Remove Camera Software - HD2 Windows Mobile 6.5 Q&A, Help & Troubleshooting

Hi
For security reasons i am not allowed to have a camera phone in work. Is there any way possible that i can remove any software or icons which are camera related by maybe tweaking the registry or running a software program that will deactivate
it for me ?.
Obviously i will have to visibly make the camera look as if it is not able to take pictures but i would also like the additional feature of disabling the software.
Thanks in advance

vario3 said:
Hi
For security reasons i am not allowed to have a camera phone in work. Is there any way possible that i can remove any software or icons which are camera related by maybe tweaking the registry or running a software program that will deactivate
it for me ?.
Obviously i will have to visibly make the camera look as if it is not able to take pictures but i would also like the additional feature of disabling the software.
Thanks in advance
Click to expand...
Click to collapse
using a file manager like resco file explorer, navigate to Start Menu\Programs\Multimedia and delete Camcorder and Camera,
this will remove the camera and camcorder shortcuts from your start menu
if you cant see them there, try showing hidden files... worked for me!
when i get home i can copy the links onto this post for you when you need them again..
or you could move the shortcuts onto a folder that wouldnt be looked at?
Tesh

Any further info is most welcome.
Thanks

I'm going to have to say that if it has the hardware they will not allow it. Just because you remove the software who's to say you can't reinstall it to have a functioning camera again.

Wil Badger said:
I'm going to have to say that if it has the hardware they will not allow it. Just because you remove the software who's to say you can't reinstall it to have a functioning camera again.
Click to expand...
Click to collapse
As a government employee, that's correct. The rule is enforced based upon hardware, not software. Obviously, it will very from company to company, but usually it is based upon hardware.

I've successfully removed the camera icons as described in a previous post but from within "pictures and Video" and "Albums" it is still possible to take a picture.
Is there possibly a way to disable the camera by editing the registry ?.
I fully understand the technicalities of leaving the camera physically intact but i need your help disabling it software wise.
All suggestions appreciated.
regards

Before you go through all the trouble you might want to ask a higher up whether they will even let it fly . I have serious reservations about them allowing it.

I think I'd be tempted to leave the HD2 at home and just get yourself a cheapo
phone sans camera for work....
There will be times when you need your camera on the HD2,holidays,nights out,
updating your Tweets etc etc

in the registry, go to key:
[HKEY_LOCAL_MACHINE\System\Pictures\Camera\OEM\DisablingConditions]
and set value of "CSPValue" entry to 1

Related

Secondary Display

I'm wondering how the second display is implemented - is the support built into WM5, or is it handled by a proprietary HTC app?
Would be great if we could display our own data on it - does anyone know if there is a standard API for controling secondary displays on WM5?
Got it - partially. It is possible to manipulate the framebuffer directly. Still need to figure out if there's an elegant way not to conflict with HTCs own Subdisplay service.
Update: Looks like the magic happens in SubDisplay.dll
Zone-MR said:
Got it - partially. It is possible to manipulate the framebuffer directly. Still need to figure out if there's an elegant way not to conflict with HTCs own Subdisplay service.
Update: Looks like the magic happens in SubDisplay.dll
Click to expand...
Click to collapse
Hi Zone-MR,
I'm not able to go so deep, but it may be of some help knowing that there is another user which may help:
http://smartphone.kleinweder.ch/downloads/index.php
He has the same device and many themes for it, some of them with images (even if not "control") of external device.
Writing this message I realized that it is of no use, but... I'm too lazy to cancel it... ;-)
Is there anyway to keep the secondary display alive by reg tweak? If so, can someone share the process?
FYI-I did try, HKLM>Software>HTC>Secondarydisplay and tried to change the display timeout value w/o any success. :x
Thanks
Zone-MR, any more info on using the external display? I found the subdisplayDLL.dll, which appears to be a driver? Couldn't find any documentation as to what the corresponding device is called, or any API for it.
Changing the external display
Guys, I have posted details at modaco of how to change the resources in the subdisplay.dll file, so you can have custom clocks, and change any icon you like.
See http://www.modaco.com/index.php?showtopic=243525&st=0&gopid=764669&[/url]

Hack to enable geocaching on the Athena Camera!

