[Q] Enable 2-way Call Recording? - Verizon HTC Droid Incredible 4G LTE

First thanks to all the great info and efforts here -- lots to read and learn from.
I am looking for a concise way to accomplish the following:
Record both sides of a phone conversation not using speaker phone or "announcing" the call is being recorded.
I have found an app called "Call Recorder" by skvalex. This app uses the " 2-way call recording" available on my phone which is a Verizon HTC Incredible 4G LTE.
Originally I was able to record both sides with a different app, however after a time -- likely when I did the Verizon software update -- that application was unable to record the other side of the conversation. So I sought a different app, tried several, and reached the following conclusion after much digging (googling, reading forums) -- that I needed to use the " 2-way call recording" functionality of the phone's kernel.
According to the developer skvalex, I need to root the phone to allow his application to utilize this 2-way call recording (2wcr) functionality.
I have found the following regarding the device:
http://www.xda-developers.com/andro...te-finally-gets-non-htcdev-bootloader-unlock/
and the companion thread
http://forum.xda-developers.com/showthread.php?t=1986346
However, I'm not clear on the exact steps I need to take -- and want to be "uber" cautious giving I am not traditionally an android developer and have never rooted a phone before. Nor is it clear that the "boot unlock" is necessarily the full picture. My impression is that I need to do these things before the Call Recorder app can access the 2wcr functionality of the kernel.
Run the unlock process from "Team fireballas FakeCid AUTOMATIC bootloader unlock" stepping carefully through the process
Follow Captain Rewind's instructions and add the TWRP recovery software to enable full phone backups (seems this is actually part of root process?) and the Super user
http://teamw.in/project/twrp2/139
From these as I'm understanding it the CWM noted in Captain Rewind' instructions are not applicable (and obsolete based on that link) if you're using TWRP. Is that correct??
If I'm reading this process correctly it's basically these steps:
Fool the CID to be the nonstandard 11111111 and use 'other supported devices' to download from HTC's unlock boot loader listing to unlock the phone's bootloader
Install TWRP
Install Superuser
After this, the phone's apps can access the kernel and the Call Recorder app should be able to record *both* sides of the conversation. In this scenario is there a way to keep those apps from accessing other things? Or is that in the permissions of the apps themselves (i.e. don't allow them to do X)?
I recognize this will need to be a clear-headed, step-by-careful-step walkthru to do it. So I want to make sure its truly necessary and that I am not missing something important -- like how do I ensure that someone doesn't call or text or email isn't picked up during the process? Or is that handled by USB debugging mode being on and the phone being connected to the computer?
What am I missing?
Thanks in advance for any assistance!!
-B.
(typically a PHP, MySQL deveioper)
BTW, I really do like my phone aside from this aspect -- and the earlier app I'd tried did a wonderful job until it appears that the software update closed the hole it might have used to access the other side of the conversation without doing speakerphone which doesn't work well for my purpose.
For those who might comment/wonder about the legality of the 2-sided recording, I have the legal approvals (signed legal documents) in place for doing it. It needs to be without interruption of the announcement to avoid impacting the information, so a call service isn't an option.
My phone software info:
Android 4.0.4
HTC Sense version 4.1
Software number 2.17.605.2 710RD
Model number ADR6410VW
Dual core processor, 1GB memory
Last software update ADR6410LVW_2.17.605.2-1.43.605.3
Kernel version 3.0.8-01620-gabf7709

Kernel feature
Sent from my Incredible 4G LTE using xda app-developers app

jose51197 said:
Kernel feature
Sent from my Incredible 4G LTE using xda app-developers app
Click to expand...
Click to collapse
Perhaps you could amplify on your comment.
I realize that 2wcr is a feature on the kernel.
My understanding is this feature must be turned ON in a setting somewhere that accesses the kernel to allow the Call Recording application to work and record both sides of the call from the application and that you need to root the phone to access that feature.
But I am unclear exactly what you are saying in your brief comment.
Perhaps I wasn't clear in my question -- I'm looking for how to enable that feature so the app works.
Thanks!

so you want root to get your app to work?
here's what i did...
http://forum.xda-developers.com/showthread.php?t=2039601

I too am interested in getting callrecorder to work. I just installed the latest viper rom, and callrecorder doesn't seem to work. Is there a specific rom or kernel that one can install which supports call recording? I had it working just fine on my old rezound with pretty much any rom.

Related

[Q] Enabling phone on Jetstream - S-OFF issue?

