Hello all
As someone handling sensitive information, I would like to investigate the security Android is dealing with.
First of all I got scared when I bought the app called SQLite Editor. It had all of my most vital passwords just stored in plain text. What I did immediately was a format of both internal and SD card as a reaction. However, I couldn't even find a feature to secure wipe the internal memory, while I've DBAN'd the SD card 7x.
So my thought was, I have to encrypt it. ICS seems to have a nice feature for that, however, it doesn't kind of work for me. I'm currently on cm-9.0.0-rc1-tinystream-hephappy-p500 (RC1-Rev.B). I went to Security in System Settings and touched "Encrypt Device". It gave some confirmations and I've accepted them however, now I'm kind of stuck on this screen.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
My first thought was "it is encrypting". But after hours of waiting, I wanted to check if it's done already. So I clicked the power-button once (just to unlock) and it asked for my password. I've entered it and it just went into my normal launcher. I've checked if anything had changed and no, my device has not been encrypted. Any logs somewhere? Any ideas what could have caused the problem?
Beside that, I asked myself the question "how secure is my Google account". As I am not planning to store any password to my device anymore, I am still connected to my Google account. I have DroidWall blocking all connections (except for my OpenVPN one).
Now my question is, what if my phone gets stolen. Does my SD-card contain any sensitive data, that's the first question. I am using LINK2SD to put everything on my SD card by the way. What security does Android use to connect to my Google account? If the thief turns on wifi and starts sniffing what data passes, what exactly would a hacker be able to sniff from me? Even then, my contacts contain valuable information. If my phone gets stolen, a hacker could simply steal all of my contacts, can't he?
Does someone have any idea to secure my phone? To connect to the internet I have OpenVPN working and blocking other connections with DroidWall. So the real case is, the data on my phone itself. Even if I use a anti-theft tool from the market and do a remote factory reset, the thief would still be able to use a datarecovery tool and so I would be screwed...
Another question: is it possible to combine a password lock and a slide lockscreen? As when I now enter my password and then put my phone in my pocket, it automaticly presses lots of things I don't want to press as there is no lockscreen for 30 minutes (I made the modification to the settings as my password is very long and I don't want to re-enter it each time). It would be perfect if a password lock would be on there to boot the phone (and even better to decrypt it) and every next time without rebooting the phone getting a patern unlock, that would be great.
So, if you can add anything usefull about securing or what security Android uses, please let me know.
Thank you very much
PS: One completely different question: does someone know why my phone boots when I plug it in to a charger? I don't like that, I want to charge without booting.
Encrypting the device will just make your device request a password each time you power it on. Since you securely erased your SD card (7x), it'll be somewhat difficult to recover those files. Just to be sure though, you could erase it using 35x (you may also want to defrag any files first). Your device connects to your Google account using a secure connection (more detailed here: https://developers.google.com/secure-data-connector/docs/1.3/security). If your contacts were synced with your Google account, it'll be ridiculously easy for anyone to access them (as long as your device is still linked to your account). So yes, a hacker could gain access (you wouldn't even need to be a hacker to do it; It's that simple).
This is quite a useful app to secure your device: https://play.google.com/store/apps/details?id=com.morrison.applock&hl=en. There are some methods to get around it, but you are able to prevent them from happening so it's still quite handy. If you remotely wipe your device, a "theif" may not be able to recover your data. Data recovery tools usually deal with external memory, so it'll be harder to recovery your device's internal data.
Yes, it is possible. If you set a password lock on your device and use some 3rd party screen lock, then you can use them at the same time. Remember you can also setup a SIM lock.
P.S: Does your device boot up fully or just to the battery charging icon? Does your device boot into recovery mode while attempting to charge it while off?
Thank you for your valuable reaction. According to what you say, Android actually doesn't care about security at all. I've just read that the Device Encryption isn't even 256-bit AES, but only 128. However, according to the link I can see that it actually uses some kind of VPN to connect to my Google account? If it is that secure, can I assume that my SQL Database of the Googel account also has extra encryption on it? And how far do you think that tunnel connection goes, does it also count for the GMail app or just for the basic Android connection? However, my contacts are indeed synced with my Google account. What do you suggest to do then? Noone should ever possibly get access to it. Let's say that I want to be as secure as that even the FBI or CIA won't be able to access it, any suggestions to accomplish that?
What I'm thinking about now is unlinking my Google account with my Android device (or even flashing a rom without Google Apps), but what would my phone make sense then? All of my contacts, numbers and more are stored on my Google profile, no other place. You also mentioned "so it'll be harder to recovery your device's internal data", from which I presume it is possible. Because I'm kind of paranoid because of what happened to me in the past, I hereby think that the only way to fix it is by encrypting the device. However, I can't get past that logo and a 3rd party app doesn't seem to do that kind of job (except for WhisperCore, which has been out of development since it has been bought by Twitter).
An interesting idea that I've just thought of is importing my contacts into Skype and then just always use the Skype app (combined with 3G). Skype always uses a 256-bit AES encryption and so it is secure for sure.
So, what do you think? Should I unlink my Google account with my Android device? Or should I just disable sync? Also, in my experience, there indeed always is a way to bypass an app locker (as easy as just removing the app, which can easily be done from recovery).
PS: It fully boots up. My previous version of CM9 booted to the battery charging icon, it's that that I want back.
