Related
Hi all,
If you are going to say we don't need Apps2SD on the N1, please leave the thread now . (Actually, read on) There are various reasons I can think of why we need Apps2SD on the N1, and one of the biggest is actually Games. I don't really play any games to begin with, but the last I checked, some games are as large as 19MB, possibly more. Isn't it kind of crappy that the N1, the superphone, can't hold more than 10 such games?
I started this thread with the intention of gathering more information, and hopefully some coders will do it (including myself, if I've the time). Package Manager (the thing in charge of installing, if I'm not wrong), is in the AOSP, under frameworks/base. In such a case, wouldn't it be possible for some programmer to mod it such that it will ask you whether to install to (SD/Phone) before each installation process?
The other issue is, looking at current implementation of A2SD, it seems all apps on Phone are moved to the SD card partition. If we can have an implementation that allows both to co-exist, in addition to the Package Manager mod, I'd say we'll have a pretty nice implementation.
Your thoughts/findings? I may be completely off, have yet to actually look at the AOSP source.
Update:
@ChrisSoyars has an early implementation of this in his SnackPack - http://forum.xda-developers.com/showthread.php?t=638301
I would also like to thank everyone else for their valuable input and support ! Keep them coming. Lastly, sorry I'm not doing much code-wise (not at all), school work's too much .
Would be nice!
....I've got the same problem. Some application are very big and so i have got only 10MB free space anymore...
ADB is god
See my attachment file
And...there is already a post about app2SD and this is not in the correct section...
lazinase said:
See my attachment file
And...there is already a post about app2SD and this is not in the correct section...
Click to expand...
Click to collapse
that doesnt work on roms like the desire by modaco. app2sd doesnt work, ive tried that method and it just hangs. true there is a thread already for app2sd, but its not going anywhere in terms of the newest desire release. i know its still early, but i only had like 50mb for apps and i have over 120 apps and i didnt feel like reinstalling. someone fix it please.
Apps to SD is of course necessary. The Nexus doesn't really have that much space for apps - about 190mb which is only the same as the Hero.
I have apps 2 SD working with CM 5.0.3 from the kitchen.
its also addable to a CM rom using the how to thread.
It WAS working ok with MoDaCo ROMS but for some reason has ceased to work and causes bootloops if you bake it in - shame...
I've no coding experience, but willing to test stuff out anytime.....
Dayz xx
i think what Wysie is trying to do is stimulate discussion about a different way to do A2SD.
He, and a lot of people believe (including myself) that running apps from the sd makes them slower, so what he wants is like WM where when you install an app it gives you an option to install it either onthe device or on the sd. So you can choose to install your most used and apps that require speed the most on your device...
And if this isnt thread development where the hell should he have posted it? It certainly is development if you ask me. he is thinking of ways to develop a better A2SD.
Seems like unionfs + some kind of app to manage which apps live where might work. This would require kernel support, however. You would set up /data/app and /data/app-private as union mounts of (say) /data/app-internal with /sdcard/app and /data/app-private-internal with /sdcard/app-private. You would then want a custom app management tool to move things to the appropriate places.
Nice initative Wysie.
My suggestions are as follows:
Use a different mount point, not inside any of the other file systems.
Like /apps2sd, this makes it alot easier to handle in the recovery realm (which is what I care about).
As for handling the specific apps installed in either /data/app or /apps2sd I suggest we have a look at something simple. Like symlinking individual apps.
Ext filesystem is mounted on /apps2sd on boot.
New installs of apps are done in /data/app like normally. /data/app is not symlinked to the apps2sd directory like it is today.
If a user want a app to be stored on apps2sd instead of in /data/app a management app can just move the .apk from /data/app to /apps2sd and set up a symlink it up into /data/app again.