Hi all,
I recently acquired a Jetstream in the US (AT&T) to bring back to France.
I'm pretty new to Android but I got the bootloader unlocked through htcdev.com, then managed to apply DoomLoRD's root and CWM recovery succesfully (excellent tutorial, BTW).
I now want to unlock the phone and reconfigure BT so I can use my regular BT headset (Nokia BH-109, supports HFP & HSP but no A2DP) following the instructions on http://forum.xda-developers.com/showthread.php?t=1418235, but that fails to work as the /system/build.prop file remains read-only.
Is there anything I've missed? Would that be because my Jetstream is still S-ON?
thanks in advance for any hint that gets me going!
François
Hi,
Welcome to the Jetstream community.
1st off, for you to be able to edit the /system/build.prop file, you need Root Explorer, navigate to the file, before opening it with the text editor, make sure to click on the R-W/R-R which you can find around the top left side of screen- it will basically change from read to write functionality in the system files. You will then be able to enable the options.
2nd, after following the steps, you will be able to get the phone app to show and you will be able to use MMI codes of the *123# sort perfectly. Coming to the call however, you will be able to make calls but no sound on either side of the calls. Still some bugs to be figured out and fixed. Some have got some clue about how to solve it - mentioned in the post with the instructions.
3rd, after following those instructions, you will be able to send and receive messages using a 3rd part app like GO SMS. Works perfectly well.
4th, the S-ON to S-OFF transition needs a lot of help from developers which is not happening as of yet. Hoping that someone will be able to really achieve this for us. It has been done for many other devices as well and we all here hope it will happen for the Jetstream too.
Hope it helps you and hope to have more people join the community of this wonderful device like you have just joined us and get this device moving soon.
-Kaialsh.
Hi Kaialsh,
thanks for taking the time to share your experience. I will look into Root Explorer for sure, even though I actually managed to answer my question when writing my original post got me thinking.
I'll write down what I found as it may be of help to others.
As I understood the problem was with the /system partition being mounted R/O I looked on the Market and found mount /system (rw/ro) and it seemed to work giving me a successful status, but the build.prop file remained R/O in vi, and Astro would not save it properly.
I then saw that DoomLoRD's custom kernel included R/W system partition and looking into that I found the adb remount command which did what I wanted, except it failed on my system.
Last bit was to boot the tablet into DoomLoRD's insecure kernel image (as I did before to root the Jetstream), then issue "adb remount", then edit build.prop and reboot again.
As you can see, it's not really straightforward and I wish I saw your post before all of this!
I did see the Audio problems with making calls and will be following the forum for a potential fix to this problem, but I have another issue right now...
Noise cancellation does not work at all and any attempt to make a VoIP call (SIP or Google Talk for instance) results in terrible echo at the other end of the line. The only way out is to use a headset and Bluetooth seems a reasonable choice.
Before the build.prop change, my Nokia headset (with HFP and HSP) would be detected and paired but would remain disconnected and no profile was listed (only options are to delete pairing or rename device). A set of Bluetooth headphones with A2DP support worked fine.
After the change, the device is paired and the headset profile listed as expected, but it still remains disconnected even though when I select it I get a "connected" popup. Of course, the headset will not give audio in any application, and the speaker works normally.
I'd be interested if someone around here has any hints into getting a regular cell phone Bluetooth headset to work with the Jetstream, as well as maybe a fix on the echo cancellation problem.
In any case, this forum is a goldmine
I too face the problem with google talk and sort-noise cancellation is bad. I however circumvented the problem by using a wired headset-no echo with that but the gain on audio was a bit low. I don't own a Bluetooth device myself to check and am kind of busy studying for exams go out and get myself one.
However, the basic problem seems to lie in the Mic settings and as mentioned in the section on enabling gsm calls, we need to check the codec files and anything related to Mic and htc audio libs. I did sit once checking for any potential files that contain details regarding this, but I was dumb enough not to note things down then and there so don't remember very well and haven't found the time to check it again. Will do so the earliest possible and share my findings. There was something about a particular file missing in the devices lost which seemed to be necessary for phone functionality.
Also, just out of curiosity, what is your main application with the Jetstream?
Sent from my HTC PG09410 using XDA
It's a shame I don't know enough about the platform to look into it myself, but I'm ready to try out any suggestion that comes forward!
What I intend to use the tablet for is remote desktop/VNC access to remote systems through ssh tunnels and voice/video conferencing, but at the moment I'm still in the discovery stages.
François
Cool. Welcome aboard once again.
Sent from my HTC PG09410 using XDA

