Hi everyone.
I would like to ask if there is a way to spoof your GPS location on tinder for Android Pie ?
I think we have many tools on Google Play that can fake GPS, does any problem when you its tool ?
Tinder uses very invasive ways to detect your location, so to counter that you need advanced ways like magisk addons or other root tools.
Spoof GPS ( paid service ) with add-on of proxy should work without root judging on data from other forums
Will have better luck with less time/effort on web-app
Related
So I have lately I have bought a Chinese Smartphone and when I looked at Settings -> Apps -> All some of the apps have a full access to my smartphone which is rather scary, can someone please help me identify which service/app shouldn't have a full access to my phone and also is there a website in which I can type the name of a service/app and it would tell me which permission it requires ? So this is the list:
Atci_service
BSPTelephonyDevTool
com.mediatek
com.mediatek.batterywarning
Common Data Service
EngineerMode
Factory Mode
FotaProvider
Fused Location
Google Account Manager
Google Play services
Google Play Store
Google Services Framework
Input Devices
Key Chain (A lot of permissions)
MmsService
MTK Thermal Manager
Phone
Phone/Messaging Storage
Schedule power on & off
Settings
Settings Storage
Shell
SIM Tool Kit
SmartcardService
System UI
UpgradeSys
User Dictionary (Why does it have a full access to my SMS/MMS and full network access (?)
YGPS
Search Application Provider
Google Contacts Sync
Google Backup Transport
Google App
Very Suspicious Services/Apps:
MTK Android Suite Daemon (e.g it can read phone status and identity or do everything it wants with a SMS or MMS (?) )
MTK NLP Service (What is this and what does it do
MTK Thermal Manager (Why does controller for a battery needs to have a full access to Android (?)
MTKLogger (Is this a spyware (?)
Omacp (e.g it has access to a "Modify secure system settings" or can do whatever it wants with either phone call or SMS/MMS.
Phone (I have two of them and the first one have handful of permissions where the second one has a full access to Android (?)
Shell (What is this ? It mainly has access to " access extra location provider commands, interact acreoss users etc, is it possible that this might be a backdoor ?)
UpgradeSys (I have never noticed it on another smartphone, same as Shell.)
Normal (What is this app ?)
LocationEM2 (Again, what the hell is this app ?)
What I don't understand is that many apps/services has permissions which they shouldn't have .... I have tried to for example find out what's LocationEM2 or MTKLogger but I have ended up with nothing ....
I was also thinking about rooting the device and install some firewall to block incoming connections to such apps/services which are suspicious or what's better remove such permissions. Also I know that Common Data Service can serve as a backdoor. Also I didn't connected this device to a Wi-Fi as I want to sort this stuff out first and it's a bit scary what's going on underneath the mask in this smartphone with services/apps and I must admit I'm a bit concerned about credentials used on such device. Also what's weird is that most of the services/apps I can't disable when for example on Sony Xperia M2 I could do it with most of them.
Can someone give me a hand here please ?
Kind Regards
Key Chain is a serious Virus i know.
Key Chain is a serious Virus i know. On other i have same question. I need to know about those app.
Say I wanted to have the most secure Sony Xperia Z Ultra possible (without "too much" sacrifice of useability).
In the context of this thread I define security as broadly anything barring network anonymity ie. hiding your device public IP address.
So I want security from network attackers (eg. drive-by download, WiFi attacks), physical device attackers (eg. customs searching devices for IP violations ... no really, that's about to become a thing apparently, GF and/or mistresses) .
How would you do it?
Could you please use sections of
Code:
firmware
phone settings
app settings
behavior
because I want to curate the best answers from users in this post for the good of the forum.
My thoughts so far are:
Firmware:
Root is disabled
Bootloader should be locked.
^^ These I'm not sure about - see if we don't have root then we don't have iptable firewall and hosts level server blocking.
One recovery should be used
Honestly I'm not sure which ROM is more secure than another but I'm assuming the latest and greatest is more secure so that would be MM atm. No idea if Sony is more secure than another flavour of ZU Android.
Phone settings:
Developer options off
Sideload apps off
Do not connect to unknown WiFi
NFC Off by default
Bluetooth Off by default
PIN unlock required
Auto-lock ON
App settings: (this includes apps you should have/not have and their settings)
I figure every additional app that I don't use is a needless attack surface so start with no apps at all - uninstall everything. Only install what you use ... for which you need root unless the ROM is premade like this.
Firewall app (Netguard no-root Firewall, DroidWall if we have root)
Adblock (if we have root)
AV - honestly most mobile AV seems pathetic at being secure and not acting like malware (notifications, popup windows etc) but Avast at least seems to not hog resources.
-Auto update every app
User behaviour:
NEVER:
-install apps from anywhere other than Google Play. Or possibly FDroid
-let another person use your device
I'd like to hear your suggestions, critique and everything else, cheers!
So you're not gonna install from other than google play, then what ad blocker are you going to use? Where is adblocker connecting to?