Simple demonstration:
Initial state, two apps installed normally:
/data/app:
SomeApp.apk
SomeOtherApp.apk
/apps2sd
<empty>
Now the user moves SomeApp to apps2sd:
/data/app
SomeApp.apk -> /apps2sd/SomeApp.apk (symlink)
SomeOtherApp.apk
/apps2sd
SomeApp.apk
If this is possible, i.e. making sure that Android doesn't bork on symlinked apps (can't see why it would, but best to make sure). This is clean simple way handle it. It gives more control on what apps are stored where, better handling of ext stuff in recovery.
Also writing scripts/apps to facilitate this is trivial since it's so simple.
What do you think? Want input especially from ROM makers.
packetlss said:
As for handling the specific apps installed in either /data/app or /apps2sd I suggest we have a look at something simple. Like symlinking individual apps.
Click to expand...
Click to collapse
Okay, that's better than my idea, assuming it works. One disadvantage is that removing the SD card breaks all the links. You could conceivably swap cards with the unionfs approach, as long as you were not using any widgets or launcher icons which rely on APKs in the SD storage, and had a way to properly unmount the disk. Might not be worth the complexity, though.
I think the biggest issue is with regards to removal of SD card. You guys have made it way more complex than I thought, thanks for enlightening/sharing !
I thought it could be as simple as simply modifying the Apps2SD script to allow apps to exist on both the sdcard and the phone, and then modifying the Package Manager to prompt the user on where to install to. Keep those thoughts/opinions coming!
If it wasn't for my school work and lousy time management i'd definitely start doing something. For now, it's good enough if all the necessary knowledge is shared here, then some dev can actually start work and put it on github or something for the rest of the community to contribute!
i haven't looked deeply into android's files. but i've worked on hacking motorola phones to engineer a packet manager system. (EZX phones)
i believe the solution that we want isn't with the use of symlink or that sort. we should aim to find a clean, programmatic way of doing it - built to the heart of android.
any idea how android am manage the apps on the phone? is there an sqlite app db or something? how does it store the installed applications information?
arctu said:
i haven't looked deeply into android's files. but i've worked on hacking motorola phones to engineer a packet manager system. (EZX phones)
i believe the solution that we want isn't with the use of symlink or that sort. we should aim to find a clean, programmatic way of doing it - built to the heart of android.
any idea how android am manage the apps on the phone? is there an sqlite app db or something? how does it store the installed applications information?
Click to expand...
Click to collapse
Well, you have to remember that the solution should work on stuff that we do not have source access to, like people wanting to use on ported ROMs or a rooted stock ROM.
I tried to simlink apk's but for some reason it didn't work, simlink the app directory works.
I think the best way would be to add paths in the program that actually searches/launches the apps (my guess would be that's in framework.jar)
Currently it looks in /system/app, /data/app & /data/app-private there should not be any technical reason why it couldn't look in a forth directory. this way you can keep the imporant/most used apps in the flash and large/less used on the sdcard...
rj3005 said:
I think the best way would be to add paths in the program that actually searches/launches the apps (my guess would be that's in framework.jar)
Currently it looks in /system/app, /data/app & /data/app-private there should not be any technical reason why it couldn't look in a forth directory. this way you can keep the imporant/most used apps in the flash and large/less used on the sdcard...
Click to expand...
Click to collapse
packetlss said:
Well, you have to remember that the solution should work on stuff that we do not have source access to, like people wanting to use on ported ROMs or a rooted stock ROM.
Click to expand...
Click to collapse
Again, this is the problem. A general technique suitable for XDA-type applications must require only root or changes to GPL code. You can't touch the framework, which can (and does) have proprietary branches.
packetlss said:
Well, you have to remember that the solution should work on stuff that we do not have source access to, like people wanting to use on ported ROMs or a rooted stock ROM.
Click to expand...
Click to collapse
i would say that we have no choice but to implement it without considering those groups. however, i do suggest that we should make the implementation compatible, just that, on modded frameworks like cyan, it works to the fullest.
olearyp said:
unionfs
Click to expand...
Click to collapse
Everything old is new again. Oh well.
olearyp said:
Everything old is new again. Oh well.
Click to expand...
Click to collapse
Unionfs is not available for android devices without kernel sources.