About Android MMS Stagefright exploit

How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Sent from my GT-I9301I using XDA Forums Pro.
mihai.apostu98 said:
How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Sent from my GT-I9301I using XDA Forums Pro.
Click to expand...
Click to collapse
Heres some useful info:
http://www.cnet.com/news/researcher-finds-mother-of-all-android-vulnerabilities/
That's some info, but not really anything useful. Does this mean Google has a patch, will they be pushing that our or will there be ways to patch custom ROMs sooner even? These are all unanswered, though would be nice to know...
"As soon as the malicious text is received, features built into Stagefright to reduce lag time for viewing videos process the video to prepare it for viewing. That processing apparently is enough for bad guys to get their hooks into the platform and take control." - cnet
I see it like this:
1. MMS with video arrives
2. Messaging app loads the video in Stagefright where it will processed for better playback.
3. Video is ready for playing.
As I figure out from Google's Android site about Stagefright, it is a service that take care of video/audio/other media related stuff offline and local.
How can hackers connect with Stagefright if Stagefright is an offline service? And anyway how can an media service recive code to execute as an remote command execution for whole system?
Sorry but I just don't get it at all.
mihai.apostu98 said:
How can Android system be hacked just by one MMS? I heard from news sites that there was found an exploit for 95% of Android phones (Android 2.3+) that can take control of the whole device just for one MMS and without letting you know. How can it be possible and how I can prevent it?
P.S.: I don't want to hack nobody's phone as I have no friends. Just curious.
Click to expand...
Click to collapse
Here's further info. Google has apparently already sent the patches, 7 in all, to the various phone manufacturers.
Because of fragmentation, though, some of them may never send out these fixes. Since these have assumedly been committed to the source code online, they should theoretically be available for download at some point as well. However, you'd (likely) need to be rooted to apply them.
In the meantime, go into your SMS application (usually Hangouts these days) and turn off automatic MMS retrieval. Then, do not accept any photos or videos from anyone you don't know. I am not sure, but I worry it's also possible you might get it from someone do know who is already infected, so just operate with an abundance of caution overall, I guess. And keep an eye out for news here, because it will probably be one of the first places they become available.
mihai.apostu98 said:
"As soon as the malicious text is received, features built into Stagefright to reduce lag time for viewing videos process the video to prepare it for viewing. That processing apparently is enough for bad guys to get their hooks into the platform and take control." - cnet
I see it like this:
1. MMS with video arrives
2. Messaging app loads the video in Stagefright where it will processed for better playback.
3. Video is ready for playing.
As I figure out from Google's Android site about Stagefright, it is a service that take care of video/audio/other media related stuff offline and local.
How can hackers connect with Stagefright if Stagefright is an offline service? And anyway how can an media service recive code to execute as an remote command execution for whole system?
Sorry but I just don't get it at all.
Click to expand...
Click to collapse
People connect with Stagefright by sending you the malicious code contained within the MMS. Once that code gets (usually automatically) processed by the Stagefright service already locally present, it exploits security vulnerabilities to hand control of your device over to whomever is waiting on the other end. As for a media service being able to control the whole system, think of how Flash (a media service) and Microsoft had those zero-day UaE bugs that would allow someone to take over your PC. The logistics may be different, but the concept is the same.
If I remember correctly, there are ways to turn stagefright on/off by editing your build.prop file (easily found on XDA). I don't know if there is another subservice or what that could be running, and I haven't devved since Android 4 dropped, so don't get your hopes up.
Hope that helps.
I gather that Google has a patch. Has it been pushed out to Nexus devices?
pomeroythomas said:
If I remember correctly, there are ways to turn stagefright on/off by editing your build.prop file (easily found on XDA). I don't know if there is another subservice or what that could be running, and I haven't devved since Android 4 dropped, so don't get your hopes up.
Click to expand...
Click to collapse
Excellent idea, +thanks. Et voilà, what appears to b-e in my KitKat:
media.stagefright.enable-player=false
media.stagefright.enable-meta=false
media.stagefright.enable-scan=false
media.stagefright.enable-http=false
media.stagefright.enable-rtsp=false
media.stagefright.enable-record=false​
Now, this can break all kinds of things if you don't know what you're doing. Use a build.prop editor from the Play Store.
I don't know that they all need to be false to plug this hole. But those are the relevant lines.*
UPDATE [10 Aug 2015]: This doesn't affect what the Zimperium scanner says is vulnerable, which may indicate the edit won't protect you. It's unclear at this point.... read the latest posts in this thread for possible info. You can turn off auto-retrieve in MMS, but SF exists at other levels of the operating system. I suppose it couldn't hurt to do the build.prop, but don't rely on it.
voxluna said:
Excellent idea, +thanks. Et voilà:
media.stagefright.enable-player=false
media.stagefright.enable-meta=false
media.stagefright.enable-scan=false
media.stagefright.enable-http=false
media.stagefright.enable-rtsp=false
media.stagefright.enable-record=false​
Now, this will probably break all kinds of things, and I don't know that they all need to be false to plug this hole. But those are the relevant lines.
Click to expand...
Click to collapse
Thanks for the thanks!
You probably won't break much of anything; 90% of today's phones are powerful enough that you don't REALLY need Stagefright handling the media unless you're playing very intensive games on your device. The most you'll likely experience is not-quite-as-good benchmarking numbers.
pomeroythomas said:
Thanks for the thanks!
You probably won't break much of anything; 90% of today's phones are powerful enough that you don't REALLY need Stagefright handling the media unless you're playing very intensive games on your device. The most you'll likely experience is not-quite-as-good benchmarking numbers.
Click to expand...
Click to collapse
I had honestly never heard of StageFright, and I've been using Android since the very first device came out. But if it's possible to run all the usual media, just with a performance penalty, I'm going to change it right now (I did, and this happened).
