ZTE Z982 Blade Z Max - FRP Locked Needing USB Debugging Or ? - Android Q&A, Help & Troubleshooting

Hello,
I have spent the better part of 24 hours trying to read up on anything and everything to do with FRP in general. I have admittedly always been a user of another brand I wont mention but not Android lol.
My question is this....is there currently any option to enable USB debugging, turning OEM off, using adb, etc on a FRP locked ZTE Z982?
I can use the bypass. And I have made it into the Settings however clicking on Build Number does NOT enable developer mode. I tried something about dialing *983* and some other numbers and then trying some GSM tool but never got anywhere with that because I am convinced it isnt being recognized by the computer.
I have tried every .apk ROOT out there thinking that may get me somewhere but that doesn't work either. I read something about combination files or something but ill admit I have no idea what that is and wasnt able to locate any information. I tried looking for a stock ROM but doesn't seem to exist and again even if I did find one, how would one flash it onto the device without USB debugging being enabled?
So essentially is this device a nice paper weight unless I wanna use it to take pictures and watch YouTube? Or am I totally missing something to get rid of this FRP and not just a bypass?
Thank you for any helpful replies.
Any advice would be appreciated.

As of today, your options are locating a seller on eBay that can do the unlock remotely. There's a few, but obviously choose one that's highly reviewed. Last I checked, the seller I used back around Halloween had lowered his price from $20, to just $15. Don't remember his name, but he had around 1300+ reviews, 100% positive feedback. I passed on the same info to another person needing help and they were able to locate the same seller quite easily, they said.
Your other option is to purchase this same software, this seller uses, which costs ~3x as much and do it yourself. You'll then have the option to unlock other phones as well, along with a vast amount of other services, which is pretty cool too, if you're wanting to take on a side gig, offering these types of services to others, making some extra money and recouping your initial expense spent on it.
There's a few other hardware based options to unlock devices, however they're considerably much more than this software, which only requires a PC and USB cable. Due to the purposes/intentions of the software, I'm hesitant to mention it's name, however it's the only one of its kind requiring simple household items that most have in their homes, so a quick Google search should easily reveal it for you.
Good luck to all still having this issue

Related

story: DeOdEx DISASTER

Deodex Disaster
by Thundercles
I dedicate this story to the fact that I have finally for the first time ever been sold an extended warranty/protection plan that I didn't feel ****ed me somehow in the end.
first off tl;dr is; I could really really use a photon 4g box. If I get one within the next week or so I can get a brand new phone and not have to worry about unbricking mine, which should be more then entirely possible to unbrick, just a pain, and actually is close to impossible to unbrick until I get a working battery since no flash utils will run without a well-charged battery. If you have the box left over from when you got the photon 4g and you could part with it, let me know, I'd love you long time. If you are in the phoenix area and you could part with a photon 4g box PM me your phone number and I'll call you and come to you wherever in the entire extended phx metro area you are in to get it. I just drove to freakin Anthem from Tempe to buy a battery that doesn't quite fit. All thos sites that say the BH5X battery fits in the electrify/photon are damn liars btw, it so doesn't.
I will type the sad story of how I thought I remembered how to manually deodex correctly and as a result just went for it only to find out that my memory ****ed a step up somewhere in there, maybe left one out altogether cause when I rebooted it wouldn't go past the inital screen, probably cause it wasn't able to load the framework and app directories thanks to my shenengins. To make matters worse right in the middle of this crisis is when my battery desides to completely **** a brick itself and is fully unresponsive in every way shape or form and will hold maybe 10 seconds worth of charge if you are in fastboot mode, but wont even be able to draw enough charge to display anything on the screen unless plugged into the wall. Ya battery is beyond toast, Went to exchange it with my protection plan from best buy and they informed me that things with that protection plan are handled by mailing out the defunct whatevers and getting the new ones mailed back, but that since I am within my initial 30 days their exchange policy would allow me to just trade the whole kit and kaboodle in for a brand new still in the box and shrink wrapped photon. This was the more attractive option since I wouldn't have to unbrick it and the battery would be brand new and any damage I may have done would be undone.
Problem is box got thrown away, it's not my fault either I specifically said that the box should be kept for now, but didn't feel up to fighting any battles over it that day and now have screwed myself royally as a result of my pacifism. The box specifically is what the chick was being anal about, I'm susppsing cause of the barcode sticker on it. If you are the angel who winds up giving me a box so I can just go to best buy and do the exchange rather then mail my battery in and wait, don't worry I can remove your sticker in tact and remount it on some card-stock for you or something. I'll just want to scan it real fast first to construct the template for my replica sticker containing my phones info. Got all kinds of specialized printers, barcode fonts, sticker maker, envelope label sticers, got everyting I need to make this replica just need a box to put it on.
So charging the battery via stripping the wires on the USB cable method won't work? Our your battery is completely fried?
I got a box, I will PM you (Screw it, I dont want to type twice) David Sims, e-mail me your addy and phone at [email protected]. It should arrive monday!
I have 2 boxes because something (long story) happen to my original Photon, Insurance company sent me new one in box, but I still have the original box. Both are on the dresser in my bedroom because I'm too lazy to put it in the living room closet where the boxes to all my other electronic s**t is!!
I posted a guide on how to fix this type of brick, by jumping the battery.
dsims7_2000 said:
I got a box, I will PM you (Screw it, I dont want to type twice) David Sims, e-mail me your addy and phone at [email protected]. It should arrive monday!
I have 2 boxes because something (long story) happen to my original Photon, Insurance company sent me new one in box, but I still have the original box. Both are on the dresser in my bedroom because I'm too lazy to put it in the living room closet where the boxes to all my other electronic s**t is!!
Click to expand...
Click to collapse
sou like it was meant to be being as how my situation is really the inverse if you think about it. (need extra box or no insurance payout ) I am e-mailing the info to that gmail, adding to google talk, and G+ while I'm at it. I've been thinking about trying to found a NPO vcard/profile storage server so you could make yourself a vCard with all your relevent contact list and online profiling info along with security and privacy permiters so you could could give and get contact info from people that's all-inclusive instead of having all these people on android devices constantly smsing each other when they could be talking in google talk, thus getting more options like group messaging and putting less strain on the network, and you could set up your online profile ONCE and import it to all your freakin forum accounts, social networking accounts, torrent tracker accounts, anything that forces you to make an account and thus have a profile of some sort that you will probably not do a damn thing with because of how unneccesarily tedious it would be. Anyone know of any good grants for that kind of thing ? Or any drugs that make you actually stay on topic.
slawson said:
I posted a guide on how to fix this type of brick, by jumping the battery.
Click to expand...
Click to collapse
please reply with the {thread}thread#{thread} pointing me to this guide. This may restore my communications abilities while I eagerly wait for this box.

