Related
Hi all
I lost my galaxy s2 two days ago. I called my phone a few times until the person who has found it, shut it down.
Unfortunately I did not activate utrack. All I have my IMEI. Here in Switzerland only my provider does blacklist IMEI-Numbers, so that sucks too.
Anybody got any idea, or should I leave it??
There is not much you can do if you didn't activate tracking in phone(samsungdive) or use some aplication for that purpose.
Tracking is i think.by.default active if u logged in to samsung account
Sent from my GT-I9100 using XDA Premium App
This app could have helped you, had you not called the number and warned the person that you are looking for the phone.
https://market.android.com/details?id=com.lookout.labs.planb&feature=search_result
if the phone is still on you can still try to install that app via the link above.
Sign into the market on your PC using your google account.
Choose to install "Lookout Plan B" to your phone.
If it is on and with network connection, with your data remaining, it should be installed.
if who found your phone know a little bit about android i think the first thing he does is to delete your gmail account to prevent you from install apps from the web...so if you can't lock by imei there's nothing else you can do i guess
Inviato dal mio GT-I9100 usando Tapatalk
hey guys
Many Many thanks for that great input. I am talking about Plan B. The chance that somebody knowing about android found it, isnt that big. I did install it over the market and it said, that its going to be installed, so i am praying for my luck know.
Will keep you guys up-to-date.
Thanks once again.
for all these things (Plan B and Dive) to even work the phone must be on, must be on 3G data plan service, or be on Wifi. If you had the data off when you lost it, and the finder does not enable it by some rare miracle, you will never find it.
Most probably you are screwed OP. I lost my SGS1 the same way.
You can however try sending to your number a text message that says "Get $$ reward for this phone, call XXXXX" or something similar, and hope the crook will decide to return your phone. For this to work the phone must only be on and must be on a cell network (no data required).
Last option is to print reward ads and stick them to light poles in the area where you lost the phone.
kreoXDA said:
for all these things (Plan B and Dive) to even work the phone must be on, must be on 3G data plan service, or be on Wifi. If you had the data off when you lost it, and the finder does not enable it by some rare miracle, you will never find it.
Most probably you are screwed OP. I lost my SGS1 the same way.
You can however try sending to your number a text message that says "Get $$ reward for this phone, call XXXXX" or something similar, and hope the crook will decide to return your phone. For this to work the phone must only be on and must be on a cell network (no data required).
Last option is to print reward ads and stick them to light poles in the area where you lost the phone.
Click to expand...
Click to collapse
hmmm... And I thought my lost-phone-karma was positive, since I found and SGS1 a few months ago and returned it to the owner immediatly.
well, my only chance is, the phone will be connected to a wireless connection, since ive got my sim blocked through the provider. The hope is gone but who knows, miracles can happen
Firstly, good luck carthago, I hope you find your phone!
Secondly, and just for curiosity, does anyone know if could Samsung DIVE, Tektrak, Lookout and those similar tools can operate if the person who find the phone do a factory reset or flash a new firmware? I doubt that it could be possible, however I'm not an expert.
If there is no way for those tools to work after a factory reset or a flashing a new firmware, their usefulness is limited to the case that the thief either an idiot (regarding the factory reset) or computer illiterate (regarding re-flashing the phone).
In the case of free tools, any remote possibility of help is welcome, of course (better than nothing), however there are also many paid apps which purport to be THE solution this kind of problem.
No they don't work after factory reset
angelomaldito said:
Firstly, good luck carthago, I hope you find your phone!
Secondly, and just for curiosity, does anyone know if could Samsung DIVE, Tektrak, Lookout and those similar tools can operate if the person who find the phone do a factory reset or flash a new firmware? I doubt that it could be possible, however I'm not an expert.
If there is no way for those tools to work after a factory reset or a flashing a new firmware, their usefulness is limited to the case that the thief either an idiot (regarding the factory reset) or computer illiterate (regarding re-flashing the phone).
In the case of free tools, any remote possibility of help is welcome, of course (better than nothing), however there are also many paid apps which purport to be THE solution this kind of problem.
Click to expand...
Click to collapse
Sent from my GT-I9100 using XDA App
angelomaldito said:
Firstly, good luck carthago, I hope you find your phone!
Secondly, and just for curiosity, does anyone know if could Samsung DIVE, Tektrak, Lookout and those similar tools can operate if the person who find the phone do a factory reset or flash a new firmware? I doubt that it could be possible, however I'm not an expert.
If there is no way for those tools to work after a factory reset or a flashing a new firmware, their usefulness is limited to the case that the thief either an idiot (regarding the factory reset) or computer illiterate (regarding re-flashing the phone).
In the case of free tools, any remote possibility of help is welcome, of course (better than nothing), however there are also many paid apps which purport to be THE solution this kind of problem.
Click to expand...