Also, I just read an article claiming that fragmentation is not so much of an issue these days, because Google Play Services is mandatory. I wonder if it can proactively change something like this, on its own?
voxluna said:
I had honestly never heard of StageFright, and I've been using Android since the very first device came out. But if it's possible to run all the usual media, just with a performance penalty, I'm going to change it right now.
Click to expand...
Click to collapse
The only reason I even know about Stagefright is because my very first, 550MHz, resistive touchscreen Kyocera Zio shipped with Stagefright disabled by default. Haha.
Also, I just read an article claiming that fragmentation is not so much of an issue these days, because Google Play Services is mandatory. I wonder if it can proactively change something like this, on its own?
Click to expand...
Click to collapse
I would assume it's possible (this is just an arbitrary code execution issue, I think), but having had that vulnerability built into pretty much every ROM for the last 5 years could be a problem in that I'm not 100% sure that Google Play Services has the access to shut down the Stagefright service (no root access, etc), so I'm pretty sure Google Play Services would be less of a fix than a piece of software that actively tries to mitigate the breach.
I could be wrong, though; I'm basically guessing as I haven't looked into the malicious code.
Xposed Android will no doubt have either a module for this or existing bugfix modules will be updated to include this vulnerability in the coming days, and due to the nature of Xposed modules taking over services the ROM is trying to run without actually messing with your ROM, I'm sure it'll be a universal fix.
Personally, I just shut off the Stagefright service using my build.prop and am patiently awaiting someone more skilled than I to create a fix.
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Morlok8k said:
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Click to expand...
Click to collapse
Here's hoping!
Morlok8k said:
i could see this as a useful root method for lollipop, and other versions that don't have root methods yet.
Click to expand...
Click to collapse
pomeroythomas said:
I'm not 100% sure that Google Play Services has the access to shut down the Stagefright service (no root access, etc), so I'm pretty sure Google Play Services would be less of a fix than a piece of software that actively tries to mitigate the breach.
Click to expand...
Click to collapse
Come to think of it, if this exploit allows any kind of root, I suppose it'd be possible for Services itself to use that hole, and therefore be able to patch StageFright. A weird workaround, but entirely possible. Something tells me they won't use it, though, as technically feasable as it may be. I'm really hoping for that Xposed fix, just like GravityBox can patch FakeID. Which, indeed, Services eventually mitigated (for the most part).
commits on android.googlesource.com
Has anyone tracked any commits in android.googlesource.com related to stagefright?
Is this really a viable fix for this? I copied it from another website
If you turn off the following settings in your messaging app/apps on your device:
Auto-retrieve MMS. Check to automatically retrieve multimedia messages that you receive. If auto-retrieve is unchecked in your Messenger MMS settings, you must touch Download to view the message.
Roaming auto-retrieve. Check to automatically retrieve multimedia messages while roaming.
Then when you receive the text with this exploit it will not download to your phone unless you hit the download button. So looks like this can be turned off without a patch but patches are needed cause not everyone is smart enough to turn these off.
iverson3-1 said:
Is this really a viable fix for this? I copied it from another website
Auto-retrieve MMS. Check to automatically retrieve multimedia messages that you receive. If auto-retrieve is unchecked in your Messenger MMS settings, you must touch Download to view the message.
Roaming auto-retrieve. Check to automatically retrieve multimedia messages while roaming.
Then when you receive the text with this exploit it will not download to your phone unless you hit the download button. So looks like this can be turned off without a patch but patches are needed cause not everyone is smart enough to turn these off.
Click to expand...
Click to collapse
That should be one way to disable the hack. It's unclear from what I've read if it only affects Hangouts, or all SMS clients. What I've done is disable any auto MMS retrieve in my own messaging app, which in my case is mySMS. I suppose it couldn't hurt to do it in Hangouts as well.
This should cover it, but I think you still run the risk of someone you know sending (probably without their knowledge) an infected video -- much like trojans that take over a PC, and use the internal contact list to send mail as though they were your friend, they could exploit your trust.
Patching the build.prop theoretically protects from this, which I've personally done, but it's not for the faint of heart. If you screw it up, you could render your phone a mess. I wish I knew more about app development, because I would write something that did all this stuff automagically.
voxluna said:
Patching the build.prop theoretically protects from this, which I've personally done, but it's not for the faint of heart. If you screw it up, you could render your phone a mess.
Click to expand...
Click to collapse
Aaaaaand that's what I just did. I'm in a boot loop after changing the build.prop file. This is going to be really fun with an encrypted data partition that holds the backup I just made.
Be warned.
UPDATE: I had to reflash the ROM, and the entire experience took about 2.5 hours because I couldn't get a KDZ to work. I decided that since it was going to be a full wipe, at least I would upgrade to Lollipop, but I'll have to set up the entire phone all over again. I suspect the problem was that I didn't pay attention to the permissions of that file when I edited and transferred it from another machine. Ugh. I just went back and put warnings on all my posts about the build.prop lines.... and it would be better to just wait for patches, IMO. This thread is progressing quickly now.
i tried tracking the fix on android source repo. but the only recent commit against libstagefright is on July 7th.
Fix global-buffer-overflow in voAWB_Copy.
Copy() in frameworks/av/media/libstagefright/codecs/amrwbenc/src/util.c always
overreads the buffer by 4 bytes to the right, which, if we are very unlucky,
can even hit an unmapped memory page (in this case it is just a global
variable).
Click to expand...
Click to collapse
Hi all,
in my case, as I plainly don't use the MMS feature, I simpl deleted the MMS apn. Is this a possible workaround for this problem (at least, until it gets fixed somehow)?