Concerning ported rom, I am not sure the package installer get modified by vendors. So it may be possible to implement the changes done to aosp code using baksmali.
So my two cents are:
- modify AOSP sources to have android lookup at /sd/app for apps
- modify package installer to have it asks where to install apps
Sure the removing of sdcard problem is still there. I don't know how we can ever handle a straight manual remove of it. It implies big modifications to AOSP sources to have the system aware of missing applications that have existing home shortcuts or widgets, so it "hides" them until app is back...
Anyway we can start implementing the functionality and look after for that sdcard removal problem.
I've been thinking of doing this for a while, has any progress been made?
I like the idea of modifying pm to prompt for the install location, I was thinking of just writing an app to manage that (but probably would be a good idea to have both).
If progress has been made, great, if not, I may start a fork of CM5's vendor tree for this.
Lox_Dev said:
Unionfs is not available for android devices without kernel sources.
Click to expand...
Click to collapse
Kernel sources are the one thing you most assuredly do have on all devices, at least if they're sold where copyright law can be enforced. No one needs to risk a lawsuit by intentionally violating GPL.
olearyp said:
Kernel sources are the one thing you most assuredly do have on all devices, at least if they're sold where copyright law can be enforced. No one needs to risk a lawsuit by intentionally violating GPL.
Click to expand...
Click to collapse
Well.. it is not the case in real life.... For eg, acer Liquid kernel sources they acer provided is unusable.
Just a clue for aosp source modification:
services/java/com/android/server/PackageManagerService.java:frameworks/base/ Log.d(TAG, "Scanning app dir " + dir
I am using Truecrypt on my PC as well as Ubuntu 10.10.
I am looking for a similar technology in Android.
Like you can mount and unmount a container like a SD card.
Nearest I reached was, people suggesting hiding files, which is not secure, simply put the card in another machine, you will see everything.
Another suggestion was to use some secure files, but it can store some information only.
I cannot see any evidence in truecrypt forums, they are working on any android version.
I was just checking Folder Lock, they do have a iPhone version. Not that impressive idea. Needs to upload data online to see in iPhone!!!
We need better and safer ideas from Androids.
Crack on...
I have the same problem for Android.
The only programs I found that you can use are secretvault pro en FileCrypter.
I use the last one. It encrypts the folder you want, but it's a little bit slow for maps above 100 MB.
I don't understand that with more than 250.000 apps, nobody comes out with a program like truecrypt, etc, where you can mount the map as a container with his own driveletter.
Berny Boss said:
I have the same problem for Android.
The only programs I found that you can use are secretvault pro en FileCrypter.
I use the last one. It encrypts the folder you want, but it's a little bit slow for maps above 100 MB.
I don't understand that with more than 250.000 apps, nobody comes out with a program like truecrypt, etc, where you can mount the map as a container with his own driveletter.
Click to expand...
Click to collapse
technical limits maybe?
Just manually encrypting folders and files might be no problem, but truecrypt is different. files from a truecrypt storage are decrypted in memory and there's a driver that makes the native file functions of the OS think that the files are coming from a real storage.
I don't think you can develop such drivers for Android, at least not on non-rooted phones. It would have been possible on Windows Mobile. I mean, it has existed already: SafeGuard for instance.
Thank you very much for your suggestions
I tried both Filecrypter and secretvault pro on Samsung Galaxy S, but encrypted files were visible on gallery!!.
This was after encrypting the folder.
Does android 2.2 saves gallery viewed files in any cache or tmp folder?
Yes we are in a desperate need for encrypted containers, which can store anything.
If we loose phone, nobody will return it, we need to safeguard our personel files.
Let the thief format the sdcard and use it.
Encrypted Container for Android
Hi,
I did a project for a client implementing encrypted container for the android phone. Unfortunately I can't release any source. But, if somebody is willing to recreate this I can guide them. PM me for details.
i know this post is old, but is there anything available today that can mount veracrypt containers? i know of eds but its just awful. android should do this by now.
essentially cryptonite is the frontend GUI for encfs.
more of encfs:
http://www.arg0.net/encfs
market link:
https://play.google.com/store/apps/...lt#?t=W251bGwsMSwxLDEsImNzaC5jcnlwdG9uaXRlIl0.