I found this on a French site, by changing the registry you get an extra camera mode that adds current position in the EXIF part of the file!
You need to edit the key : HKEY_LOCAL_MACHINE\SOFTWARE\HTC\Camera\P9 change from 0 to 1 (P9 is the Geocoding profile).
No need to soft reset, just go into the camera and set to Geocode mode (see capture)
The files get stored in My Documents/POI (maybe so they appear in Tom Tom?).
Anybody know of cool ways to use this feature? Flickr? Googlemaps?
Sorry if this has been covered already!
Oh hell yes.....
Madhadder said:
Oh hell yes.....
Click to expand...
Click to collapse
You mean it HAS been covered? could not find anything thru search....
I could never get it to work, it says the GPS is searching, but when I look at the photos I cant find any GPS coordinate data.
Anyone else actually try it?
G
I think Madhadder meant "oh hell yes I can't believe its so easy to add this feature you just made my week".
I'd like to say:
Oh hell yes!
GuardianZX9 said:
I could never get it to work, it says the GPS is searching, but when I look at the photos I cant find any GPS coordinate data.
Anyone else actually try it?
G
Click to expand...
Click to collapse
I think the data is included in the file itself in a special zone that holds info on model of camera etc.
There are some applications that "place" the pictures on maps, I do not know much about this but want to find out! The ideal would be to place them on googlemaps...
techntrek said:
I think Madhadder meant "oh hell yes I can't believe its so easy to add this feature you just made my week".
I'd like to say:
Oh hell yes!
Click to expand...
Click to collapse
Good but as much as I would love to take credit for this find, it is in fact from this site : http://www.gpspassion.com/forumsen/topic.asp?TOPIC_ID=85924&whichpage=3#641517
8th post down.
edeplano said:
I found this on a French site, by changing the registry you get an extra camera mode that adds current position in the EXIF part of the file!
You need to edit the key : HKEY_LOCAL_MACHINE\SOFTWARE\HTC\Camera\P9 change from 0 to 1 (P9 is the Geocoding profile).
No need to soft reset, just go into the camera and set to Geocode mode (see capture)
The files get stored in My Documents/POI (maybe so they appear in Tom Tom?).
Anybody know of cool ways to use this feature? Flickr? Googlemaps?
Sorry if this has been covered already!
Click to expand...
Click to collapse
there are so many line items under that folder. Could you be more specific?
thanks..
I assume that the GPS must be turned on to give the correct position prior to taking the picture, am I right?
Enable
ahmadfarid said:
there are so many line items under that folder. Could you be more specific?
thanks..
Click to expand...
Click to collapse
P1-P9 are profiles for different camera modes. You'll notice that the "Enable" key is 0 in Profile 9. Change it to 1 and you should be good.
Also found this info on GPS passion, and was going to share, but never found the time....
I did the hack on my Ameo last weekend, and played around with it a little. It is ofcourse quite an amazing feature, and it does impress people that sees it, but given the quality of the camera in the Ameo, I'm not sure how usefull it will turn out to be, I would be a little embarassed to upload any Ameopics to Google at least.
Here is what I've found out sofar, if someone finds that useful.
When you start Camera, you get a new option when you choose your Photomode, called GPS. - This starts up the GPS automatically, and once it gets a fix you are ready to shoot.
The pics you then take are stored in /my documents/my Poi - which is created.
These pics will then have the GPS position included in the Exif data.
Haven't yet found a PPC software that is capable of reading these data, but if you read them with your ordinary pc, you can input them into google Maps (on PPC for instance) and it will take you there.
Picassa will read the data, and you can input them manually into your mapsoftware (the format is: xx yy' zz'' aa bb' cc'') but I would recommend "Panorado Flyer 1.2" which is a great free and small application. It gives you some new options in the context menu, so you just right-click your Gpspicture and choose "show location in Google Maps" - and it opens up Google Earth and takes you there.
There was some discussion on the precission of the GPS Data, actually on this very site I'm pretty sure, maybe the kaiser section(?) , someone noticed the last 2 decimals recorded for latitude and longitude allways were the same, so the precision was less than 100 meters, but the good news is this is not the case with our Athenas, they are very accurate!
I don't think I'm allowed to distribute Panorado Flyer here, but here is the link for you to download it yourself.
Hopefully someone will make a similar app. for PPC, which would make this feature so much more useful.
Here is a link to the free version: http://www.photo-freeware.net/panorado-flyer.php
And here is the commercial and probably more functional version (did not try it, but there is a demo): http://www.panorado.com/en/index.htm
I went to a birthdayparty this week and took a GPSpic inside an apartment on the 7. floor to demonstrate to all how brilliant the Ameo is, got a fix and shot a pic. The pic stinks, but if you want to try Pandora, you should be able to rightclick it and fly over here, even if I downscaled it....
And I just tried myself, and the GPS data did not survive the upload so it does not work, sorry.
Here is a shot of what Panorado rteads for that pic:
works well here
Actually you can use this format directly into Google earth, which is simpler I think:
55,685278 12,584445
Ok Midget, on my setup the GPS data was lost when I d'loaded my own pic from the post.
Also had to try it out on my old uni with an external GPS, but it doesn't have the P9 option, could that be because of the old HTC Camera version (3,00 build 21424) or must it have an internal GPS?
Anyone got the newer Camera version (like the one from the Ameo WM6 - 4.01 build 27598)?
hammermedia said:
P1-P9 are profiles for different camera modes. You'll notice that the "Enable" key is 0 in Profile 9. Change it to 1 and you should be good.
Click to expand...
Click to collapse
oh!..ok..i'll try it right away..
thanks
The new mode came right up when I made the registry change. Can someone confirm where the data is stored? Seems there are 2 places mentioned here.
That's freakin awesome! Possibly rates as my top feature of the moment! Good Hack!
And @ techntrek - it goes into my \microdrive\my documents\my poi\
Ace!
I have using panorado software but the error for several pictures on same place (1 square meter) is very large, some hundreds of meters...
beginner said:
I have using panorado software but the error for several pictures on same place (1 square meter) is very large, some hundreds of meters...
Click to expand...
Click to collapse
That is what you will also get when you use googlemap. It can be hundreds of meters off.
I read recently that US goverment wants to decrease the accuracy of GPS. I wonder if it is the result of this project that I noticed that the inaccuracy has been magnified lately.

