Hi!
I am wondering if the com.android.stk package is responsible for only mere displaying of so-called sim-menus (thus providing just a user interface) or does it really implement the SIM Application toolkit standard (is it GSM 11.14?) in full?
Why am I? I want to get rid of the package to prevent all these annoying clickbait popups from appearing on the screen. But I'm afraid the operator can also become unable to perform OTA updates of the SIM card or perform adjustments of the settings stored in the SIM.
Does anyone know something about it?
Related
For an app that I am currently developing we want to read data from the SIM card of the user, which works fine. We want to make it possible that the user can switch the SIM card while the app is running. While doing this the OS request a device restart and we cannot seem to suppress this message.
Is there a way to make it able to insert a SIM card while the app is running without restarting the device. I'm open for all options (rooting, custom rom, etc...)
NOTE:
This is a very basic guide only for newbies like me.
I'm not a developer or something even near to that. All information provided here is copied from different sources and according to the best of my knowledge. I'll not be responsible for any harm to you or your device. Try it on your own risk.
Any additions or corrections are welcomed.
Note: Unlocking Bootloader and Rooting breaks "Verified Boot". It can be dangerous.
Unlocking bootloader:
Disables signature checking of boot image and recovery image
Allows all fastboot commands to be executed
Zeros out /data partition i.e. filesystem is erased and then regenerated on next boot
To know further: BOOT PROCESS: ANDROID vs. LINUX
As compared to iOS, Android is considered less secure OS because it's an open source project and a large number of developers are involved contrary to iOS where things are kept secret. We can face two types of threats regarding mobile security:
Data theft or loss when using mobile phone.
Different types of malware (spyware, adware, bloatware, ransomware, worms, trojans, virus, cookies) or a hacker can directly attack your device to gain access to your personal data like contacts, pictures, credit card information or even can note your habits and then forcefully show you ads etc. Sometimes the purpose is just to harm you, rather than having some benefit. To avoid this:
Keep your phone as simple as possible. Avoid installing apps from unknown sources particularly KeyGens and cracked / pirated / hacked apps and MODs offered free of cost. Use an app store like PlayStore to install apps which provide security somewhat.
Some stock ROMs (manufacturer's operating systems) contain bloatware (unnecessary and suspicious apps) running as an app or in background. Try removing as much of these as possible by uninstalling or freezing or at least restrict their permissions and internet access.
In Android 6 and above, apps ask for permissions from user when run first time. Allow for these permissions carefully. Check your list of apps auto-starting up and running in background as well as accessing storage and phone / sms etc.
Permission regarded as "Normal" by Android cannot be revoked by simple means e.g. you can restrict an app's INTERNET permission. Either use a third party trustworthy permission manager or at least review the list of permissions requested by an app at install time.
Use some firewall app like AFWall+ to block hidden internet access of apps to internet.
If your phone is rooted, try to avoid granting root access to as less apps as possible particularly those from uncertain sources.
Use some anti-malware or commonly known antivirus app in mobile phone which can scan and filter apps, attachments, links, emails, sms and webpages etc. There are numerous paid and free apps available for the purpose, though most of them are themselves promoting some kind of malware for business purpose. av-test.org is a good place to start with selection.
Data theft or loss when phone is lost or stolen
In this thread I'm focussing this part and giving here a few technical tips and measures you should always take that can help you keep your data, device and yourself safe in case if your device is LOST or in case of THEFT. Otherwise your device and your data can be accessed and misused.
The very first vulnerability of our data to theft and misuse starts with the Unlocking of BootLoader which is locked by default for security on most of the new devices. Unlocking BL makes it easy to flash custom recoveries, kernels and ROMs. That's why, the internal storage can be accessed from any custom recovery or device is factory reset or new OS can be installed for a fresh use. Therefore vendors are making it harder and harder to unlock BL without proper authorization. Personal data is also prone to wrong hands due to insufficient security measures on device as explained below:
DATA PRIVACY
Always keep Screen Lock enabled (with PIN or Password or Pattern).
But keep in mind, this option alone is of no use. It takes only a minute or two to remove screen lock protection if a custom recovery is installed or BL is unlocked / unlockable.
Always use Internal Memory of Phone to store personal data like pictures, contacts etc.
