Android/whatsapp hacked! Please help! - Android Q&A, Help & Troubleshooting

Hi, I really need some advice and help, please!
Someone hacked my galaxy note 8 (latest update of OS) using Bluetooth. Thereafter when I had Bluetooth turned off all the time I would sometimes found it had turned on again and at times a pic would randomly appear in my camera roll folder. I was targeted by a group of people and having recalled looking back I was encouraged to message through WhatsApp and I believe that chrome and Andoid webview extension were involved. They also got into my gmail and tried to delete my contacts and wipe my phone and whatsapp history. Aftert this I saw that a Linux device had been attached to my gmail account.
I then went to an iphone and received a whatsapp from someone and a pic appeared again in my camera roll. I believe they were trying to do the same again and not sure how effective it is on iOS.
But now I have a new galaxy note 8 and someone has sent me a pic and video. I don't know that they are involved and I think I'm being overly cautious, but I need to understand what they did before and what I can do to check if they have hacked my new phone and doing the same thing again, and what I can do now to ensure they don't do it. I'm worried now that if they have got into my new phone and WhatsApp, will they have been able to get my IMEI and is my new phone now permanently susceptible to attack?
If I wipe my phone back to factory settings and reinstall everything again and start a new whatsapp with a new number, will that work?
My MS surface has also been acting up and I'd like to know if there's an easy sign to check on there too.
Thanks so much in advance!

phoenix79802 said:
Hi, I really need some advice and help, please!
Someone hacked my galaxy note 8 (latest update of OS) using Bluetooth. Thereafter when I had Bluetooth turned off all the time I would sometimes found it had turned on again and at times a pic would randomly appear in my camera roll folder. I was targeted by a group of people and having recalled looking back I was encouraged to message through WhatsApp and I believe that chrome and Andoid webview extension were involved. They also got into my gmail and tried to delete my contacts and wipe my phone and whatsapp history. Aftert this I saw that a Linux device had been attached to my gmail account.
I then went to an iphone and received a whatsapp from someone and a pic appeared again in my camera roll. I believe they were trying to do the same again and not sure how effective it is on iOS.
But now I have a new galaxy note 8 and someone has sent me a pic and video. I don't know that they are involved and I think I'm being overly cautious, but I need to understand what they did before and what I can do to check if they have hacked my new phone and doing the same thing again, and what I can do now to ensure they don't do it. I'm worried now that if they have got into my new phone and WhatsApp, will they have been able to get my IMEI and is my new phone now permanently susceptible to attack?
If I wipe my phone back to factory settings and reinstall everything again and start a new whatsapp with a new number, will that work?
My MS surface has also been acting up and I'd like to know if there's an easy sign to check on there too.
Thanks so much in advance!
Click to expand...
Click to collapse
I do strongly advice you to do a full factory reset or go to the nearest technician if you don't know how to do it, to flash the phone from scratch inmediatly. Also try the best security app for android once you setup your device again. That's enough.
Enviado desde mi SM-G550T1 mediante Tapatalk
---------- Post added at 12:58 PM ---------- Previous post was at 12:52 PM ----------
I would also report the issue to the tech support of WhatsApp, if there's any. Also, change every passwords on your Google devices with more secure passwords, Google, banking, social. And do place a secure password to block your device. Good luck.
Enviado desde mi SM-G550T1 mediante Tapatalk

This is why I dislike Touchwiz, it's so outdated and vulnerable.
Just reflash your whole system, you can find guides on YouTube on how to flash a new firmware.
I would also recommend changing to a custom ROM with up to date security patches.
Edit: You should also change all your passwords to something very difficult like 'nJfi8t%Nc178c'
If you have difficulties remembering there's a lot of apps out there that can help, I personally use last pass, you should check it out.

davidzam said:
I would also report the issue to the tech support of WhatsApp, if there's any. Also, change every passwords on your Google devices with more secure passwords, Google, banking, social. And do place a secure password to block your device. Good luck.
Click to expand...
Click to collapse
If you were conned into downloading a webextension then this has nothing to do with whatsapp it has to do with the user. Conntact google security to change your account. In general if they hacked a phone the phone only is the problem but if they have access to all your info then it can always be a problem. About bluetooth always have at least a code between the devices (some BT keyboards do not even have this). Also look at the security update on the device if it is not the latest then swith to one of the custom roms here which are always secure.
As for passwords think of a sentence and use the first letters of each word incorperate numbers capital letters and a symbol this helps you to remember it.
For example
I Have A Dog Who Name Is Henry And I Love Him=IHADWNIHAILH
now change A for the & symbol one I for 1 and A for 4=1H4DWNIH&ILH
mix it up with some upper case and lower case (names)=1h4dwniH&Ilh
you can now add in other symbols or spell words such as [email protected] (too big so we will use only part @m )add ! after Henry and [] around &Ilh [email protected]![&ILH]
now you have a random easy to remember password. This password is the basis for all the security on android (at the current time) so even if you use a code it still unlocks with this and encrypts.

Applied Protocol said:
If you were conned into downloading a webextension then this has nothing to do with whatsapp it has to do with the user. Conntact google security to change your account. In general if they hacked a phone the phone only is the problem but if they have access to all your info then it can always be a problem. About bluetooth always have at least a code between the devices (some BT keyboards do not even have this). Also look at the security update on the device if it is not the latest then swith to one of the custom roms here which are always secure. As for passwords think of a sentence and use the first letters of each word incorperate numbers capital letters and a symbol this helps you to remember it. For example I Have A Dog Who Name Is Henry And I Love Him=IHADWNIHAILH now change A for the & symbol one I for 1 and A for 4=1H4DWNIH&ILH mix it up with some upper case and lower case (names)=1h4dwniH&Ilh you can now add in other symbols or spell words such as [email protected] (too big so we will use only part @m )add ! after Henry and [] around &Ilh [email protected]![&ILH] now you have a random easy to remember password.
Click to expand...
Click to collapse
Thanks for clarifying that fact for me.

Thanks so much! Would a custom firmware allow me to keep the use of knox? I'm thinking to flash it back to factory and only install and use everything from within knox.
Zep0th said:
This is why I dislike Touchwiz, it's so outdated and vulnerable.
Just reflash your whole system, you can find guides on YouTube on how to flash a new firmware.
I would also recommend changing to a custom ROM with up to date security patches.
Edit: You should also change all your passwords to something very difficult like 'nJfi8t%Nc178c'
If you have difficulties remembering there's a lot of apps out there that can help, I personally use last pass, you should check it out.
Click to expand...
Click to collapse

Applied Protocol said:
If you were conned into downloading a webextension then this has nothing to do with whatsapp it has to do with the user. Conntact google security to change your account. In general if they hacked a phone the phone only is the problem but if they have access to all your info then it can always be a problem. About bluetooth always have at least a code between the devices (some BT keyboards do not even have this). Also look at the security update on the device if it is not the latest then swith to one of the custom roms here which are always secure. As for passwords think of a sentence and use the first letters of each word incorperate numbers capital letters and a symbol this helps you to remember it. For example I Have A Dog Who Name Is Henry And I Love Him=IHADWNIHAILH now change A for the & symbol one I for 1 and A for 4=1H4DWNIH&ILH mix it up with some upper case and lower case (names)=1h4dwniH&Ilh you can now add in other symbols or spell words such as [email protected] (too big so we will use only part @m )add ! after Henry and [] around &Ilh [email protected]![&ILH] now you have a random easy to remember password.
Click to expand...
Click to collapse
Just another question regarding Knox Secure Folder.
If I were to install and run everything through the secure folder and I were to be compromised again through a web extension, would that then all hackers to view everything on my phone again regardless of whether it's in the knox environment or outside? Would a backdoor like that work into the secure environment as it did in my normal android system?
Thanks again!

phoenix79802 said:
Just another question regarding Knox Secure Folder.
If I were to install and run everything through the secure folder and I were to be compromised again through a web extension, would that then all hackers to view everything on my phone again regardless of whether it's in the knox environment or outside? Would a backdoor like that work into the secure environment as it did in my normal android system?
Thanks again!
Click to expand...
Click to collapse
If your knox is still working and not tripped then that would be a good idea. However understand that the way to get in and out of knox still relies on encryption methods see CVE-2016-1919 as well as the kernel level security CVE-2016-6584 see also https://googleprojectzero.blogspot.com/2017/02/lifting-hyper-visor-bypassing-samsungs.html, this means that if the key or encryption method is faulty you can get around it and the kernel is more complicated but will also do the same thing. The last way is to access a shared resource such as a clipboard that has access to both places a example of this is CVE-2016-3996. And CVE-2018-9142. Granted most of these are 2017 and 2018 and a quick look at the samsung CVA at https://www.cvedetails.com/vulnerability-list/vendor_id-822/Samsung.html does not have anything for Oreo this can be since until recently only the 9s' had it. But their is a recurring theme that the CVAs' are repeated out of the last 5 4 are repeated and some are simple mistakes (look at Googles project zero above in KALSAR). The question is is this enough and the answer is probably but a security orientated Rom might be a better bet. (I know this is not fair since they do not have CVAs). But a full wipe and fresh install should be enough. Add in a firewall too if you did not have that already.

phoenix79802 said:
Thanks so much! Would a custom firmware allow me to keep the use of knox? I'm thinking to flash it back to factory and only install and use everything from within knox.
Click to expand...
Click to collapse
Sorry for the late reply, but Knox, in my opinion is super vulnerable, new android versions are safe enough.
And no, using a custom ROM would not have Touchwiz integrated nor Knox. Why? Because it will most likely be running stock android vanilla.
More secure than Samsung's Touchwiz, recommend something like LineageOS.

