[Q] security with and without root / safestrap / nexus ROM - Kindle Fire HDX 7" & 8.9" Q&A, Help & Troubleshoot

Hi all,
after getting my new 99 € Fire HDX 7" and managing to root it, install Safestrap and the Nexus ROM, I am now somewhat worried about the security of the device in case it gets lost or stolen. Let me explain:
Among other apps with personal data I have my email account installed on the device, so anyone getting access to it can easily get into my ebay/paypal/amazon/whatever accounts using the forgot-password functionality of those web sites.
What one would do on a stock kindle in order to prevent this: use an unlock PIN for the screen and disable ADB. That should be sufficient, I guess, as I don't see what additional security there should be in enabling encryption except that someone could physically remove the flash chips from the device (but that risk I'm willing to take, as I don't deem my data sensitive enough for someone to go take the device apart).
Now how is the situation once Safestrap and the Nexus ROM are installed? I can still disable ADB in the settings, but on every reboot the Safestrap screen gets displayed and a thief can easily get into the Safestrap recovery and browse the files from there. Would it be possible for him to export files from there, reset a ROM to remove the PIN or do something else to get access to the system?
If so, would it be possible to enable encryption on the Kindle HDX to prevent this? Or would encrypting not work with Safestrap or even brick the device?

Related

(Guide) What can you do if your phone is encrypted and you can't remove it

I've spent the whole night trying to figure this out so hopefully the information is useful for some of of you
The usual scenario is that the phone is encrypted due to using Exchange email (eg. Corporate email) and now you can't upgrade or root it. The first thing to do is to delete that email account and hopefully the phone will decrypt itself or the option appears when you go to phone security settings. You can also try to access the corporate email via a browser and delete the mobile connection.
This worked for me previously but it doesn't now - I don't know if its because I'm using a non-stock rom. Either way a lot of people seems to be stuck with a Samsung rom as well. So you now have a phone with the exchange account gone and its restriction so you should in theory be able to removing the decryption but no it doesn't work. I don't know why as this is a basic OS stuff.
At this stage you can try to full wipe it - but this doesn't work, both through settings or CWM. The only way to sort this out is to copy / backup all your information then flash it to factory state and this means using odin and a stock rom. I've done this several times and there is no lasting issues.
I''m by no mean an expert and would be happy for anyone to correct me

Can recovery mode help exit Ultra-Power-Saving-Mode on S5 while locked out of phone?

Is there any way to exit Ultra-Power-Saving-Mode while locked out of my S5 using recovery mode, installing some update, etc? I have a lot of development experience with several languages and tools, but not Android.
I've been using my fingerprint for access for over a year and now I have no idea what my alternative password is... since I've never used it regularly and can't find any record of it. I usually right document such things, but apparently not this time.
Unfortunately, this last Sunday while in Ultra-Power-Saving-Mode something went wrong with my phone and now it only asks for the alternative password... which I can't recall. I've used the Android Device Manager 4 times since then to reset the lock PUK/PIK. After each time resetting it, the lock screen does show the new greeting I set via the Android Device Manager, but it still asks for the alternative password... instead of asking for the PUK/PIK that I just reset.
I am suspecting/hoping that if I can somehow get my phone out of UPSM that the lock screen will allow me to use the reset PUK/PIK to get back into my phone.
So, I am asking if you know of any app that can be installed remotely that will allow me to get my phone out of UPSM? Or, if there is any way to get it out of UPSM by rooting the phone, but installing an ADM update, etc.
Normally I would just do a factory reset because everything is synced up to my Google account. However, apparently my SD card, which was my primary storage, filled up on May 2, so everything since then has been stored on internal memory and thus will be lost if I do a factory reset. I've taken a lot of pictures and video of my 2 1/2 yr old boy and I am trying to avoid losing everything since May 2.
Thanks for any help.
rjlyders said:
Is there any way to exit Ultra-Power-Saving-Mode while locked out of my S5 using recovery mode, installing some update, etc? I have a lot of development experience with several languages and tools, but not Android.
I've been using my fingerprint for access for over a year and now I have no idea what my alternative password is... since I've never used it regularly and can't find any record of it. I usually right document such things, but apparently not this time.
Unfortunately, this last Sunday while in Ultra-Power-Saving-Mode something went wrong with my phone and now it only asks for the alternative password... which I can't recall. I've used the Android Device Manager 4 times since then to reset the lock PUK/PIK. After each time resetting it, the lock screen does show the new greeting I set via the Android Device Manager, but it still asks for the alternative password... instead of asking for the PUK/PIK that I just reset.
I am suspecting/hoping that if I can somehow get my phone out of UPSM that the lock screen will allow me to use the reset PUK/PIK to get back into my phone.
So, I am asking if you know of any app that can be installed remotely that will allow me to get my phone out of UPSM? Or, if there is any way to get it out of UPSM by rooting the phone, but installing an ADM update, etc.
Normally I would just do a factory reset because everything is synced up to my Google account. However, apparently my SD card, which was my primary storage, filled up on May 2, so everything since then has been stored on internal memory and thus will be lost if I do a factory reset. I've taken a lot of pictures and video of my 2 1/2 yr old boy and I am trying to avoid losing everything since May 2.
Thanks for any help.
Click to expand...
Click to collapse
Only option I can think of would be to install TWRP custom recovery and use the built in file manager to rename the UPSM app. This wouldn't work if you have an ATT or VZW model, as the bootloaders are locked down, not allowing installation of TWRP, but pretty much any other carrier model should be fine.