Att i527 Root

Ok guys come on this is driving me absolutely insane. Beautiful phone, no root all these work arounds because there is no root is driving me insane. Spent many many hours scouring xda and google for a solution. Maybe we need to think outside the box on this one remember Gingerbreak? I realize on a software level we have only standard user access, but its just an OS theres gotta be something we can do. Who needs what to get this going? Im brave enough to do what needs to be done/tested on my i527. Im comftorable using any tools you need me to will provide promptly. My device is ATT Branded but it is unlocked and currently being used on MetroPCS with working lte and usb tethering
Downgrading
What is seriously stopping us from odin'ing or heimdalling this thing back to stock 4.2.2? Never in my life have a seen a device (phone pc etc) that could not be drastically changed by going to the hardware level. Thats the point of download mode right? bypassing the need for a sucessful initialization. This thing is just a Krait 300 cpu with a Qualcomm Snapdragon 400 soc, seriously nothing new or special about it. (yes i understand the bootloader is locked and encrypted)
Ive been doing alot of thinking about this device and it honestly reminds me of the old days when we ran embedded systems, with alot of those embedded systems theres was no hardware level access what so ever, but there was always a way. Ive done numerous GPS's, Car stereos etc. All running windows embedded with no hardware level access and were able to bypass system software with ease. i realize yes it was windows embedded but the principal is still the same, not much has really changed since then. (yes i know ALOT has changed but not really all the same rules/principals apply) What we are dealing with seems to be software based encryption in the firmware of the device. With a computer I think of a couple things 1. with a bios password you screwed up on what do you do? reset the cmos...this is obiviously out for obvious reasons. 2. update/restore/bypass that bios Got a problem with the bios or screwed up restore it, done. (once again I realize these are not like a standard pc just comparison thinking outside the box remember?) Id really like to see this device flashed back to 4.2.2 then twrp'd or cwm to whatever we want from there.
Whats the real problem here?
Been asking myself what is the REAL problem? I dont mean, root or locked bootloader. What is really stopping us? Answer is super simple yet complicated. User Account Permissions We need rw access to that system folder. Via terminal on the device im able to mount /system as rw but any further changes are useless usually result in a bad mode error. Maybe we need to call in a black hat boy and give us an account exploit for at least software level (os root is better than no root right?)? Ive got some friends in high places in security working for that wonderful DoD, ive been in the game a long time can keep up with most of em but i went networking not security.
Come on people Ive never seen this community give up on something like this before! Yall got me started on all this with my ppc6700, and this bump in the road just makes me wanna lift the civic up a bit so we dont scrape and hit it at 30mph.
In the words of Young Jeezy:
If you grind hard enough
You could stack a few mil' nigga make it out the streets like me
If you grind strong enough
You could be a trap star nigga be on TV and keep it G
If you grind long enough
You could take care of your nephews and your nieces and your moms and your girl
If you grind hard enough
You could stand on top, tell these hatin a** niggas It's Tha World
Its all you man, knock yourself out. I was optimistic for a year. Longest year of my life. I got parolled and then liberated from Samsung.
It was malnourished from the get go, designed as an affordable big screen device. But very average.
Get out now my friend.
Sent from my Nexus 6 using XDA Free mobile app

[ARTICLE/OPINION PIECE/GUIDE] Security Flaws and How To Fix [Some of] Them - Axon 7