Zep0th said:
Sorry for the late reply, but Knox, in my opinion is super vulnerable, new android versions are safe enough.
And no, using a custom ROM would not have Touchwiz integrated nor Knox. Why? Because it will most likely be running stock android vanilla.
More secure than Samsung's Touchwiz, recommend something like LineageOS.
Click to expand...
Click to collapse
Look this depends on your perspective
FACT: knox is a hardware based security system which is unique to Samsung
FACT: Samsung phones are the most sold
FACT: The maker of the hardware has the resources to secure it better
Therefore Samsung knox is more secure and yes more users using the phone make it more advantageous to crack it. However Samsung to their credit does try to increase security in other ways such as using the TrustZone more and SEAndroid policy strengthening. Lineage is a great choice however knox which will be tripped and ever if not it needs custom software to run AFAIK. Also samsung is DoD approved see DoD list and news article. This is not necessarily a good indication of overall security but it dos put things in a good perspective (DoD do not patch themselves rather rely on the developers and stay on top of things) Really high security Android OS such as copperhead also have such improvements as Knox (way better if you look carefully) but they are limited on what phones it will work on. Also Android 8 is a lot more secure but fact of the matter is the best party that can secure a Samsung phone is Samsung but I am not saying they do. I would recommend Stock Samsung but if you need a custom rom lineage is a good choice this is true also in terms of power (used to be snapdragon charging on a rooted phone is only up to 80% but I think there is a fix) but in versatility a custom rom always wins and power saver settings can be better than the original.

Related

[Q] Problems with developing a custom GS2 rom for medicinal purposes.

Hello to you all people of XDA, firstly I must state that I've scoured the forums far and wide and have yet to find some valuable info regarding my problem.
So what we're doing is developing (or trying to, as is obvious from this post) a custom rom for the Galaxy S2 which would be used for a single medical application for sensor tracking and the processing and displaying of said data on the SGS2, while at the same time sending it to his/her doctor.
What we need to be able to achieve with this rom is to put it into the hands of the end-user (a chronical patient which will in turn be able to stay at home instead of being hospitalized) and be able to completely lock down the phone for his use (I know, it sounds terrible) so that he loses the phone/sms/games/youtube/internet functionality as we need the phone to run as stable and for as long as possible without any additional battery stress (the constant sending, processing and processing of data seems enough of a problem for now).
I've searched into some custom roms but we eventually came up with the need for a stock Samsung rom which could be modified as we want to.
See this is where the problem begins, we can't seem to get the phone rooted, the ROM customized and then unrooted again so that the phone can't be fiddled with anymore, except when it's completely dead and we need to fix it.
So to cap it all up:
It needs to allow for a custom load and bootscreen (I almost got this to work)
It needs to be completely locked down for the end user.
It has to have full BT, NFC and WiFi functionality
It has to be able to call out and reciev calls, but only to/from specific numbers (911, doctor, etc..)
It has to basically allow for 2-3 programs to be running, while the others simply don't exist on the phone.
I am terribly sorry if anything like this has been asked about before, I swear I put 2 days of me life into researching already.
Any help, any help at all, ideas and solutions, but mostly links are welcome.
Thank you and good day to all.
Just a detail, but the SGS2 doesn't have the NFC functionality. Project seems to be possible, I would look into CyanogenMod sources if I was you.
Sent from my GT-I9100 using XDA App
Why are you afraid of leaving the phone rooted and in hands of the patient?
Is he so uncritical that he can search the web and find means of unrooting a mobile phone and then get around to actually doing it?
LucLucLuc said:
Hello to you all people of XDA, firstly I must state that I've scoured the forums far and wide and have yet to find some valuable info regarding my problem.
So what we're doing is developing (or trying to, as is obvious from this post) a custom rom for the Galaxy S2 which would be used for a single medical application for sensor tracking and the processing and displaying of said data on the SGS2, while at the same time sending it to his/her doctor.
What we need to be able to achieve with this rom is to put it into the hands of the end-user (a chronical patient which will in turn be able to stay at home instead of being hospitalized) and be able to completely lock down the phone for his use (I know, it sounds terrible) so that he loses the phone/sms/games/youtube/internet functionality as we need the phone to run as stable and for as long as possible without any additional battery stress (the constant sending, processing and processing of data seems enough of a problem for now).
I've searched into some custom roms but we eventually came up with the need for a stock Samsung rom which could be modified as we want to.
See this is where the problem begins, we can't seem to get the phone rooted, the ROM customized and then unrooted again so that the phone can't be fiddled with anymore, except when it's completely dead and we need to fix it.
So to cap it all up:
It needs to allow for a custom load and bootscreen (I almost got this to work)
It needs to be completely locked down for the end user.
It has to have full BT, NFC and WiFi functionality
It has to be able to call out and reciev calls, but only to/from specific numbers (911, doctor, etc..)
It has to basically allow for 2-3 programs to be running, while the others simply don't exist on the phone.
I am terribly sorry if anything like this has been asked about before, I swear I put 2 days of me life into researching already.
Any help, any help at all, ideas and solutions, but mostly links are welcome.
Thank you and good day to all.
Click to expand...
Click to collapse
Block all internet access apart from ones you want or you can just setup iptables rules, shouldnt need root apart from when setting it up
As far as removing programs, just delete the apks from the zip, or before you remove root. My sig has a list of all apks in a upto date rom and what they do.
You can use gemini app manager to control autoruns (stop them etc) also to block (hide and disable apps)
As far removing root, your best bet is to once you are done, use adb (from the android sdk) to remove the superuser.apk then flash the stock kernel back, as far as I know without superuser apps cant grain root permisions.
OR
This app will allow you to block any app behind a password
This app will block incoming and outgoing sms and calls on white and blacklists
Custom boot logo (the first screen before the animation)
Custom boot animation need to go into system/media, I am not sure about the format but there are loads around, like this thread has loads, stock kernel should support them.
I hope that helps
Most of that is easily possible.
If you listed the apps needing removed, the apk files just need deleted.
To control calls, you can use a third party app from market for that.
It's possible to have the custom rom unrooted, and easily flashed, regardless of how badly the phone gets rooted
Boot animation is easy anyway... If you can provide it in a zip like other ones (zip containing numbered png's) then it's a piece of cake.
A little bit of clever firewall stuff would prevent any web traffic, in or out, except to your defined server, which is obviously a concern when a phone is handling sensitive medical info.
genieass said:
Why are you afraid of leaving the phone rooted and in hands of the patient?
The phones are going to be used by around 500.000 people in a year, it's not that we want to take anything away from the user, it's more about not having any problems with the firmware - like ever.
Thanks for all the help!
Click to expand...
Click to collapse
genieass said:
Why are you afraid of leaving the phone rooted and in hands of the patient?
The phones are going to be used by around 500.000 people in a year, it's not that we want to take anything away from the user, it's more about not having any problems with the firmware - like ever.
Thanks for all the help!
Click to expand...
Click to collapse
LucLucLuc, not sure where you live, but you're entering the patient confidentiality minefield with big, big boots.
Apart from the legal considerations, your question is definitely OS related and not device related.
I see what you want, but legally - where I live anyway - it's too much of a grey area to get involved with.
I use call recording a lot for referrals and info from other doctors, but I've always asked the other party if they're OK with it. I won't record patient conversations, and I won't accept any files whatsoever that have seen RIS or PACS first - not worth it.
Can't see it's worth your while, but I'd appreciate it if you keep me informed should you decide to work on it.
Big boots indeed
We are from Slovenia, Europe.
I'm actually just a student doing the research and some basic Android programming, thank god I wasn't let into the bigger of the projects
But yes, this project is a colaboration of several european firms and you can read more about it at chiron-project.eu - it's a very very interesting project afaic.
I don't think we'll be swimming with lawyer piranhas soon though, the project uses sensor data (which sorta is a privacy issue) which will be monitored on a tablet running Android (currently testing the Galaxy tab 10.1 - we were lucky to order one before Steve had another one of his fits), proccessed in real time and then stored on the central server, from where it will only be accessible by the patients doctor.
Patient consents are dealt with before we even start talking about mobile hospitalizations.
It's very encouraging to see some actual interest, if anyone wants to know more about anything related to this project contact me at [email protected]
Thanks again for all the help.

UNA ROM, Private, Fast, And Good Looking:)

