[ARTICLE/OPINION PIECE/GUIDE] Security Flaws and How To Fix [Some of] Them - Axon 7 - ZTE Axon 7 Guides, News, & Discussion

What ZTE has done with the Axon 7 is nothing short of incredible. An SD820 processor, 4 GB of RAM, Front-Facing Stereo Speakers, a 5.5" QHD AMOLED panel, MicroSD/Dual-SIM support, and a fingerprint sensor. You will not find this combination on any other phone with an unlockable bootloader or CDMA support. After getting to know the device’s security, I was less than enthused. Some things, which I would consider basic features, are missing. Other [system level] security features have been altered to the point where they are useless - or at the very least handicapped. I sought to fix those problems. In sharing what I have found, I seek to help you secure your device.
A few things, going forward…
This article is written with B29 in mind. The Nougat update has just been released and I hope that it has addressed many of my concerns. With that having been said, whip out the tin foil and fashion yourself a hat.
As I write this, the fact that I am about to list security problems with this device gives me pause. I was able to find reference or information about most, but I have found problems that I have not read about anywhere else. In effect, an unscrupulous individual could use information in this guide to compromise an unsecured device. Also, while proofreading this, I was compelled to add that I am not your lawyer. I am not here to help you cover illegal activity or shield you from legal action. At the end of the day, I cannot be responsible for the actions of another. I provide this information, in good faith, to help – not to hurt.
A word on mobile security in 2017 - especially in our current political climate.
There is no going back. We use our devices for everything from paying our bills to submitting job applications. Information that your grandparents would have kept locked in a safety deposit box is now routinely transmitted at the speed of light from your device to a remote server. Given the nature of electronics and storage, if you lose possession of the device, there is no guarantee that a skilled individual could not forcibly extract and reconstruct it. Under our current leadership, surveillance laws will be expanded in the name of security. The requirement for a warrant to forcibly extract data from a device will become more lax than it already is. The operative thought process from those in power is that, ‘if you have nothing to hide…’
Second, law enforcement:
I do not want to get into this too much. I see no way to effectively describe the problem with less than a few paragraphs; So, here we go:
With regard to your tech, the Fourth Amendment is dead. Your best defense is a secure device. Reports of police officers cloning the internal storage of Android devices on the side of the road with nothing more than a black box and a data cable are rampant. In reality, the Police have been collecting ‘analytical’ data from devices for years. All of the information is input into databases, where it can be cross-referenced and used for other investigations. Google ‘Cellebrite’ for more information about this. They are one of the leading forensic software companies. Reading about what can they do is truly disturbing. Be advised that the information on their website about compatibility and capability is not up-to-date [or complete] - for obvious reasons. For this reason, I would recommend keeping USB Debugging disabled on your device when you’re not using it.
Last year, I read a police report/legal ruling where a judge granted a police agency complete power to collect enhanced biometric data on everyone in a residence while executing a search warrant for drugs. I cannot delve too deep, but essentially, there was a device and the prosecutor had some doubts that the owner of the device used their own fingerprint. Enhanced biometric information collection was authorized [and executed] for all individuals in the household. This is a more extensive data set than what is stored by the fingerprint enrollment on Android/iOS. Tech. exists to pass this collected information to the pad sensor on your device. This was a clear violation of the Fifth Amendment if they used the information to crack open the device after the owner refused to type in their password. Because of the adversarial nature of our legal system, no one will complain until someone does something about it. The case received no attention from the press. I was never privy to the outcome, but it was clear to me that they really wanted to unlock that device.
We all have stuff to hide. Whether it is personal, criminal, whatever… The reality of our legal system in this country, combined with its age, has resulted in such an extensive set of laws that you are almost certainly violating one as we speak. Did you know that it is illegal for a man with a moustache to kiss a woman in Eureka, Nevada? See what I mean? This is [obviously] not enforced, but piss the wrong person off and watch how quickly a dumb law can serve as a pretext for investigation and discovery. See Twitter: CrimeADay for a bizarre list of Federal crimes which remain enforceable to this day. Even the most well-intentioned person could inadvertently incriminate himself or herself when surrendering their device. This is all very fascinating, and probably will never happen to you, but no one wants their device to be subject to random searches. Legal information, trade secrets, etc. can be just as damaging as incriminating information can be. Additionally, all of the data they collect leaves your protection and is subject to their storage, security flaws, breaches, and decisions to sell it in the future. If you choose to surrender your data, that is your call, but I seek to make sure that it is never by force.
Now that I've given you a headache, let's move onto the biggest security flaws that I’ve found:
ZTE has removed the ability to encrypt the internal storage on B29. I do not know if this was fixed with the B15 update, but this alone made the phone unusable for me. Several apps that I use will not even start if there is no boot time encryption password set. While I’m inclined to blame the apps, I completely understand why they won’t work. Some information is too sensitive to be stored on unencrypted media.
ZTE has altered the default security behavior of Android to allow the fingerprint sensor to unlock the device, even if it has just been rebooted or locked by a Device Admin. Again, I do not know the latest update addressed this. This feature is a last resort stopgap against your data being stolen under duress. You can refuse to type in a password, but your fingerprint can be forcibly/unknowingly used to unlock your device. I’m sure that more than a few of you have seen the Vines where the suspicious female attempts to use her man’s finger to unlock his device while he’s sleeping. I was unable to fix this, and it ultimately led me to abandon ZTE’s iteration of Android.
The bootloader can be rolled back and unlocked by anyone, allowing low-level access. From here, it is not difficult to reconstruct data that is left over by the insecure factory reset process after unlocking. However, this would probably be more useful to a thief than to someone who was after information. While this is cool for us from a development standpoint, it is also a security and anti-theft nightmare.
The power menu is accessible from the lock screen. While I’ve never seen a stock version of Android lock this down, the airplane mode function is available from the power menu on ZTE’s flavor of Marshmallow. This has the unfortunate effect of bypassing any anti-theft protection on the device that requires connectivity. We will address this and as many of the aforementioned items as we can.
Custom ROMS, Bootloader Unlocking
After careful consideration, I concluded that the only way the completely guarantee the security of my device was to use CyanogenMod/LineageOS. CM has some undesirable attributes, but [in my opinion] the positives outweigh the negatives. Let's just say that I eagerly await a fully functional AOSP build. However, CM allows encryption and requires the device’s password to be entered after rebooting or locking with a Device Admin. In order to do this, the device’s bootloader must obviously be unlocked.
Post-Unlock Security, Root, and What about my warranty?
Most security conscious individuals will probably tell you that unlocking your bootloader or rooting your device is the worst thing you can do for your device’s security. I submit to you that your device’s security is already broken. With the help of this site and a few easily accessible resources, the security that your locked bootloader affords you is useless. By encrypting your /data partition, you will be increasing the security of your data by an infinitesimal factor -- assuming you use a strong password. With regard to root, the human element remains the weakest link in the chain. Having your bootloader unlocked and your device rooted might make it easier for a knowledgeable person to reset and use the device after relieving you of it, but if your device is set up properly, your data is just as safe – if not safer than it was before.
The biggest consideration is warranty. In my opinion, any manufacturer that denies a legitimate hardware-related claim on the grounds of your bootloader being unlocked is not a company that should be supported. However, it ‘is what it is’ and time will tell how ZTE will treat its customers. The choice remains yours.
Password Strength
Using a separate encryption password is a wise thing to do. Pay attention to what keyboard you're using when you type your password in...
Do me a favor. Go to this site and check your password strength. http://calc.opensecurityresearch.com/
Under keys per second, select 'Custom' and paste
Code:
1999999999999999999999
That is very close to where we are, without going over.
The Fixes:
Please forgive the breakdown of writing style from this point forward.
/data Encryption:
The only remedy for this is to encrypt the internal storage on CM and then to reinstall B29. Unlock your bootloader, install TWRP, flash CM13, boot the device and encrypt it. From here, [if warranted] you can reset the encryption password to whatever you want it to be by running
Code:
vdc cryptfs changepw password 'old_password_here' 'new_password_here'
Reboot to TWRP, wipe everything, but do not ‘Format Data’ or Factory Reset. Perform an ‘Advanced Wipe’ and wipe everything. Reinstall B29, and you’ll be prompted for your encryption password whenever you boot your device! This alone will protect your data from forcible extraction and reconstruction after the device is factory reset.
Fingerprint Sensor Unlock Policy:
Use a different version of Android. I tried everything. Locking the device with a Device Admin, killing the services using ADB while on the lock screen, unloading drivers, etc… For some reason, the damned sensor just works all of the time. Any insight on this is greatly appreciated….
Bootloader Rollback:
The B15 update contains a newer version of fastboot that, as I understand it, is fake and does not accept fastboot commands. I will be investigating the implementation of this. This would still be subject to replacement by the working version… So, it may only slow a determined intruder down.
Lock Screen Power Menu/Airplane Mode:
There is probably a way to kill the power menu when on the lock screen by editing some resource or another. My solution utilized Tasker. Disable Tasker’s battery optimization in the Android system settings. A more comprehensive write up might be forthcoming upon request, but essentially, you would do:
Code:
2 (3rd/4th optional/troubleshooting) profiles/tasks to maintain a variable as to whether or not the device had been unlocked.
Event (Display Unlocked) -> Clear Variable %Locked
Event (Display Off) -> Set Variable %Locked To 1
State (Display Off) + State (Variable Value %Locked Doesn’t Match 1) -> Set Variable %Locked To 1
Event (Device Shutdown) -> Set Variable %Locked To 1
1 Profile/Task to disable Airplane Mode
Event (Variable Set, Airplane Mode Status, value=’on’) + State (Variable Set, %Locked, value=’1’)
From here, you can either tell a task to wait a specified amount of time to turn off Airplane Mode, have Tasker immediately turn it off, or flag a variable that will be looked for the next time the display is turned off. I would suggest having the last profile set a variable, such as %DisableAeroplaneMode=1. Then do,
Code:
Event (Display Off) + Variable Value (%DisableAeroplaneMode, value=’1’)
|-> Wait 5 Seconds, Turn Off Airplane Mode, Clear Variable %DisableAeroplaneMode
And/Or
State (Display Off) + State (Variable Value, Airplane Mode Status = ‘on’ & %DisableAeroplaneMode = ‘1’)
|-> Wait 5 Seconds, Turn Off Airplane Mode, Clear Variable %DisableAeroplaneMode
By doing it the way I have laid out, where the device waits until the screen is off, the would-be thief is tricked into thinking that he has disabled the device’s connectivity. The task will repeat as many times as the attacker toggles Airplane Mode. This will not stop the attacker from powering down the device, but may give you the extra minute you need to send the self-destruct command or locate the device. The optional tasks assure that your wishes are respected even if the Display Off events are missed -- which happens.
In conclusion, ZTE should really take a hint. Don’t cheap out on security. If something is working, and has worked for a long time, there is no reason to change it. Alternatively, to employ the age-old aphorism, if it ain’t broke, don’t fix it. I hope to have given everyone something with this write-up. A true 'pick and choose' philosophy way be the best way to proceed from here. There is no such thing as a truly secure piece of tech, and there is no such thing as a secure device that is also convenient to use on a daily basis. Take care, all.
This is my first thread in my 5 years of of XDA membership. Feedback is much appreciated.