Set a pattern unlock... it is FBI-proof as stated by CNET (if I've not mistaken)
And even amazon is using 128-bit... that isn't anything strange that Google isn't using 256-bit
Accidentally sent from my Google Nexus S
Yes it does use that connection (it wouldn't make sense to make it "open stream"). Your database files can be easily accessed from your device. The information will be secured in your Google account, but hackers can still find ways to access it (difficulty would depend on what you do). The tunnel connection goes for all your Google apps. Well if you're that paranoid, you'll probably want to remove your contacts from your Google account and disable sync.
If you do that, you will not be able to access any Google services from an app, your device will be missing important Google framework files, and you will not be able to download apps from the Play Store. Everything's possible .
Yes, you could do that. Keep in mind that the number of bits isn't necessarily important. See here: http://www.bestsslcertificates.com/articles11.html.
I would suggest disable sync.
P.S: Did you change your recovery since then?
melvinchng said:
Set a pattern unlock... it is FBI-proof as stated by CNET (if I've not mistaken)
And even amazon is using 128-bit... that isn't anything strange that Google isn't using 256-bit
Accidentally sent from my Google Nexus S
Click to expand...
Click to collapse
I am going to be honest, the first thing I did when I read this was laughing. But after some research, I saw you actually have a point. I've just read this: http://www.electricpig.co.uk/2012/0...roids-old-school-pattern-unlock-is-fbi-proof/
But then I ask myself, how hard can the FBI suck? If I'm right, you can just reboot into recovery and then access everything from there? Even disabling the pattern unlock from there is an option, no?
Beside that, what about encrypted messaging and encrypting calls. There are lots of apps available for that, but none except for Skype is stable and non-ugly at the same time.
Rakoen said:
I am going to be honest, the first thing I did when I read this was laughing. But after some research, I saw you actually have a point. I've just read this: http://www.electricpig.co.uk/2012/0...roids-old-school-pattern-unlock-is-fbi-proof/
But then I ask myself, how hard can the FBI suck? If I'm right, you can just reboot into recovery and then access everything from there? Even disabling the pattern unlock from there is an option, no?
Beside that, what about encrypted messaging and encrypting calls. There are lots of apps available for that, but none except for Skype is stable and non-ugly at the same time.
Click to expand...
Click to collapse
You can't change the setting in recovery, eg. Disable pattern unlock. It is a setting, unless you are just a little bit lucky, or else system will be corrupted
Accidentally sent from my Google Nexus S
Rakoen said:
I am going to be honest, the first thing I did when I read this was laughing. But after some research, I saw you actually have a point. I've just read this: http://www.electricpig.co.uk/2012/0...roids-old-school-pattern-unlock-is-fbi-proof/
But then I ask myself, how hard can the FBI suck? If I'm right, you can just reboot into recovery and then access everything from there? Even disabling the pattern unlock from there is an option, no?
Beside that, what about encrypted messaging and encrypting calls. There are lots of apps available for that, but none except for Skype is stable and non-ugly at the same time.
Click to expand...
Click to collapse
You could "encrypt" your messages and calls with an app locker (make "settings" be a locked app so it cannot be uninstalled). No, the pattern unlock cannot be disabled via recovery. You can access many things from recovery, but not like that. The only way they could know your pattern would be by finger markings (which you could wipe away or get a fingerprint resistant screen; unless your device is one of those which can be bypassed with key combinations).
Theonew said:
Yes it does use that connection (it wouldn't make sense to make it "open stream"). Your database files can be easily accessed from your device. The information will be secured in your Google account, but hackers can still find ways to access it (difficulty would depend on what you do). The tunnel connection goes for all your Google apps. Well if you're that paranoid, you'll probably want to remove your contacts from your Google account and disable sync.
If you do that, you will not be able to access any Google services from an app, your device will be missing important Google framework files, and you will not be able to download apps from the Play Store. Everything's possible .
Yes, you could do that. Keep in mind that the number of bits isn't necessarily important. See here: http://www.bestsslcertificates.com/articles11.html.
I would suggest disable sync.
P.S: Did you change your recovery since then?
Click to expand...
Click to collapse
There must be a solution for this, without having to remove the complete Google framework. But indeed, I am that paranoid. Nothing may lead to any personal file I have. However, you also mentioned "removing contacts from my Google account". Why would that be necessary? Google doesn't even give the FBI access to my account so why wouldn't it be secure? What I'm thinking off now is syncing my Google account with my Android device. Then unlinking it and then encrypting the contacts, just the contacts. Then I did sync, I did unlink and did encrypt. Wouldn't that make it impossible for enyone on the entire world to access anything from me?
Google services are not important for me, that "important framework files" don't sound important enough to me and the Google Play store... I don't care about it. Enough APK's around. Security first.
You are reminding me that the bits aren't important, while that's true, I want to remind you that secure deletion of 35x isn't that important too. 7x is more than enough if you choose a powerfull PNG stream.
Theonew said:
You could "encrypt" your messages and calls with an app locker (make "settings" be a locked app so it cannot be uninstalled). No, the pattern unlock cannot be disabled via recovery. You can access many things from recovery, but not like that. The only way they could know your pattern would be by finger markings (which you could wipe away or get a fingerprint resistant screen; unless your device is one of those which can be bypassed with key combinations).
Click to expand...
Click to collapse
Well, I actually was thinking like "why would you even neet to unlock the device". As far as I know, something as a pattern lockscreen doens't encrypt/decrypt anything except for your launcher, which is not a necessary product. I mean, you say "you can access many things from recovery", doesn't this include like every important files? Aren't databases accessible and so also contacts or messages?
However, about the encrypted calls and messages I actually mean off the record things. Like TextSecure do.
