seek a restraining order. XDA is a smart device hacking and development community, not a private investigation service.
V0latyle said:
Why are you posting on XDA? If you are this convinced that someone has unauthorized access to your devices, you need to be talking to law enforcement. The best advice we can offer you is to change all your passwords immediately, enable 2 factor authentication, and if possible seek a restraining order. XDA is a smart device hacking and development community, not a private investigation service.
Click to expand...
Click to collapse
I didn't think you were a p.i. firm. Obviously, I am not tech savvy. A little kindness please? I simply want to know how to ungray grayed out app permissions. I have searched on my own and cannot find the answer. I have reported it to local police, state police, Motorola, Samsung, Verizon, Xfinity, metronet, on and on and on. No help from anyone. I don't have $2,500.00 to just put down a retainer for a p.i. I knew someone on this forum would know the answer I am searching for and might kindly tell me. Thank you.
Scammed said:
I didn't think you were a p.i. firm. Obviously, I am not tech savvy. A little kindness please? I simply want to know how to ungray grayed out app permissions. I have searched on my own and cannot find the answer. I have reported it to local police, state police, Motorola, Samsung, Verizon, Xfinity, metronet, on and on and on. No help from anyone. I don't have $2,500.00 to just put down a retainer for a p.i. I knew someone on this forum would know the answer I am searching for and might kindly tell me. Thank you.
Click to expand...
Click to collapse
Well, it can be hard to distinguish the difference between reasonable concern over privacy violations vs unwarranted paranoia, and you aren't the only one who's come to XDA with this type of story. Most of your assumptions are likely mistaken and can be simply explained by the nature of Android itself.
Remote intrusion of mobile devices is actually pretty rare. The most common ways bad actors get ahold of sensitive user information are: phishing, user-approved permissions on questionable apps such as TikTok, and "connected" social media accounts, where users allow websites and apps access to their social media profiles, or use their social media as a login.
Regardless, to the technical point of the matter, grayed out app permissions are not the result of hacking or surreptitious malfeasance, but rather the nature of the "rules" inherent to Android - you can't remove system apps or disable system-controlled permissions without root.
If you still think you have reasons for concern, this is my only suggestion:
Change your phone number
Immediately change all relevant passwords - minimum 10 characters, a mix of upper case, lower case, numbers, and special characters, do not reuse them
Enable 2 factor authentication on all accounts, ensuring your 2nd factor is something that you and only you have access to
Once done, sign out all devices signed into those accounts
Perform a factory reset on your device; even better, reflash factory firmware. Keep bootloader locked.
Do not use questionable apps