Physical security of this device was gone the day that tenfar released the boot/recovery flashing tool. That sends the signed firehose over the USB connection, which can be picked up and used by anyone who knows how (eg. tennear). Your *only* security on the device is encryption. Period.
And just so you don't feel too bad about this, you can bet that law enforcement has, or can subpoena, the firehose from any manufacturer.
Moral: always encrypt and use a strong password. That at least gives you *some* chance of security.

Very interesting read. There's very little privacy in the connected society we will live in. Who needs any kind of tracking device when the cell phone does that and so much more. In the older days (pre 2012?) one could fully shutdown the phone by pulling the battery. This is no longer possible with sealed/embedded batteries. One certainly hopes the phone is truly off when powered down or transmitter is deactivated in airplane mode.
We've traded privacy for convenience. The other day a personal banker at my bank was trying to sell me on mobile banking. How easy and convenient it is to deposit a check or transfer funds. No thanks. Just don't trust android enough to install any finance related apps.
If you leave your wifi on, the phone scanning for an AP reveals enough about itself to be a tracking marker.
IMO, best security for a mobile device is not to contain any confidential information in the first place. There won't be anything to reveal should the device become compromised.

A fantastic read, very appreciated, thanks for your work.
I know that, amazing piece of hardware, with very poor software development, with all the rumors confirmed: terribles mistakes in almost any software aspect's.
Thanks again and please, write more often !