Rakoen said:
There must be a solution for this, without having to remove the complete Google framework. But indeed, I am that paranoid. Nothing may lead to any personal file I have. However, you also mentioned "removing contacts from my Google account". Why would that be necessary? Google doesn't even give the FBI access to my account so why wouldn't it be secure? What I'm thinking off now is syncing my Google account with my Android device. Then unlinking it and then encrypting the contacts, just the contacts. Then I did sync, I did unlink and did encrypt. Wouldn't that make it impossible for enyone on the entire world to access anything from me?
Google services are not important for me, that "important framework files" don't sound important enough to me and the Google Play store... I don't care about it. Enough APK's around. Security first.
You are reminding me that the bits aren't important, while that's true, I want to remind you that secure deletion of 35x isn't that important too. 7x is more than enough if you choose a powerfull PNG stream.
Click to expand...
Click to collapse
About the Google framework files, you may want to take a look here: http://forum.xda-developers.com/showthread.php?t=1715375. That could be necessary to prevent hackers from getting to them. Yes, unless your data was still left on Google servers (in your account) and hackers got to it.
Yes, but some powerful undelete and data recovery softwares can still recovery data deleted using 7x (especially if the files were fragmented).
Rakoen said:
Well, I actually was thinking like "why would you even neet to unlock the device". As far as I know, something as a pattern lockscreen doens't encrypt/decrypt anything except for your launcher, which is not a necessary product. I mean, you say "you can access many things from recovery", doesn't this include like every important files? Aren't databases accessible and so also contacts or messages?
However, about the encrypted calls and messages I actually mean off the record things. Like TextSecure do.
Click to expand...
Click to collapse
You can use 3rd party apps to set pattern unlock for other apps. Partly, but not quite. In recovery, you can access /data (where all your data is stored), but only to backup that partition (unless you made a previous backup which would also allow you to "restore"). You can't access the files like being able to view them (unless you are using Aroma file manager, but you still won't access those files). Databases, contacts, and messages are not accessible (unless you backed them up to your SDcard - they still wouldn't be readable though).
Rakoen said:
Well, I actually was thinking like "why would you even neet to unlock the device". As far as I know, something as a pattern lockscreen doens't encrypt/decrypt anything except for your launcher, which is not a necessary product. I mean, you say "you can access many things from recovery", doesn't this include like every important files? Aren't databases accessible and so also contacts or messages?
However, about the encrypted calls and messages I actually mean off the record things. Like TextSecure do.
Click to expand...
Click to collapse
This topic is getting more and more interesting.
In the other hand, IF you're having pure Google Device with build in memory, people cant access your storage (built in memory) without entering a pattern or etc
Accidentally sent from my Google Nexus S
Theonew said:
About the Google framework files, you may want to take a look here: http://forum.xda-developers.com/showthread.php?t=1715375. That could be necessary to prevent hackers from getting to them. Yes, unless your data was still left on Google servers (in your account) and hackers got to it.
Yes, but some powerful undelete and data recovery softwares can still recovery data deleted using 7x (especially if the files were fragmented).
You can use 3rd party apps to set pattern unlock for other apps. Partly, but not quite. In recovery, you can access /data (where all your data is stored), but only to backup that partition (unless you made a previous backup which would also allow you to "restore"). You can't access the files like being able to view them (unless you are using Aroma file manager, but you still won't access those files). Databases, contacts, and messages are not accessible (unless you backed them up to your SDcard - they still wouldn't be readable though).
Click to expand...
Click to collapse
The 7x note is not correct for 100%. The way that I overwrite data won't make it possible to recover anything at 7x, not even using powerful undelete or data recovery software. Even if you're a professional, it will be very hard to get back any data. I have experience in this sector, so I know where I'm talking about on this part.
However, what you just said about the pattern unlock is almost unbelievable. Doesn't this simply solve everything? I mean, why would anyone ever use the Android Device Encryption in ICS if there is something as a pattern unlock? Why would it make sense to use AES 128-bit when you can't even access it without the encryption?
So it wouldn't even make sense to unlink my Google account, would it? It isn't accessible you say, so why whould it be any concern? If the FBI isn't able to break behind the pattern unlock, who would be? You first said that a hacker can easily get access to any sensitive data if I sync my Google account, but why should it? Even without OpenVPN, it uses a VPN encryption for every Google App ... so Android is the best in security, I was wrong?
melvinchng said:
This topic is getting more and more interesting.
In the other hand, IF you're having pure Google Device with build in memory, people cant access your storage (built in memory) without entering a pattern or etc
Accidentally sent from my Google Nexus S
Click to expand...
Click to collapse
You are very right on that. It really is getting interesting. Your "IF" makes me wonder what exactly you mean. As I have a LG Optimus One (P500) with custom rom, custom recovery and custom radio. Does it make any difference here?
Rakoen said:
You are very right on that. It really is getting interesting. Your "IF" makes me wonder what exactly you mean. As I have a LG Optimus One (P500) with custom rom, custom recovery and custom radio. Does it make any difference here?
Click to expand...
Click to collapse
You can't access your storage WITHOUT entering the pattern in stock device. IF you're in stock and wanted to root, both system and internal SD will be wiped (a factory reset will be made). So no data will be left
Device: nexus s, galaxy nexus, nexus 7
Accidentally sent from my Google Nexus S
And regarding to the security, Google released an app that helps you to monitor which app is requesting what permission. You can even set which permission is deny so that you can't install the app and highly "dangerous" app will be kept away from your device.