You're talking about still having a lot of apps connecting through servers that you don't control.
morestupidemailnames said:
You're talking about still having a lot of apps connecting through servers that you don't control.
Click to expand...
Click to collapse
Well if you are worried about connecting to servers that you dont control - isnt that all servers?
At which point you may as well remove all WIFI and Mobile Data capabilities and just stick to 2G
panyan said:
Well if you are worried about connecting to servers that you dont control - isnt that all servers?
At which point you may as well remove all WIFI and Mobile Data capabilities and just stick to 2G
Click to expand...
Click to collapse
Exactly my point.
The op is a long winded question that leaves you with more questions.
Probably why there's been such a landslide of security tips here
cryzies said:
After some research, I think I figured it out, mess with GSF. However doing exactly that, I restricted:
Network - WiFi.Srv_getScanResults
Location - Srv_getAllCellInfo
Location - Srv_getCellLocation
Location - Srv_getNeighboringCellInfo
Location - WiFi.Srv_getScanResults
I spoofed my location a couple blocks down and Google Map still jitters between my real and spoofed location, I have tried rebooting. Any suggestions?
Click to expand...
Click to collapse
I posted this in the XPrivacy thread, I'm attempting to disable all methods to obtain location other than GPS. I want to spoof my GPS system wide for privacy reasons, and GPS spoofing is easy however Google Service Framework allows users to determine location using WiFi and Cell. I figured this is such a strange request that I should attempt to take a crack at modifying the Google Service Framework apk. Does anyone have any tips to start this off, I've done some apk reversing before, my biggest worry is finding the functions I need to null in the apk and signing the apk after modifications. Any guidance would be greatly appreciated, any alternative suggestions would be gladly welcomed.
Hey guys, I've been seeking an alternate of Network Log (you can find it on Google Play Store) for quite a while but with no luck, so come out to ask if anyone knows one suitable for me .
I have to say Network Log is almost worthy for purchasing (although it is not a paid app), considering the job it's done in categorizing by protocols, by apps, displaying packets by size and time, graphing as a timeline, and that made it an excellent choice for analyzing apps consuming data and draining battery, but unfortunately the app owner doesn't respond to bug summit or emails.
The thing is, Network Log no longer works after Android 6.0, while others in the market relies on system-built-in VPN function to capture data, which is not suitbale for people like me in China using proxies to reach out to world .
So if anyone knows apps that can capture packets (not necessarily able to decrypt contents) and display by apps, just to make it easy to let me see the amounts and frequency Android apps uses the Internet, I‘ll be thankful that you recommend them to me (again it cannot be using Android VPN function since Shadowsocks is already using VPN, so I think the app maybe require root permission but I'm OK)
check...
will somebody know that???
my problem is that i have a non rooted phone with vpn always on and im searching for an app to activating ad block on it.
My fix for it would be to use an android wide proxy or a custom dns that overrides vpn dns.
as title said an root app or an app that provides vpn solution wouldnt be what im searching for. I had once an adblock app that routes traffic trough local proxy beside the vpn but cant find it anymore
Update: i found AdHell but its only for Samsung Devices with knox. Any other solutions?
HeathenMan said:
Update: i found AdHell but its only for Samsung Devices with knox. Any other solutions?
Click to expand...
Click to collapse
any news on this one?
I wanna use protonVPN and adblcoker at same time
a bit of elbow grease to protect self from Privacy Raping
Some [open]vpn clients allow vpn side connection to Socks5. Some even allow toggle of LAN access from device. I am not claiming a finish product exists but perhaps this gives you some joy.
Perhaps your socks5 instance runs in Amazon AWS free tier. Maybe it runs locally on your android handset. Perhaps you run Privoxy itself on android. [@mod: privoxy is F/OSS older than this forum]. There are a few privoxy projects for android on github. Perhaps you pick their brain. It was that against which proxomitron competed [also F/OSS. Thank God for Scott Lemmon].
Using things in differing order you might search the article to which I may not link: Privoxy on Android (with EC2 VPN)
I wanted to bring the Amazon EC2-based Privoxy service to it, by way of a VPN.
Click to expand...
Click to collapse
There was no obvious way to contact the author who hasn't posted since 2016.
There is an OpenVPN service you can likely find the name of yourself offering *recently* an adblock toggle and AntiTracker toggle with a hardcode mode to protect you from predators like google and Fbook. It shouldn't be long before others emulate this functionality. It sports the vpn side socks5 option.
Or privoxy tunnel to remote [cloud (openvpn)]. See? Fun with permutations. Maybe from phone with ShadowSocks to cloud to vpn to web. "OpenVPN over shadowsocks". At this point look into sites helping Chinese dissidents.
You definitely then return here with your improvements to share.
The remaining question is how much is your time worth? Not much? Then search the web ad naseum for the 'ideal free' solution. Elsewise pony up some pennies for some cloud time as part of a solution.
Same question here !
And it seems that adhell is now only available for entreprise use
Wasn't AdGuard doing that?
yes you are right. it works with setting a private dns in the system settings with dns.adguard.com - no batterydrain - no more ads - no vpn - no root