Related
Does anyone know how to do it on the Droid?
Is there a single honorable reason why you would be interested in doing this?
I sure can't think of one.
well as soon as wifi packet injection works on android i am switching.
¿GotJazz? said:
Is there a single honorable reason why you would be interested in doing this?
I sure can't think of one.
Click to expand...
Click to collapse
Vulnerability testing... an auditor who wants to do bluetooth related pen test with his/her phone?
archangelugp said:
Vulnerability testing... an auditor who wants to do bluetooth related pen test with his/her phone?
Click to expand...
Click to collapse
Lets go with that . So I'm guessing theres no way yet?
alienware777 said:
Lets go with that . So I'm guessing theres no way yet?
Click to expand...
Click to collapse
Nope. Not yet.
I don't see why it matters to anyone why someone wants this.
I want this too. I don't have to explain to anyone as to why I want it. Because, it is absolutely none of your business. If you don't know how to implement it, then don't post.
Lol. This is a public forum. Of course you don't have to explain why you want something. Equally, if someone who could help doesn't want to, because they suspect you're up to no good, they don't have to justify their actions either, let alone help you. Blessed be.
cauli said:
Lol. This is a public forum. Of course you don't have to explain why you want something. Equally, if someone who could help doesn't want to, because they suspect you're up to no good, they don't have to justify their actions either, let alone help you. Blessed be.
Click to expand...
Click to collapse
Touché. I'll admit it. The main reason I want this is to mess with my friends. Nothing actually detrimental. Same reason I like sms bombers, and caller id fakers.
But still, this would be great to add on to my list
This would be so awesome..just from a security standpoint to be able to show and explain to friends and family to not there guards down when it comes to cyber theft and to turn off your radios when not in use
I never quite understand answers like this. This forum is for the exchange of information, not personal opinions. People that think their some kind of 'ethics police' need not be on this type of site. This site is for the exploration, hacking and development of our phones. Rooting & custom firmware is frowned upon by security researchers and manufacturers alike, but because your into it, it's morally correct?
supern0va said:
I never quite understand answers like this. This forum is for the exchange of information, not personal opinions. People that think their some kind of 'ethics police' need not be on this type of site. This site is for the exploration, hacking and development of our phones. Rooting & custom firmware is frowned upon by security researchers and manufacturers alike, but because your into it, it's morally correct?
Click to expand...
Click to collapse
Yep, one man's "not needed" is another man's necessity. This is no less needed than say someone thinking they need a ps3 controller (or wiimote) working with their phone, but no one really complains about that.
here's a very legitimate reason for you so if you know how PM me
Hi,
A friend of mine has an older mobile with a broken touchscreen - the phone no longer has a SIM or a RAM card and is in "Music Sync" mode when it connects to a PC via USB.
They are currently in a court case and need to get their old SMS's off the broken phone - all the "forensic" mobile software out there (from $500 up to $5000!!!) require that the phone is in PC-Suite (or PC-Sync) mode. This can't be changed on the phone as the touchscreen doesn't work.
The only way to get to the SMS's is by Bluesnarfing, so if you know of a PC program or a WinMo 6.5 program that will let me access their phone PM me.
Thanks.
Why is there always that one person that offers no assistance, takes up bandwidth questioning your motives...
For those that don't know:
"Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs. This allows access to a calendar, contact list, emails and text messages. Bluesnarfing is much more serious in relation to Bluejacking, although both exploit others’ Bluetooth connections without their knowledge. Any device with its Bluetooth connection turned on and set to “discoverable” (able to be found by other Bluetooth devices in range) can be attacked. By turning off this feature you can be protected from the possibility of being Bluesnarfed. Since it is an invasion of privacy, Bluesnarfing is illegal in many countries."
Thread closed
Well I was just reading a thread about someone buying a Vibrant from someone who "found" it and this person was looking for a way to bypass WaveSecure.
We all know that with a little know how that it is possible with Recovery Mode.
The question I have is there a way to prevent even a Recovery Mode reflash? To absolutely stop someone from touching the ROM at all?