Accidentally sent from my Google Nexus S
Rakoen said:
The 7x note is not correct for 100%. The way that I overwrite data won't make it possible to recover anything at 7x, not even using powerful undelete or data recovery software. Even if you're a professional, it will be very hard to get back any data. I have experience in this sector, so I know where I'm talking about on this part.
However, what you just said about the pattern unlock is almost unbelievable. Doesn't this simply solve everything? I mean, why would anyone ever use the Android Device Encryption in ICS if there is something as a pattern unlock? Why would it make sense to use AES 128-bit when you can't even access it without the encryption?
So it wouldn't even make sense to unlink my Google account, would it? It isn't accessible you say, so why whould it be any concern? If the FBI isn't able to break behind the pattern unlock, who would be? You first said that a hacker can easily get access to any sensitive data if I sync my Google account, but why should it? Even without OpenVPN, it uses a VPN encryption for every Google App ... so Android is the best in security, I was wrong?
Click to expand...
Click to collapse
Not necessarily. If someone knows your pattern unlock, they could unlock your device. Or even people standing behind you could see it. Someone may use it if another person knows their unlock pattern (but wouldn't know the code).
If USB debugging is enabled, someone could access your databases, etc. over adb. You wouldn't need to sync your Google account - your device would do that automatically (unless you disabled sync which is what I suggested).
melvinchng said:
You can't access your storage WITHOUT entering the pattern in stock device. IF you're in stock and wanted to root, both system and internal SD will be wiped (a factory reset will be made). So no data will be left
Device: nexus s, galaxy nexus, nexus 7
Accidentally sent from my Google Nexus S
Click to expand...
Click to collapse
That's a true thing you say there. But however, it doesn't apply in my situation. I currently am on a rooted device that not even is a nexus (LG Optimus One P500)... so how does it make sense in my case?
melvinchng said:
And regarding to the security, Google released an app that helps you to monitor which app is requesting what permission. You can even set which permission is deny so that you can't install the app and highly "dangerous" app will be kept away from your device.
Accidentally sent from my Google Nexus S
Click to expand...
Click to collapse
I've blocked all connections using DroidWall, so it would be impossible to upload anything personal to an intruder. Beside that, I use my own way of scanning apps and so I do know if I'm secure on that matter. However, thanks for letting me know there is an app for that.
However, I'm not concerned about that kind of security (I am protected against any kind of virusses or malware), my concern is about sniffers and more importantly thiefs that are great hackers (which in my case are around the corner).
Theonew said:
Not necessarily. If someone knows your pattern unlock, they could unlock your device. Or even people standing behind you could see it. Someone may use it if another person knows their unlock pattern (but wouldn't know the code).
If USB debugging is enabled, someone could access your databases, etc. over adb. You wouldn't need to sync your Google account - your device would do that automatically (unless you disabled sync which is what I suggested).
Click to expand...
Click to collapse
Disable visible pattern and use two steps verification for Gmail.
Google search for it, 2 steps verification for Gmail.
Even thought someone has your Gmail account AND password, they still aren't able to log in into your mail... and the password that you use to log in in your Android device IS different from the normal one AND the password has to renew monthly..
Google really put a lot of hard work on solving those problem that you mentioned. Try out those things that Google has made
Accidentally sent from my Google Nexus S
Theonew said:
Not necessarily. If someone knows your pattern unlock, they could unlock your device. Or even people standing behind you could see it. Someone may use it if another person knows their unlock pattern (but wouldn't know the code).
If USB debugging is enabled, someone could access your databases, etc. over adb. You wouldn't need to sync your Google account - your device would do that automatically (unless you disabled sync which is what I suggested).
Click to expand...
Click to collapse
Well, then I'm going to create a pattern unlock as strong that it's impossible to follow, even if the person is standing beside me and looking at it. I'm also not planning to show it to anyone and will look around if there are cameras every time I unlock (yes, I am paranoid, but with reason).
I thought exactly the same about USB debugging and so I disabled it. I don't understand what you are trying to say with the sync. Why would I want to disable it? What would it add as security?
And it seems like I skipped this:
Theonew said:
P.S: Did you change your recovery since then?
Click to expand...
Click to collapse
No, I haven't change my recovery since a long time.
Rakoen said:
That's a true thing you say there. But however, it doesn't apply in my situation. I currently am on a rooted device that not even is a nexus (LG Optimus One P500)... so how does it make sense in my case?
I've blocked all connections using DroidWall, so it would be impossible to upload anything personal to an intruder. Beside that, I use my own way of scanning apps and so I do know if I'm secure on that matter. However, thanks for letting me know there is an app for that.
However, I'm not concerned about that kind of security (I am protected against any kind of virusses or malware), my concern is about sniffers and more importantly thiefs that are great hackers (which in my case are around the corner).
Click to expand...
Click to collapse
Can you let us know what is your job / what does your phone contains / what is most of them...
And actually, there is an Chinese app, 360 Strong Box, and what it does is exactly what you want. It is a software made by 360 company, the app can convert image / video / documents and data into a file that can only be access by using the 360 strongbox... you don't have to worry about the security, 360 is one of the largest Chinese security company that provides antivirus or anti spyware on different platform, windows, android, symbian, iOS etc.
UNFORTUNATELY, it is in Chinese language and the company signed it in private, so I couldn't compile and recompile it and make a translation.
Request from the company for the English translation. I can help them to translate if they're willing to release a copy of English version. The translation is about 400 lines only, a short app.
Accidentally sent from my Google Nexus S
Related
Ok, maybe I'm in the wrong place. But here goes.
