[Q] inbrowser browsing security - Galaxy Tab 10.1 Q&A, Help & Troubleshooting

Hi All
Picked up the very impressive Galaxy Tab 10.1 2 days ago with the intention of replacing what now seems like a clunky laptop.
Is the browser or any browser available for the Galaxy Tab secure enough for me to purchase items online and for use with online banking?
Im hoping the answer to this little question is a resounding yes!
Looking forward to reading your responses
S

I would say from a security stand point it all depends on how you use your tablet, which it the same as a laptop or pc. If you download a lot of questionable applications from unknown sources then you do run more of security risk. So the following is just some helpful advice when ever making purchases or managing your accounts online.
I highly recommend using a credit card when making secure online purchases when possible. If it gets compromised, a simple call to the issuing company and they turn the card off and switch you over to a new account free of any fraudulant charges. This actually happened to me a few weeks ago.
When managing you financial accounts online https is encrypted on any device, but again you should understand the risks of installing untrusted apps. At this point there seems to be more exploits on iPhone Windows Mac and Adobe products then Android, but maybe because there are so many premade tools out there for those devices.
Also you will notice that you have the option to lock your tab with a pin and even encrypt you storage. I highly recommend both if you tend to store plenty of personal information. Finaly don't use the same password for all of your online accounts, this especially includes your email which can be used to recover all your other accounts.

Might want put a security app like Lookout on the tab also.
Sent from my Verizon LTE 4G Thunderbolt

Please use the Q&A Forum for questions Thanks
Moving to Q&A

To the moderators : apologies for not popping this in the correct section *consider me told off !
To the chaps or chapettes who have offered me their advice..many thanks..im not one for installing any old app so feel quite safe that all is quite secure. However after reading your replies i purchased AVG Security Pro..which hopefullywill give me some extra confidence when banking and buying
Thank again

Related

[Q] Can someone develop an app for me?