I know the Security Apps out right now can track you from GPS, wipe the phone remotely, etc... But can it stop someone from reflashing a ROM?
If there is a app out there like that please let me know, but if not, what would it take to create such a app.
What are YOUR thoughts??
What if this happens and then you brick for some reason need to reflash and it's locked. I would just bank on the fact that most people think that it's a "Droid" phone and don't know ****.
I was hoping for a question like that.
Either there is a security measure which at some point of using Recovery that it asks for a password or pin. Something that will allow you to access it securely and nobody else.
Yes, it is a droid, very true, but how many droids are out there now, are going to be out there, and with the new laws that allow you to unlock your device and pretty much do anything with it, more and more people are going to start playing around. Not only that, there is always somebody who knows someone, you know.
Personally myself, I would feel secure with having an implementation like this, everything else is pointless.
It's sort of like having a anti virus on your computer but not scanning for rootkits, only viruses.
The idea of that app sounds nice and all that but I seriously doubt that the average Android user would know about flashing ROMs and all that. But if it does get into the hands of somebody that does know how to do it then it can be a problem.
jzero88 said:
Yes, it is a droid, very true, but how many droids...
Click to expand...
Click to collapse
First of all these are android devices / android phones. I was mocking the people who call these phones "droid" phones.
Now on topic: All it takes to break this security is for one person to say, "I forgot my password on for the ==sUPERlOCKER== what do I do to get access?" Then all your worry is for nothing again.
What has been done can always be undone.
Sure, unlike me, I never forget my passwords. Especially for something this serious.
Second, of course something can be undo, but to what extent, after hearing your lack of concern makes me think you don't even have a lock on your phone
Again, would you rather have a password like "1234" that is easily guessed, or would you rather have something like "00LowJK54889$3%#". It's really a matter of personal security.
You sound like one of those people who would have Security Cameras, but never has the DVR on to record anything.
I'm saying your idea is bad. I have illustrated why. You have no counterpoint other than that I am 'relaxed' about my phone security.
How about this, keep your phone in your pocket or hand? 100% security.
This should be in general and not development
Sent from my Vibrant using xda app
This has been discussed a few times, you could compile your own recovery image and program in a password while at it, or you can accept that 90% of theives(or people who would find your phone) cannot get to recovery. If I found a phone then yeah I would go straight to recovery but I'm not your average user.
Sent from my T-Mobile myTouch 3G Slide using XDA App
I'm saying your idea is bad. I have illustrated why. You have no counterpoint other than that I am 'relaxed' about my phone security.
How about this, keep your phone in your pocket or hand? 100% security.
Click to expand...
Click to collapse
First, my idea is not bad, give it time, you will see.
Second, I do not have a counterpoint because my main point is stated in the first post. Read again.
Third, I don't care if you are relaxed about your security or not. This post obviously is not for you, another negative person who stunts development if they do not see a logical use for themselves.
I wish you the best and hope that you do not need to ever use such a tool or measure. Take it easy.
This has been discussed a few times, you could compile your own recovery image and program in a password while at it, or you can accept that 90% of theives(or people who would find your phone) cannot get to recovery. If I found a phone then yeah I would go straight to recovery but I'm not your average user.
Sent from my T-Mobile myTouch 3G Slide using XDA App
Click to expand...
Click to collapse
On the Vibrant forums? Haven't seen anything yet.
Also, I am not betting on a thief or someone who found the phone to be able to get to recovery, I'm worried about who these people might know. It's surprising to see how many people out here think that they are the only person in a 20 mile radius who knows how to do such mods... Maybe it's just the people I know but I know quite a few people who can easily google and find a way, easily.
I can bet that 90% of people here do not know anything except following directions, no pun intended to those who do. I definitely do not know half of what I should know, but again, is it really that hard?
Your own logic defeats what you are saying here. Don't you understand OP?
If there is a security measure, there will be a work around it? So why have more than ONE thing for the uneducated masses and stop there?