(What are) Must have APPS and To-Do to newbies to Galaxy S9+ (?)

Hey all.
Within a couple of days I'm getting my new Galaxy S9+ (Exynos) phone.
I made a year break from Android and switched to Apple, and now I'm back.
Unfortunately, I know nothing about newest Galaxy phones.
Maybe anyone has suggestions what should I do (download) when I'll set-up my phone (I've watched all the reviews of "must have" etc., don't suggest me to do that)?
I used to root and unlock bootloader for each my android phone, but I won't do that to my Galaxy S9+ at least for 6 months.
Hence, many root apps not working: "AdAway", "Viper4Android" etc.,
Maybe anyone knows Ad Blocking app without rooting a phone?
Or just mention anything that newbie to Galaxy S9+ should know.
(If you're wondering why am I "spamming" with these "stupid" questions: And no, I didn't find any similar thread to this)
Thanks in advance!
I use to root and rom all my phones, but I don't think it is as necessary as before.
I also use to download all the tweaks, but I don't do that either.
Non-root to block adds try Blokada it is in the F-Droid store.
It is Free and it Works.
I also swear by ES File Explorer to view and move files on your app. Also to sync any cloud storage you have.
If you have a regular phone number and google voice number going to the same phone
Voice Choice 2.0 is a nice app that allows you to make calls with a specific number
i.e. family and close friends have you carrier number
work partners, resume, business line has your google number
when you make a call you don't have to select anything, based on your rules set up it will dial out using the appropriate number.
re
qnc said:
I use to root and rom all my phones, but I don't think it is as necessary as before.
I also use to download all the tweaks, but I don't do that either.
Non-root to block adds try Blokada it is in the F-Droid store.
It is Free and it Works.
I also swear by ES File Explorer to view and move files on your app. Also to sync any cloud storage you have.
If you have a regular phone number and google voice number going to the same phone
Voice Choice 2.0 is a nice app that allows you to make calls with a specific number
i.e. family and close friends have you carrier number
work partners, resume, business line has your google number
when you make a call you don't have to select anything, based on your rules set up it will dial out using the appropriate number.
Click to expand...
Click to collapse
Thanks! Maybe you know anything about removing / disabling Bloatware as well?
LaurynasVP said:
Thanks! Maybe you know anything about removing / disabling Bloatware as well?
Click to expand...
Click to collapse
check out this thread at your own risk. It works I disabled Facebook (don't see why that would be on and unlocked phone fro Samsung, but i digress)
https://forum.xda-developers.com/galaxy-s9-plus/how-to/s9-s9-bloatware-removal-thread-g960u-t3817810
Be careful with the commands and understand what is being done before you hit the enter/return key
Good thing about disabling is if you fubar the phone you can do a factory restore and start all over
I only disabled Facebook. will investigate the other software as i play with the phone. Only had it 2 weeks so far.
re
qnc said:
check out this thread at your own risk. It works I disabled Facebook (don't see why that would be on and unlocked phone fro Samsung, but i digress)
https://forum.xda-developers.com/galaxy-s9-plus/how-to/s9-s9-bloatware-removal-thread-g960u-t3817810
Be careful with the commands and understand what is being done before you hit the enter/return key
Good thing about disabling is if you fubar the phone you can do a factory restore and start all over
I only disabled Facebook. will investigate the other software as i play with the phone. Only had it 2 weeks so far.
Click to expand...
Click to collapse
Thanks, I'll keep everything in mind

Question How to make the best of an unlockable_unrootable Verizon US variant?