Hi.
I am looking at getting a couple of Flyers for my small business, but I need something quite specific, so I am guessing I would need an app developed for me.
What I am looking for, is an app that I can use as a job sheet when on site.
It would need to have a template for the job sheet, with areas that I can enter text using the on screen keyboard.
It would also need to have tick boxes for several areas of the service work that has been completed.
Another thing that would be required, is the ability to automatically save to a specific folder on the SD card, using the job reference as a file name.
The final thing, and probably the hardest to implement, is an area for the customer to sign upon completion of the work.
Is this possible, and would anyone be interested in helping out with this?
I think that if the template could be inseted into the app using either an image file, pdf, or some other file type, the app could be valuable to many people considering using a device like the Flyer for work.
If somebody could get an app developed in this way, we would be able to pay something towards it.
Thanks.
Steve.
stabloid said:
Hi.
I am looking at getting a couple of Flyers for my small business, but I need something quite specific, so I am guessing I would need an app developed for me.
-snipped-
Click to expand...
Click to collapse
Can I ask a few questions...
1. Why an app specifically for the Flyer? Would a web/cloud app do?
Given that you could save to a cloud database rather than an SD card, this would have certain advantages. If this doesn't work for you, I'd be interested to know why not.
Though question 2 might do it.
2.a I get why you may want a customer to sign a screen with a pen as per the Flyer platform. Could they use Evernote to do the signature?
2.b If Evernote would suffice for the signature, why not just use an Evernote form. for the whole app. (Google 'Evernote Form' for details)
3. Personally, I advise avoiding "signing" tablet devices (like delivery pads). The potential identity theft and data protection risks from recording and storing handwriting make me shudder.
A better form of authorisation (imo) would be to complete the form, email a PDF to your client, and have the client reply back to authorize. This is better because the client's email server and your email server will both have a legally enforceable record of the transaction.
I'm interested in your view of this.
Hope that helps
I will have a look at the suggestions you made.
The reason we're looking for this app, is to replace our job sheet books, which we take on site with us.
Being able to use the flyer instead, will save us a lot of money over a 2 year period, and would be more convenient than a paper book, which becomes dog-eared, and I am able to print off multiple copies if required, or email it direct to the customer.
We tend to deal with commercial establishments, such as care home groups, so we could streamline the whole process.
With regards to the whole identity theft thing, we don't take any details from people other than name & signature, and we never have any access to home addresses, credit cards, or bank details. Like I say, we bill head office, and they send a cheque, or use direct bank transfer.
I will try and post up a copy of one of our sheets, so you can see the layout we currently use.
Are you able to help develop an app, or are you just trying to help me find a different way to acheive my goals?
Cheers.
Steve.
There is a possibility that I could develop such an app. I would like to see a copy of the work sheet you currently use. I cannot commit myself to it right now though. If no one else picks it up in a few days, I'll try to carve out some time for it.
Thanks.
No major rush.
We don't have the Flyers yet.
I think I would prefer an app, as it is less messing around.
Cheers.
Steve.
stabloid said:
-snip-
Are you able to help develop an app, or are you just trying to help me find a different way to acheive my goals?
Click to expand...
Click to collapse
My interest is in web-based mobile apps rather than os-based mobile apps. The difference being that web-based is browser only, whereas os-based runs on your device. What you've asked for here is, ostensibly, an os-based app - what I think you want is a business solution.
Right now, there is a lot of pressure, from the marketing side of the software industry, to build os-based mobile apps. Personally, I challenge the long-term commercial viability of this - because it will not fulfill customers (i.e. your) goals.
My concern is with the total cost of ownership. The bug fixes, version upgrades, and general long term viability are a 10:1 factor in favour of web-based rather than os-based. In this I'm referring only to custom/bespoke business applications not mass market targets.
(However, in your case, as you want to take your job books on-site, you may have to work without an internet connection and this means you have to go os-based.)
Forgive me if this all seems a bit esoteric.
Short answer, if you want a web-based mobile app, yes I can help. PM for details.
But... I suspect the costs to build/host could come as a bit of a shock. Your posts imply that you'd have a handful of users. To get major cost benefits you'd have to have 100's of users - and I think this would apply wherever (web or os) the app was targeted.
From what you've said, and guessing at your budget, getting someone to simply put your form into Evernote would be your likely best course of action. Sorry, I can't help with this.
(Evernote is the free Notes app that comes pre-installed with the Flyer. I've no affiliation, though I am a user.)
Trust that is all of some use.
Regards
You make some good points mate, and I can see the benefits of all solutions.
However, as you say, with taking the Flyer on site, we do end up in "dead-spots", and this would just cause huge problems.
I was considering getting the wifi version for us, and using tethering from our phones for data when required.
If it can all be done in Evernote, then that may be an option.
The reason I would like sd card usage, is so that I can review job sheets at any time.
I would like to run a full system for job sheets, invoicing, etc. but that would just be too costly.
I think VNC to connect to the office PC would be best option for invoicing.
There are currently only 2 engineers, and we would just like a nice clean simple solution to the job sheet problem, and the Flyer seems like it could be perfect.
It would replace diaries, job books, notepads (pen & paper), sat-nav, and looks nice and professional when you are on site.
Cheers.
Steve.