External memory (SD cards) can be removed from device and easily accessed from computer or other devices. They aren't erased usually in case an app tries to erase data in case of theft. Also, Android doesn't offer encryption of SD cards by default. A few custom ROMs offer this feature or you have to use a third part app for encryption. Built-in kernel module dm-crypt is used by AOSP for full disk encryption (FDE). A similar service is needed which auto-mounts your memory card at OS boot. Good examples of encryption at filesystem level are EncFS and CryFS which offer a stackable transparent encryption with virtual filesystem. An easy way to implement EncFS on Android 5- is explained here.
However, in Android 6.0 and above, external memory swapping with internal memory is offered called adoptable storage. That's relatively more secure because it makes SD card not readable by other devices (at least not easily).
Old Devices with Low Internal Memory - in this case instead of putting personal data on SD card, try using SD card's 2nd partition to link apps & their data to SD card by Link2SD and keep your personal data on internal memory.
However, Link2SD may slow down your device or can be a battery hog. In this case, use Third Party Encryption apps to encrypt your targeted data instead of encrypting whole /data partition. There are numerous apps like KeepSafe which is more useful if you combine encryption with cloud backup or online synchronization. However, be careful while selecting app. The app can fail to protect your data online or it can itself misuse your data. Otherwise, any app like ES Explorer or Solid Explorer can be used to keep data encrypted.
In case of third party encryption software, you must be extra conscious of your data. Sometimes sensitive data is hidden (apps data or due to .nomedia) like WhatsApp Sent folders. You have to take care of all this manually. It's really a hectic job.
Encrypt Internal Memory (particularly if BL is unlocked).
It's because and attempt to unlock BL erases all personal data on internal memory (not external SD card). However, it may not always be true. So keeping Internal Memory Encrypted always promises more security. An un-encrypted internal memory can be easily accessed from custom recovery.
Performing these steps makes your data quite secure and not vulnerable to easy access.
DATA PROTECTION
Data Recoverable - use local / online backup of your data. Read here how to do that.
Wiping Data
Bootloader Locked - so that there is no chance of flashing custom recovery and then accessing data from there or through ADB. As stated above, unlocking BL will erase data but it's not always true. So, this option alone cannot be relied on.
There are chances of wiping data if you use some anti-theft app. Android Device Manager (ADM) is a built-in app on all Android devices that suffices the basic needs of an anti-theft app. A Google account on device is mandatory and ADM must be enabled from settings i.e. Device Administrator. You can use Google Find My Device anytime to Locate (Location services should be enabled on device), Play Sound, Lock or Erase your device. Obviously, device should be connected to internet for ADM to work.
However, you may use any third party app with rich features (also SMS based).
Rendering Data Useless - as stated above, using Encrypted Internal Memory only for personal data makes it secure and hard to read by others, even useless.
DEVICE SECURITY
Device Recoverable
As stated above, there are chances of device recovery if you use some anti-theft app.
Keep your phone's IMEI number safe. Your Mobile Network Operator along with the help of police can trace your device whenever it's switched on unless its IMEI is tempered.
Rendering Device Useless
Bootloader Locked - so that there is no chance of flashing custom recovery and then flashing new ROM.
OEM Unlocking disabled - so that Bootloader can't be unlocked without proper authorization.
It can be disabled from ROM settings menu on Android 5.0 and higher devices (if found).
Factory Reset Protection (FRP) - so that after resetting device from recovery, device can't be logged in without already linked Google account. This is implemented by a separate partition named FRP or CONFIG or PDB (on Intel devices) or something else which saves information of last logged in Google (or OEM) accounts. This partition is not reset on factory data reset by stock recovery. So, if bootloader is locked and set unlockable in Developer Options, one can't flash custom recovery to erase FRP partition. He will be stuck at login screen permanently.
So a working Google account on device is mandatory. It works on some Android devices with Lollipop 5.1 and higher. However all vendors don't implement this security feature in their devices. Some use their own similar feature e.g. XIAOMI links your device to MI account.
Additionally some OEM's don't allow unlocking of bootloader without permission from OEM to ensure more security i.e. contents of partition[/URL] "devinfo" are signed by the OEM and can't be modified without their approval. After having permission, an official method is provided to unlock BL using PC.