I recently upgraded to the S23 Ultra and discovered that there's no option to unlock the bootloader. The root functions I value most are:
A firewall that will block apps from phoning home and/or accessing the internet without using the Android vpn (not sure if I could do that even if rooted...I just want to block apps from phoning home and use a vpn at the same time))
A call recorder (currently using Cube ACR, which actually works pretty good)
A way to 'image' the entire phone (i.e., like TWRP back up/restore)
A way to uninstall the bloatware that doesn't have an uninstall function.
Barring some method that will unlock the bootloader on this phone, what are methods/apps that will help me get as close to a rooted state as possible?
Well your first point is solved with what I use for privacy and adblocking. NextDNS (free option or $12/yr) you get a private DNS server and you control what is blocked and what isn't with all the customization you want. As for call recording, I've used skvalex (free with paid pro option but pro only adds automatic backup) for years whether rooted or not and it always works just fine. Though I will admit when it's connected to my car with Bluetooth it only records my side but I rarely talk while in the car so not a deal breaker for me. Thirdly, you could use adb to make a backup (from what I've read) but I use shizuku to give swift backup more permissions and it backups everything for me.
Thanks for your comments, spart0n.
I looked over NextDNS. It seems to have a lot of features. I do use my vpn's DNS, but they're various US servers are slow, plus NextDNS seems to have more features.
One thing I'm not clear on is can it slectively block apps from connecting to the internet, both on mobile /and/or wifi connection, much like a firewall?
I also did a quick perusal of skvalex, but I'm not sure how it's different from Cube ACR? One concern with cube is security...are they doing nefarious things with my data.
Cube also won't record the other side of a conversation when I'm using a bluetooth device (earbuds, car).
Is skvalex ' more respecting of privcy? In what ways do you deem it superior to other options such as Cube?
I'll be looking into Shizku and Swift backup, but am I correct in that it seems to be more of a 'Titanium' type app than a complete phone backup?
I really appreciate the pointers.
Sam Sung said:
Thanks for your comments, spart0n.
I looked over NextDNS. It seems to have a lot of features. I do use my vpn's DNS, but they're various US servers are slow, plus NextDNS seems to have more features.
One thing I'm not clear on is can it slectively block apps from connecting to the internet, both on mobile /and/or wifi connection, much like a firewall?
I also did a quick perusal of skvalex, but I'm not sure how it's different from Cube ACR? One concern with cube is security...are they doing nefarious things with my data.
Cube also won't record the other side of a conversation when I'm using a bluetooth device (earbuds, car).
Is skvalex ' more respecting of privcy? In what ways do you deem it superior to other options such as Cube?
I'll be looking into Shizku and Swift backup. I really appreciate the pointers.
Click to expand...
Click to collapse
I've tried cube in the past and it had a lot of denied connections in the background but over the years skvalex has worked perfectly even if I completely block all internet connectivity even from the start of installation except for checking for pro version.
As for NextDNS it does work on wifi and cellular. Personally I pay for the pro and have it setup on my home router plus all my phones too
Try freezing the Apps you cannot uninstall - e.g. SuperFreezZ or SD Maid.
Have a look here for some other goodies that may be useful:
https://alternativeto.net/list/28655/the-ultimate-f-droid-setup/
elmor0 said:
Try freezing the Apps you cannot uninstall - e.g. SuperFreezZ or SD Maid.
Have a look here for some other goodies that may be useful:
https://alternativeto.net/list/28655/the-ultimate-f-droid-setup/
Click to expand...
Click to collapse
There's no such thing as not able to uninstall. With adb commands you can uninstall literally any app, even system apps.
spart0n said:
There's no such thing as not able to uninstall. With adb commands you can uninstall literally any app, even system apps.
Click to expand...
Click to collapse
My understanding is that the system apps don't get truly uninstalled but are effectively disabled (frozen)......?
spart0n said:
I've tried cube in the past and it had a lot of denied connections in the background but over the years skvalex has worked perfectly even if I completely block all internet connectivity even from the start of installation except for checking for pro version.
As for NextDNS it does work on wifi and cellular. Personally I pay for the pro and have it setup on my home router plus all my phones too
Click to expand...
Click to collapse
The problem I've seen with Cube is that it sometimes randomly ends a recording before the call is finished.
Your earlier comment about using ABD to backup the phone - I found this and several other similar articles/guides outlining the method I think you alluded to. Seems pretty straight-forward. I also turned up info on uninstalling. Thanks for that - ABD seems the way to go.
The link:
How To Create a Full Android Phone or Tablet Backup Without Rooting or Unlocking Your Device
Android includes a built-in way to back up and restore the contents of your phone or tablet. All you need is a computer and a device running Android 4.0 (Ice Cream Sandwich) or newer.
www.howtogeek.com
Adding this link:
How to uninstall carrier/OEM bloatware without root access
If you want to get rid of carrier/OEM apps from your phone, here's how you can uninstall bloatware from your device without root access!
www.xda-developers.com
elmor0 said:
My understanding is that the system apps don't get truly uninstalled but are effectively disabled (frozen)......?
Click to expand...
Click to collapse
They do get uninstalled, but they remain inside the recovery partition so that when you reset the device they get reinstalled. You can disable or uninstall from Android any system app, even breaking the system, but the app will not get deleted from recovery unless you flash twrp or another custom recovery which deletes the stock recovery
Sam Sung said:
The problem I've seen with Cube is that it sometimes randomly ends a recording before the call is finished.
Your earlier comment about using ABD to backup the phone - I found this and several other similar articles/guides outlining the method I think you alluded to. Seems pretty straight-forward. I also turned up info on uninstalling. Thanks for that - ABD seems the way to go.
The link:
How To Create a Full Android Phone or Tablet Backup Without Rooting or Unlocking Your Device
Android includes a built-in way to back up and restore the contents of your phone or tablet. All you need is a computer and a device running Android 4.0 (Ice Cream Sandwich) or newer.
www.howtogeek.com
Adding this link:
How to uninstall carrier/OEM bloatware without root access
If you want to get rid of carrier/OEM apps from your phone, here's how you can uninstall bloatware from your device without root access!
www.xda-developers.com
Click to expand...
Click to collapse