Microsoft vs Verizon's spyware

I know we are all android fans, but I thought this was an interesting read. I know this is just a rumor, but it may have some credence. Microsoft is trying to defend mobile user privacy. Verizon is saying no, they would rather share your info to advertisers.. Makes me wonder about that last update....
Microsoft vs Verizon
Another article
I've come to the conclusion that the only way to minimize invasion of privacy is to not use electronics technology. Credit cards, cell phones and computers give thieves the opportunity to steal. I can't live without these so I opt out when it's convenient to do so and live with the risk otherwise. We don't really have much choice. The alternative would be too time consuming.
I wonder what others think.
Sent from my HTC Incredible 4G on Verizon's periodically blazing fast and mostly reliable 4G LTE network using xda-developers app
Nyobie said:
I've come to the conclusion that the only way to minimize invasion of privacy is to not use electronics technology. Credit cards, cell phones and computers give thieves the opportunity to steal. I can't live without these so I opt out when it's convenient to do so and live with the risk otherwise. We don't really have much choice. The alternative would be too time consuming.
I wonder what others think.
Sent from my HTC Incredible 4G on Verizon's periodically blazing fast and mostly reliable 4G LTE network using xda-developers app
Click to expand...
Click to collapse
I agree with that. I buy stuff on line, too. I used to be concerned, but haven't had a problem (yet).
Sent from my Fireball using Xparent Blue Tapatalk 2
Knock on wood.
Sent from my HTC Incredible 4G on Verizon's periodically blazing fast and mostly reliable 4G LTE network using xda-developers app
Nyobie said:
I wonder what others think.
Click to expand...
Click to collapse
Anyone who has ever entered information on the internet has left a digital fingerprint of one form or fashion. Companies keep all records for years, so if you bought something online, they still have record of it. Using a cell phone, law enforcement agencies can petition the company for which towers you were connected to during a given time, and if you have GPS enabled, that information as well, and use it against you whether you are guilty or not. Every text message, its contents, every phone call, and more is tracked and stored by your company for years, despite claims by the company to the contrary. I know a guy who had text messages subpoenaed by the court from over a year before used in his child custody case, despite the company saying it only saved them for a week. With smartphones, any app you download with the right permissions can steal all of your data, or utilize a known exploit and do it without the right permissions. There are apps which can prevent certain apps from performing functions you don't want them to, like access the internet or your GPS, but that's assuming it obeys the normal rules.
I've been working with computers for over 20 years and know the risk that revealing personal information can pose. I change my passwords every couple months, and for some sites, change my username on occasion. Every website you visit is tracked and stored by your ISP, and every download you make, including torrents, is tracked. I don't enter credit card data online, I'll pay someone the cash and get them to make purchases for me with their card if I need something. I don't reveal my real name or much personal information about myself, other than basic things like that I work and have kids. Your IP address is stored by almost every website you visit, and if you allow cookies you are being tracked by multiple websites across your entire internet experience until you delete them. All this may sound extreme, and it is, but it's all true. Now, is it really that bad? If you're not smart about it, yeah, it can be. I can name over a dozen people I know that had some form of identity theft or credit card fraud in the last year alone, some due to sheer stupidity, others due to bad luck.
Now, whose spyware is worse, Microsoft or Verizon? Microsoft forces you to make a new account when you have a new installation of Windows, generally leaving the default Administrator account created but disabled, unless you're savvy enough to enable the default Administrator account during installation and use that one as your primary account, thereby leaving the computer open to anyone with a Windows boot CD able to take over your computer with admin rights. While not technically spyware, it's a dumbass move. Verizon stores everything you do, every website you visit, every text you send, and then lies to you about it. Still, not technically spyware, but shady to say the least. Microsoft can remotely access any computer with Windows on it, even if you have it disabled, and now Verizon can access our phone, even if we don't want them to. Both claim they wouldn't use this without our consent, but how do we really know? Once again, bleak, but true.
So, you want to use the internet, but don't want your information stolen or used against you. How do you minimize personal information on the internet? Don't use your real name, don't use your credit card to make purchases, use a proxy server logged into another proxy server to prevent website tracking, don't text or instant message any information you don't want police to see, use the default administrator account on Windows with a password, preferably a 12+ character password with capital letters and symbols. Don't use the same username across many websites, alternate difficult to crack passwords and change them out on a semi-regular basis. Never store passwords on your computer! That's one of the biggest problems I've seen. Perform full-drive encryption on your hard drive, turn your computer off when not in use. Don't leave webcams plugged in when you're not using them, and just don't be stupid.
In our society, it's really difficult to not use electronics, and eventually something about yourself is going to come out. When you've been working with computers and their users as long as I have, it's hard not to have seen so many horror stories which spawned this post. Most people aren't going to have a problem which requires all that, but I've taken a largely preemptive stance toward privacy on the internet. If I Google my name, I get a few references in family tree websites, which don't really uniquely identify me, and am mentioned in a couple posts on a few websites, like a company I used to work for which hasn't updated its site in years but keeps paying for web services. While this type of severe privacy isn't necessary for most people, I've never had a single account hacked, never been a victim of identity theft/fraud, and still manage to enjoy myself on the internet. Sure, a Facebook with my real name and a picture of me wouldn't be the end of the world, but I just don't need that to continue enjoying myself. Randomly-named Facebook with a few close friends and family and a picture of the sunset from the beach in California I took last summer while on vacation with my kids are enough.