[Q] Can I enable exposure lock support?

Hi all.
I have a galaxy s3 mini running cm11. It does not support exposure lock ( isAutoExposureLockSupported returns false). Is there any way to enable exposure lock and also white balance lock as it seems to be a software limitation. I have searched around and cannot find where the file that contains these parameters about exposure, focus, white balance, etc. Could I change the isAutoExposureLockSupported=true to achieve exposure lock. The camera also seems to not support many focus modes which have been common to all lower end phones I have owned, and also exposure lock was supported on these too. Has anyone any idea of how to do this?
Bump
I don't do much beyond taking a few random pics of nice scenery or my pets (yea, I'm lame, but they're cute, so what? ) , but from reading a bit, seems like you might just have to use another camera app that might have that feature. Probably not going to be as good as a stock camera set up that has it built in, but you gotta work with what you have... Maybe something like this one?
http://forum.xda-developers.com/showthread.php?p=45806383
Has an exposure settings option that might do what you are looking for. There are some others, but many of them are very device specific, and not likely something that just spoofing the build.prop would help with. This is mainly due to so many different cameras/camera drivers to get working with generic camera apps that don't have access to the proprietary drivers from the manufacturers. If your phone stock doesn't have this feature, then probably going to be very hard to maybe not enable, but to get it to work like you would hope or expect.
es0tericcha0s said:
I don't do much beyond taking a few random pics of nice scenery or my pets (yea, I'm lame, but they're cute, so what? ) , but from reading a bit, seems like you might just have to use another camera app that might have that feature. Probably not going to be as good as a stock camera set up that has it built in, but you gotta work with what you have... Maybe something like this one?
http://forum.xda-developers.com/showthread.php?p=45806383
Has an exposure settings option that might do what you are looking for. There are some others, but many of them are very device specific, and not likely something that just spoofing the build.prop would help with. This is mainly due to so many different cameras/camera drivers to get working with generic camera apps that don't have access to the proprietary drivers from the manufacturers. If your phone stock doesn't have this feature, then probably going to be very hard to maybe not enable, but to get it to work like you would hope or expect.
Click to expand...
Click to collapse
Thanks but its not the app that I need, I have a few in mind (camera fv-5, cinema fv-5, etc) but its the fact that the phone doesnt support autoexposurelock even though the app has it implemented (therefore I cannot use it). I was wondering could I change some code around to enable the phone to support it?
Kevinjs said:
Thanks but its not the app that I need, I have a few in mind (camera fv-5, cinema fv-5, etc) but its the fact that the phone doesnt support autoexposurelock even though the app has it implemented (therefore I cannot use it). I was wondering could I change some code around to enable the phone to support it?
Click to expand...
Click to collapse
Does the phone support it while on the stock TW rom? If so, there might be a way, but if not, then probably out of luck.
es0tericcha0s said:
Does the phone support it while on the stock TW rom? If so, there might be a way, but if not, then probably out of luck.
Click to expand...
Click to collapse
I dont think so, although I have never used the stock rom but on any rom for it I have used it hasnt been supported.