Linux/Ubuntu users should be familiar with encfs (with various frontend GUI such as Cryptkeeper). Personally I find this is great program (in Ubuntu). Tried the one for android, still in beta but so far works well. Good alternative to Truecrypt. And those who are using Dropbox, this app has the support for that too.
Also the dev is super responsive.
Trying this out now. I love seeing apps like these as I'm in college for computer forensics.
Excellent work. The poor security model that Dropbox is using is what prompted my move to Wuala. Client-side encryption/decryption ftw.
Glad to see someone addressing DB's faulty security.
I'll check that out!
I've been using LUKS, which is basically another BestCrypy/TrueCrypt for Android. It's a little finicky though.
@agentdr8
The other alternative would be Spideroaks which has client side encryption too.
@namebrandon
Yeah, I tried LUKS, Encryption Manager (by Giraone) and Renzhi.
LUKS & Renzhi are like Truecrypt. The size is fixed in advance and it is a hassle to change the size at later date if you need more space afterwards - which can be done in Linux, but I am not so sure how you can change the size afterwards in Android though. Encryption Manager on the other hand - I am not sure how it works but it managed to screw up few of my files during decryption whilst I was experimenting with it.
Nice thing about encfs/cryptonite - the "pass-through" file system, the space/size grows as needed with no intervention from the user.
Wow, sweet! I was looking for a TrueCrypt alternative for a while...
And I don't really like SpiderOak. On desktop it's cool, but the Android app is not really good...
Cryptonite now includes TrueCrypt
The latest alpha includes a command-line version of TrueCrypt. Get it from here: https://code.google.com/p/cryptonite/downloads/list
To get started, select the "expert" tab, then click "Start root terminal".
The value of this is as an encryption tool for dropbox or similar, when used with Foldersync or similar. Interestingly the latter can encrypt your files but only for Amazon S3. Unfortunately , the app needs root access to mount the encrypted volume on _my_ phone; how about you?
dabl8 said:
The value of this is as an encryption tool for dropbox or similar, when used with Foldersync or similar. Interestingly the latter can encrypt your files but only for Amazon S3. Unfortunately , the app needs root access to mount the encrypted volume on _my_ phone; how about you?
Click to expand...
Click to collapse
Yeah, you need to be rooted to mount the locally enrcypted volume
Apart from the encryption it gives to stuff you upload to the cloud, it protects anything sensitive that could be accessed if the phone is stolen. The big problem with having a rooted phone is that the phone is an open book for a thief with a USB cable that knows what recovery is. Android has full device encryption now, but I don't know if we will ever get a custom recovery that will work with that. I use an encfs'd textfile-based wiki (wikiandpad ) for my notes which I leave mounted while the phone is on and which obviously gets unmounted if the phone has to reboot, thus leaving it inaccessible from recovery. For the moment I don't see a better way, as any encrypted note taking apps are too inflexible for my liking. Another way might be a locked down recovery. So long as I can keep anybody from knowing my security pattern and I remember to keep adb off my notes are secure. The remaining problem is that any app with access to sdcard_rw and internet permissions can read my mounted encfs, so I would like to be able to mount the encfs on a different partition. But I think Google will come up with a fix for this soon.
dabl8 said:
encrypted note taking apps are too inflexible.
Click to expand...
Click to collapse
I agree. However, what's the next best thing at the moment since Whisper got bought out and everything from Guardian FC's? I'm looking for something convienient (quick) but has to be OpenSource...
Notecipher is a good idea but is not very good. Keepassdroid is a password store that could be pressed into service as a note taker. There is an app called mininoteviewer which is a port of Tombo and does quick encryption of individual notes.I would use Ghost Commander as root to edit your notes within /data, zip (within GC) or tar them up now and then (tar cf destination source, in th terminal or GC) and drop them in your cryptonite volume. Then share the encrypted version to Ubuntu One, which of course gets uploaded to your Ubuntu One Pictures directory. Email will work too. If you have sensitive notes it is not a good idea to have them on a fat32 sdcard.