If the person who steals your phone knows someone who could get around WaveSecure, or any other security application. Then that same person can get around ANY AND ALL other types and forms of theft deterrent. If not, they will know someone, ask on forums, etc. UNTIL they gain access.
zaduma
Then why have any security on anything at all?
You my friend make no sense, good day!
jzero88 said:
Then why have any security on anything at all?
Click to expand...
Click to collapse
Ok, I will lay it out as simply as I can man. I do not want to argue, but you are missing why this is impossible to accomplish.
The existing security layers can be compromised by lets say... 10% of the population, seeing as most people who are thieves do not talk about it, most people dislike thieves.
So effectively 90% of people will be stopped dead in their tracks by having WaveSecure, etc.
The 10% who are not stopped however, can not be stopped by any means. None. They are the people who read these forums, have technical ability, etc.
Therefore having one layer of security means 90% of people are stopped from using your device. But it has ridiculously diminishing returns. With two layers, say stopping access to recovery, 10% are now stopped. Just boot into download mode and flash with odin. Stop download mode? First of all how? Second of all, there has to be a workaround for people who forget their passwords and stuff. And guess what, those 10% will know about that as well.
So please, address these issues and resolve them somehow, and your idea has merit. Without doing so you are wasting your time.
Also, much to your liking I will assume, I will no longer be posting in this thread due to your constant elevation of flaming.
Any security pro will tell you, if you have physical access to a computer, you can make it usable for you. The only real security you can hope for its to prevent access to your data by the thief. That's what full disk encryption and such is about. For our phones, we could achieve this much with a custom kernel perhaps, but how would you enter the password? No keyboard at that level.
The cellular providers can prevent the stolen phone from getting on their networks, and some do, but that's about as far as it goes.
Its like having a lock on your front door.. Its only going to keep out the honest people... Thats what they are made for, honest people, because dishonest people will just kick the door in.. And the good thieves can pick a dead bolt...
Sent from my SGH-T959 using XDA App
I'm starting to think this request/question is for the wrong crowd, truly it is...
If you build it they will hack it... Hands down... Look at the droid x, the unhackable phone, it took 5 weeks..
Sent from my SGH-T959 using XDA App
I agree, never did I not. This thread wasn't to debate whether a security measure could be hacked or not, the thread was created to see what we could do to implement such a measure.
I am totally aware of that. I know that if there is a will there is a way.
PERSONALLY, that is something I wouldn't mind having. Though some of you disagree and have a right to your own opinion, that is beyond the point. I am trying to see if a) is it possible. and b) what it would take to do so, and possibly c) if anyone was interested in trying or helping out.
So feel free to express your opinion. Mine is that you can never have enough protection cuz I would never bring a knife to a gun fight. But that's just me...
BTW, those who hacked the unhackable phone I would consider being part of the .01%.
jzero88 said:
I'm starting to think this request/question is for the wrong crowd, truly it is...
Click to expand...
Click to collapse
If you mean people that know how things work, I suppose. It's the same problem as drm. When you understand why that's not possible, you will understand this. Read up on jtag as well, you can't protect against that. 90% is about as good as it gets.
Hey XDA!! I came here because I know you're quick to deliver the help. I'm not sure if this should go in Q&A or the Development section, and you'll see why in a bit.
A friend of mine (we’ll call him M for ease) recently came to me with a concern. His coworker's ex-boyfriend has been hassling and harassing her using her Android phone. **BEFORE I go any further, YES I have suggested that the proper authorities get contacted.** At first he was allegedly sending texts to MY friend via the girl’s phone. He had some forwarding/spy type app (that’s all I could figure out from some research) on her phone that would allow him to text it, and then those messages would forward to M as if they came from his coworker. I have no idea how he could have done that, and I couldn’t find a lot of apps in the play store that seemed to have similar functions.
But now, he is apparently trying to get the poor girl to install a GPS tracker on her phone (unwittingly, I assume) so he can, well, know where she is. M can’t tell me the name of this app because he’s unsure.
So at this point I’m thinking that we not only have someone who’s being evil, but who is *maybe* making his own apps to stalk and get this girl, and my friend, in trouble at work.