[Q] How bad is the camera on the XZU, with a custom ROM?

Does anyone have any before/after pictures, or have an opinion as to how bad it gets?
1. take a picture with the stock sony camera app
2. take a picture with any other camera app on play store, for example Google camera https://play.google.com/store/apps/details?id=com.google.android.GoogleCamera
3. transfer both pictures to your computer
4. look at them and see for yourself
Oh I didn't realise you could do that. The Google Camera photo I took looks, if anything, better
Thanks for your help. No reason not to flash then, cheers.
RedMist said:
Oh I didn't realise you could do that. The Google Camera photo I took looks, if anything, better
Thanks for your help. No reason not to flash then, cheers.
Click to expand...
Click to collapse
Its just about one chip on the motherboard which reduce the amount of pixel noise in the image and its only the stock sony camera app that can use the server interface to send data back and forth to this chip. If you flash any sony based rom you can now flash a .zip file with the lib files and server apk to make the chip work again even if you unlocked your bootloader.
But to me..its a stupid gimmick that just ruins the image. This is not a camera phone.
You can find the mod in the cross dev forum part. Nothing special really... keep moving towards the lollipop roms :silly: those are the fun around here
the camera on this phone is nothing to write home about... stock or AOSP...
We won't see any better photos on the Ultra until we get the camera2 API implemented, which allows RAW capture and better control of the sensor. Only the Nexus 5 and 6 are supported right now as far as I know.
The issue today is that Sony is controlling the camera hardware and its software, so it's impossible to reduce or change anything major. Camera2 in Lollipop changes this, giving regular third party devs direct access to the camera hardware, and with that we can potentially use the sensor, which shouldn't be that bad, to its fullest. Snapping photos in RAW would for example eliminate the freaking compression that Sony uses.