[HOW TO] ENSURE ANDROID DEVICE SECURITY, PRIVACY and DATA PROTECTION

NOTE:
This is a very basic guide only for newbies like me.
I'm not a developer or something even near to that. All information provided here is copied from different sources and according to the best of my knowledge. I'll not be responsible for any harm to you or your device. Try it on your own risk.
Any additions or corrections are welcomed.
Note: Unlocking Bootloader and Rooting breaks "Verified Boot". It can be dangerous.
Unlocking bootloader:
Disables signature checking of boot image and recovery image
Allows all fastboot commands to be executed
Zeros out /data partition i.e. filesystem is erased and then regenerated on next boot
To know further: BOOT PROCESS: ANDROID vs. LINUX
As compared to iOS, Android is considered less secure OS because it's an open source project and a large number of developers are involved contrary to iOS where things are kept secret. We can face two types of threats regarding mobile security:
Data theft or loss when using mobile phone.
Different types of malware (spyware, adware, bloatware, ransomware, worms, trojans, virus, cookies) or a hacker can directly attack your device to gain access to your personal data like contacts, pictures, credit card information or even can note your habits and then forcefully show you ads etc. Sometimes the purpose is just to harm you, rather than having some benefit. To avoid this:
Keep your phone as simple as possible. Avoid installing apps from unknown sources particularly KeyGens and cracked / pirated / hacked apps and MODs offered free of cost. Use an app store like PlayStore to install apps which provide security somewhat.
Some stock ROMs (manufacturer's operating systems) contain bloatware (unnecessary and suspicious apps) running as an app or in background. Try removing as much of these as possible by uninstalling or freezing or at least restrict their permissions and internet access.
In Android 6 and above, apps ask for permissions from user when run first time. Allow for these permissions carefully. Check your list of apps auto-starting up and running in background as well as accessing storage and phone / sms etc.
Permission regarded as "Normal" by Android cannot be revoked by simple means e.g. you can restrict an app's INTERNET permission. Either use a third party trustworthy permission manager or at least review the list of permissions requested by an app at install time.
Use some firewall app like AFWall+ to block hidden internet access of apps to internet.
If your phone is rooted, try to avoid granting root access to as less apps as possible particularly those from uncertain sources.
Use some anti-malware or commonly known antivirus app in mobile phone which can scan and filter apps, attachments, links, emails, sms and webpages etc. There are numerous paid and free apps available for the purpose, though most of them are themselves promoting some kind of malware for business purpose. av-test.org is a good place to start with selection.
Data theft or loss when phone is lost or stolen
In this thread I'm focussing this part and giving here a few technical tips and measures you should always take that can help you keep your data, device and yourself safe in case if your device is LOST or in case of THEFT. Otherwise your device and your data can be accessed and misused.
The very first vulnerability of our data to theft and misuse starts with the Unlocking of BootLoader which is locked by default for security on most of the new devices. Unlocking BL makes it easy to flash custom recoveries, kernels and ROMs. That's why, the internal storage can be accessed from any custom recovery or device is factory reset or new OS can be installed for a fresh use. Therefore vendors are making it harder and harder to unlock BL without proper authorization. Personal data is also prone to wrong hands due to insufficient security measures on device as explained below:
DATA PRIVACY
Always keep Screen Lock enabled (with PIN or Password or Pattern).
But keep in mind, this option alone is of no use. It takes only a minute or two to remove screen lock protection if a custom recovery is installed or BL is unlocked / unlockable.
Always use Internal Memory of Phone to store personal data like pictures, contacts etc.
External memory (SD cards) can be removed from device and easily accessed from computer or other devices. They aren't erased usually in case an app tries to erase data in case of theft. Also, Android doesn't offer encryption of SD cards by default. A few custom ROMs offer this feature or you have to use a third part app for encryption. Built-in kernel module dm-crypt is used by AOSP for full disk encryption (FDE). A similar service is needed which auto-mounts your memory card at OS boot. Good examples of encryption at filesystem level are EncFS and CryFS which offer a stackable transparent encryption with virtual filesystem. An easy way to implement EncFS on Android 5- is explained here.