Great write up.
I'm on B15 and when you set a pattern lock or pin it asks you if you want the device to require the pin/password/pattern on startup. So there's some change there. I have a pattern set and after reboots it does ask me to unlock it before finger print will work.
Airplane mode still accessible from the lockscreen on B15.

LineageOS 14.1 for ZTE Axon 7
QuantumFluxx said:
What ZTE has done with the Axon 7 is nothing short of incredible. An SD820 processor, 4 GBs of RAM, Front-Facing Stereo Speakers, a QHD AMOLED panel, MicroSD support, and a fingerprint sensor. You will not find this combination on any other phone with an unlockable bootloader or CDMA support.
Click to expand...
Click to collapse
Agreed. Especially the 5.5" 1440p AMOLED display. We have enough 5.5" 1080p slabs from the budget Chinese companies. ZTE "gets" it.
I wish Google had bought a MILLION of these, loaded on Nougat and sold them as the Pixel XL. The specs put Google to shame, and they charge twice the price.
If only ZTE had included wireless charging I would have bought 3 of them immediately. For now, I'm sticking with my 2014 Moto XT1225 -- basically the 5.2" version of the Moto Nexus 6, but with a BIGGER battery:
5.2" 1440p, Snapdragon 805, 3GB RAM, 64GB internal memory, Qi wireless charging, Qualcomm Quickcharge 2.0, 3900 mAh battery. And yes, I have three of them.
QuantumFluxx said:
The only remedy for this is to encrypt the internal storage on CM and then to reinstall B29. Unlock your bootloader, install TWRP, flash CM13, boot the device and encrypt it
Click to expand...
Click to collapse
CM13 is abandoned. Surely you mean CM/LOS14?
[OFFICIAL]LineageOS 14.1 for ZTE Axon 7
https://forum.xda-developers.com/axon-7/development/unofficial-lineageos-14-1-zte-axon-7-t3545679
You just wrote this three days ago. You don't know this?

ChazzMatt said:
CM13 is abandoned. Surely you mean CM/LOS14?
[OFFICIAL]LineageOS 14.1 for ZTE Axon 7
https://forum.xda-developers.com/axon-7/development/unofficial-lineageos-14-1-zte-axon-7-t3545679
You just wrote this three days ago. You don't know this?
Click to expand...
Click to collapse
I was aware. I'm even running LOS on my Axon I have personally set up an encrypted /data partition on CM13 (MM) and then reinstalled B29 (MM) without formatting /data. I haven't tried using CM14/LOS for the first step of that process. Since the recently released B15 (Nougat) update seems to have addressed the missing encryption option, this guide might mostly be deprecated -- or only useful to those who choose to remain on B29. I would not recommend using Nougat to set up a /data partition for a Marshmallow system.

This.. was very interesting. I've decided I'm not gonna buy the device until they fix this. On the other hand, my bullhead has *no* encryption as boot encryption is too much of an annoyance to me. I'm waiting for TWRP to support file-based encryption on my device (hopefully WITH f2fs) so I can contain my speed within good security. Also, on AOSP the data CAN be turned off from Quick Settings, unfortunately. I could just remove it from there I guess... (but I need to keep a watch)

I suspected that something is a miss with the device when I got it yesterday, but didn't have the time to check it out why exactly I don't see the expected encryption settings...
Saved me a lot of time and research.. Thanks for that.
Good thing that I'm actually renting the device and didn't actually bought it... I guess I won't be keeping it..

Considering ZTE has been in the frying pan by US Congress, the FBI, etc. for the past 5 years, I'm not surprised they'd make a phone our government would love everyone to get but... not use themselves. Just be glad you were able to get a fancy cheap phone to put LOS on at the moment considering Congress only recently (this past summer) gave ZTE a temporary halt on their sanctions to do business in the U.S. I read a lot before clicking "buy" but decided to pull the trigger because it is a sweet phone. Before I first used it I scanned it with practically every major antivirus and malware product, put it behind a pfSense firewall running Snort, scanned it network-side with Nessus... I'd do more if I could.
https://www.nytimes.com/2016/06/03/technology/huawei-technologies-subpoena-iran-north-korea.html
http://intelligence.house.gov/sites...s/huawei-zte investigative report (final).pdf
https://www.nytimes.com/2016/03/19/...uestions-about-huawei-and-sanctions.html?_r=0
http://techonomy.com/2013/04/huawei-zte-banned-from-selling-to-u-s-government/
https://www.theguardian.com/technology/2012/oct/08/china-huawei-zte-security-threat
http://www.phonearena.com/news/Huawei-ZTE-may-be-doing-espionage-for-China_id35269
http://www.chinausfocus.com/finance...chinese-telecom-giants-conflicts-with-the-u-s
https://www.cyberscoop.com/android-malware-china-huawei-zte-kryptowire-blu-products/
http://www.fiercewireless.com/tech/...irms-be-allowed-back-into-u-s-wireless-market
... I could go on. Literally Google Huawei and ZTE in the same search and you get this stuff.