My phone is trying to send text to paid numbers behind my back. I'm using prepaid so it doesn't work. I get a "You have insufficient funds to send this text" message daily, at random times.
I have no pirated apps. Everything on my phone came straight from the market. However, I've not installed a single one of the apps that was on the recent list all over tech sites.
I'm planning on reflashing with a different rom and changing all the passwords that were stored on my phone.
BUT.
Before I do this, I want to find out which app is causing this behavior. Any Ideas on how to find out what is sending random text from my phone (they don't show up in the messaging app)
viogrep said:
Ok, maybe I'm in the wrong place. But here goes.
My phone is trying to send text to paid numbers behind my back. I'm using prepaid so it doesn't work. I get a "You have insufficient funds to send this text" message daily, at random times.
I have no pirated apps. Everything on my phone came straight from the market. However, I've not installed a single one of the apps that was on the recent list all over tech sites.
I'm planning on reflashing with a different rom and changing all the passwords that were stored on my phone.
BUT.
Before I do this, I want to find out which app is causing this behavior. Any Ideas on how to find out what is sending random text from my phone (they don't show up in the messaging app)
Click to expand...
Click to collapse
Install a android antivirus and firewall like Lookout.
Sent from my GingerBread Eris using XDA App
lookout finds nothing. All the other AV software fails to install. "Unknown error -18"
i have plenty of free space.
viogrep,
I wrote a novel, but then thought I should just ask a few preliminary questions:
Q1) does the error message contain any useful "hints", such as the destination number ?
Q2) if you use a logcat - capturing app, does anything show up in the logcat right around the time the message is generated which might provide some further clues?
There's a lot of different techniques you can use, but they require a bit of effort - not only to perform, but to explain, too.
Q3) Are you willing to post up the output of the "ps" command to a pastebin?
Q4) What apps on your phone request "SEND_SMS" privileges? You can find out with
Code:
strings /data/system/packages.xml > /sdcard/strings-pkgs-xml.txt
and then poking through the "strings-pkgs-xml.txt" file. When you see (for instance)
name="android.permission.SEND_SMS"
the immediately prior package is what requested it. Either that or you can do something tricky like
Code:
strings /data/system/packages.xml | awk '/<package name/{pkg=$2;}; /_SMS/{print pkg, $2;}'
bftb0
1. No destination number in the error. Sorry.
2. Also, no clues in logcat from what I've seen.
3. PS > http://pastebin.com/iUAfP9Yb
4. Besides the default gapps, the only other app with SEND_SMS priv. is Koxx Pure Messenger. (Purchased from the market, Have had for awhile, the sms sending is new)
Going to try to call my provider and see if I can get the number that's been denied because of funds.
*edit* No luck with provider.
I'd really like to know whats doing it so I don't install the same app once I flash. Luckily I keep nothing important on my phone. Its gmail account is actually a duplicate with my original forwarding to it. I'm a tiny bit overprotective over my email(address). :x
viogrep said:
4. Besides the default gapps, the only other app with SEND_SMS priv. is Koxx Pure Messenger. (Purchased from the market, Have had for awhile, the sms sending is new)
Click to expand...
Click to collapse
I know that it isn't necessarily this simple, but if that really is the only other app besides the GAPPs with SMS priveledges, especially coupled with the knowledge that the SMS capability is new, I think you have your answer.
If you tried a new ROM and restored all but that one app, and the problem never happens again then you can be 95% sure. Only way to be 100% sure is that after a certain length of time without a problem (a week?) you reinstall Koxx and then if the problem starts happening again.
I looked through your "ps" listing.
Didn't see anything too obvious sticking out at me; there were a couple of non-market apps running though. I know that there is no theoretical reason why non-market apps would be malicious - on the other hand, I sort of wonder why they are not on the market... you know what I mean? What is stopping them? (In the case of Tubemate - which was actually kicked off of Google's market, my suspicions are even higher. I realize it was not kicked off because of malware; but still...)
These were the only processes that were either not on my phone, or I didn't really recognize.
Code:
com.dylan.tube = [Non-Market App] Tubemate
com.gau.golauncherex.notification = GO Launcher EX (READ SMS)
com.levelup.beautifulwidgets = Beautiful Widgets (LevelUp)?
com.revsodev.volumecontrol = [Non-Market App] Volume Control (Cyrket?)
com.swype.android.inputmethod = Swype?
com.tencent.research.drop = QQPlayer (no perms req'd?)
net.bajawa.battery = BattStatt (no perms req'd?)
org.sipdroid.sipua = Sipdroid VoIP + video
The Road Warrior has an idea which is sort of useful; but I'll modify it to use binary division.
Start with a freshly installed, clean ROM, and only install half of your apps. (I would put all of your most frequently used apps in the first half, and delay any non-market apps as long as possible). Here's how this goes:
- if the "half" you put on the phone is trouble-free (long enough to know the SMS popup thing is not going on), then, install half of the remaining apps, and wait again to see if there is a problem.
- if the "half" you put on the phone develops trouble, then you know that the problem app is in that group. Wipe the phone and re-install all prior "halves" (that caused no trouble), but split the current half (the group containing the suspect app) in half, and only install that. Proceed in this fashion until you are down to the app which causes the trouble.
If you have 128 apps on your phone, and you wait 1 day between installations, it will take 7 days to find the malicious app. (And if you don't get a failure within the first two days, your phone will have 3/4s of it's apps installed - that's not too bad).