What ZTE has done with the Axon 7 is nothing short of incredible. An SD820 processor, 4 GB of RAM, Front-Facing Stereo Speakers, a 5.5" QHD AMOLED panel, MicroSD/Dual-SIM support, and a fingerprint sensor. You will not find this combination on any other phone with an unlockable bootloader or CDMA support. After getting to know the device’s security, I was less than enthused. Some things, which I would consider basic features, are missing. Other [system level] security features have been altered to the point where they are useless - or at the very least handicapped. I sought to fix those problems. In sharing what I have found, I seek to help you secure your device.
A few things, going forward…
This article is written with B29 in mind. The Nougat update has just been released and I hope that it has addressed many of my concerns. With that having been said, whip out the tin foil and fashion yourself a hat.
As I write this, the fact that I am about to list security problems with this device gives me pause. I was able to find reference or information about most, but I have found problems that I have not read about anywhere else. In effect, an unscrupulous individual could use information in this guide to compromise an unsecured device. Also, while proofreading this, I was compelled to add that I am not your lawyer. I am not here to help you cover illegal activity or shield you from legal action. At the end of the day, I cannot be responsible for the actions of another. I provide this information, in good faith, to help – not to hurt.
A word on mobile security in 2017 - especially in our current political climate.
There is no going back. We use our devices for everything from paying our bills to submitting job applications. Information that your grandparents would have kept locked in a safety deposit box is now routinely transmitted at the speed of light from your device to a remote server. Given the nature of electronics and storage, if you lose possession of the device, there is no guarantee that a skilled individual could not forcibly extract and reconstruct it. Under our current leadership, surveillance laws will be expanded in the name of security. The requirement for a warrant to forcibly extract data from a device will become more lax than it already is. The operative thought process from those in power is that, ‘if you have nothing to hide…’
Second, law enforcement:
I do not want to get into this too much. I see no way to effectively describe the problem with less than a few paragraphs; So, here we go:
With regard to your tech, the Fourth Amendment is dead. Your best defense is a secure device. Reports of police officers cloning the internal storage of Android devices on the side of the road with nothing more than a black box and a data cable are rampant. In reality, the Police have been collecting ‘analytical’ data from devices for years. All of the information is input into databases, where it can be cross-referenced and used for other investigations. Google ‘Cellebrite’ for more information about this. They are one of the leading forensic software companies. Reading about what can they do is truly disturbing. Be advised that the information on their website about compatibility and capability is not up-to-date [or complete] - for obvious reasons. For this reason, I would recommend keeping USB Debugging disabled on your device when you’re not using it.
Last year, I read a police report/legal ruling where a judge granted a police agency complete power to collect enhanced biometric data on everyone in a residence while executing a search warrant for drugs. I cannot delve too deep, but essentially, there was a device and the prosecutor had some doubts that the owner of the device used their own fingerprint. Enhanced biometric information collection was authorized [and executed] for all individuals in the household. This is a more extensive data set than what is stored by the fingerprint enrollment on Android/iOS. Tech. exists to pass this collected information to the pad sensor on your device. This was a clear violation of the Fifth Amendment if they used the information to crack open the device after the owner refused to type in their password. Because of the adversarial nature of our legal system, no one will complain until someone does something about it. The case received no attention from the press. I was never privy to the outcome, but it was clear to me that they really wanted to unlock that device.
We all have stuff to hide. Whether it is personal, criminal, whatever… The reality of our legal system in this country, combined with its age, has resulted in such an extensive set of laws that you are almost certainly violating one as we speak. Did you know that it is illegal for a man with a moustache to kiss a woman in Eureka, Nevada? See what I mean? This is [obviously] not enforced, but piss the wrong person off and watch how quickly a dumb law can serve as a pretext for investigation and discovery. See Twitter: CrimeADay for a bizarre list of Federal crimes which remain enforceable to this day. Even the most well-intentioned person could inadvertently incriminate himself or herself when surrendering their device. This is all very fascinating, and probably will never happen to you, but no one wants their device to be subject to random searches. Legal information, trade secrets, etc. can be just as damaging as incriminating information can be. Additionally, all of the data they collect leaves your protection and is subject to their storage, security flaws, breaches, and decisions to sell it in the future. If you choose to surrender your data, that is your call, but I seek to make sure that it is never by force.
Now that I've given you a headache, let's move onto the biggest security flaws that I’ve found:
ZTE has removed the ability to encrypt the internal storage on B29. I do not know if this was fixed with the B15 update, but this alone made the phone unusable for me. Several apps that I use will not even start if there is no boot time encryption password set. While I’m inclined to blame the apps, I completely understand why they won’t work. Some information is too sensitive to be stored on unencrypted media.
ZTE has altered the default security behavior of Android to allow the fingerprint sensor to unlock the device, even if it has just been rebooted or locked by a Device Admin. Again, I do not know the latest update addressed this. This feature is a last resort stopgap against your data being stolen under duress. You can refuse to type in a password, but your fingerprint can be forcibly/unknowingly used to unlock your device. I’m sure that more than a few of you have seen the Vines where the suspicious female attempts to use her man’s finger to unlock his device while he’s sleeping. I was unable to fix this, and it ultimately led me to abandon ZTE’s iteration of Android.
The bootloader can be rolled back and unlocked by anyone, allowing low-level access. From here, it is not difficult to reconstruct data that is left over by the insecure factory reset process after unlocking. However, this would probably be more useful to a thief than to someone who was after information. While this is cool for us from a development standpoint, it is also a security and anti-theft nightmare.
The power menu is accessible from the lock screen. While I’ve never seen a stock version of Android lock this down, the airplane mode function is available from the power menu on ZTE’s flavor of Marshmallow. This has the unfortunate effect of bypassing any anti-theft protection on the device that requires connectivity. We will address this and as many of the aforementioned items as we can.
Custom ROMS, Bootloader Unlocking
After careful consideration, I concluded that the only way the completely guarantee the security of my device was to use CyanogenMod/LineageOS. CM has some undesirable attributes, but [in my opinion] the positives outweigh the negatives. Let's just say that I eagerly await a fully functional AOSP build. However, CM allows encryption and requires the device’s password to be entered after rebooting or locking with a Device Admin. In order to do this, the device’s bootloader must obviously be unlocked.
Post-Unlock Security, Root, and What about my warranty?
Most security conscious individuals will probably tell you that unlocking your bootloader or rooting your device is the worst thing you can do for your device’s security. I submit to you that your device’s security is already broken. With the help of this site and a few easily accessible resources, the security that your locked bootloader affords you is useless. By encrypting your /data partition, you will be increasing the security of your data by an infinitesimal factor -- assuming you use a strong password. With regard to root, the human element remains the weakest link in the chain. Having your bootloader unlocked and your device rooted might make it easier for a knowledgeable person to reset and use the device after relieving you of it, but if your device is set up properly, your data is just as safe – if not safer than it was before.
The biggest consideration is warranty. In my opinion, any manufacturer that denies a legitimate hardware-related claim on the grounds of your bootloader being unlocked is not a company that should be supported. However, it ‘is what it is’ and time will tell how ZTE will treat its customers. The choice remains yours.
Password Strength
Using a separate encryption password is a wise thing to do. Pay attention to what keyboard you're using when you type your password in...
Do me a favor. Go to this site and check your password strength. http://calc.opensecurityresearch.com/