I remember reading about Huawei's involvement in this, but not ZTE's. Corporate greed, corporate greed, corporate greed.... I guess we should all be very aware of this and any developments. Please advise us of anything you come across that doesn't look right.
jawz101 said:
Considering ZTE has been in the frying pan by US Congress, the FBI, etc. for the past 5 years, I'm not surprised they'd make a phone our government would love everyone to get but... not use themselves. Just be glad you were able to get a fancy cheap phone to put LOS on at the moment considering Congress only recently (this past summer) gave ZTE a temporary halt on their sanctions to do business in the U.S. I read a lot before clicking "buy" but decided to pull the trigger because it is a sweet phone. Before I first used it I scanned it with practically every major antivirus and malware product, put it behind a pfSense firewall running Snort, scanned it network-side with Nessus... I'd do more if I could.
Click to expand...
Click to collapse
---
I'm so sorry to have played a part, but I am very glad that you were able to find all of this out before the end of your return period. At least, I assume that you're going to return it
I wrote this piece because I couldn't find something comparable on XDA or the rest of the net. Just a one sentence reference, here or there, that says someone couldn't encrypt. You would think more people would have flipped out about this, but the average 'unlocker'/'flasher' has a very poor opinion of full device encryption.
apocalypse_bg said:
I suspected that something is a miss with the device when I got it yesterday, but didn't have the time to check it out why exactly I don't see the expected encryption settings...
Saved me a lot of time and research.. Thanks for that.
Good thing that I'm actually renting the device and didn't actually bought it... I guess I won't be keeping it..
Click to expand...
Click to collapse
---
Good luck with your upcoming TWRP update! P.S., From TWRP.me regarding the Bullhead
NOTE: Decrypting data does not work if you fastboot boot the recovery image. Decrypt works if you flash the recovery and boot it like normal. If you do not know what this means, you can ignore this note.
Click to expand...
Click to collapse
If you install the recovery image through TWRP and reboot recovery, have you had any luck? Dunno if I'm reading that wrong.
I believe that the Nougat update re-added encryption [for the Axon].
I can help you secure your quick settings while the device is locked. You need Tasker and root.
Go to a shell and do
Code:
settings get secure sysui_qs_tiles
and take notice of the output. We will call these your 'default' settings, hereafter.
In Tasker, you would set up an event that triggered whenever the display was switched off. You could create a timer, but that would be substantially more complex than just tying the functions to the screen state of the device. The next command you will need is
Code:
settings put secure sysui_qs_tiles xxx
where 'xxx' are the tiles you want to appear on the lock screen/after the command is executed (referred to as 'modified', hereafter.)
So, 1st: Event,ScreenOff->Code,RunShell 'settings put secure sysui_qs_tiles modified', Use Root
2nd: Event,DeviceUnlocked->Code,RunShell 'settings put secure sysui_qs_tiles default', Use Root
3rd: Event,DeviceShutdown->>Code,RunShell 'settings put secure sysui_qs_tiles modified', Use Root
You will end up with 3 profiles and 2 tasks. I have attached a screenshot. This is my configuration of the 'Run Shell' command that would be triggered by the 'DeviceUnlocked' event.
You could set up the two different configurations, i.e. edit the quick settings tiles to one configuration when the device is locked, and one configuration for when the device is unlocked. Retain the output of the aforementioned 'get' shell command for each configuration and use them as the 'default' and 'modified' variables for your shell commands.
I always find it extremely difficult to write about Tasker and maintain any sense of literary professionalism. My apologies for any confusion. I'm looking at what I just wrote, and....yeah.
I have the same thing set up on my device and I would be happy to provide the exported files, if you are interested.
LazerL0rd said:
This.. was very interesting. I've decided I'm not gonna buy the device until they fix this. On the other hand, my bullhead has *no* encryption as boot encryption is too much of an annoyance to me. I'm waiting for TWRP to support file-based encryption on my device (hopefully WITH f2fs) so I can contain my speed within good security. Also, on AOSP the data CAN be turned off from Quick Settings, unfortunately. I could just remove it from there I guess... (but I need to keep a watch)
Click to expand...
Click to collapse
---
Yes!!! I wholeheartedly agree. You are getting speed, reliability, support, and updates with the Pixel.
We got the speed.
We got the reliability.
We have XDA.
We finally got the updates. -- I'm on the January security patch on 7.1.1.
In short, the Pixel can remain on the top shelf. I can see no reason it is so expensive other than the fact that Google knew people would gobble it up. That's how Apple does things. smh. The Pixel (and the iPhones) are just not worth $700-870. I would pay 400$ for the Pixel and $549.99 for the XL. That is still overpriced, but much more acceptable. In my opinion, these companies would have you believe that these phones really are VERY expensive to manufacturer. From what I've heard/read, Apple is making about 200$ on every iPhone they sell. Over the years, with that amount of money coming in, there is ABSOLUTELY no excuse to release a phone with outdated hardware and inferior display technology.
By the way, your Moto sounds sweet I miss my XT1575...
ChazzMatt said:
Agreed. Especially the 5.5" 1440p AMOLED display. We have enough 5.5" 1080p slabs from the budget Chinese companies. ZTE "gets" it.
I wish Google had bought a MILLION of these, loaded on Nougat and sold them as the Pixel XL. The specs put Google to shame, and they charge twice the price.
If only ZTE had included wireless charging I would have bought 3 of them immediately. For now, I'm sticking with my 2014 Moto XT1225 -- basically the 5.2" version of the Moto Nexus 6, but with a BIGGER battery:
5.2" 1440p, Snapdragon 805, 3GB RAM, 64GB internal memory, Qi wireless charging, Qualcomm Quickcharge 2.0, 3900 mAh battery. And yes, I have three of them.
Click to expand...
Click to collapse
---
Thank you all for your kind words!

QuantumFluxx said:
I remember reading about Huawei's involvement in this, but not ZTE's. Corporate greed, corporate greed, corporate greed.... I guess we should all be very aware of this and any developments. Please advise us of anything you come across that doesn't look right.
---
I'm so sorry to have played a part, but I am very glad that you were able to find all of this out before the end of your return period. At least, I assume that you're going to return it
I wrote this piece because I couldn't find something comparable on XDA or the rest of the net. Just a one sentence reference, here or there, that says someone couldn't encrypt. You would think more people would have flipped out about this,
Click to expand...
Click to collapse
Well, I read up on all of it beforehand and then bought it anyways. Yeah, it was mainly Huawei - probably because ZTE isn't a household name in the U.S. Regardless, they never gave any proof of tampering with spying so I ultimately wrote it off as b.S. I really think the gov't just wanted to convince people to buy from our partner countries instead of China because China has been quietly buying up a bunch of U.S. businesses and property over the past decade. They're worried about our economy, really. All I know is I want quality and affordability and of China produces that I'm going to opt for it. It is true I've been screwed on some China purchases- namely Indiegogo campaigns recently.

As I have a 2017G, the latest version available is B10. I'm interested if someone from the US with Nougat can confirm the encryption situation. I highly doubt that they have very different builds for EU/US..
According to the official German(EU) support forum of ZTE, they have said that the encryption will be available in Nougat.