I found a GPS spoofer on the play store https://play.google.com/store/apps/details?id=com.lexa.fakegps&hl=en I have offered to help root phones and install this and do whatever is necessary to get this guy off their backs. I can test it all day long since I have a rooted device—my question is, I don’t have a spy app to spoof, nor do I know what exactly I’m trying to spoof, so how do I know this will be helpful?
I’m also considering finding a custom ROM and helping this girl lock her phone down more. Or telling her to call her carrier and change her number. Beyond that, does XDA have any suggestions or advice? I’m not a coder, but I can follow directions to change things if you tell me exactly where to go and what to change (i have dabbled a teensy bit in android source code before breaking my phone >_>)
The girl has a Samsung Dart, I’m currently unsure of the version of Android it’s running, but should find out soon and will edit the post.
Thanks for all the help!
You can format the phone and see if that works. Plus there are many text blocker apps on market.
Hope i helped .
Sent from my GT-S5360 using xda app-developers app
Yes ,I patiently read the entire story! Wipe the phones data !
As far as the text problem you said I don't think there is anything like that which could receive an sms from a number and then forward it to another number. So there are two options either the girl sent the text or the guy semt the text with a spoof number!
And as far as the GPS is concerned, one doesn't need a GPS tracker to know where one is! Just Google maps is enough if the guy has the girls mail in his contacts. Ask her to change the mail id it should be enough!
Sent from my GT-P3100 using Tapatalk 2
Hello,
Long story short, I am pretty sure my child has a serious problem that he is refusing to share for some reason (I'm getting the idea that he's not allowed to). I am afraid he'll enter clinical depression if I couldn't help him. I am pretty sure I will have an idea about what's going on if I could get my hands on his whatsapp chat with a specific contact. Is there any app that can do that? I read StealthGenie can do that but it's very expensive ($110).
Any help will be much appreciated.
Thanks
PeritoX said:
Hello,
Long story short, I am pretty sure my child has a serious problem that he is refusing to share for some reason (I'm getting the idea that he's not allowed to). I am afraid he'll enter clinical depression if I couldn't help him. I am pretty sure I will have an idea about what's going on if I could get my hands on his whatsapp chat with a specific contact. Is there any app that can do that? I read StealthGenie can do that but it's very expensive ($110).
Any help will be much appreciated.
Thanks
Click to expand...
Click to collapse
If his device is rooted, the database whatsapp stores the texts is in plain text... But that needs you to have his device in your hands anyway so thre must be a more simple solution. Oh, I read the stealthgenie stuf, the phone needs to be rooted anyway to get it to work with whatsapp so it needs to be in your hands. Meaning you should be able to read the whatsapp just by holding the thing.
We have been through five phones -Samsung Galaxy, then Motorola, two internet providers two cell phone providers, made so many calls I have lost count. He uses Chromebook and a Motorola Droid phone. He has even hacked my old home phone, tv, you name it, he has tried to own it . Oh, I forgot-my home security and ring doorbells also. I can change an app permission and I can see him go right in and change it back. I am sure he lives close in the neighborhood How do I get rid of this horrible person?
He grays out permissions, default apps, etc., Which keeps me from being able to delete an app, or change someone being able to access in the background. He has confiscated our emails (Gmail), prevents us from sending or receiving ones he doesn't like. He uses email for email on the web, advertising, chat, and many other things. He listens to phone calls steals all photos, maps addresses to companies or people in contacts, uses maps for ?? Xxx an anyone help me, or at least tell me how to reverse graying out on apps? This has become unbearable! Thank you!
How do you know it's a he?
It's always the girl next door.
Lol! I cannot prove it, but the big gamers nextdoor moved in when this started happening. Their best friend is an experienced IT guy who only appears when I have gone in and changed things. In those days, new changes happen, such as Ring doorbells hacker, etc. Not blaming, but coincidence?
blackhawk said:
How do you know it's a he?
It's always the girl next door.
Click to expand...
Click to collapse
Sorry. See reply in post.