Under keys per second, select 'Custom' and paste
Code:
1999999999999999999999
That is very close to where we are, without going over.
The Fixes:
Please forgive the breakdown of writing style from this point forward.
/data Encryption:
The only remedy for this is to encrypt the internal storage on CM and then to reinstall B29. Unlock your bootloader, install TWRP, flash CM13, boot the device and encrypt it. From here, [if warranted] you can reset the encryption password to whatever you want it to be by running
Code:
vdc cryptfs changepw password 'old_password_here' 'new_password_here'
Reboot to TWRP, wipe everything, but do not ‘Format Data’ or Factory Reset. Perform an ‘Advanced Wipe’ and wipe everything. Reinstall B29, and you’ll be prompted for your encryption password whenever you boot your device! This alone will protect your data from forcible extraction and reconstruction after the device is factory reset.
Fingerprint Sensor Unlock Policy:
Use a different version of Android. I tried everything. Locking the device with a Device Admin, killing the services using ADB while on the lock screen, unloading drivers, etc… For some reason, the damned sensor just works all of the time. Any insight on this is greatly appreciated….
Bootloader Rollback:
The B15 update contains a newer version of fastboot that, as I understand it, is fake and does not accept fastboot commands. I will be investigating the implementation of this. This would still be subject to replacement by the working version… So, it may only slow a determined intruder down.
Lock Screen Power Menu/Airplane Mode:
There is probably a way to kill the power menu when on the lock screen by editing some resource or another. My solution utilized Tasker. Disable Tasker’s battery optimization in the Android system settings. A more comprehensive write up might be forthcoming upon request, but essentially, you would do:
Code:
2 (3rd/4th optional/troubleshooting) profiles/tasks to maintain a variable as to whether or not the device had been unlocked.
Event (Display Unlocked) -> Clear Variable %Locked
Event (Display Off) -> Set Variable %Locked To 1
State (Display Off) + State (Variable Value %Locked Doesn’t Match 1) -> Set Variable %Locked To 1
Event (Device Shutdown) -> Set Variable %Locked To 1
1 Profile/Task to disable Airplane Mode
Event (Variable Set, Airplane Mode Status, value=’on’) + State (Variable Set, %Locked, value=’1’)
From here, you can either tell a task to wait a specified amount of time to turn off Airplane Mode, have Tasker immediately turn it off, or flag a variable that will be looked for the next time the display is turned off. I would suggest having the last profile set a variable, such as %DisableAeroplaneMode=1. Then do,
Code:
Event (Display Off) + Variable Value (%DisableAeroplaneMode, value=’1’)
|-> Wait 5 Seconds, Turn Off Airplane Mode, Clear Variable %DisableAeroplaneMode
And/Or
State (Display Off) + State (Variable Value, Airplane Mode Status = ‘on’ & %DisableAeroplaneMode = ‘1’)
|-> Wait 5 Seconds, Turn Off Airplane Mode, Clear Variable %DisableAeroplaneMode
By doing it the way I have laid out, where the device waits until the screen is off, the would-be thief is tricked into thinking that he has disabled the device’s connectivity. The task will repeat as many times as the attacker toggles Airplane Mode. This will not stop the attacker from powering down the device, but may give you the extra minute you need to send the self-destruct command or locate the device. The optional tasks assure that your wishes are respected even if the Display Off events are missed -- which happens.
In conclusion, ZTE should really take a hint. Don’t cheap out on security. If something is working, and has worked for a long time, there is no reason to change it. Alternatively, to employ the age-old aphorism, if it ain’t broke, don’t fix it. I hope to have given everyone something with this write-up. A true 'pick and choose' philosophy way be the best way to proceed from here. There is no such thing as a truly secure piece of tech, and there is no such thing as a secure device that is also convenient to use on a daily basis. Take care, all.
This is my first thread in my 5 years of of XDA membership. Feedback is much appreciated.
Physical security of this device was gone the day that tenfar released the boot/recovery flashing tool. That sends the signed firehose over the USB connection, which can be picked up and used by anyone who knows how (eg. tennear). Your *only* security on the device is encryption. Period.
And just so you don't feel too bad about this, you can bet that law enforcement has, or can subpoena, the firehose from any manufacturer.
Moral: always encrypt and use a strong password. That at least gives you *some* chance of security.
Very interesting read. There's very little privacy in the connected society we will live in. Who needs any kind of tracking device when the cell phone does that and so much more. In the older days (pre 2012?) one could fully shutdown the phone by pulling the battery. This is no longer possible with sealed/embedded batteries. One certainly hopes the phone is truly off when powered down or transmitter is deactivated in airplane mode.
We've traded privacy for convenience. The other day a personal banker at my bank was trying to sell me on mobile banking. How easy and convenient it is to deposit a check or transfer funds. No thanks. Just don't trust android enough to install any finance related apps.
If you leave your wifi on, the phone scanning for an AP reveals enough about itself to be a tracking marker.
IMO, best security for a mobile device is not to contain any confidential information in the first place. There won't be anything to reveal should the device become compromised.
A fantastic read, very appreciated, thanks for your work.
I know that, amazing piece of hardware, with very poor software development, with all the rumors confirmed: terribles mistakes in almost any software aspect's.
Thanks again and please, write more often !
Great write up.
I'm on B15 and when you set a pattern lock or pin it asks you if you want the device to require the pin/password/pattern on startup. So there's some change there. I have a pattern set and after reboots it does ask me to unlock it before finger print will work.
Airplane mode still accessible from the lockscreen on B15.
LineageOS 14.1 for ZTE Axon 7
QuantumFluxx said:
What ZTE has done with the Axon 7 is nothing short of incredible. An SD820 processor, 4 GBs of RAM, Front-Facing Stereo Speakers, a QHD AMOLED panel, MicroSD support, and a fingerprint sensor. You will not find this combination on any other phone with an unlockable bootloader or CDMA support.
Click to expand...
Click to collapse
Agreed. Especially the 5.5" 1440p AMOLED display. We have enough 5.5" 1080p slabs from the budget Chinese companies. ZTE "gets" it.
I wish Google had bought a MILLION of these, loaded on Nougat and sold them as the Pixel XL. The specs put Google to shame, and they charge twice the price.
If only ZTE had included wireless charging I would have bought 3 of them immediately. For now, I'm sticking with my 2014 Moto XT1225 -- basically the 5.2" version of the Moto Nexus 6, but with a BIGGER battery:
5.2" 1440p, Snapdragon 805, 3GB RAM, 64GB internal memory, Qi wireless charging, Qualcomm Quickcharge 2.0, 3900 mAh battery. And yes, I have three of them.
QuantumFluxx said:
The only remedy for this is to encrypt the internal storage on CM and then to reinstall B29. Unlock your bootloader, install TWRP, flash CM13, boot the device and encrypt it
Click to expand...
Click to collapse
CM13 is abandoned. Surely you mean CM/LOS14?
[OFFICIAL]LineageOS 14.1 for ZTE Axon 7
https://forum.xda-developers.com/axon-7/development/unofficial-lineageos-14-1-zte-axon-7-t3545679
You just wrote this three days ago. You don't know this?
ChazzMatt said:
CM13 is abandoned. Surely you mean CM/LOS14?
[OFFICIAL]LineageOS 14.1 for ZTE Axon 7
https://forum.xda-developers.com/axon-7/development/unofficial-lineageos-14-1-zte-axon-7-t3545679
You just wrote this three days ago. You don't know this?
Click to expand...
Click to collapse
I was aware. I'm even running LOS on my Axon I have personally set up an encrypted /data partition on CM13 (MM) and then reinstalled B29 (MM) without formatting /data. I haven't tried using CM14/LOS for the first step of that process. Since the recently released B15 (Nougat) update seems to have addressed the missing encryption option, this guide might mostly be deprecated -- or only useful to those who choose to remain on B29. I would not recommend using Nougat to set up a /data partition for a Marshmallow system.
This.. was very interesting. I've decided I'm not gonna buy the device until they fix this. On the other hand, my bullhead has *no* encryption as boot encryption is too much of an annoyance to me. I'm waiting for TWRP to support file-based encryption on my device (hopefully WITH f2fs) so I can contain my speed within good security. Also, on AOSP the data CAN be turned off from Quick Settings, unfortunately. I could just remove it from there I guess... (but I need to keep a watch)
I suspected that something is a miss with the device when I got it yesterday, but didn't have the time to check it out why exactly I don't see the expected encryption settings...
Saved me a lot of time and research.. Thanks for that.
Good thing that I'm actually renting the device and didn't actually bought it... I guess I won't be keeping it..