Related

Samsung Galaxy S3 Encryption

I have a Samsung Galaxy S3 for both personal and business use. I do not currently use any of the security features as I don't use it for anything other than text messaging and web access, so there is nothing particularly sensitive stored on the phone, SD card or SIM card. However this is going to be changing soon as I take on a new project for work.
I need to be confident that should my phone fall into the wrong hands, they would not be able to access anything on the device. I understand that the iPhone 3 and up have an AES key burned into silicon with a hardware encryption engine which obviously provides better protection than any software based solution ever could. However I have been unable to find a definitive answer on whether handsets from any other manufacturer have a similar implementation. I would rather not have to buy a new handset, much less an Apple one, but at the moment it looks like my best bet is to pick up a second hand iPhone 4S for about £150. Do I have any other options?
Any takers?
Encryption should be fine
davejuk said:
I have a Samsung Galaxy S3 for both personal and business use. I do not currently use any of the security features as I don't use it for anything other than text messaging and web access, so there is nothing particularly sensitive stored on the phone, SD card or SIM card. However this is going to be changing soon as I take on a new project for work.
I need to be confident that should my phone fall into the wrong hands, they would not be able to access anything on the device. I understand that the iPhone 3 and up have an AES key burned into silicon with a hardware encryption engine which obviously provides better protection than any software based solution ever could. However I have been unable to find a definitive answer on whether handsets from any other manufacturer have a similar implementation. I would rather not have to buy a new handset, much less an Apple one, but at the moment it looks like my best bet is to pick up a second hand iPhone 4S for about £150. Do I have any other options?
Click to expand...
Click to collapse
Encrypting the device should be fine and I suggest you to use 8 digit password. It is very difficult to break encryption on Android. There are very few methods (couple of them) for cracking the encryption, however, all the tests are made on 4 digit passcode but not on 8 digit. It takes really a very long time to crack an 8 digit password. Otherwise your data is very secure and safe once the device is encrypted.
mrnobody007 said:
Encrypting the device should be fine and I suggest you to use 8 digit password. It is very difficult to break encryption on Android. There are very few methods (couple of them) for cracking the encryption, however, all the tests are made on 4 digit passcode but not on 8 digit. It takes really a very long time to crack an 8 digit password. Otherwise your data is very secure and safe once the device is encrypted.
Click to expand...
Click to collapse
Thnank you for your reply.
I am aware that brute-forcing AES is impractical. However brute-force is not the only method for attacking an encrypted device.
There is not much information available online but as far as I can tell, only iPhone's do not store the AES key in RAM. If the key is stored in RAM, then it is feasible to pull the power (battery) from the target device for a split second, dump RAM contents and so recover the key. If the key is burned into silicon and only accessible by the AES engine then this is not possible.

Broke LCD on Samsung Galaxy S6 NEED TO RECOVER PHOTOS!

So last week someone dropped a weight on my phone and broke the screen completely, I can no longer see anything on the screen. So Verizon's insurance company sent me another phone and I have to ship this one back however I have 2 years of photos on this phone that I do NOT want to lose. Does anyone know any ways to recover the ALL the files on this device? For some reason the finger print scanner doesnt work either so I can't really unlock it, and can't use the samsung page to unlock it because I already setup my new phone so I wasn't phone-less. Any information would be much appreciated and is welcomed; any way to buypass the lock or somehow just download the phone to my PC ect.
THANKS!!
Display repair or forensic data recovery from USF chip
If you have no prior access enabled, that is you have usb debugging (would be easiest) still in it's default off state, you have no custom recovery ROM installed, no screen mirroring solution that was installed at an earlier date etc. then really your only option is to go for the hardware.
Basically, you can either have the display replaced or pay a professional data recovery/forensics company to remove the internal sd card and backup the data from there.
Replacing the display is the less expensive choice. It will cost around 250 Euro where I live. If you want to try it yourself, the mere hardware will cost around 100 Euros (that's for the S6 - other phones have much cheaper displays). However, you'll likely need extra tools that are not standard household items, so the effective cost may be greater. Ofcourse with this option there's the risk that more than just the display is broken and your investment will have been for nothing.
Removing the internal flash memory chip and backup the data on it was deemed somewhere between impossible and highly impropable until recently, because it is so tightly embedded into the device. Around a year ago, chances of recovery were said to be around 40% by professional data recovery companies. Apparantly, this has greatly improved lately though, with a likeliness of 95+% now being stated. However, this involves very precise work and specialised hardware, so prices are accordingly high. I don't know exact prices in western Europe but judging from other types of professional recovery think 700/800 Euro upwards. Apparantly there are eastern European companies which offer the service for only around 300 Euro though. Look for "chip-off" method and UFS if you want to go in this direction.
(And just in case you're thinking about trying this yourself, take a look at this thread - and that isn't even related to the new UFS chips embedded in the Samsung Galaxy S6.
I'm sorry that I can't provide any better prospects for you. I guess that's what we get for letting companies get away with selling ever more locked up devices to us that we have practically no control over ourselves anymore.
Still, I wish you good luck!
shevtak

Pixel XL not rooted, with Android nougat can be hacked?