After weeks of hard work we (Setmov and uncle Fab) proudly present you the first Una ROM for the galaxy Grand 2 I7102, based on 4.3 XXUANG4.
DISCLAIMER​
As usual, your phone your responsability, we won't take any responsability if it flies out of the window or if your girlfriend/boyfriend runs away with it.
PLEASE, DO READ OP COMPLETELY AND CAREFULLY BEFORE ASKING ANY QUESTIONS, ANSWERS TO MOST PROBLEMS ARE THERE​
WHAT IS UNA?​
Una is a new concept that takes security to a new level.
Are you tired of seeing so much blatant, outrageous and shameless invasion of your privacy and data mining hidden behind nice sentences like "enhanced use experience" or "complete integration with the system"? We decided to develop secure ROMs where privacy means just that – Private!.
It’s free of charge, we are a non profit structure and we are not here to make big bucks
WHAT UNA ISN'T​
UNA isn't a way to help you to stealthily buy massive destruction weapons to foment a coup d'etat in your favorite banana republic or to prepare the third world war.
UNA secures what leaves from your phone (ie your personnal data doesn't leak and no app can look over your shoulder to spy your activities), but it can't completely secure what comes into your phone.
Why is that?
Because it's just not possible to fully secure a phone from what comes into it, and anyone claiming to be able to do it is either a liar, or an ignorant, or both.
There are too many attacks, some not well documented, if documented at all, and some unknown to the public, and there are too many ways to hack a phone, especially if the user doesn't use his/her common sense.
If you are the type of person that installs apps from shaddy source and/or warez web sites (sites offering cracked paid apps) chances are that at some point you will unknowingly install a malware or a spyware. The same applies if you click on any link, specially on SMS' and emails, if you let any pop out window appear or if you don't protect your lockscreen with a password/pin/pattern and let anyone get physical access to your phone.
A bit of judgment and common sense can save you a lot of trouble, but there's unfortunately nothing UNA can do about it.
Then, if you use your phone to call through GSM your provider will know where you are. If he didn't you wouldn't be able to make any call, the signal has to find you and there's nothing UNA or anyone can do about it.
The only way to prevent that is to disable the phone functions (but then your phone will turn into a wifi only device) and reenable them when needed, head to the scripts section to learn how to do it.
Last but not least, bear in mind that the agencies have armies of tech savvy henchmen and 10 storeys computers, and tricks we can't even imagine, so think twice and use your brain before you attempt to outsmart them...
UNA IS FOR YOU IF:​
. You are willing to learn how to use an unconventional ROM and generally speaking to understand how things work, even if it sometimes requires a little effort to fix this or that little problem (bear in mind that it took us a lot of work to develop Una to where it is now),
. You don't mind a few little occasional bugs here and there that come from all the restrictions the ROM contains,
. You want to take back ownership of your phone from google’s claws.
UNA IS NOT FOR YOU IF:​
. All that you care about is the latest gimmick in the latest OS,
. You can't live without the google’s apps,
. You are the kind of person that never reads through the OP and only scroll down to the download section, and then complain that things don't work and/or ask stupid questions that have already been answered in OP.
An example? One guy makes a mod and writes clearly in OP that it's specifically for 4.2.2. Then some people complain: "it doesn't work on 4.4.2"...
ARE WE PARANOID TIN FOIL HATS? OR TERRORISTS? OR CARTEL BOSSES?​
Nope, we only are people that don't see why we shouldn't be in control of our phones. Or why our phones can be wiped remotely, why apps or updates or who knows what can be downloaded and installed without asking for our consent, why SMS' can be sent without us to know, why we should pay for the bandwidth used for data mining and unwanted downloads, and why all those activities should deplete our battery and kill our RAM.
You think we are overreacting here?
You don't have to take our word for it, just download and install Network Log from here:
https://f-droid.org/repository/browse/?fdfilter=network+log&fdid=com.googlecode.networklog
Give it root permission, start logging and open some web pages. Come back to Network Log after a few minutes and see for yourself, you'll be surprised (or maybe horrified?) to find out that your android system, your settings, your kernel etc. connect to all sorts of funny IPs, including and foremost google’s.
Now you see what we mean?
It's time to go for Una
UNA'S FEATURES​
. Rooted.
. Deodexed.
. Zipaligned.
. Busybox and sqlite installed.
. Init.d support and scripts.
. Auto start disabled for most apps.
. About 120 system apps, 40 framework jars, 30 permissions xmls and 25 libs removed, plus files here and there.
. Very low RAM and CPU consumption, more than 8 hours screen time with the WIFI on, 1% battery decrease every 10-12 hours while in stand by.
. Heavily and extensively modified system, in order to make it secure and prevent it from leaking your data.
. App Settings, Firewall and Xprivacy built-in, and already applied out of the box to make sure you are well protected.
. Xprivacy is a fantastic tool but it has one big limitation, it can't restrict the Android System from accessing your serial numbers and leaking it. For that reason these IDs have been edited as follows:
build.serial (androidboot.serialno), ro.boot.serialno and ro.serialno are both set to "1",
android id is set to "id",
net.hostname is set to "1".
. Wlan serial number set to "00000001" (this number identifies you everytime you connect to the internet, and Xprivacy can't do anything about it).
. USB ID (iSerial) set to 1.
. Unreadable cp access.
. Vulnerabilities patched thanks to Master Key Multi Fix.
. ADB disabled (can be re-enabled, see below).
. By default ADB, all google access (including youtube, blogspot and google search), the Live Wallpaper Picker and the Media Storage are disabled. You can re-enable some or all of them, instructions are in the "HOW TO USE THE ROM" section.
. Plenty of under the hood modifications to make the ROM fast and fluid.
. Multi-purpose navigation keys.
. Call button in contacts.
. Because secure doesn't mean ugly, the whole ROM has been themed with a beautiful green color (if there are enough requests other themes will follow), transparency, and Lollipop HD wallpapers.
. Multiwindows have been revamped, they are no longer only static in Samsung style but now they can float and be resized/minimized too, like on a computer.
. All apps can be opened in floating mode.
. KK style quad view multiwindows.
. Heaps of hand picked and carefully scrutinized open source apps.
There are 2 non open source apps (Greenify and Quick Pic) but they are safe, believe me, I have thoroughly examined them. Still, you can always uninstall them if you feel like it.
In time we will develop our own apps, but first we want to see how people respond to the Una concept...
Installed apps/tools​
. 920 Editor, to create and edit scripts or text files.
. AF+ Firewall.
. Alarm clock.
. APG, to encrypt messages.
. App Settings, to restrict apps' permissions, change DPI on a per app basis and more.
. Arity, a calcultor.
. Conversations, a secure and encrypted chat, modded by uncle Fab for increased security.
. Fdroid, an alternative to the Play Store, and all the apps are open source!
. Floating stickies, to make small notes on the fly.
. FTP Server, to copy files to/from your phone wirelessly.
. Ghost Commander, a very powerful dual panel root file manager.
. Gravity Box, a theming engine.
. Greenify, to make apps behave by hibernating them when not in use.
. K9 Mail, an email client.
. Kernel Adiutor, if you feel like playing with kernel tweaks (but you have to know what you are doing).
. Lightning, a fast and light weight browser.
. Master Key Multi Fix, a patch to some vulnerabilities.
. Network Log, to check where your apps connect and chase unwanted connections.
. Open Camera.
. Tor (Orbot) for Android, modded by uncle Fab for increased security.
. OS Monitor, to monitor and kill your phone's processes, and more.
. Pale Moon, based on Firefox for Android, for a full desktop experience with Mozilla add-ons preinstalled for enhanced security.
. PDF Reader.
. Preferences Manager, to edit the otherwise difficult to read shared_prefs files in data/data.
. Quick Dic, a good selection of free dictionaries.
. Quick Pic, a Gallery app.
. Rmaps, a maps app where you can download maps from various sources for offline use.
. Search Light, a torch.
. Terminal Emulator, fire up your commands and show your phone who is the boss!
. Text Secure, a secure and encrypted SMS app, modded by uncle Fab for increased security.
. Tint Browser, another fast web browser.
. Urecord, to record sounds with different sample rates.
. USB Mass Storage Enabler, to connect your phone to any computer (note that it only mounts the external SD).
. Viper4Android FX, a powerful sound enhancer.
. Viper4Android XHiFi, some more sound enhancements.
. VLC, a video and music player favourite.
. WI-Fi Privacy Police, to secure your connections even better than they already are.
. Xposed Installer, a great framework that enables apps like App Settings or Xprivacy to work.
. Xprivacy, last but not least, the best privacy app.
WHY DO WE USE A 4.3 ROM AS BASE INSTEAD OF THE LATEST 4.4.2?​
Because when it comes to privacy Kit Kat 4.4.x is a complete
disaster, the newer the android version the more buit-in spying there is (and the more difficult it is to remove it), despite google's sweet talk about "enhanced user's experience.
Lollipop seems to be even worse, but that's another story.
INSTALLATION​
As usual, make a backup first!
Do backup your contacts and whatever is important because all your apps and data will be erased (your sd card contents won't be deleted though).
Do backup your /system/csc folder, in case you need it for later.
Do backup your efs folder (VERY IMPORTANT).
Open an android terminal from your phone and type:
su
enter, then type:
busybox dd if=/dev/block/mmcblk0p11 of=/sdcard/efs.img
enter, this will create an efs backup caled efs.img in your sd card.
To restore it, first make sure the efs.img is in your internal sd card, then type:
su
enter, then type:
busybox dd if=/sdcard/efs.img of=/dev/block/mmcblk0p11
enter, your efs will be restored in no time.
If that sounds like too much work you can use the scripts provided to backup/restore your efs, instructions are in the scripts section.
To install the ROM you need a Custom Recovery and Philz' comes highly recommended.
We chose Philz since AFAIK it's the only one that allows you to lock you recovery with a password (if your recovery is not password protected it wouldn't take more than 2 minutes for someone to disable your pattern or pin protected lockscreen and access all your personal data on the phone).
I'm not sure whether there's a Philz recovery or not for the Grand 2, if there isn't then CWM or TWRP will do.
Custom recovery installation instructions
You need to have Samsung drivers installed.
Boot your phone into download mode (press volume down and power at the same time).
Open Odin 3.07 and connect your phone.
Click on the PDA slot, navigate to where the Custom Recovery is located and select it.
DOUBLE CHECK AND MAKE SURE THAT "RE-PARTITION" IS UNTICKED (only "Auto Reboot" and "F.Reset Time" should be selected).
Click start and wait while Odin flashes the Recovery.
If everything went well your phone will now auto-reboot into the system. Go into recovery, you should see your brand new Custom Recovery.
If you are still on stock recovery then repeat the above steps, but this time untick “Auto Reboot” in Odin.
When in recovery, if before you reboot you see a text on the screen displaying “yes – disable flash recovery”, select it to avoid stock recovery overwriting the Custom Recovery.
Download Una for Grand 2 from here (click on the menu at the top right and go to the download section):
http://unaos.com
Unzip the ROM and copy it to the backup folder that is inside the clockworkmod folder in your sd card (if there's no backup folder create it by choosing "mkdir" in Ghost Commander).