Sorry this rant has gone on so long. I just have strong opinions due to scenarios I've seen first-hand, and don't want that to happen to me. I guess I'm a privacy freak. lol. It's all your fault, Nyobie, you opened up a can of worms!
IceDragon59 said:
Anyone who has ever entered information on the internet has left a digital fingerprint of one form or fashion. Companies keep all records for years, so if you bought something online, they still have record of it. Using a cell phone, law enforcement agencies can petition the company for which towers you were connected to during a given time, and if you have GPS enabled, that information as well, and use it against you whether you are guilty or not. Every text message, its contents, every phone call, and more is tracked and stored by your company for years, despite claims by the company to the contrary. I know a guy who had text messages subpoenaed by the court from over a year before used in his child custody case, despite the company saying it only saved them for a week. With smartphones, any app you download with the right permissions can steal all of your data, or utilize a known exploit and do it without the right permissions. There are apps which can prevent certain apps from performing functions you don't want them to, like access the internet or your GPS, but that's assuming it obeys the normal rules.
I've been working with computers for over 20 years and know the risk that revealing personal information can pose. I change my passwords every couple months, and for some sites, change my username on occasion. Every website you visit is tracked and stored by your ISP, and every download you make, including torrents, is tracked. I don't enter credit card data online, I'll pay someone the cash and get them to make purchases for me with their card if I need something. I don't reveal my real name or much personal information about myself, other than basic things like that I work and have kids. Your IP address is stored by almost every website you visit, and if you allow cookies you are being tracked by multiple websites across your entire internet experience until you delete them. All this may sound extreme, and it is, but it's all true. Now, is it really that bad? If you're not smart about it, yeah, it can be. I can name over a dozen people I know that had some form of identity theft or credit card fraud in the last year alone, some due to sheer stupidity, others due to bad luck.
Now, whose spyware is worse, Microsoft or Verizon? Microsoft forces you to make a new account when you have a new installation of Windows, generally leaving the default Administrator account created but disabled, unless you're savvy enough to enable the default Administrator account during installation and use that one as your primary account, thereby leaving the computer open to anyone with a Windows boot CD able to take over your computer with admin rights. While not technically spyware, it's a dumbass move. Verizon stores everything you do, every website you visit, every text you send, and then lies to you about it. Still, not technically spyware, but shady to say the least. Microsoft can remotely access any computer with Windows on it, even if you have it disabled, and now Verizon can access our phone, even if we don't want them to. Both claim they wouldn't use this without our consent, but how do we really know? Once again, bleak, but true.
So, you want to use the internet, but don't want your information stolen or used against you. How do you minimize personal information on the internet? Don't use your real name, don't use your credit card to make purchases, use a proxy server logged into another proxy server to prevent website tracking, don't text or instant message any information you don't want police to see, use the default administrator account on Windows with a password, preferably a 12+ character password with capital letters and symbols. Don't use the same username across many websites, alternate difficult to crack passwords and change them out on a semi-regular basis. Never store passwords on your computer! That's one of the biggest problems I've seen. Perform full-drive encryption on your hard drive, turn your computer off when not in use. Don't leave webcams plugged in when you're not using them, and just don't be stupid.
In our society, it's really difficult to not use electronics, and eventually something about yourself is going to come out. When you've been working with computers and their users as long as I have, it's hard not to have seen so many horror stories which spawned this post. Most people aren't going to have a problem which requires all that, but I've taken a largely preemptive stance toward privacy on the internet. If I Google my name, I get a few references in family tree websites, which don't really uniquely identify me, and am mentioned in a couple posts on a few websites, like a company I used to work for which hasn't updated its site in years but keeps paying for web services. While this type of severe privacy isn't necessary for most people, I've never had a single account hacked, never been a victim of identity theft/fraud, and still manage to enjoy myself on the internet. Sure, a Facebook with my real name and a picture of me wouldn't be the end of the world, but I just don't need that to continue enjoying myself. Randomly-named Facebook with a few close friends and family and a picture of the sunset from the beach in California I took last summer while on vacation with my kids are enough.
Sorry this rant has gone on so long. I just have strong opinions due to scenarios I've seen first-hand, and don't want that to happen to me. I guess I'm a privacy freak. lol. It's all your fault, Nyobie, you opened up a can of worms!
Click to expand...
Click to collapse
amen
You can now use TOR on your phone. Search for it in google play, or better yet, download the APK online without letting google know. I'm pretty sure root access gives you much more control as well. It will be the first addition to my new unlocked phone. We are living in an age where privacy is almost nonexistent. Entire personal lives are at our finger tips... Call me paranoid, but I just don't like being spied on or tracked. Proxify yourself. Use TOR + widecap. Learn how the internet operates. You never know who is watching..