Hello,
I own a pixel xl with the latest nougat android operating system. My question is , is fully encrypted? if falls in wrong hands, like business competitors, authorities, or any one who can have high tech computers and software they can unlock it? unlocking it I mean to find our my password and open it and then have access to all data and photos.
please help
nikelecy said:
Hello,
I own a pixel xl with the latest nougat android operating system. My question is , is fully encrypted? if falls in wrong hands, like business competitors, authorities, or any one who can have high tech computers and software they can unlock it? unlocking it I mean to find our my password and open it and then have access to all data and photos.
please help
Click to expand...
Click to collapse
If the phone is locked like with pin code and stuff like that, anyone can pass that by using a custom Recovery to delete some stuff from system or he can do it using adb.
If you mean an encrypted storage, then it would be hard, but like you said "high tech computers and softwares" they will possibly be able to do it.
And hackers these days don't need to have the phone to hack it, they are capable of hacking remotely!!
But don't worry, it's nothing to be worry about because the chance of this happening to you is too low, they probably target very high business men and political characters and people like that
anyway, i don't recommend keeping your sensitive information in the phone(bank accounts, IDs...), it's so dangerous like that.
MigoMujahid said:
If the phone is locked like with pin code and stuff like that, anyone can pass that by using a custom Recovery to delete some stuff from system or he can do it using adb.
If you mean an encrypted storage, then it would be hard, but like you said "high tech computers and softwares" they will possibly be able to do it.
And hackers these days don't need to have the phone to hack it, they are capable of hacking remotely!!
But don't worry, it's nothing to be worry about because the chance of this happening to you is too low, they probably target very high business men and political characters and people like that
anyway, i don't recommend keeping your sensitive information in the phone(bank accounts, IDs...), it's so dangerous like that.
Click to expand...
Click to collapse
I have bank accounts , and cards and customer file lists etc...and many other things personally. the phone have lock screen and if fully encrypted. I have a password over 10 characters. high tech software and computers what is it ? what kind of computer?
now about hackers. lets say a competitor wants to know what kind of customers/ I have on my phone. he can hack it remotely and see?
I have an app blocking all permissions from all installed apps. how he can hack it? also I dont download games, or files on the laptop or pirated movies etc
nikelecy said:
I have bank accounts , and cards and customer file lists etc...and many other things personally. the phone have lock screen and if fully encrypted. I have a password over 10 characters. high tech software and computers what is it ? what kind of computer?
now about hackers. lets say a competitor wants to know what kind of customers/ I have on my phone. he can hack it remotely and see?
I have an app blocking all permissions from all installed apps. how he can hack it? also I dont download games, or files on the laptop or pirated movies etc
Click to expand...
Click to collapse
About computers, i have no idea, but anyway, to hack remotely, it requires an infected file to get inside the phone, so you have to be safe, that infected file might simply capture the screen and show them what you're typing in the password field.
BUT as long as you don't download anything from anywhere you're safe.
Apps and games should be trusted and only be downloaded from play store.
If you're using a laptop, you should switch to Linux OS immediately, it's much much safer than Windows, especially these days ransom-ware's hackers encrypted many PCs and asked for money to get the encryption code.
Happened to people i know, but never happened to someone with Linux operating system.
MigoMujahid said:
About computers, i have no idea, but anyway, to hack remotely, it requires an infected file to get inside the phone, so you have to be safe, that infected file might simply capture the screen and show them what you're typing in the password field.
BUT as long as you don't download anything from anywhere you're safe.
Apps and games should be trusted and only be downloaded from play store.
If you're using a laptop, you should switch to Linux OS immediately, it's much much safer than Windows, especially these days ransom-ware's hackers encrypted many PCs and asked for money to get the encryption code.
Happened to people i know, but never happened to someone with Linux operating system.
Click to expand...
Click to collapse
a person who hack phones told me that most android phones can be hacked easy and open them without erase the data. he told me that the icloud is impossible.
i will take the pixel to see if he can hack it. which I doubt.
one more question, if I buy a cheaper version phone and update to android nougat will be the same safe like pixel xl or not?
my computer is mac. i was sondering to switch to chromebook to tell you honest but I must confirm if can be hacked or not the chromebook
nikelecy said:
my computer is mac. i was sondering to switch to chromebook to tell you honest but I must confirm if can be hacked or not the chromebook
Click to expand...
Click to collapse
MAC is great as well.
About the Nogut upgrade, I'm not sure that is only about the OS, native OS might be less secure than the company's OS, even if both OSs are Nogut, the Company add modifications and security to its OS that make it more secure.
MigoMujahid said:
MAC is great as well.
About the Nogut upgrade, I'm not sure that is only about the OS, native OS might be less secure than the company's OS, even if both OSs are Nogut, the Company add modifications and security to its OS that make it more secure.
Click to expand...
Click to collapse
ok, buy you didn't answer me about the cheaper option of the android phone. lets say I want to give a phone to one of my manager with credit card info, clients etc, and doesnt have the preinstalled android nougat on it. this will be the same safe like the pixel? because to this employee I don't want to buy him pixel to handle the works tasks because i did it before with an iphone and she lost it.
nikelecy said:
ok, buy you didn't answer me about the cheaper option of the android phone. lets say I want to give a phone to one of my manager with credit card info, clients etc, and doesnt have the preinstalled android nougat on it. this will be the same safe like the pixel? because to this employee I don't want to buy him pixel to handle the works tasks because i did it before with an iphone and she lost it.
Click to expand...
Click to collapse
No I did answer ?
About the Nogut upgrade, I'm not sure that is only about the OS, native OS might be less secure than the company's OS, even if both OSs are Nogut, the Company add modifications and security to its OS that make it more secure.
Click to expand...
Click to collapse

ZTE Z982 Blade Z Max - FRP Locked Needing USB Debugging Or ?

Hello,
I have spent the better part of 24 hours trying to read up on anything and everything to do with FRP in general. I have admittedly always been a user of another brand I wont mention but not Android lol.
My question is this....is there currently any option to enable USB debugging, turning OEM off, using adb, etc on a FRP locked ZTE Z982?
I can use the bypass. And I have made it into the Settings however clicking on Build Number does NOT enable developer mode. I tried something about dialing *983* and some other numbers and then trying some GSM tool but never got anywhere with that because I am convinced it isnt being recognized by the computer.
I have tried every .apk ROOT out there thinking that may get me somewhere but that doesn't work either. I read something about combination files or something but ill admit I have no idea what that is and wasnt able to locate any information. I tried looking for a stock ROM but doesn't seem to exist and again even if I did find one, how would one flash it onto the device without USB debugging being enabled?
So essentially is this device a nice paper weight unless I wanna use it to take pictures and watch YouTube? Or am I totally missing something to get rid of this FRP and not just a bypass?
Thank you for any helpful replies.
Any advice would be appreciated.
As of today, your options are locating a seller on eBay that can do the unlock remotely. There's a few, but obviously choose one that's highly reviewed. Last I checked, the seller I used back around Halloween had lowered his price from $20, to just $15. Don't remember his name, but he had around 1300+ reviews, 100% positive feedback. I passed on the same info to another person needing help and they were able to locate the same seller quite easily, they said.
Your other option is to purchase this same software, this seller uses, which costs ~3x as much and do it yourself. You'll then have the option to unlock other phones as well, along with a vast amount of other services, which is pretty cool too, if you're wanting to take on a side gig, offering these types of services to others, making some extra money and recouping your initial expense spent on it.
There's a few other hardware based options to unlock devices, however they're considerably much more than this software, which only requires a PC and USB cable. Due to the purposes/intentions of the software, I'm hesitant to mention it's name, however it's the only one of its kind requiring simple household items that most have in their homes, so a quick Google search should easily reveal it for you.
Good luck to all still having this issue