About Android MMS Stagefright exploit

How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Sent from my GT-I9301I using XDA Forums Pro.
mihai.apostu98 said:
How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Sent from my GT-I9301I using XDA Forums Pro.
Click to expand...
Click to collapse
Heres some useful info:
http://www.cnet.com/news/researcher-finds-mother-of-all-android-vulnerabilities/
That's some info, but not really anything useful. Does this mean Google has a patch, will they be pushing that our or will there be ways to patch custom ROMs sooner even? These are all unanswered, though would be nice to know...
"As soon as the malicious text is received, features built into Stagefright to reduce lag time for viewing videos process the video to prepare it for viewing. That processing apparently is enough for bad guys to get their hooks into the platform and take control." - cnet
I see it like this:
1. MMS with video arrives
2. Messaging app loads the video in Stagefright where it will processed for better playback.
3. Video is ready for playing.
As I figure out from Google's Android site about Stagefright, it is a service that take care of video/audio/other media related stuff offline and local.
How can hackers connect with Stagefright if Stagefright is an offline service? And anyway how can an media service recive code to execute as an remote command execution for whole system?
Sorry but I just don't get it at all.
mihai.apostu98 said:
How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Click to expand...
Click to collapse
Here's further info. Google has apparently already sent the patches, 7 in all, to the various phone manufacturers.
Because of fragmentation, though, some of them may never send out these fixes. Since these have assumedly been committed to the source code online, they should theoretically be available for download at some point as well. However, you'd (likely) need to be rooted to apply them.
In the meantime, go into your SMS application (usually Hangouts these days) and turn off automatic MMS retrieval. Then, do not accept any photos or videos from anyone you don't know. I am not sure, but I worry it's also possible you might get it from someone do know who is already infected, so just operate with an abundance of caution overall, I guess. And keep an eye out for news here, because it will probably be one of the first places they become available.
mihai.apostu98 said:
"As soon as the malicious text is received, features built into Stagefright to reduce lag time for viewing videos process the video to prepare it for viewing. That processing apparently is enough for bad guys to get their hooks into the platform and take control." - cnet
I see it like this:
1. MMS with video arrives
2. Messaging app loads the video in Stagefright where it will processed for better playback.
3. Video is ready for playing.
As I figure out from Google's Android site about Stagefright, it is a service that take care of video/audio/other media related stuff offline and local.
How can hackers connect with Stagefright if Stagefright is an offline service? And anyway how can an media service recive code to execute as an remote command execution for whole system?
Sorry but I just don't get it at all.
Click to expand...
Click to collapse
People connect with Stagefright by sending you the malicious code contained within the MMS. Once that code gets (usually automatically) processed by the Stagefright service already locally present, it exploits security vulnerabilities to hand control of your device over to whomever is waiting on the other end. As for a media service being able to control the whole system, think of how Flash (a media service) and Microsoft had those zero-day UaE bugs that would allow someone to take over your PC. The logistics may be different, but the concept is the same.
If I remember correctly, there are ways to turn stagefright on/off by editing your build.prop file (easily found on XDA). I don't know if there is another subservice or what that could be running, and I haven't devved since Android 4 dropped, so don't get your hopes up.
Hope that helps.
I gather that Google has a patch. Has it been pushed out to Nexus devices?
pomeroythomas said:
If I remember correctly, there are ways to turn stagefright on/off by editing your build.prop file (easily found on XDA). I don't know if there is another subservice or what that could be running, and I haven't devved since Android 4 dropped, so don't get your hopes up.
Click to expand...
Click to collapse
Excellent idea, +thanks. Et voilà, what appears to b-e in my KitKat:
media.stagefright.enable-player=false
media.stagefright.enable-meta=false
media.stagefright.enable-scan=false
media.stagefright.enable-http=false
media.stagefright.enable-rtsp=false
media.stagefright.enable-record=false​
Now, this can break all kinds of things if you don't know what you're doing. Use a build.prop editor from the Play Store.
I don't know that they all need to be false to plug this hole. But those are the relevant lines.*
UPDATE [10 Aug 2015]: This doesn't affect what the Zimperium scanner says is vulnerable, which may indicate the edit won't protect you. It's unclear at this point.... read the latest posts in this thread for possible info. You can turn off auto-retrieve in MMS, but SF exists at other levels of the operating system. I suppose it couldn't hurt to do the build.prop, but don't rely on it.
voxluna said:
Excellent idea, +thanks. Et voilà:
media.stagefright.enable-player=false
media.stagefright.enable-meta=false
media.stagefright.enable-scan=false
media.stagefright.enable-http=false
media.stagefright.enable-rtsp=false
media.stagefright.enable-record=false​
Now, this will probably break all kinds of things, and I don't know that they all need to be false to plug this hole. But those are the relevant lines.
Click to expand...
Click to collapse
Thanks for the thanks!
You probably won't break much of anything; 90% of today's phones are powerful enough that you don't REALLY need Stagefright handling the media unless you're playing very intensive games on your device. The most you'll likely experience is not-quite-as-good benchmarking numbers.
pomeroythomas said:
Thanks for the thanks!
You probably won't break much of anything; 90% of today's phones are powerful enough that you don't REALLY need Stagefright handling the media unless you're playing very intensive games on your device. The most you'll likely experience is not-quite-as-good benchmarking numbers.
Click to expand...
Click to collapse
I had honestly never heard of StageFright, and I've been using Android since the very first device came out. But if it's possible to run all the usual media, just with a performance penalty, I'm going to change it right now (I did, and this happened).