Is work profile isolated and secure enough?

Hello all,
First of all, please don't throw me rocks as I will perhaps have a lot of false assomptions in my question.
I'm a hardcore user of Android for my personal needs but I have to admit that I have provided my wife and children with iPhones most of all for security reasons.
The Appstore has not yet given me headache with crappy bloatware and spyware app on their phones like I had with just one day of use when I gave my old Nexus 5 to my daughter.
Don't expect any kids with no computing knowledge to discern bad and "fake" app from genuine and official one.
They are looking for app like "Your real mental age", "What animal would you be?" so you can guess the issue...
I got a LG6 really cheap lately and was willing to give it to my daughter.
I thought about showing her how to install all the apps in the Shelter application which use the "Work profile" feature to isolate apps assuming that it would be a good way to prevent any unwanted behaviour from those apps.
What do you think of that? Is it a good way to prevent any spamming window or information steal or am I too confident in this feature?
Please answer only if you are familiar with shelter or the Work profile feature.
Thanks for your insights!

Serious ways to bypass a screen lock without data loss

Hello all,
In my circle of friends there was a suicide case and I was asked by the family if I would be able to remove a screen lock from a Samsung Galaxy S21. The family can't explain why their son killed himself and would like answers to all their questions. They assume that there is information on the phone or reasons for the suicide.
Are there any serious ways to get around such a block? I don't have much information about the device yet, nor do I currently have it with me. Maybe there are exploits or bruteforce toolkits to bypass the lockscreen. Programs like Tenorshare 4uKey or PassFab Android Unlocker are probably scam or?
I will get the device in the next week and could provide more information then.
Currently the following information is available:
Device Model: Samsung Galaxy S21 5G | Samsung SM-G991B | Android 11 | One UI 3.1
Mobile contract: active
SMS PIN & PUK: available
Google account credentials: available and valid and linked to the device but no backups available in Google Drive
Samsung account credentials: present and valid but not associated with the device so no backups available
Does the approach via Kali Nethunter and a HID keyboard attack work with a current Android Samsung Galaxy S21 bruteforcing or do you always get into the temporally increasing lock?
A data recovery $pecialist might be able to, ask the police for assistance.
Find the password for the lockscreen, or maybe through their Gmail or Samsung accounts, again passwords needed.
I think if they wanted you in the phone they would have unlocked it...
blackhawk said:
A data recovery $pecialist might be able to, ask the police for assistance.
Find the password for the lockscreen, or maybe through their Gmail or Samsung accounts, again passwords needed.
I think if they wanted you in the phone they would have unlocked it...
Click to expand...
Click to collapse
This is not a helpful answer.
The police in this country does not help in such matters if it is assumed that no outside influence was involved.
A data recovery specialist also only executes toolkits or exploits. I am also able to do this if someone gives me a hint which toolkits or exploits would come into question for this model. I work as a sysadmin myself and therefore I am not completely untalented technically. I just lack information about which approach would be the best.
This is a community of people who like to hack their phones, not hack into other people's phones... which is considered unethical.
Are you serious?
You really think it's unethical when a 21 year old boy takes his own life overnight and the family just wants to know why their son did it? Sure, the boy was of age at 21 and can do with his life what he wants. Nevertheless, any clear-thinking person can understand that the family wants to know why the son did that.
I have no bad intentions and I am only trying to help the family. This is not about hacking a stolen cell phone. Then I would just do a factory reset and use the phone normally and not write this post here.
Yes, well... be that as it may.
With a screen lock in place you can't simply factory reset as you still be locked out.
I believe my original response was valid. It's not an easy nut to crack... by design.