Considering ZTE has been in the frying pan by US Congress, the FBI, etc. for the past 5 years, I'm not surprised they'd make a phone our government would love everyone to get but... not use themselves. Just be glad you were able to get a fancy cheap phone to put LOS on at the moment considering Congress only recently (this past summer) gave ZTE a temporary halt on their sanctions to do business in the U.S. I read a lot before clicking "buy" but decided to pull the trigger because it is a sweet phone. Before I first used it I scanned it with practically every major antivirus and malware product, put it behind a pfSense firewall running Snort, scanned it network-side with Nessus... I'd do more if I could.
https://www.nytimes.com/2016/06/03/technology/huawei-technologies-subpoena-iran-north-korea.html
http://intelligence.house.gov/sites...s/huawei-zte investigative report (final).pdf
https://www.nytimes.com/2016/03/19/...uestions-about-huawei-and-sanctions.html?_r=0
http://techonomy.com/2013/04/huawei-zte-banned-from-selling-to-u-s-government/
https://www.theguardian.com/technology/2012/oct/08/china-huawei-zte-security-threat
http://www.phonearena.com/news/Huawei-ZTE-may-be-doing-espionage-for-China_id35269
http://www.chinausfocus.com/finance...chinese-telecom-giants-conflicts-with-the-u-s
https://www.cyberscoop.com/android-malware-china-huawei-zte-kryptowire-blu-products/
http://www.fiercewireless.com/tech/...irms-be-allowed-back-into-u-s-wireless-market
... I could go on. Literally Google Huawei and ZTE in the same search and you get this stuff.
I remember reading about Huawei's involvement in this, but not ZTE's. Corporate greed, corporate greed, corporate greed.... I guess we should all be very aware of this and any developments. Please advise us of anything you come across that doesn't look right.
jawz101 said:
Considering ZTE has been in the frying pan by US Congress, the FBI, etc. for the past 5 years, I'm not surprised they'd make a phone our government would love everyone to get but... not use themselves. Just be glad you were able to get a fancy cheap phone to put LOS on at the moment considering Congress only recently (this past summer) gave ZTE a temporary halt on their sanctions to do business in the U.S. I read a lot before clicking "buy" but decided to pull the trigger because it is a sweet phone. Before I first used it I scanned it with practically every major antivirus and malware product, put it behind a pfSense firewall running Snort, scanned it network-side with Nessus... I'd do more if I could.
Click to expand...
Click to collapse
---
I'm so sorry to have played a part, but I am very glad that you were able to find all of this out before the end of your return period. At least, I assume that you're going to return it
I wrote this piece because I couldn't find something comparable on XDA or the rest of the net. Just a one sentence reference, here or there, that says someone couldn't encrypt. You would think more people would have flipped out about this, but the average 'unlocker'/'flasher' has a very poor opinion of full device encryption.
apocalypse_bg said:
I suspected that something is a miss with the device when I got it yesterday, but didn't have the time to check it out why exactly I don't see the expected encryption settings...
Saved me a lot of time and research.. Thanks for that.
Good thing that I'm actually renting the device and didn't actually bought it... I guess I won't be keeping it..
Click to expand...
Click to collapse
---
Good luck with your upcoming TWRP update! P.S., From TWRP.me regarding the Bullhead
NOTE: Decrypting data does not work if you fastboot boot the recovery image. Decrypt works if you flash the recovery and boot it like normal. If you do not know what this means, you can ignore this note.
Click to expand...
Click to collapse
If you install the recovery image through TWRP and reboot recovery, have you had any luck? Dunno if I'm reading that wrong.
I believe that the Nougat update re-added encryption [for the Axon].
I can help you secure your quick settings while the device is locked. You need Tasker and root.
Go to a shell and do
Code:
settings get secure sysui_qs_tiles
and take notice of the output. We will call these your 'default' settings, hereafter.
In Tasker, you would set up an event that triggered whenever the display was switched off. You could create a timer, but that would be substantially more complex than just tying the functions to the screen state of the device. The next command you will need is
Code:
settings put secure sysui_qs_tiles xxx
where 'xxx' are the tiles you want to appear on the lock screen/after the command is executed (referred to as 'modified', hereafter.)
So, 1st: Event,ScreenOff->Code,RunShell 'settings put secure sysui_qs_tiles modified', Use Root
2nd: Event,DeviceUnlocked->Code,RunShell 'settings put secure sysui_qs_tiles default', Use Root
3rd: Event,DeviceShutdown->>Code,RunShell 'settings put secure sysui_qs_tiles modified', Use Root
You will end up with 3 profiles and 2 tasks. I have attached a screenshot. This is my configuration of the 'Run Shell' command that would be triggered by the 'DeviceUnlocked' event.
You could set up the two different configurations, i.e. edit the quick settings tiles to one configuration when the device is locked, and one configuration for when the device is unlocked. Retain the output of the aforementioned 'get' shell command for each configuration and use them as the 'default' and 'modified' variables for your shell commands.
I always find it extremely difficult to write about Tasker and maintain any sense of literary professionalism. My apologies for any confusion. I'm looking at what I just wrote, and....yeah.
I have the same thing set up on my device and I would be happy to provide the exported files, if you are interested.
LazerL0rd said:
This.. was very interesting. I've decided I'm not gonna buy the device until they fix this. On the other hand, my bullhead has *no* encryption as boot encryption is too much of an annoyance to me. I'm waiting for TWRP to support file-based encryption on my device (hopefully WITH f2fs) so I can contain my speed within good security. Also, on AOSP the data CAN be turned off from Quick Settings, unfortunately. I could just remove it from there I guess... (but I need to keep a watch)
Click to expand...
Click to collapse
---
Yes!!! I wholeheartedly agree. You are getting speed, reliability, support, and updates with the Pixel.
We got the speed.
We got the reliability.
We have XDA.
We finally got the updates. -- I'm on the January security patch on 7.1.1.
In short, the Pixel can remain on the top shelf. I can see no reason it is so expensive other than the fact that Google knew people would gobble it up. That's how Apple does things. smh. The Pixel (and the iPhones) are just not worth $700-870. I would pay 400$ for the Pixel and $549.99 for the XL. That is still overpriced, but much more acceptable. In my opinion, these companies would have you believe that these phones really are VERY expensive to manufacturer. From what I've heard/read, Apple is making about 200$ on every iPhone they sell. Over the years, with that amount of money coming in, there is ABSOLUTELY no excuse to release a phone with outdated hardware and inferior display technology.
By the way, your Moto sounds sweet I miss my XT1575...
ChazzMatt said:
Agreed. Especially the 5.5" 1440p AMOLED display. We have enough 5.5" 1080p slabs from the budget Chinese companies. ZTE "gets" it.
I wish Google had bought a MILLION of these, loaded on Nougat and sold them as the Pixel XL. The specs put Google to shame, and they charge twice the price.
If only ZTE had included wireless charging I would have bought 3 of them immediately. For now, I'm sticking with my 2014 Moto XT1225 -- basically the 5.2" version of the Moto Nexus 6, but with a BIGGER battery:
5.2" 1440p, Snapdragon 805, 3GB RAM, 64GB internal memory, Qi wireless charging, Qualcomm Quickcharge 2.0, 3900 mAh battery. And yes, I have three of them.
Click to expand...
Click to collapse
---
Thank you all for your kind words!
QuantumFluxx said:
I remember reading about Huawei's involvement in this, but not ZTE's. Corporate greed, corporate greed, corporate greed.... I guess we should all be very aware of this and any developments. Please advise us of anything you come across that doesn't look right.
---
I'm so sorry to have played a part, but I am very glad that you were able to find all of this out before the end of your return period. At least, I assume that you're going to return it
I wrote this piece because I couldn't find something comparable on XDA or the rest of the net. Just a one sentence reference, here or there, that says someone couldn't encrypt. You would think more people would have flipped out about this,
Click to expand...
Click to collapse
Well, I read up on all of it beforehand and then bought it anyways. Yeah, it was mainly Huawei - probably because ZTE isn't a household name in the U.S. Regardless, they never gave any proof of tampering with spying so I ultimately wrote it off as b.S. I really think the gov't just wanted to convince people to buy from our partner countries instead of China because China has been quietly buying up a bunch of U.S. businesses and property over the past decade. They're worried about our economy, really. All I know is I want quality and affordability and of China produces that I'm going to opt for it. It is true I've been screwed on some China purchases- namely Indiegogo campaigns recently.
As I have a 2017G, the latest version available is B10. I'm interested if someone from the US with Nougat can confirm the encryption situation. I highly doubt that they have very different builds for EU/US..
According to the official German(EU) support forum of ZTE, they have said that the encryption will be available in Nougat.