The thing is though, even if you had an app compromise your phone, it might not be an "app" that is doing the dirty work any longer. For example, the most recently discovered malware ran rooting exploits against the device, and once successful, downloaded and installed "other stuff". That "other stuff" could be native binaries. So, examining permissions in the system manifest doesn't necessarily guarantee that you have exhaustively looked at your phone, or discovered all possible means of interacting with the SMS system.
It might be "just an app", though - and if it were me, the first ones that I would suspect are non-Market apps, or apps that *cough* got downloaded from "freeware" sites.
Thanks for the responses. I actually did a fresh flash last night. First thing I installed was tubemate (running through non market apps) and it did it. Ironically I added some money to my account to see if I could get the number it was trying to text. Apparently it still couldn't go through.
Sent from my FroShedYo V10-ERIS using XDA App
I had a game from a Chinese developer that stole my gmail. Log into yours from the website and see if you get a red warning.
Sent from my GSBv1.9 ERIS using XDA App
viogrep said:
Thanks for the responses. I actually did a fresh flash last night. First thing I installed was tubemate (running through non market apps) and it did it. Ironically I added some money to my account to see if I could get the number it was trying to text. Apparently it still couldn't go through.
Sent from my FroShedYo V10-ERIS using XDA App
Click to expand...
Click to collapse
I'm always amazed when something I suggested actually works. LOL. It's just that I'm used to things being more complicated than I hope.
Glad you figured out the trouble!
Thanks bt and RW for the help.
As far as the gmail thing... I use a different gmail address on my phone with email forwarded (different pass)...
If it gets taken I just stop the forwarding and make a new one. Makes things a more simple. Sure, they can see past emails, but they cant request passes/info from other sites... (I also monitor the login IPs in gmail, religiously. Just a habbit.)
viogrep said:
Thanks bt and RW for the help.
As far as the gmail thing... I use a different gmail address on my phone with email forwarded (different pass)...
If it gets taken I just stop the forwarding and make a new one. Makes things a more simple. Sure, they can see past emails, but they cant request passes/info from other sites... (I also monitor the login IPs in gmail, religiously. Just a habbit.)
Click to expand...
Click to collapse
You're welcome. You could just change your password from the web if your phone gets stolen.
Especially since it's the gmail address you use on your phone that everything is sync'd to, not the one that's forwarding to it. So if you got another Android phone you'd lose all your contact info and bought and installed apps info, calendar and such. Unless you sync them manually which is so much harder in my experience.
Or you could use one of the many free apps out there that would let you remotely do many things to your phone. Turn the GPS on, triangulate your phone, make your phone scream, do a factory reset to erase everything...
Just a suggestion.
Right now it looks like Cerberus is still great - or should we take a good look at Avast and Kaspersky as well?
Prey got a lot of press hype, but it seems like on android it can't take pictures of the thief? Can cerberus be forced to use the front camera?
Confirmed that Cerberus can take pictures with the front camera. I tested it when I first installed it and it works very well. It even flashes to a bright white screen for a second in case of low light conditions.
Try Androidlost.
I found it much, much better.
Romonster said:
Try Androidlost.
I found it much, much better.
Click to expand...
Click to collapse
What he said
Sent from my SPH-D700 using Tapatalk
Romonster said:
Try Androidlost.
I found it much, much better.
Click to expand...
Click to collapse
Interesting. So you would say this is better than Cerberus? In which ways?
1. It's absolutely free.
2. Uses your Google account, no need to create another account for app and no battery drain.
3. More features- pull last 50 messages and browse/download/delete sdcard contents remotely.
Considering I got Cerberos for free during their giveaway, it's serving me very well. I particularly like the five devices I can track with it; makes me feel better about taking both my phone and tablet into public.
How effective are anti-theft apps?
Do any of these anti-theft apps prevent a factory reset or a ROM flash?
Have any independent comparisons been published?
How does SamsungDive compare to the likes of Prey et al?
I think Avast Mobile Security is a pretty good bet, allows SMS only management, and system installation so goes to the rom.
Respect to flashing the device, I think regardless on any anti theft software (cerberus, androidlost, avast mobile security) you can start the device in Recovery mode and flash a new rom, wipe cache & data and such. That is because the recovery prevails over the operating system because loads first when demanded.
AndroidLost
Win
HairyScot said:
Do any of these anti-theft apps prevent a factory reset or a ROM flash?
Click to expand...
Click to collapse
scandiun said:
I think Avast Mobile Security is a pretty good bet, allows SMS only management, and system installation so goes to the rom.
Respect to flashing the device, I think regardless on any anti theft software (cerberus, androidlost, avast mobile security) you can start the device in Recovery mode and flash a new rom, wipe cache & data and such. That is because the recovery prevails over the operating system because loads first when demanded.
Click to expand...
Click to collapse
With Avast if you allow its root options you can set the phone so that it CANNOT be data reset from the phone menus or recovery. It can block USB Debugging as well so that the phone cannot be wiped and reset that way either. You can also set Anti-Theft as an app with Admin permissions so that it cannot be uninstalled, not to mention it will run in stealth mode when active so that it doesn't appear in your apps list at all. It is also separate from the Anti-virus portion so you can uninstall that and there would be no way to tell the Anti-theft is even present on the phone.
It is amazing that it's still free, but as Avast! stated they make their money off of their PC utilities and plan to keep it free.