Hi,
I have posted the Fuse kernel module for Sony Xperia Arc/Ray & others Xperia 2011 series...
It allow cryptonite to works on every ICS 4.0x ROMs (including stock)
I can't certify it will works on others models but u can try... if it doesn't works, module will refuse to load... So, there is no risk.
my post :
http://forum.xda-developers.com/showthread.php?t=1752870
Regards.
Sekhen.
dabl8 said:
The value of this is as an encryption tool for dropbox or similar, when used with Foldersync or similar. Interestingly the latter can encrypt your files but only for Amazon S3. Unfortunately , the app needs root access to mount the encrypted volume on _my_ phone; how about you?
Click to expand...
Click to collapse
I'm using dropsync for this with a one-way download from cloud to sdcard. It can be setup to do a full 2-way mirror if you are intending to edit files on-the-go.
Yes, I have root and presume that is necessary for mounting the encrypted volume.
---------- Post added at 12:37 PM ---------- Previous post was at 12:29 PM ----------
dabl8 said:
Notecipher is a good idea but is not very good. Keepassdroid is a password store that could be pressed into service as a note taker. There is an app called mininoteviewer which is a port of Tombo and does quick encryption of individual notes.I would use Ghost Commander as root to edit your notes within /data, zip (within GC) or tar them up now and then (tar cf destination source, in th terminal or GC) and drop them in your cryptonite volume. Then share the encrypted version to Ubuntu One, which of course gets uploaded to your Ubuntu One Pictures directory. Email will work too. If you have sensitive notes it is not a good idea to have them on a fat32 sdcard.
Click to expand...
Click to collapse
I sync my Keepassdroid db to cloud storage where it is encrypted with encFS.
Boxcryptor gets me access to it by handling the decryption seamlessly.
Both tools are available on Ubuntu (Cryptkeeper instead of Boxcryptor), Windows and Android so I've got access to all my passwords everywhere I go.
The really nice part is I have made all of the passwords long and complex, I don't even know them, only my keepass db and also email account which can be used to reset the accounts if something goes horribly wrong. And I augment security on that with the Google Authenticator tool that I have on both phone and tablet.
I'm very happy with the setup now and recommend it.:good:
I don't know how all the legality crap works, or what disclaimer i am required to post so here is everything i can think of.
-- Do this at your own risk.
-- I nor anyone else is responsible for unforeseen difficulty, your phone getting up and walking out of your house, or ANYTHING else.
-- This is for educational purposes only and NOT to be used maliciously or in any way without permission.
-- The ease of this bypass should impress upon everyone that physical access to a device trumps all, further you should consider carefully the consequences of "rooting" your phone before doing so. If you loose possession of your phone either permanently or temporarily, someone with the knowledge, a laptop (or tablet with a USB) and the will - can easily bypass any security you have in place Further, you could be completely unaware of this. In today's day in age, please consider device and system security with the utmost scrutiny. If you "root" your phone i highly recommend encryption. To best protect your privacy multiple layers of different security best protect your privacy & data. There is no single security apparatus that is fool proof. Password protection (using long complex passwords with lowercase, upper case, numbers, and special characters and never use dictionary words), encryption, live system monitoring app such as "Lookout", turning off unnecessary services such as Bluetooth, NFC, etc.. use "tor" or VPN service, all together will provide the best protection. Again, please remember that physical access trumps all so never let your phone out of your sight without locking it in a locker or a locked drawer, or whatever. For every convenience we gain from technology there is a very serious unintended risk on the flip side. Please be careful with your electronic equipment. My knowledge is armature and everything i know i learned from Google, others are far more knowledgeable.
This can only be done in Rooted Phones as far as I know because you need read/write permission, root folder access as well as be able to flash ".zip" files from recovery. But by all means try as you might and post your findings for others to use. Open Source RULES!