Broke LCD on Samsung Galaxy S6 NEED TO RECOVER PHOTOS!

So last week someone dropped a weight on my phone and broke the screen completely, I can no longer see anything on the screen. So Verizon's insurance company sent me another phone and I have to ship this one back however I have 2 years of photos on this phone that I do NOT want to lose. Does anyone know any ways to recover the ALL the files on this device? For some reason the finger print scanner doesnt work either so I can't really unlock it, and can't use the samsung page to unlock it because I already setup my new phone so I wasn't phone-less. Any information would be much appreciated and is welcomed; any way to buypass the lock or somehow just download the phone to my PC ect.
THANKS!!
Display repair or forensic data recovery from USF chip
If you have no prior access enabled, that is you have usb debugging (would be easiest) still in it's default off state, you have no custom recovery ROM installed, no screen mirroring solution that was installed at an earlier date etc. then really your only option is to go for the hardware.
Basically, you can either have the display replaced or pay a professional data recovery/forensics company to remove the internal sd card and backup the data from there.
Replacing the display is the less expensive choice. It will cost around 250 Euro where I live. If you want to try it yourself, the mere hardware will cost around 100 Euros (that's for the S6 - other phones have much cheaper displays). However, you'll likely need extra tools that are not standard household items, so the effective cost may be greater. Ofcourse with this option there's the risk that more than just the display is broken and your investment will have been for nothing.
Removing the internal flash memory chip and backup the data on it was deemed somewhere between impossible and highly impropable until recently, because it is so tightly embedded into the device. Around a year ago, chances of recovery were said to be around 40% by professional data recovery companies. Apparantly, this has greatly improved lately though, with a likeliness of 95+% now being stated. However, this involves very precise work and specialised hardware, so prices are accordingly high. I don't know exact prices in western Europe but judging from other types of professional recovery think 700/800 Euro upwards. Apparantly there are eastern European companies which offer the service for only around 300 Euro though. Look for "chip-off" method and UFS if you want to go in this direction.
(And just in case you're thinking about trying this yourself, take a look at this thread - and that isn't even related to the new UFS chips embedded in the Samsung Galaxy S6.
I'm sorry that I can't provide any better prospects for you. I guess that's what we get for letting companies get away with selling ever more locked up devices to us that we have practically no control over ourselves anymore.
Still, I wish you good luck!
shevtak