MissionImprobable said:
With Avast if you allow its root options you can set the phone so that it CANNOT be data reset from the phone menus or recovery. It can block USB Debugging as well so that the phone cannot be wiped and reset that way either. You can also set Anti-Theft as an app with Admin permissions so that it cannot be uninstalled, not to mention it will run in stealth mode when active so that it doesn't appear in your apps list at all. It is also separate from the Anti-virus portion so you can uninstall that and there would be no way to tell the Anti-theft is even present on the phone.
It is amazing that it's still free, but as Avast! stated they make their money off of their PC utilities and plan to keep it free.
Click to expand...
Click to collapse
Do you mean the phone won't enter on recovery holding power+volup+menu? And that there won't be the option to install update from sdcard?
MissionImprobable said:
With Avast if you allow its root options you can set the phone so that it CANNOT be data reset from the phone menus or recovery. It can block USB Debugging as well so that the phone cannot be wiped and reset that way either. You can also set Anti-Theft as an app with Admin permissions so that it cannot be uninstalled, not to mention it will run in stealth mode when active so that it doesn't appear in your apps list at all. It is also separate from the Anti-virus portion so you can uninstall that and there would be no way to tell the Anti-theft is even present on the phone.
It is amazing that it's still free, but as Avast! stated they make their money off of their PC utilities and plan to keep it free.
Click to expand...
Click to collapse
scandiun said:
Do you mean the phone won't enter on recovery holding power+volup+menu? And that there won't be the option to install update from sdcard?
Click to expand...
Click to collapse
Since I have paid for Avast! on my PC maybe I should use it for my Android devices.
Would be interesting to verify if it can prevent flashing etc.
HairyScot said:
Since I have paid for Avast! on my PC maybe I should use it for my Android devices.
Would be interesting to verify if it can prevent flashing etc.
Click to expand...
Click to collapse
As far as I know, there is no such hardware locking ability on some devices, at least in my SGS2 there is no way to prevent flashing.
does this thing really work? just a newbie here.
You can install cerberus on to the root of your phone to gain two additional features that will result in cerberus still being installed even after a delete/wipe.
Link to cerberus q&a HERE
Just expand the "I have a rooted device. Can I get additional features?" topic and follow instructions
Remember when un-installing cerberus to uninstall it the proper way to avoid problems when flashing it to root, open the app login and disable admin then uninstall
ill have to check that out
Thing is if you lose your phone the best you can hope for is a quick lock via a website to track it down or protect your data (which will already be backed up)
As long as you can secure the phone and data then how much do you really want to catch a thief?
Will check these out though as being able to lock the phone down and ensure it has to be reflashed is good, but unless you use encryption not sure how any of these can really protect the data?
scandiun said:
Do you mean the phone won't enter on recovery holding power+volup+menu? And that there won't be the option to install update from sdcard?
Click to expand...
Click to collapse
I was still able to wipe data and cache after I sent a text to set it as lost, but once the phone restarted the Anti-theft app was still active so that aspect that is common to Cerberus still works at least. I'm about to see if it survives RSD.
Edit: Alrighty. As stated Anti-theft survived wipe/reset so that part holds true, and RSD is unable to function so it is preventing USB debugging access. The only thing that shows that anything out of the ordinary is going on is that you have the option to set one app as admin and it does not appear with the rest of your apps in the app drawer, but as you can name it anything that you want only someone very familiar with Avast/Cerberus would have any reason to suspect that it's an anti-theft app.
One thing that may give it away that the phone is being tracked is that an SMS goes to the device saying that it has been marked lost and depending on your network and when the thief powers off the phone it still may show up in the inbox and they could see it. Considering that many thieves may switch SIMs as soon as they get the phone though, this should be a non-issue and is covered by the forwarding and SIM-tracking portions of the App.
I would like to play with all this further, but as of now it appears that Avast pretty much performs as promised and your phone will still be trackable even if someone does a battery pull and reset. You will have to send an additional Lost SMS if you wish to lock the phone again, but you can send your other commands: SIREN ON, LOCATE, etc and it the phone will react appropriately. The LOCATE command will give you the owner name, Cell ID, Carrier, and new ID. If they change SIM cards the new SIM info will be forwarded to the two numbers you chose as friends during setup. You can do a test to make sure they'll get the message, but I would like to actually try this but my phone is CDMA only so I can't vet that out.
Declaring lost does Automatically power WIFI, GPS, and Data back on as promised. I apparently misspoke about being able to prevent access to recovery. When locked it is impossible to access the system menus on the phone, but as noted it can be wiped and reset from recovery though Avast will survive this and it looks like Cerberus should as well since it utilizes a similar method.
Don't know how much more to ask for from an anti-theft app, especially a free one. The only nice addition would be being able to lock recovery the way you can BIOS, though this may make a savvy thief more likely to toss the phone so maybe it's a good thing that they would be able to flash a new Rom via SD and the phone could still be tracked with them none the wiser.
---------- Post added at 03:58 AM ---------- Previous post was at 03:14 AM ----------
Doallyn said:
Thing is if you lose your phone the best you can hope for is a quick lock via a website to track it down or protect your data (which will already be backed up)
As long as you can secure the phone and data then how much do you really want to catch a thief?
Will check these out though as being able to lock the phone down and ensure it has to be reflashed is good, but unless you use encryption not sure how any of these can really protect the data?
Click to expand...
Click to collapse
All my important data is backed up so that I'm not worried about. As to the thief bit, this app is great. When it becomes clear to thieves that stealing a phone will at best result in them getting a GPS tracker that they need to toss and at worse give them something that actually lands them in jail then thefts will certainly drop off. Apps like this and Cerberus will make phone theft something that's benefits certainly do not outweigh the potential costs.