Boot into recovery.
Go to restore from sdcard, choose 1970-01-01.10.06.02, and go for it!
IMPORTANT!!!​
If you are on Kit Kat (4.4.2) you must downgrade first to stock 4.3 before you attempt to install Una ROM, otherwise you may end up with a bricked phone.
Here are 2 threads to assist you in the downgrading process:
http://forum.xda-developers.com/galaxy-grand-2/general/how-to-downgrade-galaxy-grand-2-sm-t2857767
http://forum.xda-developers.com/galaxy-grand-2/help/downgrade-to-4-3-t2857183
If it works please report here so that other people will know, thanks in advance!
Once it's done reboot, congratulations, you have installed Una ROM on your phone!
HOW TO USE THE ROM​
. Swipe down to access the applications drawer.
. Swipe up to turn off the screen.
. Go to settings and set a stong password/pin/pattern protected lockscreen (recommended).
. Go in recovery and set a recovery password (recommended).
. Long pressing on the menu key toggles expanded desktop (full screen, no more navigation bar and no more status bar).
. Double pressing the menu key kills and hibernates the current application.
. Long pressing the recent key brings you back to the last application (convenient to switch from one app to another).
. Between the home and the back key there's a supplementary key that can display up to 12 apps (editable in gravity box).
Double pressing that key shows the sound panel, long pressing it shows the reboot menu (note that there's an option to take screenshots in the reboot menu).
. You can open an app in full screen mode by dragging it from the Flash Bar (the side bar), then you can drag and add more windows to the view (up to 4 on the same screen).
Or, you can open apps in resizable and movable floating mode by clicking on them (double tapping the top bar minimizes them into a bubble, double tapping the bubble restores them).
. Go to /system/etc/security/cacerts, check the certificates that are there (you'll find the certificate's name approximately by the middle of the file), and erase the ones you don't need/like.
When you want to transfer files to/from your phone open the USB Mass Storage Enabler app and enable mass storage, that's it. When you are done, don't forget to eject your phone from the computer and to reenable MTP from the app.
. When you install a new application, by default it will be fully restricted in both Xprivacy and the Firewall.
Before you open the newly installed app wait until the Xprivacy icon appears in the status bar, then and only then can you open it.
Most likely the app will crash.
Go to Xprivacy, open its settings and then usage data, you will see what restrictions caused the crash. Re enable some, provided that they are not too invasive.
Many apps require "load.Library" to be allowed in the shell section, that's ok.
Others may need to access the sd card, that's in the storage section and it's ok to allow it for apps that really need to access the storage, like players, cameras or file managers (for other apps try to keep it restricted).
Root apps obviously need "su" and/or 'sh", and sometimes "exec", in the shell section.
Always try to enable as few fields as possible, and bear in mind that data requested by an app is not necessarily needed for that app to work (especially true for identification, internet and mcc/mmc access).
Lastly, give the app internet access in the Firewall if, and only if, it needs it, and restrict some more permissions in App Settings.
If you can't tame the app consider uninstalling it and look for a similar one that has less built-in spyware.
SCRIPTS​
. As said above, by default ADB, all google access (including youtube, blogspot and google search), the Live Wallpaper Picker and the Media Storage are disabled.
If you want to re-enable some or all of them, open the script folder located in system/etc.
Click on the desired script and choose edit.
Copy the whole text and paste it into the Android Terminal, voila, the script is automagically executed.
. You will see more scripts to disable/enable the Bluetooth, the FM Radio and the Phone.
If you disable the Phone and later want to re-enable it do as follows:
untick App Settings in Xposed's modules section, re-enable Phone, reboot, then enable App Settings again.
. Some scripts will enable you to backup/restore your efs partition and flash a recovery.img (to restore or flash an .img, make sure it's in your internal sd and execute the script).
. Other scripts can enable/disable am and pm, but don't play with it unless you know what you're doing.
. You can uninstall the Live Wallpaper Picker, the Wallpaper Chooser and the Media Storage if you want, or keep them disabled and resurrect them when needed.
. If you are very privacy concerned you should consider using the "uncle's phone lite" mod because it enables you to call with only the Phone and the Telephony Provider apps (CSC, Contacts, Contacts Storage, Logs Provider and STK are completely de-activated). That's the method I use to make calls, but you have to know that the dialler forces close after you complete the call (not a big deal in my opinion but still, I may look into it one of these days). You'll find the mod in the add-ons section.
ENCRYPTION​
If encryption is your thing we have you covered with the following installed apps:
APG, Conversations, K9 Mail and Text Secure.
BUGS​
. Quick Dic won't download any dictionary, actually it's not a bug but a Una restriction since Quick Dic downloads from a google owned web site.
If you need to download dictionaries, temporarly enable google by running the "enable_google" script (don't forget to disable it again when you're done). After you've run the script go to the firewall, open its settings, go to "Set custom script" and click "OK" (do the same if you decide to disable again google's stuff).
. For some reason the ADW Launcher doesn't allow transparency in the navigation bars while in portrait, I'm working on that.
. You can't download anything from Lightning and Tint Browser, that's because the Download Manager and the Download UI have been uninstalled. If you need to download something, copy the link and paste it in Pale Moon, it has its own download engine.
. I didn't have time to properly and restrictively set Text Secure (the SMS app), because I don't own this phone and the person I borrowed it from wanted it back ASAP. Sorry about that, you'll have to do it on your own (if you want to make it simple just restrict its internet access).
. All the installed apps work, but other apps you install may crash. I call that kind of apps "google’s henchmen", they only work if the play store services or the bla bla app are installed and of course they won't on Una since all that garbage has been removed.
If I install your app, why do you want to force me to install your boss' app too? Forget about those apps and search Fdroid, you'll find what you need...
. Depending the way you use your phone you may have to fine tune Xprivacy and reenable some permissions, I'm sorry for the inconvenience but it's impossible to set Xprivacy for all users since we all have different ways to use our phone.
ADD-ONS​
. Sony Xperia Keyboard, flash it in recovery.
Credits KristianCarl for porting it, and unclefab for theming it in green.
It's not open source and that's why it's not included in the rom by default, but it's my every day keyboard because it works fine and because I themed it to make it look nice.
Don't give it internet access in the Firewall.
In Xprivacy, only allow "loadLibrary" in the shell section. You may have to enable a few fields in the contacts section depending your phone's configuration.
In App Settings, restrict "Read_Phone_State" and "Record_Audio".
I removed the Chinese Keyboard, tell me if you want it and I'll readd it.
. Universe Wallpapers
If there are enough users' requests then I'll upload the following:
. Uncle's phone lite (with clipboard and dialer) for hardcore users. It's safer than using the regular phone configuration, but the dialer forces close when you hang up the call. Flash it in recovery, wipe dalvik-cache, reboot.
. Completely disable internet access for the Android System. Lightning and Tint Browser won't connect anymore since they use the same web engine as the Android System, but Pale Moon still works thanks to its build-in web engine. Flash it in recovery, wipe dalvik-cache, reboot.
RECOMMENDED NON OPEN SOURCE APPS​
. Pri-fy, from chainfire the root master:
http://forum.xda-developers.com/showthread.php?t=2631512
. Logging Test:
http://androidsecuritytest.com/
UPDATES?​
I'm working on some improvements on kernel and system level to make Una even more secure, but I will release them for the Grand 2 if, and only if, there are enough users' feedback for the current version, because it's a lot of work to implement such stuff in a ROM.
No ETA though, you'll have to be patient because now we have to design and release Una for many other phones.
Still, any suggestions/comments/bug reports are welcome, help us to improve Una!
FEATURE REQUESTS​
Yeah, sure, we'll see what we can do but we don't promise anything
SCREENSHOTS​
I didn't have time to make screenshots since I ran short of time, so the ones you'll see here come from another phone.
They are very similar in shape, layout and color though, and you'll get the idea.
That's all for now, enjoy the ROM!!!
The Una team
CREDITS​
Big thanks to:
F-Droid
M66B (Xprivacy)
Rovo89 (Xposed)
Tungstwenty (App Settings, Master Key Multi Fix)
Ukanth (AF+Firewall)
Jecelyin (920 Editor)
Kraigsandroid (Alarm Klock)
Thialfihar (APG)
Arity (Arity calculator)
Siacs (Conversations)
Ppareit (FTP)
Ghost Squared (Ghost Commander File manager)
Mohammad Adib (Floating Stickies)
C3C076(Gravity Box)
Oasisfeng (Greenify)
K-9 Dog Walkers (K9 Mail)
Grarak (Kernel Adiutor)
Anthonycr (Lightning)
Xperiacle (Multiwindows Manager)
Pragmatic Software (Network Log)
Mdwh2(Open Camera)
The Guardian Project (Orbot)
Eolwral (OS Monitor)
Moon Child and Cyansmoker (Pale Moon)
Droidapps (PDF Reader)
Simon Marquis (Preferences Manager)
Thad Hughes (Quick Dic)
Q-Supreme team (Quick Pic)
Robert.Developer (Rmaps)
Search Light (Search Light)
Jackpal (Terminal Emulator)
Anasthase (Tint Browser And Tint Browser Adblock Addon)
Thomasebell (Urecord)
Mohammad Abu-Garbeyyeh (USB Mass Storage Enabler)
Zhuhang (Viper4Android FX and Viper4Android XHiFi)
Videolan.org (VLC)
Brambonne (Wi-Fi Privacy Police)
i dont own a galaxy grand 2 , although i may have to get one , but thank you for sharing your work. i'm not a developer so i can only imagine ( which probably falls way short ) of what this took to build.:thumbsup:
"all i can really do , is stay out of my own way and let the will of heaven be done"
Please do a 4.4.4/4.4.2 version. What about the security? Like anyone can hack into your phone....
salimtn said:
4.3 ?! Not interrested
Sent from my SM-G7102 using Tapatalk
Click to expand...
Click to collapse
Laurisss said:
Please do a 4.4.4/4.4.2 version. What about the security? Like anyone can hack into your phone....
Click to expand...
Click to collapse
Thank you for your useful feedbacks.
PLEASE, DO READ OP COMPLETELY AND CAREFULLY BEFORE ASKING ANY QUESTIONS, ANSWERS TO MOST PROBLEMS ARE THERE
WHY DO WE USE A 4.3 ROM AS BASE INSTEAD OF THE LATEST 4.4.2?
Because when it comes to privacy Kit Kat 4.4.x is a complete disaster, the newer the android version the more buit-in spying there is (and the more difficult it is to remove it), despite google's sweet talk about "enhanced user's experience.
Lollipop seems to be even worse, but that's another story.
And NO, not anyone can hack into your phone, but many can and google already did it!
salimtn said:
4.3 ?! Not interrested
Click to expand...
Click to collapse
Thank you soooooo much to take time to reply and show how much consideration and respect you have for someone that worked about 100 hours to build a rom and share it for free with the community.
It feels sad to know that you won t run Una rom on your phone, and thanks again for informing us that we won t count such a great person like you amongst our users, but maybe next time you should read OP:
UNA IS NOT FOR YOU IF:
. All that you care about is the latest gimmick in the latest OS,
. You can't live without the google’s apps,
. You are the kind of person that never reads through the OP and only scroll down to the download section, and then complain that things don't work and/or ask stupid questions that have already been answered in OP.