Life after ROOT

So. I did a bunch of complaining about the T-Mobile network lock and the whole waiting game.. Then I found out that I had to wait an additional undetermined amount of days tp get the OEM key from OnePlus.. Grrrrrr... Arrrggg!! Well if any of you have a Nord 10 5G from the USA and it happens to be a carrier phone its gonna take at least 45 days from Carrier to OEM before you can root the thing. Just this morning, and after a long wait with much study on this process, I finally had my climactic victory with my first rooted device with a custom ROM. I am seriously a novice when it comes to these phones. Thank Geebus I have some sort of tech understanding and a ton of patience because I now have a beautifully modded Nord N10 5G that runs like a Pixel 5 with all the bells and whistles. A great deal of thanks goes to you folks for providing me the tools and know how to get thru this. The new PixelExperience_Plus ROM worked like a charm. And my ignorant American ass got it right on the fist try! I can't wait to see what kinds of new things you all will let me chew on in the near future. Cheers!!
Spidermonkeyj75 said:
So. I did a bunch of complaining about the T-Mobile network lock and the whole waiting game.. Then I found out that I had to wait an additional undetermined amount of days tp get the OEM key from OnePlus.. Grrrrrr... Arrrggg!! Well if any of you have a Nord 10 5G from the USA and it happens to be a carrier phone its gonna take at least 45 days from Carrier to OEM before you can root the thing. Just this morning, and after a long wait with much study on this process, I finally had my climactic victory with my first rooted device with a custom ROM. I am seriously a novice when it comes to these phones. Thank Geebus I have some sort of tech understanding and a ton of patience because I now have a beautifully modded Nord N10 5G that runs like a Pixel 5 with all the bells and whistles. A great deal of thanks goes to you folks for providing me the tools and know how to get thru this. The new PixelExperience_Plus ROM worked like a charm. And my ignorant American ass got it right on the fist try! I can't wait to see what kinds of new things you all will let me chew on in the near future. Cheers!!
Click to expand...
Click to collapse
I'm currently on my 6th rooted phone and I can assure you that typically it's never a relaxed process: You're always anxious because you don't want to turn your phone into a useless brick (unbootable and no possible fix).
However, just like you, all the knowledge we gain when rooting the phones it's totally worthy.
Now, since this is your first root, I want to share some useful root-required apps with you (most of them are not available on Google's play store, you can find them on F-Droid for example):
AdAway: System-wide free and open-source ad blocker. It has predefined ads lists. Some games where you get rewards for viewing ads either show an error when viewing the ad or give will simply reward you instantly without showing the ad.
AFWall+: System-wide firewall that blocks internet access for certain apps: Useful to avoid fishy apps to send your personal info to their servers. For example ATM I'm blocking Microsoft SwiftKey Keyboard, Google Messages and Google Phone.
Bouncer (paid): Gives temporary permissions to the apps and remembers your option: If you want to send an image through facebook go ahead, allow the external storage access, then later a notification shows up asking you to remove the pending temporary permissions.
OverrideDNS (paid): Probably the best DNS overrider you can find, it listens for new connections and automatically changes the DNS to your desired one.
Greenify: It's a huge helper on battery saving, allows you to select apps that you don't want to allow to run on background: Greenify kills these apps. Useful if you're like me and you have lots of apps that you use ONLY when needed, for instance, I don't want any of my games to run on background and I don't want to be bothered by game notifications.
Boot animations for superuser: Allows you to flash custom boot animations. Be careful with this app, I didn't try it yet on OP N10 (since I actually like Oxygen's boot animation).
Tasker (paid): Now this is where the fun begins... You can automate pretty much anything! Let me give you some examples that I have on my tasker:
Managing some custom profiles (technically speaking, custom tasks). I have 2 pre-defined profiles: Home and Outside (they change screen brightness, volumes, vibration, display timeout, wi-fi state, mobile data state, and so on, and these values depend if I'm connected to my smartwatch or not).
If my phone connects to my car's BT system, I forced tasker into changing to my Outside profile. If my phone is at my house's coordinates, it changes to home profile.
Whenever I connect my headset, it automatically opens Spotify.
When I received a text message, my torch flashes 3 times.
If my battery reaches 10%, it automatically sends my GF a message saying my battery is running low.
Whenever I open Google Maps, my GPS turns on.
Do you have links to these wonderful apps?
Spidermonkeyj75 said:
Do you have links to these wonderful apps?
Click to expand...
Click to collapse
Yes.
AdAway (or get it from F-Droid)
AFWall+ (you can also find it on Google Play or F-Droid)
Bouncer: You can either visit the author's website or get it on Google Play
OverrideDNS (you can find it on Google Play)
Greenify (you can find it on Google Play)
Boot animations for Super User (you can find it on Google Play)
Tasker (you can find it on Google Play)
You can also see some examples of tasker capabilities on the author's YouTube channel.
Oh man, wait until you get apps like V4A running.
It's a whole new ballpark, just gotta be careful not to hit too many foul balls.
So make sure to keep a backup whenever you start messing around.
CF Lumen (Play Store)
Titanium Backup (Play Store)
Solid Explorer (Play Store)
I thought the advantage to buying OnePlus phones is that they do not lock the bootloader, so no rooting is required (I read that somewhere online). Is that not correct?
I have been thinking about the N10 or 8T, but the lack of carrier support is making me hesitant. Also, the N10 has very good specs for the price, but with only one Android update and only 2 years of security updates, it would (I assume) need to have a custom rom installed after that to maintain security. Is that correct?
stealth49rt said:
I thought the advantage to buying OnePlus phones is that they do not lock the bootloader, so no rooting is required (I read that somewhere online). Is that not correct?
Click to expand...
Click to collapse
Not correct, the bootloader is still locked but:
If you unlock it, the device will still pass Google's SafetyNet check (which is used to check if your device is reliable to use more sensitive APPs/features: Netflix, Brave's rewards feature, some payment APPs). When I rooted my Xiaomi MI A3, unlocking the bootloader made the device being marked as untrustworthy, and therefore failing the SafetyNet.
OnePlus allows users to root their phone without voiding the warranty.
stealth49rt said:
I have been thinking about the N10 or 8T, but the lack of carrier support is making me hesitant. Also, the N10 has very good specs for the price, but with only one Android update and only 2 years of security updates, it would (I assume) need to have a custom rom installed after that to maintain security. Is that correct?