Also, I just read an article claiming that fragmentation is not so much of an issue these days, because Google Play Services is mandatory. I wonder if it can proactively change something like this, on its own?
voxluna said:
I had honestly never heard of StageFright, and I've been using Android since the very first device came out. But if it's possible to run all the usual media, just with a performance penalty, I'm going to change it right now.
Click to expand...
Click to collapse
The only reason I even know about Stagefright is because my very first, 550MHz, resistive touchscreen Kyocera Zio shipped with Stagefright disabled by default. Haha.
Also, I just read an article claiming that fragmentation is not so much of an issue these days, because Google Play Services is mandatory. I wonder if it can proactively change something like this, on its own?
Click to expand...
Click to collapse
I would assume it's possible (this is just an arbitrary code execution issue, I think), but having had that vulnerability built into pretty much every ROM for the last 5 years could be a problem in that I'm not 100% sure that Google Play Services has the access to shut down the Stagefright service (no root access, etc), so I'm pretty sure Google Play Services would be less of a fix than a piece of software that actively tries to mitigate the breach.
I could be wrong, though; I'm basically guessing as I haven't looked into the malicious code.
Xposed Android will no doubt have either a module for this or existing bugfix modules will be updated to include this vulnerability in the coming days, and due to the nature of Xposed modules taking over services the ROM is trying to run without actually messing with your ROM, I'm sure it'll be a universal fix.
Personally, I just shut off the Stagefright service using my build.prop and am patiently awaiting someone more skilled than I to create a fix.
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Morlok8k said:
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Click to expand...
Click to collapse
Here's hoping!
Morlok8k said:
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Click to expand...
Click to collapse
pomeroythomas said:
I'm not 100% sure that Google Play Services has the access to shut down the Stagefright service (no root access, etc), so I'm pretty sure Google Play Services would be less of a fix than a piece of software that actively tries to mitigate the breach.
Click to expand...
Click to collapse
Come to think of it, if this exploit allows any kind of root, I suppose it'd be possible for Services itself to use that hole, and therefore be able to patch StageFright. A weird workaround, but entirely possible. Something tells me they won't use it, though, as technically feasable as it may be. I'm really hoping for that Xposed fix, just like GravityBox can patch FakeID. Which, indeed, Services eventually mitigated (for the most part).
commits on android.googlesource.com
Has anyone tracked any commits in android.googlesource.com related to stagefright?
Is this really a viable fix for this? I copied it from another website
If you turn off the following settings in your messaging app/apps on your device:
Auto-retrieve MMS. Check to automatically retrieve multimedia messages that you receive. If auto-retrieve is unchecked in your Messenger MMS settings, you must touch Download to view the message.
Roaming auto-retrieve. Check to automatically retrieve multimedia messages while roaming.
Then when you receive the text with this exploit it will not download to your phone unless you hit the download button. So looks like this can be turned off without a patch but patches are needed cause not everyone is smart enough to turn these off.
iverson3-1 said:
Is this really a viable fix for this? I copied it from another website
Auto-retrieve MMS. Check to automatically retrieve multimedia messages that you receive. If auto-retrieve is unchecked in your Messenger MMS settings, you must touch Download to view the message.
Roaming auto-retrieve. Check to automatically retrieve multimedia messages while roaming.
Then when you receive the text with this exploit it will not download to your phone unless you hit the download button. So looks like this can be turned off without a patch but patches are needed cause not everyone is smart enough to turn these off.
Click to expand...
Click to collapse
That should be one way to disable the hack. It's unclear from what I've read if it only affects Hangouts, or all SMS clients. What I've done is disable any auto MMS retrieve in my own messaging app, which in my case is mySMS. I suppose it couldn't hurt to do it in Hangouts as well.
This should cover it, but I think you still run the risk of someone you know sending (probably without their knowledge) an infected video -- much like trojans that take over a PC, and use the internal contact list to send mail as though they were your friend, they could exploit your trust.
Patching the build.prop theoretically protects from this, which I've personally done, but it's not for the faint of heart. If you screw it up, you could render your phone a mess. I wish I knew more about app development, because I would write something that did all this stuff automagically.
voxluna said:
Patching the build.prop theoretically protects from this, which I've personally done, but it's not for the faint of heart. If you screw it up, you could render your phone a mess.
Click to expand...
Click to collapse
Aaaaaand that's what I just did. I'm in a boot loop after changing the build.prop file. This is going to be really fun with an encrypted data partition that holds the backup I just made.
Be warned.
UPDATE: I had to reflash the ROM, and the entire experience took about 2.5 hours because I couldn't get a KDZ to work. I decided that since it was going to be a full wipe, at least I would upgrade to Lollipop, but I'll have to set up the entire phone all over again. I suspect the problem was that I didn't pay attention to the permissions of that file when I edited and transferred it from another machine. Ugh. I just went back and put warnings on all my posts about the build.prop lines.... and it would be better to just wait for patches, IMO. This thread is progressing quickly now.
i tried tracking the fix on android source repo. but the only recent commit against libstagefright is on July 7th.
Fix global-buffer-overflow in voAWB_Copy.
Copy() in frameworks/av/media/libstagefright/codecs/amrwbenc/src/util.c always
overreads the buffer by 4 bytes to the right, which, if we are very unlucky,
can even hit an unmapped memory page (in this case it is just a global
variable).
Click to expand...
Click to collapse
Hi all,
in my case, as I plainly don't use the MMS feature, I simpl deleted the MMS apn. Is this a possible workaround for this problem (at least, until it gets fixed somehow)?

Categories

Resources