Those are okay but dated guides for bloatware removal. There's 2 easy ways right now. One open source and not as feature rich and then there's a free/pro app that has more features.
Open source is universal android debloater gui (unless you want command line) from GitHub really easy to find with Google.
Or adb app control from cybercat. He's very active in his telegram support group and helpful
spart0n said:
Those are okay but dated guides for bloatware removal. There's 2 easy ways right now. One open source and not as feature rich and then there's a free/pro app that has more features.
Open source is universal android debloater gui (unless you want command line) from GitHub really easy to find with Google.
Or adb app control from cybercat. He's very active in his telegram support group and helpful
Click to expand...
Click to collapse
So they are. Not stuck on terminal. I've found and bookmarked AppControl download page.
Looking again, the ADB guide I linked to is aged too...is that still the best method? A Windows GUI would be nice for that too. Is there a reliable app or is ADB still my best bet?
Sam Sung said:
So they are. Not stuck on terminal. I've found and bookmarked AppControl download page.
Looking again, the ADB guide I linked to is aged too...is that still the best method? A Windows GUI would be nice for that too. Is there a reliable app or is ADB still my best bet?
Click to expand...
Click to collapse
Yeah there's a gui for adb, it's called universal android debloater from GitHub and in the release section they have a gui version
GitHub - 0x192/universal-android-debloater: Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device.
Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device. - GitHub - 0x192/universal-android-debloater:...
github.com
spart0n said:
Yeah there's a gui for adb, it's called universal android debloater from GitHub and in the release section they have a gui version
GitHub - 0x192/universal-android-debloater: Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device.
Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device. - GitHub - 0x192/universal-android-debloater:...
github.com
Click to expand...
Click to collapse
Rereading, I can see I wasn't clear at all. I should have specified 'for backup'. I'm doing a bit of searching for something now and this week. I doubt I can image the entire phone, but I'm hoping to find as complete and 'nandroid-like' backup solution as I can. If you know of anything, I'd appreciate it. Or maybe my best bet actually is ABD and commandline.
Sam Sung said:
Rereading, I can see I wasn't clear at all. I should have specified 'for backup'. I'm doing a bit of searching for something now and this week. I doubt I can image the entire phone, but I'm hoping to find as complete and 'nandroid-like' backup solution as I can. If you know of anything, I'd appreciate it. Or maybe my best bet actually is ABD and commandline.
Click to expand...
Click to collapse
Honestly I don't know any good ones, I use swift backup with shizuku. That's all I really know of. It works like titanium backup did but without root, even with shizuku, is somewhat limited.
adb pull /sdcard will get your files
Sometimes adb pull will fail on a specific file or folder and just puke on itself and refuse to continue. If that happens, you just have to delete the file/folder and try again. I've only had this happen once though.
Swift Backup with shizuku will back up apps and their downloaded data but not user data. Pair it with Google Backup and Google will restore *some* app data... Realistically though, you'll be losing some or a lot of app data, depending on app policies.
Thanks for your responses. Regrettably, there's no option in Dev options to unlock the boot-loader., so I'm stuck with whatever is available. Now I know. I should have either switched carriers or bought an unlocked phone, which I think comes with its own caveats.
User data, photos and such isn't too much of an issue here. My client data from apps is backed up to PC regularly, as are any photos I want to keep etc.
I like Nandroid backups because they backup everything including texts, call logs and OS (nice in case something happens and the OS bites the dust or gets crippled).
The real issue is my texts and call logs, moreso the texts..
How reliable is Swift (which is looking more and more attractive) compared to ABD, and can ABD back up more?
Also, side note, but my late wife's phone is an S7. I lost a previous phone and ergo my texts, so the texts on her phone are all I have of our texts over the years.
I was thinking I'd use Smart Switch or something to transfer the texts from her phone over to the S10 I just upgraded from. Is that practical?
I appreciate your remarks. Thanks!
Sam Sung said:
Thanks for your responses. Regrettably, there's no option in Dev options to unlock the boot-loader., so I'm stuck with whatever is available. Now I know. I should have either switched carriers or bought an unlocked phone, which I think comes with its own caveats.
User data, photos and such isn't too much of an issue here. My client data from apps is backed up to PC regularly, as are any photos I want to keep etc.
I like Nandroid backups because they backup everything including texts, call logs and OS (nice in case something happens and the OS bites the dust or gets crippled).
The real issue is my texts and call logs, moreso the texts..
How reliable is Swift (which is looking more and more attractive) compared to ABD, and can ABD back up more?
Also, side note, but my late wife's phone is an S7. I lost a previous phone and ergo my texts, so the texts on her phone are all I have of our texts over the years.
I was thinking I'd use Smart Switch or something to transfer the texts from her phone over to the S10 I just upgraded from. Is that practical?
I appreciate your remarks. Thanks!
Click to expand...
Click to collapse
As for bootloader unlocking anything Samsung, you can't buy the north America models, any other country model will have the option for unlocking. As for swift vs adb without root? Swift does call logs and text backups locally on the device and on several cloud services of your choice if you wish.
spart0n said:
As for bootloader unlocking anything Samsung, you can't buy the north America models, any other country model will have the option for unlocking. As for swift vs adb without root? Swift does call logs and text backups locally on the device and on several cloud services of your choice if you wish.
Click to expand...
Click to collapse
Thanks, sprt0n. I'll give Swift a try, along with Shizuku. Regarding the old S7 texts...do you recommend Swift there as well? WIll there be an issue transfering texts between the s7 and s10 given their age? S10 is Android 12, S7 is Android 8.
Sam Sung said:
Thanks, sprt0n. I'll give Swift a try, along with Shizuku. Regarding the old S7 texts...do you recommend Swift there as well? WIll there be an issue transfering texts between the s7 and s10 given their age? S10 is Android 12, S7 is Android 8.
Click to expand...
Click to collapse
You can try it says on the Google Play store listing page that supports Android 6 and up so it should work
I'll do that, Thx.
Y'all have given me direction regarding uninstalling apps and back up, and even firewalling, if NextDNS allows.
I may be back for future questions after I research this stuff. I appreciate all your comments, particularly spart0n.