Hi, i need help and i hope that someone here can help me, im currently infested by a virus or malware that keeps on coming back, it never stop it always install itself
and it has the capability to
1. read phone status and identity
2. location
3. modify/delete contents
4. find accounts on device
5. download files WITHOUT notification
6.retrieve running app and run at startup
7. draw over other apps
8. read sync settings
it looks very dangerous it could steal info from my phone, based on my research those who are infected by this app also receives msgs with links and it seems that the phone itself created that message and sends to itself
right now i have no idea on how to remove this problem, also rooting is impossible currently because my phone is not supported on any rooting services and i yes i tried everything, emailed them if they supports rooting my phone and they all say no.
i was able to grab a copy of the enginee app in apk format maybe someone is interested on simulating it on an emulator (im doing it right now actually)
wow, very friendly "developers"
Hello, everyone. I removed plenty of bloatware from Sprint using ADB Shell. I checked a post about the LG G8 because of the annoying "Sprint activation" message everytime i restarted the phone. On that post, some users gave useful packages to remove to get rid of the bloatware, among them was the package com.lge.lgdmsclientspr that some user said was the responsible for the activation message. This was true, once I removed it, the message stopped. However, along with that, I lost the option to check software updates in the About Phone menu. Apparently, there's a package with a similar name com.lge.lgdmsclient that's responsible for the software updates. I did some searching and found the apk. I installed it successfully and I got back the option in the About Phone menu, but it doesn't work. When i press it, it tries to load something but nothing more. If I touch it again, a message appears telling me the app stopped working. I uninstalled it again, but I want to know if I can recover the menu option again without having to do a hard reset and having to tolerate the Sprint activation message each time I turn on the phone. Thanks in advance.
Nemo Draksler said:
Hello, everyone. I removed plenty of bloatware from Sprint using ADB Shell. I checked a post about the LG G8 because of the annoying "Sprint activation" message everytime i restarted the phone. On that post, some users gave useful packages to remove to get rid of the bloatware, among them was the package com.lge.lgdmsclientspr that some user said was the responsible for the activation message. This was true, once I removed it, the message stopped. However, along with that, I lost the option to check software updates in the About Phone menu. Apparently, there's a package with a similar name com.lge.lgdmsclient that's responsible for the software updates. I did some searching and found the apk. I installed it successfully and I got back the option in the About Phone menu, but it doesn't work. When i press it, it tries to load something but nothing more. If I touch it again, a message appears telling me the app stopped working. I uninstalled it again, but I want to know if I can recover the menu option again without having to do a hard reset and having to tolerate the Sprint activation message each time I turn on the phone. Thanks in advance.
Click to expand...
Click to collapse
As far as I know there's a way to recover uninstalled apps via adb by using another adb command, you can do a Google search for this
For anyone seeing this at a later date, the command to reinstall apps removed with adb is
adb shell cmd package install-existing <package-name>
Let me preface by saying I'm brand new to tweaking Android.
I have a Huawei Psmart 2019 , it's an old phone I wanted to experiment with in degoogling and just general tweaking.
I used adb to remove a whole lot of Google and Huawei apps and replace them with alternatives from fdroid. Following this I did a reboot and the phone no longer recognizes the sim cards. It just displays No Sim.
This is my second run through of this with this same error happening. After the first I did a factory reset which solved the issue and tried again. I can't be sure which package I removed both times to make this happen and I am hoping somebody can shed some light on the matter. If not, that's fine, I guess I'll just trial and error it until I find the culprit.
TIA!
One of these services may be responsible
android.autoinstalls.config.motorola.layout
com.android.companiondevicemanager
com.android.traceur
com.lmi.motorola.rescuesecurity
com.motorola.android.jvtcmd
com.motorola.ccc.devicemanagement
com.motorola.invisiblenet
com.motorola.pgmsystem2
com.motorola.setup
com.motorola.slpc_sys
com.motorola.systemserver
com.qti.qualcomm.datastatusnotification
com.qualcomm.atfwd
com.qualcomm.embms
com.qualcomm.qcrilmsgtunnel
com.qualcomm.qti.lpa
com.qualcomm.qti.qms.service.connectionsecurity
com.qualcomm.qti.qms.service.telemetry
com.qualcomm.qti.remoteSimlockAuth
com.qualcomm.qti.uim