Bro, I'm so sorry. My husband has been going through this VERY thing for the past year. They don't mess with mine. I just wanted to let you know even though I don't have any resolve for you, I hear you and know that it's not phony and we totally feel for you. Seriously, maybe you and my hubby can talk. I'm so sorry that you're going through it. Feel free to message me.
This sounds like a great fan fiction and will bookmark this to see how the story develops. Thank you for putting this in Moto G Power section right where it belongs!
Sounds like you might need to invest in a router with better security features.
Moosetears said:
This sounds like a great fan fiction and will bookmark this to see how the story develops. Thank you for putting this in Moto G Power section right where it belongs!
Sounds like you might need to invest in a router with better security features.
Click to expand...
Click to collapse
Definitely not fiction. It is a nightmare and could REALLY use some advice!
gunnshot81488 said:
Bro, I'm so sorry. My husband has been going through this VERY thing for the past year. They don't mess with mine. I just wanted to let you know even though I don't have any resolve for you, I hear you and know that it's not phony and we totally feel for you. Seriously, maybe you and my hubby can talk. I'm so sorry that you're going through it. Feel free to message me.
Click to expand...
Click to collapse
It has been a nightmare! They started with mine, and have now invaded my husband's phone also.
Scammed said:
It has been a nightmare! They started with mine, and have now invaded my husband's phone also.
Click to expand...
Click to collapse
Why are you posting on XDA? If you are this convinced that someone has unauthorized access to your devices, you need to be talking to law enforcement. The best advice we can offer you is to change all your passwords immediately, enable 2 factor authentication, and if possible seek a restraining order. XDA is a smart device hacking and development community, not a private investigation service.
V0latyle said:
Why are you posting on XDA? If you are this convinced that someone has unauthorized access to your devices, you need to be talking to law enforcement. The best advice we can offer you is to change all your passwords immediately, enable 2 factor authentication, and if possible seek a restraining order. XDA is a smart device hacking and development community, not a private investigation service.
Click to expand...
Click to collapse
I didn't think you were a p.i. firm. Obviously, I am not tech savvy. A little kindness please? I simply want to know how to ungray grayed out app permissions. I have searched on my own and cannot find the answer. I have reported it to local police, state police, Motorola, Samsung, Verizon, Xfinity, metronet, on and on and on. No help from anyone. I don't have $2,500.00 to just put down a retainer for a p.i. I knew someone on this forum would know the answer I am searching for and might kindly tell me. Thank you.
Scammed said:
I didn't think you were a p.i. firm. Obviously, I am not tech savvy. A little kindness please? I simply want to know how to ungray grayed out app permissions. I have searched on my own and cannot find the answer. I have reported it to local police, state police, Motorola, Samsung, Verizon, Xfinity, metronet, on and on and on. No help from anyone. I don't have $2,500.00 to just put down a retainer for a p.i. I knew someone on this forum would know the answer I am searching for and might kindly tell me. Thank you.
Click to expand...
Click to collapse
Well, it can be hard to distinguish the difference between reasonable concern over privacy violations vs unwarranted paranoia, and you aren't the only one who's come to XDA with this type of story. Most of your assumptions are likely mistaken and can be simply explained by the nature of Android itself.
Remote intrusion of mobile devices is actually pretty rare. The most common ways bad actors get ahold of sensitive user information are: phishing, user-approved permissions on questionable apps such as TikTok, and "connected" social media accounts, where users allow websites and apps access to their social media profiles, or use their social media as a login.
Regardless, to the technical point of the matter, grayed out app permissions are not the result of hacking or surreptitious malfeasance, but rather the nature of the "rules" inherent to Android - you can't remove system apps or disable system-controlled permissions without root.
If you still think you have reasons for concern, this is my only suggestion:
Change your phone number
Immediately change all relevant passwords - minimum 10 characters, a mix of upper case, lower case, numbers, and special characters, do not reuse them
Enable 2 factor authentication on all accounts, ensuring your 2nd factor is something that you and only you have access to
Once done, sign out all devices signed into those accounts
Perform a factory reset on your device; even better, reflash factory firmware. Keep bootloader locked.
Do not use questionable apps