Hello, i own a phone repair shop and i'm a relation with a person specialized in unlocking phones. He said me that he can bypass the lock screen and keep data on all samsung phones and he can do it remotly. Being in this business i don't trust him a lot about keeping data. One of my customer's son is dead and his family want to access his phone, they gave me his phone and they are agree to loose data if things dont go good so i'm gonna try with this guy and if you want i will give you a feedback.
Hi sorry to hear that this terrible situation happened around you.
I am in a similar situation. My cousin died suddenly and his sister asked be to recover pictures and videos because he filmed himself before try to end his life and she would like to find if there is any video that could help us understand better.
I'm trying to find ways to do that and so far I haven't but I wanted to share some information in case it could be helpful to someone.
I tried the iMobie Data Extractor. It is supposed to help recover data from "broken phone". I guess it's the closest thing I found that didn't look scammy and could work. After about a month of back and forth with their support person, I managed to replaced the OS using Odin (because the official software left my phone in a non-bootable state) replacing all partitions except User Data. Unfortunately, that didn't remove the lock (PIN). I'm not surprised since I didn't wipe the User Data.
From a security perspective, it is good that it is hard (impossible) to access data of a locked phone, but from a family emotional perspective, it is hard to have to tell my family that I failed.
I wish you good luck and please post here if you find a way.
be safe
Touftaf said:
Hello, i own a phone repair shop and i'm a relation with a person specialized in unlocking phones. He said me that he can bypass the lock screen and keep data on all samsung phones and he can do it remotly. Being in this business i don't trust him a lot about keeping data. One of my customer's son is dead and his family want to access his phone, they gave me his phone and they are agree to loose data if things dont go good so i'm gonna try with this guy and if you want i will give you a feedback.
Click to expand...
Click to collapse
What happened
I don't have easy-to-hear information for you. But I offer these words as a way to think about this situation.
I believe Samsung intentionally builds phones which are extremely hard to break into. This is a conscious design decision they make. Why? Because so many users do things like credit card payments, banking, and social media, where, if you lost your phone and a bad person found it, an easy-to-break-into device would have potentially catastrophic results. Aside from the harm to a user who lost a phone, Samsung themselves would be subjected to great reputational damage, too. It's bad press when it's easy to break into and steal something.
Also, you may not be able to break into the device, even with the help of a commercial vendor. Exploits in Android, when found, are patched regularly. A very smart person might have had a way to crack into a phone last week, last month, or last year. But again, Samsung intends to continually patch the software to keep it secure. They make a point to telling people that Samsung phones are patched for several years, so users will feel confident their data will be secure.
One suspects certain governments have police or security organizations who likely could break in, but they are unlikely to help in a personal situation, as you described.
Although this doesn't seem to apply to you, it's worth saying that Samsung phones are also backed up (by default) to their "cloud." It's possible that a lawyer might be able, with proper documentation of the owner's death, to get access to Samsung's (or Google's) cloud backup(s). I don't think it's easy though. Google, at least in the USA, allows the owner of an account to specify how Google should handle their data if they stop accessing their accounts. (I think Google treats an idle account as "dead" and for reasons like this, if you no longer want to use a vendor like Samsung or Google, you should proactively delete your account, not merely let it go idle.)
Anyone reading this post, might want to consider having what can be an uncomfortable conversation with your friends and family: "How would you like your friends and family handle your electronic, financial, and social accounts in the event of your death?"
Please, forgive me if any of this sounds insensitive. My father worked in insurance and as part of his job he knew all to well that all people eventually die. And how hard it is for those left behind to pick up the pieces, especially when secrets are involved. My family knows where to find my keys.