The reason Avast and Cerberus (or just any other system app) survives a wipe/factory reset is because they are in the System folder... all those apps aren't deleted when you perform a wipe...
But sure enough, if the thief flashes a new ROM from recovery then all apps are gone, nothing will survive that!
Anyway, Avast seems to be the way to go since is free ;-)
Hi people;
I just wanna point out am idea abt security of device. Is that possibile to add an counter to pin login screen to count back unsuccessful login attempts? Actually an add-on to pin login security to enhance general device security. As been on BlackBerry devices. After an settled number of login attempts device could block it self or better to wipe device to factory settings?
Just an idea just came out from an necessity.
Thanks.
Sent from my GT-I9100
I think that's a wonderful idea. Go forth and develop it my friend. Hey, why not use Kickstarter to gain funding?
****Non of this is of any importance. Just chill the f**k out and relax****
It would take ayear or more if i do it.im a rookie
Sent from my GT-I9100
Just install programs like Cerberus, They have much better features then this.
Cerberus or other prg's made to work on after stolen. This improvement is as a first defence for data security. All other scenarios can fail after device stolen. Cerberus only takes pictures what will i do with pic.of thief after its stolen and what if thief is after my data not my device.
Sent from my GT-I9100
I saw an app in the play store can't remember the name it was in the top 60 that if you're patter unlock was entered incorrectly it would take a pic and email location and pic to you
asterius said:
Cerberus or other prg's made to work on after stolen. This improvement is as a first defence for data security. All other scenarios can fail after device stolen. Cerberus only takes pictures what will i do with pic.of thief after its stolen and what if thief is after my data not my device.
Sent from my GT-I9100
Click to expand...
Click to collapse
In cerberus you can set what you want even clear sdcard.
asterius said:
Cerberus or other prg's made to work on after stolen. This improvement is as a first defence for data security. All other scenarios can fail after device stolen. Cerberus only takes pictures what will i do with pic.of thief after its stolen and what if thief is after my data not my device.
Sent from my GT-I9100
Click to expand...
Click to collapse
Dude, you have absolutely no idea what your talking about and obviously havent even used the app or web service or any other of the many same type apps.
You can manually OR automatically wipe data on internal or external card, lock device, get GPS location, take pictures, videos, sound recordings, display messages, send sms, make it scream. etc etc etc. You can automate these actions in various scenarios from wrong unlock codes, new sim card inserted etc. You can also hide the app or install as system app so they can uninstall even if wiped. Only way to get rid is install new rom, but majority of people who would find/steal phone wouldnt have a clue flashing roms was even possible.
Your idea is and already has been used in various security apps for long time.
I have this Nokia phone and I absolutely hate it. It's like I don't have control over my phone or account or something... I really don't know how to explain what's going on with it either. I don't like the fact that it's a Google phone. I thought all phones come with a default phone app, not this 1. I tried to download a different phone app but theres this 1 that always stays on and will not disable if that makes sense I get weird notifications every now and then, my screen layout and keyboard changes on me all the time, it's like choosing what notifications I get per app and email. Some factory apps become not compatible anymore. What I'm wondering is there a way someone could have made an OS for my phone or have a virtual machine of it or cloned an app I use?? If so how would I find out if someone got control of my stuff???
Hello, i have this phone also (X20), but no problem at all.
I see the SPEN app in your screenshot, but that is not default on the Nokia phones.
It sounds like a "S Pen" which is (i believe) an app for Samsung phones/tablets (use of a pen instead of finger).
There is a default phone app and that should just work, if you have a sim in the phone.
If i where you, i would start with checking your google account.
Do you have only a password or also multi-factor authentication (2FA)?
If you only use a password, you might want to activate 2FA on your google account, so nobody else can take over your account.
After that, you might want to reset (factory reset) your phone and start over.
I'm thinking it's my Google... I believe my husband did something to it just can't figure out what exactly
Did you lock your account (Google) with Multi Factor Authentication (MFA of 2FA) so no one else can login with your account??
If you did, did you do a factory reset of your phone?
If you do a factory reset, do not let Google install your apps and settings again (restore) by disabling the Backup/restore settings.
If you are able to ask your husband, please do. That can make it easier to reset the app or option.
Hi
I am sure i have turned something off in the past that causes this.
Smart switch never yransfers my passwords. I end up having to download my apps again. Tbey show as greyed out on the phone. And every
app that i then download needs password entry. Any ideas what i have wrong?
That's typical; it doesn't glean passwords or app data. Never use SmartSwitch to transfer critical data as it can fail you miserably.
Best not to use it on a different device or Android version and do a clean load build instead...
Its one of those things that i watch the rest of family do with apple thats so seamless. I struggle to remember every password and it takes a few hours. Does help me bin the trash though i suppose
s3fan said:
Its one of those things that i watch the rest of family do with apple thats so seamless. I struggle to remember every password and it takes a few hours. Does help me bin the trash though i suppose
Click to expand...
Click to collapse
Apple is easy, it works and I hate it. Unfortunately Google Android and Samsung are getting to be more like Apple every year. That's why I'm still using N10+'s running on Android 9 and 10. Screw them all.
Passwords should be part of your backups. Before a factory reset delete your Google and Samsung accounts on the phone. Do the reset through settings rather than the boot menu to avoid the possibility of FRP rearing it's ugly head.
Use ApkExport to make installable copies of all your apps to avoid using Playstore and speed load time. I disable firmware upgrades/updates and rarely update apps. Upgrades/updates can and do break Samsung's.