Life after ROOT

So. I did a bunch of complaining about the T-Mobile network lock and the whole waiting game.. Then I found out that I had to wait an additional undetermined amount of days tp get the OEM key from OnePlus.. Grrrrrr... Arrrggg!! Well if any of you have a Nord 10 5G from the USA and it happens to be a carrier phone its gonna take at least 45 days from Carrier to OEM before you can root the thing. Just this morning, and after a long wait with much study on this process, I finally had my climactic victory with my first rooted device with a custom ROM. I am seriously a novice when it comes to these phones. Thank Geebus I have some sort of tech understanding and a ton of patience because I now have a beautifully modded Nord N10 5G that runs like a Pixel 5 with all the bells and whistles. A great deal of thanks goes to you folks for providing me the tools and know how to get thru this. The new PixelExperience_Plus ROM worked like a charm. And my ignorant American ass got it right on the fist try! I can't wait to see what kinds of new things you all will let me chew on in the near future. Cheers!!
Spidermonkeyj75 said:
So. I did a bunch of complaining about the T-Mobile network lock and the whole waiting game.. Then I found out that I had to wait an additional undetermined amount of days tp get the OEM key from OnePlus.. Grrrrrr... Arrrggg!! Well if any of you have a Nord 10 5G from the USA and it happens to be a carrier phone its gonna take at least 45 days from Carrier to OEM before you can root the thing. Just this morning, and after a long wait with much study on this process, I finally had my climactic victory with my first rooted device with a custom ROM. I am seriously a novice when it comes to these phones. Thank Geebus I have some sort of tech understanding and a ton of patience because I now have a beautifully modded Nord N10 5G that runs like a Pixel 5 with all the bells and whistles. A great deal of thanks goes to you folks for providing me the tools and know how to get thru this. The new PixelExperience_Plus ROM worked like a charm. And my ignorant American ass got it right on the fist try! I can't wait to see what kinds of new things you all will let me chew on in the near future. Cheers!!
Click to expand...
Click to collapse
I'm currently on my 6th rooted phone and I can assure you that typically it's never a relaxed process: You're always anxious because you don't want to turn your phone into a useless brick (unbootable and no possible fix).
However, just like you, all the knowledge we gain when rooting the phones it's totally worthy.
Now, since this is your first root, I want to share some useful root-required apps with you (most of them are not available on Google's play store, you can find them on F-Droid for example):
AdAway: System-wide free and open-source ad blocker. It has predefined ads lists. Some games where you get rewards for viewing ads either show an error when viewing the ad or give will simply reward you instantly without showing the ad.
AFWall+: System-wide firewall that blocks internet access for certain apps: Useful to avoid fishy apps to send your personal info to their servers. For example ATM I'm blocking Microsoft SwiftKey Keyboard, Google Messages and Google Phone.
Bouncer (paid): Gives temporary permissions to the apps and remembers your option: If you want to send an image through facebook go ahead, allow the external storage access, then later a notification shows up asking you to remove the pending temporary permissions.
OverrideDNS (paid): Probably the best DNS overrider you can find, it listens for new connections and automatically changes the DNS to your desired one.
Greenify: It's a huge helper on battery saving, allows you to select apps that you don't want to allow to run on background: Greenify kills these apps. Useful if you're like me and you have lots of apps that you use ONLY when needed, for instance, I don't want any of my games to run on background and I don't want to be bothered by game notifications.
Boot animations for superuser: Allows you to flash custom boot animations. Be careful with this app, I didn't try it yet on OP N10 (since I actually like Oxygen's boot animation).
Tasker (paid): Now this is where the fun begins... You can automate pretty much anything! Let me give you some examples that I have on my tasker:
Managing some custom profiles (technically speaking, custom tasks). I have 2 pre-defined profiles: Home and Outside (they change screen brightness, volumes, vibration, display timeout, wi-fi state, mobile data state, and so on, and these values depend if I'm connected to my smartwatch or not).
If my phone connects to my car's BT system, I forced tasker into changing to my Outside profile. If my phone is at my house's coordinates, it changes to home profile.
Whenever I connect my headset, it automatically opens Spotify.
When I received a text message, my torch flashes 3 times.
If my battery reaches 10%, it automatically sends my GF a message saying my battery is running low.
Whenever I open Google Maps, my GPS turns on.
Do you have links to these wonderful apps?
Spidermonkeyj75 said:
Do you have links to these wonderful apps?
Click to expand...
Click to collapse
Yes.
AdAway (or get it from F-Droid)
AFWall+ (you can also find it on Google Play or F-Droid)
Bouncer: You can either visit the author's website or get it on Google Play
OverrideDNS (you can find it on Google Play)
Greenify (you can find it on Google Play)
Boot animations for Super User (you can find it on Google Play)
Tasker (you can find it on Google Play)
You can also see some examples of tasker capabilities on the author's YouTube channel.
Oh man, wait until you get apps like V4A running.
It's a whole new ballpark, just gotta be careful not to hit too many foul balls.
So make sure to keep a backup whenever you start messing around.
CF Lumen (Play Store)
Titanium Backup (Play Store)
Solid Explorer (Play Store)
I thought the advantage to buying OnePlus phones is that they do not lock the bootloader, so no rooting is required (I read that somewhere online). Is that not correct?
I have been thinking about the N10 or 8T, but the lack of carrier support is making me hesitant. Also, the N10 has very good specs for the price, but with only one Android update and only 2 years of security updates, it would (I assume) need to have a custom rom installed after that to maintain security. Is that correct?
stealth49rt said:
I thought the advantage to buying OnePlus phones is that they do not lock the bootloader, so no rooting is required (I read that somewhere online). Is that not correct?
Click to expand...
Click to collapse
Not correct, the bootloader is still locked but:
If you unlock it, the device will still pass Google's SafetyNet check (which is used to check if your device is reliable to use more sensitive APPs/features: Netflix, Brave's rewards feature, some payment APPs). When I rooted my Xiaomi MI A3, unlocking the bootloader made the device being marked as untrustworthy, and therefore failing the SafetyNet.
OnePlus allows users to root their phone without voiding the warranty.
stealth49rt said:
I have been thinking about the N10 or 8T, but the lack of carrier support is making me hesitant. Also, the N10 has very good specs for the price, but with only one Android update and only 2 years of security updates, it would (I assume) need to have a custom rom installed after that to maintain security. Is that correct?