I have done this on a Sprint Note 3, Sprint Note 4 and a Sprint S4 with KitKat 4.4.4. I assume its the same for all Android but i can only confirm functionality on the above listed.
I had to figure out these below steps because i did a backup of my ROM to try out some new ones. When I re-applied my backup after trying and disliking the new ROMS (I don't like MM KitKat still reigns supreme in my opinion) my fingerprint scanner didn't work on the lock-screen. I had to use the backup password to unlock phone but once unlocked the backup password did not allow me to re-scan my fingerprint, i kept getting backup password is incorrect. Weird...
Anyway, here is the fix...
I deleted these files:
(using twrp recovery choose "advanced" and "file explorer" or you can try using a root file explorer like "Root Explorer")
/data/validity/template.db
/data/system/lockscreen.db
/data/system/lockscreen.db-shm
/data/system/lockscreen.db-wal
/data/system/password.key
/data/system/gesture.key
(This might be all you need to do. I also flashed the .zip files below. You can try the above w/o flashing the below zip files for any number of reasons such as, you cannot unlock YOUR phone, do not have an SD Card, or do not know how to push files to your phone via ADB.)
Flashed these in recovery:
LockScreen_Security_bypassV1.1.zip
registry.zip
Rebooted phone (notice swipe is re-enabled instead of fingerprint scan )and re-did fingerprint and it worked.
Links to the source pages from where i downloaded the ".zip" files and learned which files to delete
http://forum.xda-developers.com/not...ass-lock-screen-pattern-password-pin-t2948336
http://forum.xda-developers.com/showpost.php?p=63327098&postcount=1
Please be sure to give credit where credit is due.
Hi Experts,
I have accidentally deleted some important files in my Samsung S9+ Secure Folder, and trying to find the best way to recover them. Looking for the Experts advice!
I read through the forums but it seems rooting and wiping the device is a must, and looks like rooting the device will kill my Secure Folder and Samsugn Pay forever. Despite this, I think it still needs to be done. Please if anyone could offer me some advice, it is greatly appreciated. I am also fairly new to Android, so please bear with me on the very technical side of things.
What I have tried:
1. Download file recovery apps in secure folder but it only restores files from the downloads/pictures/videos folders but my files did not sit there...
2. Tried multiple windows software and play store apps, all asking the device to be rooted first
2. Tried to root my device with Kingo Root, King Root, One Click Root and Towelroot, all failed to root....
Thanks in advance for any advice on this.
Jeffrey
Umm..... The whole point of the secure folder is to house content that you don't want people to be able to access!
So no, there's absolutely no way to do it.
Sent from my SM-G965W using Tapatalk
Devhux said:
Umm..... The whole point of the secure folder is to house content that you don't want people to be able to access!
So no, there's absolutely no way to do it.
Sent from my SM-G965W using Tapatalk
Click to expand...
Click to collapse
Thanks Devhux. But if I root the device and do a disk recovery treating it like a normal hard drive, applications should still be able to run a thorough scan on everything deleted on it?
Unfortunately, no. The secure folder is heavily encrypted. Considering that Knox is certified by the US Department of Defense and NSA, you're not going to get at the data that was in Secure Folder.
Also note that Android works differently due to using Media Transfer Protocol (MTP) when connecting to a Windows computer. That in itself won't let you create a disk "image" like you can on a regular computer.
There's also the issue that if you're running a Snapdragon 845 model of the S9+ you won't be able to root anyways.
Sent from my SM-G965W using Tapatalk
Got it, thanks for the details. I guess there is nothing I can do about this then.
I think you should root your Samsung S9+ first. Then try with an Android recovery software or app. Also, this Android data recovery must be helpful with you.
www.android-data-recovery.com
If he root the phone, Knox will be tripped and a secured folder won't work anymore. Why you didn't log in your account in the first place? So Samsung Cloud will do a backup and when you reinstall the phone, everything will be downloaded again.