However, in Android 6.0 and above, external memory swapping with internal memory is offered called adoptable storage. That's relatively more secure because it makes SD card not readable by other devices (at least not easily).
Old Devices with Low Internal Memory - in this case instead of putting personal data on SD card, try using SD card's 2nd partition to link apps & their data to SD card by Link2SD and keep your personal data on internal memory.
However, Link2SD may slow down your device or can be a battery hog. In this case, use Third Party Encryption apps to encrypt your targeted data instead of encrypting whole /data partition. There are numerous apps like KeepSafe which is more useful if you combine encryption with cloud backup or online synchronization. However, be careful while selecting app. The app can fail to protect your data online or it can itself misuse your data. Otherwise, any app like ES Explorer or Solid Explorer can be used to keep data encrypted.
In case of third party encryption software, you must be extra conscious of your data. Sometimes sensitive data is hidden (apps data or due to .nomedia) like WhatsApp Sent folders. You have to take care of all this manually. It's really a hectic job.
Encrypt Internal Memory (particularly if BL is unlocked).
It's because and attempt to unlock BL erases all personal data on internal memory (not external SD card). However, it may not always be true. So keeping Internal Memory Encrypted always promises more security. An un-encrypted internal memory can be easily accessed from custom recovery.
Performing these steps makes your data quite secure and not vulnerable to easy access.
DATA PROTECTION
Data Recoverable - use local / online backup of your data. Read here how to do that.
Wiping Data
Bootloader Locked - so that there is no chance of flashing custom recovery and then accessing data from there or through ADB. As stated above, unlocking BL will erase data but it's not always true. So, this option alone cannot be relied on.
There are chances of wiping data if you use some anti-theft app. Android Device Manager (ADM) is a built-in app on all Android devices that suffices the basic needs of an anti-theft app. A Google account on device is mandatory and ADM must be enabled from settings i.e. Device Administrator. You can use Google Find My Device anytime to Locate (Location services should be enabled on device), Play Sound, Lock or Erase your device. Obviously, device should be connected to internet for ADM to work.
However, you may use any third party app with rich features (also SMS based).
Rendering Data Useless - as stated above, using Encrypted Internal Memory only for personal data makes it secure and hard to read by others, even useless.
DEVICE SECURITY
Device Recoverable
As stated above, there are chances of device recovery if you use some anti-theft app.
Keep your phone's IMEI number safe. Your Mobile Network Operator along with the help of police can trace your device whenever it's switched on unless its IMEI is tempered.
Rendering Device Useless
Bootloader Locked - so that there is no chance of flashing custom recovery and then flashing new ROM.
OEM Unlocking disabled - so that Bootloader can't be unlocked without proper authorization.
It can be disabled from ROM settings menu on Android 5.0 and higher devices (if found).
Factory Reset Protection (FRP) - so that after resetting device from recovery, device can't be logged in without already linked Google account. This is implemented by a separate partition named FRP or CONFIG or PDB (on Intel devices) or something else which saves information of last logged in Google (or OEM) accounts. This partition is not reset on factory data reset by stock recovery. So, if bootloader is locked and set unlockable in Developer Options, one can't flash custom recovery to erase FRP partition. He will be stuck at login screen permanently.
So a working Google account on device is mandatory. It works on some Android devices with Lollipop 5.1 and higher. However all vendors don't implement this security feature in their devices. Some use their own similar feature e.g. XIAOMI links your device to MI account.
Additionally some OEM's don't allow unlocking of bootloader without permission from OEM to ensure more security i.e. contents of partition[/URL] "devinfo" are signed by the OEM and can't be modified without their approval. After having permission, an official method is provided to unlock BL using PC.