Click to expand...
Click to collapse
What do you mean carrier support? The first time I bought an OP device, they weren't even officially selling in my country.
Are you telling me that your country still sim-locks the devices? Why don't you buy it directly from oneplus.com? I think those are unlocked.
If you're referring to the frequency support, you can Google to check the frequency coverage in your area and compare with the device's supported frequencies.
OP's typically have a good ROM support, try Pixel Experience...
lbsilva said:
Not correct, the bootloader is still locked but:
If you unlock it, the device will still pass Google's SafetyNet check (which is used to check if your device is reliable to use more sensitive APPs/features: Netflix, Brave's rewards feature, some payment APPs). When I rooted my Xiaomi MI A3, unlocking the bootloader made the device being marked as untrustworthy, and therefore failing the SafetyNet.
OnePlus allows users to root their phone without voiding the warranty.
What do you mean carrier support? The first time I bought an OP device, they weren't even officially selling in my country.
Are you telling me that your country still sim-locks the devices? Why don't you buy it directly from oneplus.com? I think those are unlocked.
If you're referring to the frequency support, you can Google to check the frequency coverage in your area and compare with the device's supported frequencies.
OP's typically have a good ROM support, try Pixel Experience...
Click to expand...
Click to collapse
I apologize for my confusing message. I am in the USA. By "carriers" I meant companies like Verizon, AT&T, T-Mobile, etc. I am currently on Republic Wireless with a Moto G5s Plus (stuck on Android 8 and no more security patches either). RW doesn't allow the N10 5G yet on their network. I have only found a few MVNOs that do (e.g. Mint Mobile). Just about all support phones from Moto and Samsung. So I feel I may be going out on a limb getting a OnePlus phone.
AT&T actually (temporarily) suspended my account for turning the N105G on, with my AT&T SIM in it. Learned the hard way no one answers the phone anymore outside business hours, glad I didn't need to make any calls or do it on Friday at 5:01p. They got fired for that.
TMobile took it happily, no issues with activation, nice 5G signal (we don't have MMw in my city, but uses one of the other bands). Speed varies by location/tower, but have clocked downloads over 380Mbs. Note that Tmobile uses IPV6 and IPV4, so for certain things like VPNs you either have to futz with the APN settings to do IPV4 only, or make sure you have IPV6 functionality on destination sites (when you do, works pretty damn slick, I must say).
The thought of using Verizon makes me want to throw up, so no comments on that one.
Hope that helps.
SomeRandomGuy said:
AT&T actually (temporarily) suspended my account for turning the N105G on, with my AT&T SIM in it. Learned the hard way no one answers the phone anymore outside business hours, glad I didn't need to make any calls or do it on Friday at 5:01p. They got fired for that.
TMobile took it happily, no issues with activation, nice 5G signal (we don't have MMw in my city, but uses one of the other bands). Speed varies by location/tower, but have clocked downloads over 380Mbs. Note that Tmobile uses IPV6 and IPV4, so for certain things like VPNs you either have to futz with the APN settings to do IPV4 only, or make sure you have IPV6 functionality on destination sites (when you do, works pretty damn slick, I must say).
The thought of using Verizon makes me want to throw up, so no comments on that one.
Hope that helps.
Click to expand...
Click to collapse
There's a reason why AT&T is losing customers
stealth49rt said:
I apologize for my confusing message. I am in the USA. By "carriers" I meant companies like Verizon, AT&T, T-Mobile, etc. I am currently on Republic Wireless with a Moto G5s Plus (stuck on Android 8 and no more security patches either). RW doesn't allow the N10 5G yet on their network. I have only found a few MVNOs that do (e.g. Mint Mobile). Just about all support phones from Moto and Samsung. So I feel I may be going out on a limb getting a OnePlus phone.
Click to expand...
Click to collapse
If you have the ability to mod your phone, I mean install a custom ROM I suggest Pixel experience and Deepest. I've run them both and you have a lot more control over your radio options and network capability. Good luck!
Spidermonkeyj75 said:
If you have the ability to mod your phone, I mean install a custom ROM I suggest Pixel experience and Derpfest I've run them both and you have a lot more control over your radio options and network capability. Good luck!
Click to expand...
Click to collapse
Spidermonkeyj75 said:
So. I did a bunch of complaining about the T-Mobile network lock and the whole waiting game.. Then I found out that I had to wait an additional undetermined amount of days tp get the OEM key from OnePlus.. Grrrrrr... Arrrggg!! Well if any of you have a Nord 10 5G from the USA and it happens to be a carrier phone its gonna take at least 45 days from Carrier to OEM before you can root the thing. Just this morning, and after a long wait with much study on this process, I finally had my climactic victory with my first rooted device with a custom ROM. I am seriously a novice when it comes to these phones. Thank Geebus I have some sort of tech understanding and a ton of patience because I now have a beautifully modded Nord N10 5G that runs like a Pixel 5 with all the bells and whistles. A great deal of thanks goes to you folks for providing me the tools and know how to get thru this. The new PixelExperience_Plus ROM worked like a charm. And my ignorant American ass got it right on the fist try! I can't wait to see what kinds of new things you all will let me chew on in the near future. Cheers!!
Click to expand...
Click to collapse
Hi, i just had to ditch my pixel2 when the screen died and got the nord 10 5g. if rooted plenty of phones before but never had to wait to get an oem key from a vendor. would you mind elaborating on this point before i head into nightmare?
frankygoes said:
Hi, i just had to ditch my pixel2 when the screen died and got the nord 10 5g. if rooted plenty of phones before but never had to wait to get an oem key from a vendor. would you mind elaborating on this point before i head into nightmare?
Click to expand...
Click to collapse
No problem, if you have a T-Mobile carrier you will have to jump thru a few hoops to get your network (SIM) unlock , then you have to run a command via ADB to get the unlock code, :But WAIT ! There' s MORE" When that has al come to pass you have to get the unlock token from OnePlus and while in Fastboot Mode , you have to flash the cust-unlock.bin file to unlock the bootloader. Afterwards you can load whatever you want in there. Unfortunately, the Nord N10 5G doesn't get a lot of support or updates which sucks because it's not a bad device on the right platform. I'm looking to try the A/B GSI Flash method since the device is Treble worthy. Good luck! Hope you fare better than I did my first go-around.
thanks for the response. So i got an unlocked phone into which i put my existing SIM card. went into the developer settings and enabled "allow bootloader to be unlocked." you are saying that to now actually unlock the bootloader i need a code from oneplus?
Yep. A big pain in the ass.

Categories

Resources