Click to expand...
Click to collapse
You see guys?
It s thanks to that kind of person that so many devs have left, leave, or will leave the forum...
Please do a 4.4.4/4.4.2 version
Click to expand...
Click to collapse
As written in OP there might be updates:
I'm working on some improvements on kernel and system level to make Una even more secure, but I will release them for the Grand 2 if, and only if, there are enough users' feedback for the current version, because it's a lot of work to implement such stuff in a ROM.
Click to expand...
Click to collapse
Well, time will tell, but so far if you were me what would you think/do?
Thanks for your valient efforts.
But most of the phones would have been upgraded
to k.k. and downgrading them to 4.3 is rather risky.
Even I wonder whether I can downgrade to 4.3 add you rightly mentioned
about 4.4 and 5 android versions.
Even then I will try to down grade to 4.3 and also
try this room. I am willing to take the risk for the developer.
salimtn said:
4.3 and a cute dev. ?! Still not interested ...
Click to expand...
Click to collapse
Still not interested?
Such a pity, people like you are every devs' dream and it would have been a real honour to count such a VIP like you amongst our users.
Thanks for letting us know, next time we ll try to do our best to satisfy demanding users like you...
wrishaba said:
Thanks for your valient efforts.
But most of the phones would have been upgraded
to k.k. and downgrading them to 4.3 is rather risky.
Even I wonder whether I can downgrade to 4.3 add you rightly mentioned
about 4.4 and 5 android versions.
Even then I will try to down grade to 4.3 and also
try this room. I am willing to take the risk for the developer.
Click to expand...
Click to collapse
Thank you for your support. With this attitude you are definitely repaying every effort made.
wrishaba said:
But most of the phones would have been upgraded
to k.k. and downgrading them to 4.3 is rather risky.
Even I wonder whether I can downgrade to 4.3 add you rightly mentioned
about 4.4 and 5 android versions.
Even then I will try to down grade to 4.3 and also
try this room. I am willing to take the risk for the developer.
Click to expand...
Click to collapse
I really dislike 4.4 because it s full of spying, but on the other hand I definitely could build a 4.4 rom for the Grand 2 cuz I can understand that not many people want to take the risk to downgrade.
The only problem is that I don t own the phone, and that the person I borrowed it from doesn t want me to install 4.4 on it, because of knox and because 4.3 runs well.
One thing you have to bear in mind is that latest android version doesn t mean best version, and since 4.1 it s actually been quite the opposite.
Google install 2-3 gimmicks to "enhance users' experience" bla bla, and at the same time strengthens its grip on android.
It got particularly bad with 4.4, and I read reports that it went even worse with 5x...
unclefab said:
I really dislike 4.4 because it s full of spying, but on the other hand I definitely could build a 4.4 rom for the Grand 2 cuz I can understand that not many people want to take the risk to downgrade.
The only problem is that I don t own the phone, and that the person I borrowed it from doesn t want me to install 4.4 on it, because of knox and because 4.3 runs well.
One thing you have to bear in mind is that latest android version doesn t mean best version, and since 4.1 it s actually been quite the opposite.
Google install 2-3 gimmicks to "enhance users' experience" bla bla, and at the same time strengthens its grip on android.
It got particularly bad with 4.4, and I read reports that it went even worse with 5x...
Click to expand...
Click to collapse
spying? Meh. 80% of people are on kitkat and a few are on lollipop. No reports of something hack-ish.
Laurisss said:
spying? Meh. 80% of people are on kitkat and a few are on lollipop. No reports of something hack-ish.
Click to expand...
Click to collapse
Most people don t realise they are being spyied.
Do one test.
Download network log from here:
https://f-droid.org/repository/browse/?fdfilter=network+log&fdid=com.googlecode.networklog
Install it, open it, give it root access and start logging by clicking "logging on" on the top.
Then do some browsing, going to this or that site, but don t go to any google related web site (no search, no youtube etc.).
Come back to network log, you will see that your phone connected to many funny addresses, including of course google, and that quite a lot of data has been transfered both inbound and outbound.
That s just a small test, there s actually much more than that but you ll get the idea.
You could make another test with xprivacy, and if you do so you ll see that all apps request various private data like ids and cell towers location.
The thing is that the higher the android version the more difficult it is to prevent that data mining, data mining that is little more than spying by looking over your shoulder.
Una roms have been designed to prevent that, and more (see OP), but it s up to everybody to install it or not.
I really appreciate your Hard work , I can imagine how much hard work you would have done by working on a phone which you do not own , borrowing it again and again , testing the ROM on someone else's phone and the fear of bricking it . But as someone mentioned in the thread many users are on 4.4 . Many here fear bricking there devices while downgrading it. The mere fact that you have to downgrade your device to use the ROM is what cause of lack of users . personally I really liked what your ROM offers. Just to help you for further development H6 is the most stable and without Knox count firmware. Some 60-70 % users who flash custom ROM are on this firmware and even many custom Roms use it as a base . Hope to see this ROM on kk .
Best of luck.
unclefab said:
I really dislike 4.4 because it s full of spying, but on the other hand I definitely could build a 4.4 rom for the Grand 2 cuz I can understand that not many people want to take the risk to downgrade.
The only problem is that I don t own the phone, and that the person I borrowed it from doesn t want me to install 4.4 on it, because of knox and because 4.3 runs well.
One thing you have to bear in mind is that latest android version doesn t mean best version, and since 4.1 it s actually been quite the opposite.
Google install 2-3 gimmicks to "enhance users' experience" bla bla, and at the same time strengthens its grip on android.
It got particularly bad with 4.4, and I read reports that it went even worse with 5x...
Click to expand...
Click to collapse
Definitely I wanna going to try this rom. I never said 4.4. Or 5 is best versions of android.
But the fact is downgrading is some what risky. Eben then I am going to try.
No need to pay me for taking sweet.
wrishaba said:
Definitely I wanna going to try this rom. I never said 4.4. Or 5 is best versions of android.
But the fact is downgrading is some what risky. Eben then I am going to try.
No need to pay me for taking sweet.
Click to expand...
Click to collapse
I didn t read everything about the downgrade procedure, but of what I have read you have to odin flash a specific KK version first, and then a specific 4.3.
Anyway, if it s really that risky maybe you shouldn t try and wait until we manage to release a 4.4 Una rom.
The problem is that the person that owns that phone uses it for business purposes, so I have to be very careful not to loose all the whatsapp, bbm etc. contacts and settings, and if it was ok to backup her rom, work on making una during nights and then restoring her original rom in the early morning, it would be a different story to switch from 4.3 to 4.4 to again 4.3 every night...
Let s see if I can convince her to use 4.4 as her daily rom, but I can t lie and tell her that 4.4 is better than 4.3, and I don t think she will accept to sacrifice her phone.
I meet her again next month and I ll keep you informed in case she accepts.
For now what you can do if you want to make your phone more private and secure is to follow what I explain in my security thread (check my signature "how to secure your phone").
unclefab said:
I didn t read everything about the downgrade procedure, but of what I have read you have to odin flash a specific KK version first, and then a specific 4.3.
Anyway, if it s really that risky maybe you shouldn t try and wait until we manage to release a 4.4 Una rom.
The problem is that the person that owns that phone uses it for business purposes, so I have to be very careful not to loose all the whatsapp, bbm etc. contacts and settings, and if it was ok to backup her rom, work on making una during nights and then restoring her original rom in the early morning, it would be a different story to switch from 4.3 to 4.4 to again 4.3 every night...
Let s see if I can convince her to use 4.4 as her daily rom, but I can t lie and tell her that 4.4 is better than 4.3, and I don t think she will accept to sacrifice her phone.
I meet her again next month and I ll keep you informed in case she accepts.
For now what you can do if you want to make your phone more private and secure is to follow what I explain in my security thread (check my signature "how to secure your phone").
Click to expand...
Click to collapse
All builds prior to NK1 are without KNOX.
NH6 is good and speedy.
I'm a dev too, and I don't recommend the over-VIP experience you're using to grab customers. I ain't sure, but it looks humiliating to you to give picky users a VIP experience.
Just tell them to get the hell off the thread if they hate the idea (I really like it and would've upgraded if I was a TW user. I use AOSP CM).
Also, the screenshots are from a Grand 1, and our device is SM-G7102, not I7102. You mixed up with the Grand 1 i9082.
Oah you know, customers is maybe not the right word, unless they pay which is not the case!
Then I don t know if that can be called a vip experience, but I understand your point, maybe sometimes I m too nice, what to do...
For the screenshots, I didn t mix 'em, I explained in OP that I didn't have time to make any since I ran short of time, and that the ones I put here come from another phone.
A galaxy grand i9082, yep, well done, you have a sharp eye!
They are very similar in shape, layout and color (apart from the cascade icon to minimize windows that Samsung has removed after 4.2.2, a big mistake to my opinion), so people can get the idea.
WaseemAlkurdi said:
I'm a dev too, and I don't recommend the over-VIP experience you're using to grab customers. I ain't sure, but it looks humiliating to you to give picky users a VIP experience.
Just tell them to get the hell off the thread if they hate the idea (I really like it and would've upgraded if I was a TW user. I use AOSP CM).
Click to expand...
Click to collapse
In some ways you are right, but we think that being professional is not a bad thing, despite the fact that the forum is full of picky users, ready to make bad comments even without trying the product. Of course, we can and we will also give a VIP experience, but it is reserved for the ones that will earn it.
In any case we appreciate your support. Thank you
WaseemAlkurdi said:
All builds prior to NK1 are without KNOX.
NH6 is good and speedy.
I'm a dev too, and I don't recommend the over-VIP experience you're using to grab customers. I ain't sure, but it looks humiliating to you to give picky users a VIP experience.
Just tell them to get the hell off the thread if they hate the idea (I really like it and would've upgraded if I was a TW user. I use AOSP CM).
Also, the screenshots are from a Grand 1, and our device is SM-G7102, not I7102. You mixed up with the Grand 1 i9082.
Click to expand...
Click to collapse
When downgrade strucked at boot logo "samsung".
Thai version. 4.3. What to do wasim? Any idea.
Odin flash failed. Again flashed NH6. Again boot loop.
Pllllzzzzz download link
Sent from my SM-G7102 using XDA Free mobile app
wrishaba said:
When downgrade strucked at boot logo "samsung".
Thai version. 4.3. What to do wasim? Any idea.
Odin flash failed. Again flashed NH6. Again boot loop.
Click to expand...
Click to collapse
As I recall, wiping (data/cache/Dalvik cache) from recovery worked.
You're lucky you ain't in a hard brick
Note that you need ClockWorkMod Recovery to wipe Dalvik.