HELP FROM DEV, bad virus/rat

(Im new to XDA and initially posted this in the wrong place and do not know how to delete the last one. If admin deletes one because of multi posting, please keep this one up) my phone is infected with a virus that has imbedded itself in my system settings, any anti malware apps used do not detect it. when plugging my phone into my computer (for developer access) it began to install the device driver. once the "device driver" installed it took all administrative use away from me and locked all drives. I do not have ABD access or any computer access at this point. this phone has killed 3 laptops and a desktop. the only way ive been able to partially stop the virus is using a firewall to block it. since my phone is NOT rooted I cannot delete system files containing the virus. I noticed the virus will edit apps and system functions to try and hide itself (Google play services) for example. someone is using a form of remote access to control things and change settings. it is possible that someone (close family or friend) may have gotten their hands on it to install the virus. factory reset does nothing as the virus is stored in system settings. phone cannot be hooked to Pc without severe repercussions. I cannot gain root access through any rooting apps for some reason. only tried to access system settings. I HAVE TRIED EVERYTHING.
Defeated01 said:
(Im new to XDA and initially posted this in the wrong place and do not know how to delete the last one. If admin deletes one because of multi posting, please keep this one up) my phone is infected with a virus that has imbedded itself in my system settings, any anti malware apps used do not detect it. when plugging my phone into my computer (for developer access) it began to install the device driver. once the "device driver" installed it took all administrative use away from me and locked all drives. I do not have ABD access or any computer access at this point. this phone has killed 3 laptops and a desktop. the only way ive been able to partially stop the virus is using a firewall to block it. since my phone is NOT rooted I cannot delete system files containing the virus. I noticed the virus will edit apps and system functions to try and hide itself (Google play services) for example. someone is using a form of remote access to control things and change settings. it is possible that someone (close family or friend) may have gotten their hands on it to install the virus. factory reset does nothing as the virus is stored in system settings. phone cannot be hooked to Pc without severe repercussions. I cannot gain root access through any rooting apps for some reason. only tried to access system settings. I HAVE TRIED EVERYTHING.
Click to expand...
Click to collapse
First of all, you should disable autostart on your laptop/PC ( on Windows 10 press [WINDOWS] + "Setup"). There you can config autostart/actions for sd-card, mobile memory and your phone (scroll down on this page). No auto play or sync (fotos/media) for ALL devices is recommend. Don't log in your PC as admin, use a non-admin-account for testing with your phone.
Take a fresh sd card, copy the virustotal scanner on it (take it from the attachment at that post: https://forum.xda-developers.com/showpost.php?p=77053739&postcount=11), switch the sd-card to "read only" (https://www.youtube.com/watch?v=SgguVeKWCTw), put it in your phone, install the virustotal app from the sd-card, go online and let it run. So we figure (hopefull) out, which malware it is and where it is located. Write down the findings (name, location, how much scanner find it) and post it here...
Are you shure, that your ADB-SW/Drivers for the PC/Laptop are okay and clean? Plz post additional Infos about your phone...
I think, someone may have taken my phone, rooted it, and installed or is possibly using Samsung KNOX? If this were the case is there a way to break Knox without a PC? I don't want access to anything in it, just to destroy it. If this is part of the problem, just a quick theory and question I will get back to you with more information. Thank you
Defeated01 said:
I think, someone may have taken my phone, rooted it, and installed or is possibly using Samsung KNOX? If this were the case is there a way to break Knox without a PC? I don't want access to anything in it, just to destroy it. If this is part of the problem, just a quick theory and question I will get back to you with more information. Thank you
Click to expand...
Click to collapse
There are malware in the wild, which can root you phone (like "Dvmap"). In this case you only have one chance about the complete flashing of the device with a clean rom. This type of malware also infects system files, so it cannot be quarantined and removed. At the moment I don't understand why the computers you used for flashing don't work anymore. if the drivers / software are OK (do you have the right versions for windows7/8/10 and e.g. 32/64 Bit) this should not happen? Does this work with other smartphones? Normally the phone is switched off for flashing, so Android is not running. Also autostart should not work then.... that would be completely new behavior.....
"
Every device this phone plugs into, dies after Bluetooth randomly coming on

Bypass manufacturers registration startup

I have a device (GT Wonder Boy with Android "GT OS") that starts in the manufacturers custom user registration prompt and process. This version of Android has required apps installed, so I can't otherwise replace the OS. Is anyone aware of a method that may bypass these first run registration prompts? To complicate matters, the recovery menu is in Chinese, which I do not speak. Though I have reasoned out how to restore if needed.
did you ever solve this?
lmarkeh said:
I have a device (GT Wonder Boy with Android "GT OS") that starts in the manufacturers custom user registration prompt and process. This version of Android has required apps installed, so I can't otherwise replace the OS. Is anyone aware of a method that may bypass these first run registration prompts? To complicate matters, the recovery menu is in Chinese, which I do not speak. Though I have reasoned out how to restore if needed.
Click to expand...
Click to collapse
For recovery use Google translate, anyway I don't know how you would be able to pass this first setup registration
Skorpion96 said:
For recovery use Google translate, anyway I don't know how you would be able to pass this first setup registration
Click to expand...
Click to collapse
unfortunately the bypass menu - hold down the volume key during startup - only provides "Testing" resources. I am unable to access a ip ftp or ssh login without knowing a bit more information about what the OS is. Now that they are out of business there might be some 3rd party resources fiarly soon. I'll check back in if I find access.
Maybe if you root it, you can remove the app responsible for this, after that wipe and next time you would skip the registration process
i was able to use the usb micro connect to root via Kingo. playing with os now

Categories

Resources