Question Nokia X10 (X20) Android 13 chances of new ROM/ some-any ways to override settings/ "jail-break"???

In short : X10, UK, Android 13 - thanks, no thanks!
0 actual improvements as per discussed to some degree on Nokia "support forum".
Silly bloatware "features" added, but nothing what would be useful.
Have tried 50 apps of different kinds, enabling permissions (+ "developer mode"), yet still haven't found any that would record other person's voice, even thus is being transmitted via speaker or loudspeaker (heard).
Turns out down to legality issue, where's google has decided to undertake... 4'th party "responsibility, (3'rd would be Nokia), (1'st would be myself) and 2'nd party in it is the person who is to be it warned or not being recorded. Utter nonsense!
Looks like I cannot even downgrade back to neither Android 12 or 11 and custom ROM is the only option without any guarantees it'll work...
Deal breaker, and if I'll fail to find a fix or "jail-break this "feature"" will mean me binning my X10 for the older phone WITHOUT restrictions for recording, as google got scared of legality in CONTROLLING features and abilities of what it deemed as "their business" in EU and UK.
Turns out the back-up I've created is locked too- can not access it to upload for someone to have a play on virtual machine.
Deleted disabled most of google "feature" apps- still absolute the same my phone, but NOT mine, as OS is so great, it takes care of everything, including any chance to change permisions or the way it is set up.
Disappointed is understatement.
If anyone has ANY ideas how to fix this problem- I'd love to hear or if anyone would find a working bootloader for me to upload back up files- I'd love ANY suggestions,
Thanks!
Alvy123 said:
Have tried 50 apps of different kinds, enabling permissions (+ "developer mode"), yet still haven't found any that would record other person's voice, even thus is being transmitted via speaker or loudspeaker (heard).
Click to expand...
Click to collapse
I'm pretty sure there's a Magisk module that helps you with that problem. Requires you to unlock your phone's bootloader, though, which requires you to wipe your data on the phone.
Right (wrong so far)
Nokia_HMD_Fire_Tool_V1.4_Official
Doesn't run at all on my config

Categories

Resources