About Android MMS Stagefright exploit

How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Sent from my GT-I9301I using XDA Forums Pro.
mihai.apostu98 said:
How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Sent from my GT-I9301I using XDA Forums Pro.
Click to expand...
Click to collapse
Heres some useful info:
http://www.cnet.com/news/researcher-finds-mother-of-all-android-vulnerabilities/
That's some info, but not really anything useful. Does this mean Google has a patch, will they be pushing that our or will there be ways to patch custom ROMs sooner even? These are all unanswered, though would be nice to know...
"As soon as the malicious text is received, features built into Stagefright to reduce lag time for viewing videos process the video to prepare it for viewing. That processing apparently is enough for bad guys to get their hooks into the platform and take control." - cnet
I see it like this:
1. MMS with video arrives
2. Messaging app loads the video in Stagefright where it will processed for better playback.
3. Video is ready for playing.
As I figure out from Google's Android site about Stagefright, it is a service that take care of video/audio/other media related stuff offline and local.
How can hackers connect with Stagefright if Stagefright is an offline service? And anyway how can an media service recive code to execute as an remote command execution for whole system?
Sorry but I just don't get it at all.
mihai.apostu98 said:
How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Click to expand...
Click to collapse
Here's further info. Google has apparently already sent the patches, 7 in all, to the various phone manufacturers.
Because of fragmentation, though, some of them may never send out these fixes. Since these have assumedly been committed to the source code online, they should theoretically be available for download at some point as well. However, you'd (likely) need to be rooted to apply them.
In the meantime, go into your SMS application (usually Hangouts these days) and turn off automatic MMS retrieval. Then, do not accept any photos or videos from anyone you don't know. I am not sure, but I worry it's also possible you might get it from someone do know who is already infected, so just operate with an abundance of caution overall, I guess. And keep an eye out for news here, because it will probably be one of the first places they become available.
mihai.apostu98 said:
"As soon as the malicious text is received, features built into Stagefright to reduce lag time for viewing videos process the video to prepare it for viewing. That processing apparently is enough for bad guys to get their hooks into the platform and take control." - cnet
I see it like this:
1. MMS with video arrives
2. Messaging app loads the video in Stagefright where it will processed for better playback.
3. Video is ready for playing.
As I figure out from Google's Android site about Stagefright, it is a service that take care of video/audio/other media related stuff offline and local.
How can hackers connect with Stagefright if Stagefright is an offline service? And anyway how can an media service recive code to execute as an remote command execution for whole system?
Sorry but I just don't get it at all.
Click to expand...
Click to collapse
People connect with Stagefright by sending you the malicious code contained within the MMS. Once that code gets (usually automatically) processed by the Stagefright service already locally present, it exploits security vulnerabilities to hand control of your device over to whomever is waiting on the other end. As for a media service being able to control the whole system, think of how Flash (a media service) and Microsoft had those zero-day UaE bugs that would allow someone to take over your PC. The logistics may be different, but the concept is the same.
If I remember correctly, there are ways to turn stagefright on/off by editing your build.prop file (easily found on XDA). I don't know if there is another subservice or what that could be running, and I haven't devved since Android 4 dropped, so don't get your hopes up.
Hope that helps.
I gather that Google has a patch. Has it been pushed out to Nexus devices?
pomeroythomas said:
If I remember correctly, there are ways to turn stagefright on/off by editing your build.prop file (easily found on XDA). I don't know if there is another subservice or what that could be running, and I haven't devved since Android 4 dropped, so don't get your hopes up.
Click to expand...
Click to collapse
Excellent idea, +thanks. Et voilà, what appears to b-e in my KitKat:
media.stagefright.enable-player=false
media.stagefright.enable-meta=false
media.stagefright.enable-scan=false
media.stagefright.enable-http=false
media.stagefright.enable-rtsp=false
media.stagefright.enable-record=false​
Now, this can break all kinds of things if you don't know what you're doing. Use a build.prop editor from the Play Store.
I don't know that they all need to be false to plug this hole. But those are the relevant lines.*
UPDATE [10 Aug 2015]: This doesn't affect what the Zimperium scanner says is vulnerable, which may indicate the edit won't protect you. It's unclear at this point.... read the latest posts in this thread for possible info. You can turn off auto-retrieve in MMS, but SF exists at other levels of the operating system. I suppose it couldn't hurt to do the build.prop, but don't rely on it.
voxluna said:
Excellent idea, +thanks. Et voilà:
media.stagefright.enable-player=false
media.stagefright.enable-meta=false
media.stagefright.enable-scan=false
media.stagefright.enable-http=false
media.stagefright.enable-rtsp=false
media.stagefright.enable-record=false​
Now, this will probably break all kinds of things, and I don't know that they all need to be false to plug this hole. But those are the relevant lines.
Click to expand...
Click to collapse
Thanks for the thanks!
You probably won't break much of anything; 90% of today's phones are powerful enough that you don't REALLY need Stagefright handling the media unless you're playing very intensive games on your device. The most you'll likely experience is not-quite-as-good benchmarking numbers.
pomeroythomas said:
Thanks for the thanks!
You probably won't break much of anything; 90% of today's phones are powerful enough that you don't REALLY need Stagefright handling the media unless you're playing very intensive games on your device. The most you'll likely experience is not-quite-as-good benchmarking numbers.
Click to expand...
Click to collapse
I had honestly never heard of StageFright, and I've been using Android since the very first device came out. But if it's possible to run all the usual media, just with a performance penalty, I'm going to change it right now (I did, and this happened).
Also, I just read an article claiming that fragmentation is not so much of an issue these days, because Google Play Services is mandatory. I wonder if it can proactively change something like this, on its own?
voxluna said:
I had honestly never heard of StageFright, and I've been using Android since the very first device came out. But if it's possible to run all the usual media, just with a performance penalty, I'm going to change it right now.
Click to expand...
Click to collapse
The only reason I even know about Stagefright is because my very first, 550MHz, resistive touchscreen Kyocera Zio shipped with Stagefright disabled by default. Haha.
Also, I just read an article claiming that fragmentation is not so much of an issue these days, because Google Play Services is mandatory. I wonder if it can proactively change something like this, on its own?
Click to expand...
Click to collapse
I would assume it's possible (this is just an arbitrary code execution issue, I think), but having had that vulnerability built into pretty much every ROM for the last 5 years could be a problem in that I'm not 100% sure that Google Play Services has the access to shut down the Stagefright service (no root access, etc), so I'm pretty sure Google Play Services would be less of a fix than a piece of software that actively tries to mitigate the breach.
I could be wrong, though; I'm basically guessing as I haven't looked into the malicious code.
Xposed Android will no doubt have either a module for this or existing bugfix modules will be updated to include this vulnerability in the coming days, and due to the nature of Xposed modules taking over services the ROM is trying to run without actually messing with your ROM, I'm sure it'll be a universal fix.
Personally, I just shut off the Stagefright service using my build.prop and am patiently awaiting someone more skilled than I to create a fix.
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Morlok8k said:
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Click to expand...
Click to collapse
Here's hoping!
Morlok8k said:
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Click to expand...
Click to collapse
pomeroythomas said:
I'm not 100% sure that Google Play Services has the access to shut down the Stagefright service (no root access, etc), so I'm pretty sure Google Play Services would be less of a fix than a piece of software that actively tries to mitigate the breach.
Click to expand...
Click to collapse
Come to think of it, if this exploit allows any kind of root, I suppose it'd be possible for Services itself to use that hole, and therefore be able to patch StageFright. A weird workaround, but entirely possible. Something tells me they won't use it, though, as technically feasable as it may be. I'm really hoping for that Xposed fix, just like GravityBox can patch FakeID. Which, indeed, Services eventually mitigated (for the most part).
commits on android.googlesource.com
Has anyone tracked any commits in android.googlesource.com related to stagefright?
Is this really a viable fix for this? I copied it from another website
If you turn off the following settings in your messaging app/apps on your device:
Auto-retrieve MMS. Check to automatically retrieve multimedia messages that you receive. If auto-retrieve is unchecked in your Messenger MMS settings, you must touch Download to view the message.
Roaming auto-retrieve. Check to automatically retrieve multimedia messages while roaming.
Then when you receive the text with this exploit it will not download to your phone unless you hit the download button. So looks like this can be turned off without a patch but patches are needed cause not everyone is smart enough to turn these off.
iverson3-1 said:
Is this really a viable fix for this? I copied it from another website
Auto-retrieve MMS. Check to automatically retrieve multimedia messages that you receive. If auto-retrieve is unchecked in your Messenger MMS settings, you must touch Download to view the message.
Roaming auto-retrieve. Check to automatically retrieve multimedia messages while roaming.
Then when you receive the text with this exploit it will not download to your phone unless you hit the download button. So looks like this can be turned off without a patch but patches are needed cause not everyone is smart enough to turn these off.
Click to expand...
Click to collapse
That should be one way to disable the hack. It's unclear from what I've read if it only affects Hangouts, or all SMS clients. What I've done is disable any auto MMS retrieve in my own messaging app, which in my case is mySMS. I suppose it couldn't hurt to do it in Hangouts as well.
This should cover it, but I think you still run the risk of someone you know sending (probably without their knowledge) an infected video -- much like trojans that take over a PC, and use the internal contact list to send mail as though they were your friend, they could exploit your trust.
Patching the build.prop theoretically protects from this, which I've personally done, but it's not for the faint of heart. If you screw it up, you could render your phone a mess. I wish I knew more about app development, because I would write something that did all this stuff automagically.
voxluna said:
Patching the build.prop theoretically protects from this, which I've personally done, but it's not for the faint of heart. If you screw it up, you could render your phone a mess.
Click to expand...
Click to collapse
Aaaaaand that's what I just did. I'm in a boot loop after changing the build.prop file. This is going to be really fun with an encrypted data partition that holds the backup I just made.
Be warned.
UPDATE: I had to reflash the ROM, and the entire experience took about 2.5 hours because I couldn't get a KDZ to work. I decided that since it was going to be a full wipe, at least I would upgrade to Lollipop, but I'll have to set up the entire phone all over again. I suspect the problem was that I didn't pay attention to the permissions of that file when I edited and transferred it from another machine. Ugh. I just went back and put warnings on all my posts about the build.prop lines.... and it would be better to just wait for patches, IMO. This thread is progressing quickly now.
i tried tracking the fix on android source repo. but the only recent commit against libstagefright is on July 7th.
Fix global-buffer-overflow in voAWB_Copy.
Copy() in frameworks/av/media/libstagefright/codecs/amrwbenc/src/util.c always
overreads the buffer by 4 bytes to the right, which, if we are very unlucky,
can even hit an unmapped memory page (in this case it is just a global
variable).
Click to expand...
Click to collapse
Hi all,
in my case, as I plainly don't use the MMS feature, I simpl deleted the MMS apn. Is this a possible workaround for this problem (at least, until it gets fixed somehow)?