Click to expand...
Click to collapse
What do you mean carrier support? The first time I bought an OP device, they weren't even officially selling in my country.
Are you telling me that your country still sim-locks the devices? Why don't you buy it directly from oneplus.com? I think those are unlocked.
If you're referring to the frequency support, you can Google to check the frequency coverage in your area and compare with the device's supported frequencies.
OP's typically have a good ROM support, try Pixel Experience...
lbsilva said:
Not correct, the bootloader is still locked but:
If you unlock it, the device will still pass Google's SafetyNet check (which is used to check if your device is reliable to use more sensitive APPs/features: Netflix, Brave's rewards feature, some payment APPs). When I rooted my Xiaomi MI A3, unlocking the bootloader made the device being marked as untrustworthy, and therefore failing the SafetyNet.
OnePlus allows users to root their phone without voiding the warranty.
What do you mean carrier support? The first time I bought an OP device, they weren't even officially selling in my country.
Are you telling me that your country still sim-locks the devices? Why don't you buy it directly from oneplus.com? I think those are unlocked.
If you're referring to the frequency support, you can Google to check the frequency coverage in your area and compare with the device's supported frequencies.
OP's typically have a good ROM support, try Pixel Experience...
Click to expand...
Click to collapse
I apologize for my confusing message. I am in the USA. By "carriers" I meant companies like Verizon, AT&T, T-Mobile, etc. I am currently on Republic Wireless with a Moto G5s Plus (stuck on Android 8 and no more security patches either). RW doesn't allow the N10 5G yet on their network. I have only found a few MVNOs that do (e.g. Mint Mobile). Just about all support phones from Moto and Samsung. So I feel I may be going out on a limb getting a OnePlus phone.
AT&T actually (temporarily) suspended my account for turning the N105G on, with my AT&T SIM in it. Learned the hard way no one answers the phone anymore outside business hours, glad I didn't need to make any calls or do it on Friday at 5:01p. They got fired for that.
TMobile took it happily, no issues with activation, nice 5G signal (we don't have MMw in my city, but uses one of the other bands). Speed varies by location/tower, but have clocked downloads over 380Mbs. Note that Tmobile uses IPV6 and IPV4, so for certain things like VPNs you either have to futz with the APN settings to do IPV4 only, or make sure you have IPV6 functionality on destination sites (when you do, works pretty damn slick, I must say).
The thought of using Verizon makes me want to throw up, so no comments on that one.
Hope that helps.
SomeRandomGuy said:
AT&T actually (temporarily) suspended my account for turning the N105G on, with my AT&T SIM in it. Learned the hard way no one answers the phone anymore outside business hours, glad I didn't need to make any calls or do it on Friday at 5:01p. They got fired for that.
TMobile took it happily, no issues with activation, nice 5G signal (we don't have MMw in my city, but uses one of the other bands). Speed varies by location/tower, but have clocked downloads over 380Mbs. Note that Tmobile uses IPV6 and IPV4, so for certain things like VPNs you either have to futz with the APN settings to do IPV4 only, or make sure you have IPV6 functionality on destination sites (when you do, works pretty damn slick, I must say).
The thought of using Verizon makes me want to throw up, so no comments on that one.
Hope that helps.
Click to expand...
Click to collapse
There's a reason why AT&T is losing customers
stealth49rt said:
I apologize for my confusing message. I am in the USA. By "carriers" I meant companies like Verizon, AT&T, T-Mobile, etc. I am currently on Republic Wireless with a Moto G5s Plus (stuck on Android 8 and no more security patches either). RW doesn't allow the N10 5G yet on their network. I have only found a few MVNOs that do (e.g. Mint Mobile). Just about all support phones from Moto and Samsung. So I feel I may be going out on a limb getting a OnePlus phone.
Click to expand...
Click to collapse
If you have the ability to mod your phone, I mean install a custom ROM I suggest Pixel experience and Deepest. I've run them both and you have a lot more control over your radio options and network capability. Good luck!
Spidermonkeyj75 said:
If you have the ability to mod your phone, I mean install a custom ROM I suggest Pixel experience and Derpfest I've run them both and you have a lot more control over your radio options and network capability. Good luck!
Click to expand...
Click to collapse
Spidermonkeyj75 said:
So. I did a bunch of complaining about the T-Mobile network lock and the whole waiting game.. Then I found out that I had to wait an additional undetermined amount of days tp get the OEM key from OnePlus.. Grrrrrr... Arrrggg!! Well if any of you have a Nord 10 5G from the USA and it happens to be a carrier phone its gonna take at least 45 days from Carrier to OEM before you can root the thing. Just this morning, and after a long wait with much study on this process, I finally had my climactic victory with my first rooted device with a custom ROM. I am seriously a novice when it comes to these phones. Thank Geebus I have some sort of tech understanding and a ton of patience because I now have a beautifully modded Nord N10 5G that runs like a Pixel 5 with all the bells and whistles. A great deal of thanks goes to you folks for providing me the tools and know how to get thru this. The new PixelExperience_Plus ROM worked like a charm. And my ignorant American ass got it right on the fist try! I can't wait to see what kinds of new things you all will let me chew on in the near future. Cheers!!
Click to expand...
Click to collapse
Hi, i just had to ditch my pixel2 when the screen died and got the nord 10 5g. if rooted plenty of phones before but never had to wait to get an oem key from a vendor. would you mind elaborating on this point before i head into nightmare?
frankygoes said:
Hi, i just had to ditch my pixel2 when the screen died and got the nord 10 5g. if rooted plenty of phones before but never had to wait to get an oem key from a vendor. would you mind elaborating on this point before i head into nightmare?
Click to expand...
Click to collapse
No problem, if you have a T-Mobile carrier you will have to jump thru a few hoops to get your network (SIM) unlock , then you have to run a command via ADB to get the unlock code, :But WAIT ! There' s MORE" When that has al come to pass you have to get the unlock token from OnePlus and while in Fastboot Mode , you have to flash the cust-unlock.bin file to unlock the bootloader. Afterwards you can load whatever you want in there. Unfortunately, the Nord N10 5G doesn't get a lot of support or updates which sucks because it's not a bad device on the right platform. I'm looking to try the A/B GSI Flash method since the device is Treble worthy. Good luck! Hope you fare better than I did my first go-around.
thanks for the response. So i got an unlocked phone into which i put my existing SIM card. went into the developer settings and enabled "allow bootloader to be unlocked." you are saying that to now actually unlock the bootloader i need a code from oneplus?
Yep. A big pain in the ass.

Categories

Resources