Bypassing Pin on galaxy s21 without data loss

My father passed a couple days ago and I need to gain access to his phone in order to invite all his friends to the service as well as get into contact with some family overseas.
He has a 4 pin code that I've been trying to guess but have not yet succeded.
I can provide proof that it is my fathers phone incase people believe it is stolen.
I can't get into his samsung account because it is basically his google account, I set up his google account with two factor authorization. Which requires me to get into his phone to even access.
Anything Helps
I don't have easy-to-hear information for you. But I offer these words as a way to think about this situation.
I believe Samsung intentionally builds phones which are extremely hard to break into. This is a conscious design decision they make. Why? Because so many users do things like credit card payments, banking, and social media, where, if you lost your phone and a bad person found it, an easy-to-break-into device would have potentially catastrophic results. Aside from the harm to a user who lost a phone, Samsung themselves would be subjected to great reputational damage, too. It's bad press when it's easy to break into and steal something.
Also, you may not be able to break into the device, even with the help of a commercial vendor. Exploits in Android, when found, are patched regularly. A very smart person might have had a way to crack into a phone last week, last month, or last year. But again, Samsung intends to continually patch the software to keep it secure. They make a point to telling people that Samsung phones are patched for several years, so users will feel confident their data will be secure.
One suspects certain governments have police or security organizations who likely could break in, but they are unlikely to help in a personal situation, as you described.
It's worth saying that Samsung phones are also backed up (by default) to their "cloud." It's possible that a lawyer might be able, with proper documentation of the owner's death, to get access to Samsung's (or Google's) cloud backup(s). I don't think it's easy though. Google, at least in the USA, allows the owner of an account to specify how Google should handle their data if they stop accessing their accounts. (I think Google treats an idle account as "dead" and for reasons like this, if you no longer want to use a vendor like Samsung or Google, you should proactively delete your account, not merely let it go idle.)
Anyone reading this post, might want to consider having what can be an uncomfortable conversation with your friends and family: "How would you like your friends and family handle your electronic, financial, and social accounts in the event of your death?"
Please, forgive me if any of this sounds insensitive. My father worked in insurance and as part of his job he knew all to well that all people eventually die. And how hard it is for those left behind to pick up the pieces, especially when secrets are involved. My family knows where to find my keys.
Uzuki12 said:
My father passed a couple days ago and I need to gain access to his phone in order to invite all his friends to the service as well as get into contact with some family overseas.
He has a 4 pin code that I've been trying to guess but have not yet succeded.
I can provide proof that it is my fathers phone incase people believe it is stolen.
I can't get into his samsung account because it is basically his google account, I set up his google account with two factor authorization. Which requires me to get into his phone to even access.
Anything Helps
Click to expand...
Click to collapse
You can see his contacts in his Google account on a browser, but if he saved the contacts locally (which is annoying that many phones don't make it clear that contacts are saved locally only until specifying Google as the account to save to)

Categories

Resources