(What are) Must have APPS and To-Do to newbies to Galaxy S9+ (?)

Hey all.
Within a couple of days I'm getting my new Galaxy S9+ (Exynos) phone.
I made a year break from Android and switched to Apple, and now I'm back.
Unfortunately, I know nothing about newest Galaxy phones.
Maybe anyone has suggestions what should I do (download) when I'll set-up my phone (I've watched all the reviews of "must have" etc., don't suggest me to do that)?
I used to root and unlock bootloader for each my android phone, but I won't do that to my Galaxy S9+ at least for 6 months.
Hence, many root apps not working: "AdAway", "Viper4Android" etc.,
Maybe anyone knows Ad Blocking app without rooting a phone?
Or just mention anything that newbie to Galaxy S9+ should know.
(If you're wondering why am I "spamming" with these "stupid" questions: And no, I didn't find any similar thread to this)
Thanks in advance!
I use to root and rom all my phones, but I don't think it is as necessary as before.
I also use to download all the tweaks, but I don't do that either.
Non-root to block adds try Blokada it is in the F-Droid store.
It is Free and it Works.
I also swear by ES File Explorer to view and move files on your app. Also to sync any cloud storage you have.
If you have a regular phone number and google voice number going to the same phone
Voice Choice 2.0 is a nice app that allows you to make calls with a specific number
i.e. family and close friends have you carrier number
work partners, resume, business line has your google number
when you make a call you don't have to select anything, based on your rules set up it will dial out using the appropriate number.
re
qnc said:
I use to root and rom all my phones, but I don't think it is as necessary as before.
I also use to download all the tweaks, but I don't do that either.
Non-root to block adds try Blokada it is in the F-Droid store.
It is Free and it Works.
I also swear by ES File Explorer to view and move files on your app. Also to sync any cloud storage you have.
If you have a regular phone number and google voice number going to the same phone
Voice Choice 2.0 is a nice app that allows you to make calls with a specific number
i.e. family and close friends have you carrier number
work partners, resume, business line has your google number
when you make a call you don't have to select anything, based on your rules set up it will dial out using the appropriate number.
Click to expand...
Click to collapse
Thanks! Maybe you know anything about removing / disabling Bloatware as well?
LaurynasVP said:
Thanks! Maybe you know anything about removing / disabling Bloatware as well?
Click to expand...
Click to collapse
check out this thread at your own risk. It works I disabled Facebook (don't see why that would be on and unlocked phone fro Samsung, but i digress)
https://forum.xda-developers.com/galaxy-s9-plus/how-to/s9-s9-bloatware-removal-thread-g960u-t3817810
Be careful with the commands and understand what is being done before you hit the enter/return key
Good thing about disabling is if you fubar the phone you can do a factory restore and start all over
I only disabled Facebook. will investigate the other software as i play with the phone. Only had it 2 weeks so far.
re
qnc said:
check out this thread at your own risk. It works I disabled Facebook (don't see why that would be on and unlocked phone fro Samsung, but i digress)
https://forum.xda-developers.com/galaxy-s9-plus/how-to/s9-s9-bloatware-removal-thread-g960u-t3817810
Be careful with the commands and understand what is being done before you hit the enter/return key
Good thing about disabling is if you fubar the phone you can do a factory restore and start all over
I only disabled Facebook. will investigate the other software as i play with the phone. Only had it 2 weeks so far.
Click to expand...
Click to collapse
Thanks, I'll keep everything in mind

Question How to make the best of an unlockable_unrootable Verizon US variant?

I recently upgraded to the S23 Ultra and discovered that there's no option to unlock the bootloader. The root functions I value most are:
A firewall that will block apps from phoning home and/or accessing the internet without using the Android vpn (not sure if I could do that even if rooted...I just want to block apps from phoning home and use a vpn at the same time))
A call recorder (currently using Cube ACR, which actually works pretty good)
A way to 'image' the entire phone (i.e., like TWRP back up/restore)
A way to uninstall the bloatware that doesn't have an uninstall function.
Barring some method that will unlock the bootloader on this phone, what are methods/apps that will help me get as close to a rooted state as possible?
Well your first point is solved with what I use for privacy and adblocking. NextDNS (free option or $12/yr) you get a private DNS server and you control what is blocked and what isn't with all the customization you want. As for call recording, I've used skvalex (free with paid pro option but pro only adds automatic backup) for years whether rooted or not and it always works just fine. Though I will admit when it's connected to my car with Bluetooth it only records my side but I rarely talk while in the car so not a deal breaker for me. Thirdly, you could use adb to make a backup (from what I've read) but I use shizuku to give swift backup more permissions and it backups everything for me.
Thanks for your comments, spart0n.
I looked over NextDNS. It seems to have a lot of features. I do use my vpn's DNS, but they're various US servers are slow, plus NextDNS seems to have more features.
One thing I'm not clear on is can it slectively block apps from connecting to the internet, both on mobile /and/or wifi connection, much like a firewall?
I also did a quick perusal of skvalex, but I'm not sure how it's different from Cube ACR? One concern with cube is security...are they doing nefarious things with my data.
Cube also won't record the other side of a conversation when I'm using a bluetooth device (earbuds, car).
Is skvalex ' more respecting of privcy? In what ways do you deem it superior to other options such as Cube?
I'll be looking into Shizku and Swift backup, but am I correct in that it seems to be more of a 'Titanium' type app than a complete phone backup?
I really appreciate the pointers.
Sam Sung said:
Thanks for your comments, spart0n.
I looked over NextDNS. It seems to have a lot of features. I do use my vpn's DNS, but they're various US servers are slow, plus NextDNS seems to have more features.
One thing I'm not clear on is can it slectively block apps from connecting to the internet, both on mobile /and/or wifi connection, much like a firewall?
I also did a quick perusal of skvalex, but I'm not sure how it's different from Cube ACR? One concern with cube is security...are they doing nefarious things with my data.
Cube also won't record the other side of a conversation when I'm using a bluetooth device (earbuds, car).
Is skvalex ' more respecting of privcy? In what ways do you deem it superior to other options such as Cube?
I'll be looking into Shizku and Swift backup. I really appreciate the pointers.
Click to expand...
Click to collapse
I've tried cube in the past and it had a lot of denied connections in the background but over the years skvalex has worked perfectly even if I completely block all internet connectivity even from the start of installation except for checking for pro version.
As for NextDNS it does work on wifi and cellular. Personally I pay for the pro and have it setup on my home router plus all my phones too
Try freezing the Apps you cannot uninstall - e.g. SuperFreezZ or SD Maid.
Have a look here for some other goodies that may be useful:
https://alternativeto.net/list/28655/the-ultimate-f-droid-setup/
elmor0 said:
Try freezing the Apps you cannot uninstall - e.g. SuperFreezZ or SD Maid.
Have a look here for some other goodies that may be useful:
https://alternativeto.net/list/28655/the-ultimate-f-droid-setup/
Click to expand...
Click to collapse
There's no such thing as not able to uninstall. With adb commands you can uninstall literally any app, even system apps.
spart0n said:
There's no such thing as not able to uninstall. With adb commands you can uninstall literally any app, even system apps.
Click to expand...
Click to collapse
My understanding is that the system apps don't get truly uninstalled but are effectively disabled (frozen)......?
spart0n said:
I've tried cube in the past and it had a lot of denied connections in the background but over the years skvalex has worked perfectly even if I completely block all internet connectivity even from the start of installation except for checking for pro version.
As for NextDNS it does work on wifi and cellular. Personally I pay for the pro and have it setup on my home router plus all my phones too
Click to expand...
Click to collapse
The problem I've seen with Cube is that it sometimes randomly ends a recording before the call is finished.
Your earlier comment about using ABD to backup the phone - I found this and several other similar articles/guides outlining the method I think you alluded to. Seems pretty straight-forward. I also turned up info on uninstalling. Thanks for that - ABD seems the way to go.
The link:
How To Create a Full Android Phone or Tablet Backup Without Rooting or Unlocking Your Device
Android includes a built-in way to back up and restore the contents of your phone or tablet. All you need is a computer and a device running Android 4.0 (Ice Cream Sandwich) or newer.
www.howtogeek.com
Adding this link:
How to uninstall carrier/OEM bloatware without root access
If you want to get rid of carrier/OEM apps from your phone, here's how you can uninstall bloatware from your device without root access!
www.xda-developers.com
elmor0 said:
My understanding is that the system apps don't get truly uninstalled but are effectively disabled (frozen)......?
Click to expand...
Click to collapse
They do get uninstalled, but they remain inside the recovery partition so that when you reset the device they get reinstalled. You can disable or uninstall from Android any system app, even breaking the system, but the app will not get deleted from recovery unless you flash twrp or another custom recovery which deletes the stock recovery
Sam Sung said:
The problem I've seen with Cube is that it sometimes randomly ends a recording before the call is finished.
Your earlier comment about using ABD to backup the phone - I found this and several other similar articles/guides outlining the method I think you alluded to. Seems pretty straight-forward. I also turned up info on uninstalling. Thanks for that - ABD seems the way to go.
The link:
How To Create a Full Android Phone or Tablet Backup Without Rooting or Unlocking Your Device
Android includes a built-in way to back up and restore the contents of your phone or tablet. All you need is a computer and a device running Android 4.0 (Ice Cream Sandwich) or newer.
www.howtogeek.com
Adding this link:
How to uninstall carrier/OEM bloatware without root access
If you want to get rid of carrier/OEM apps from your phone, here's how you can uninstall bloatware from your device without root access!
www.xda-developers.com
Click to expand...
Click to collapse
Those are okay but dated guides for bloatware removal. There's 2 easy ways right now. One open source and not as feature rich and then there's a free/pro app that has more features.
Open source is universal android debloater gui (unless you want command line) from GitHub really easy to find with Google.
Or adb app control from cybercat. He's very active in his telegram support group and helpful
spart0n said:
Those are okay but dated guides for bloatware removal. There's 2 easy ways right now. One open source and not as feature rich and then there's a free/pro app that has more features.
Open source is universal android debloater gui (unless you want command line) from GitHub really easy to find with Google.
Or adb app control from cybercat. He's very active in his telegram support group and helpful
Click to expand...
Click to collapse
So they are. Not stuck on terminal. I've found and bookmarked AppControl download page.
Looking again, the ADB guide I linked to is aged too...is that still the best method? A Windows GUI would be nice for that too. Is there a reliable app or is ADB still my best bet?
Sam Sung said:
So they are. Not stuck on terminal. I've found and bookmarked AppControl download page.
Looking again, the ADB guide I linked to is aged too...is that still the best method? A Windows GUI would be nice for that too. Is there a reliable app or is ADB still my best bet?
Click to expand...
Click to collapse
Yeah there's a gui for adb, it's called universal android debloater from GitHub and in the release section they have a gui version
GitHub - 0x192/universal-android-debloater: Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device.
Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device. - GitHub - 0x192/universal-android-debloater:...
github.com
spart0n said:
Yeah there's a gui for adb, it's called universal android debloater from GitHub and in the release section they have a gui version
GitHub - 0x192/universal-android-debloater: Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device.
Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device. - GitHub - 0x192/universal-android-debloater:...
github.com
Click to expand...
Click to collapse
Rereading, I can see I wasn't clear at all. I should have specified 'for backup'. I'm doing a bit of searching for something now and this week. I doubt I can image the entire phone, but I'm hoping to find as complete and 'nandroid-like' backup solution as I can. If you know of anything, I'd appreciate it. Or maybe my best bet actually is ABD and commandline.
Sam Sung said:
Rereading, I can see I wasn't clear at all. I should have specified 'for backup'. I'm doing a bit of searching for something now and this week. I doubt I can image the entire phone, but I'm hoping to find as complete and 'nandroid-like' backup solution as I can. If you know of anything, I'd appreciate it. Or maybe my best bet actually is ABD and commandline.
Click to expand...
Click to collapse
Honestly I don't know any good ones, I use swift backup with shizuku. That's all I really know of. It works like titanium backup did but without root, even with shizuku, is somewhat limited.
adb pull /sdcard will get your files
Sometimes adb pull will fail on a specific file or folder and just puke on itself and refuse to continue. If that happens, you just have to delete the file/folder and try again. I've only had this happen once though.
Swift Backup with shizuku will back up apps and their downloaded data but not user data. Pair it with Google Backup and Google will restore *some* app data... Realistically though, you'll be losing some or a lot of app data, depending on app policies.
Thanks for your responses. Regrettably, there's no option in Dev options to unlock the boot-loader., so I'm stuck with whatever is available. Now I know. I should have either switched carriers or bought an unlocked phone, which I think comes with its own caveats.
User data, photos and such isn't too much of an issue here. My client data from apps is backed up to PC regularly, as are any photos I want to keep etc.
I like Nandroid backups because they backup everything including texts, call logs and OS (nice in case something happens and the OS bites the dust or gets crippled).
The real issue is my texts and call logs, moreso the texts..
How reliable is Swift (which is looking more and more attractive) compared to ABD, and can ABD back up more?
Also, side note, but my late wife's phone is an S7. I lost a previous phone and ergo my texts, so the texts on her phone are all I have of our texts over the years.
I was thinking I'd use Smart Switch or something to transfer the texts from her phone over to the S10 I just upgraded from. Is that practical?
I appreciate your remarks. Thanks!
Sam Sung said:
Thanks for your responses. Regrettably, there's no option in Dev options to unlock the boot-loader., so I'm stuck with whatever is available. Now I know. I should have either switched carriers or bought an unlocked phone, which I think comes with its own caveats.
User data, photos and such isn't too much of an issue here. My client data from apps is backed up to PC regularly, as are any photos I want to keep etc.
I like Nandroid backups because they backup everything including texts, call logs and OS (nice in case something happens and the OS bites the dust or gets crippled).
The real issue is my texts and call logs, moreso the texts..
How reliable is Swift (which is looking more and more attractive) compared to ABD, and can ABD back up more?
Also, side note, but my late wife's phone is an S7. I lost a previous phone and ergo my texts, so the texts on her phone are all I have of our texts over the years.
I was thinking I'd use Smart Switch or something to transfer the texts from her phone over to the S10 I just upgraded from. Is that practical?
I appreciate your remarks. Thanks!
Click to expand...
Click to collapse
As for bootloader unlocking anything Samsung, you can't buy the north America models, any other country model will have the option for unlocking. As for swift vs adb without root? Swift does call logs and text backups locally on the device and on several cloud services of your choice if you wish.
spart0n said:
As for bootloader unlocking anything Samsung, you can't buy the north America models, any other country model will have the option for unlocking. As for swift vs adb without root? Swift does call logs and text backups locally on the device and on several cloud services of your choice if you wish.
Click to expand...
Click to collapse
Thanks, sprt0n. I'll give Swift a try, along with Shizuku. Regarding the old S7 texts...do you recommend Swift there as well? WIll there be an issue transfering texts between the s7 and s10 given their age? S10 is Android 12, S7 is Android 8.
Sam Sung said:
Thanks, sprt0n. I'll give Swift a try, along with Shizuku. Regarding the old S7 texts...do you recommend Swift there as well? WIll there be an issue transfering texts between the s7 and s10 given their age? S10 is Android 12, S7 is Android 8.
Click to expand...
Click to collapse
You can try it says on the Google Play store listing page that supports Android 6 and up so it should work
I'll do that, Thx.
Y'all have given me direction regarding uninstalling apps and back up, and even firewalling, if NextDNS allows.
I may be back for future questions after I research this stuff. I appreciate all your comments, particularly spart0n.

Categories

Resources