Click to collapse
All those tools are good IF you lost the phone, realized it right away, ran to the nearest computer and activated the tools, provided the phone is still reachable and on data network.
For the crooks who STEAL the expensive phones, the business is a fine tuned machine. 10 people run around stealing, and the immediately turn them off or remove battery. then they bulk-sell them to phone hackers who produce brand new freshly installed phones that can be sold at local flea market
Deactivating the IMEI I think will do anything only if the new owner tries to activate the phone on the same network.
First I was calling my phone again and again, cause I thought perhaps it was laying around somewhere and so I could hear it. But then that asshole had found out how to shut it down.
If you find something and theres no name and nothing on it, ok, if you keep that perhaps thats not exactly stealing. But if you shutdown a phone, because the owner is calling again and again, that is STEALING!
alcurtis93 said:
No they don't work after factory reset
There is two you can push to /system/app. One is sim checker. The other it locservice. I will check with vendor if the data can fire email notifications and passwords be made to survive
Sent from my GT-I9100 using XDA App
Click to expand...
Click to collapse
Sent from my GT-I9100 using Tapatalk
I was just wondering: one of the features of those tracking apps is the possibility of wiping your data if you lose your phone. Therefore, if wiping your data in this way (which I don't know if it corresponds to a factory reset or is just a 'soft wipe') means that it will be no longer possible to locate your phone?
Sent from my GT-I9100 using XDA App
Hi Guys,
There are many apps available in the market to find your lost phone.
But before buying any of them, I need few tips if anybody used them.
Are these apps really useful?
Say if I lost my mobile & the person who found has switched off the phone/removed sim card then will these apps help???
Please suggest!!
I don't think they can help on a switched off or reflashed device
Sent from my iPad 2 using Tapatalk
WatchDroid prevents reflashing the phone and will work even after sim card change, plus gives you access to lots of commands
Never had to use it yet, but it needs to be pre configured before it is lost/stolen.
really suggest it!
fredastere said:
WatchDroid prevents reflashing the phone and will work even after sim card change, plus gives you access to lots of commands
Never had to use it yet, but it needs to be pre configured before it is lost/stolen.
really suggest it!
Click to expand...
Click to collapse
Would it prevent Flashtool from working or just the SEUS?
fredastere said:
WatchDroid prevents reflashing the phone and will work even after sim card change, plus gives you access to lots of commands
Never had to use it yet, but it needs to be pre configured before it is lost/stolen.
really suggest it!
Click to expand...
Click to collapse
Good..i will consider this, thanks..
Sent from my Sony Tablet S using xda premium
I think you must go with your tel box with in the police
if you have information about your phone from your app's that +
police must help you
P.S. =(
rmk152 said:
Would it prevent Flashtool from working or just the SEUS?
Click to expand...
Click to collapse
After reading the description of the program i don't think it could do either of those.
the thing is, your have to enter a different startup mode for flashtool/SEUS, in other words, you would have to boot in flash mode.
An app won't be able to communicat to your phone before it is even booted, and since you boot into flash mode before you even reach android, it would just become impossible.
Would be neat though, if it was to be made, but that would have to be integrated into the bootloader.
Hi,
I understand that if a person get physical access to the device, even if it is encrypted and password protected, access can be obtain by connecting the tablet to a computer.
This could be done even if the N7 is not rooted neither debugging mode is on and fast boot is locked.
Thanks.
Sent from my Nexus 7 using xda app-developers app
My concern is the following one:
The Nexus root kit allow to make a back up of the device, to unlock fast boot (That step will wipe the device), root the N7.
I understand that these steps can be done without N7 password.
When access in root mode, malicious code could be installed.
Nexus root kit allow you to restore the backup previously done, unroot and re-lock fast boot.
If what I state is correct, a person with physical access to the device can do whatever he wants to do. The user will have no way to be aware of it.
There is a way to protect a N7 against that kind of attack?
There is a way to protect access to fast boot or to disable access through USB?
Sent from my Nexus 7 using xda app-developers app
The way I understand it, I may be wrong though.
If you keep the boot loader locked, a malicious person would inevitably have to erase everything on the device to unlock it to root it.
Now if they made a backup first using the tool kit and restored when they were done, I feel they may undo everything they tried to put on your device.
Granted they would have a complete backup of your device on hand after everything's said and done
If physical security is a concern, I'd suggest having your information you want to keep safe completely off the device, using a cloud service, and inputting your password into such apps all the time.
Sent from my Nexus 7 using xda app-developers app
If I turn on pattern lock (haven't tested with pin, password, face, but I don't know why it would be any different), and connect N7 to the computer, it won't connect. As in, I still see the Nexus 7 device in my computer, but when I click on it, it displays nothing. Only once I enter the pattern, files appear.
Of course, once you enter the pattern, you will gain access to files, even if you relock it (while still connected - once you disconnect, you will have to reenter the pattern)
You can encrypt the tablet in Security settings, and while I don't really know what that does, it should make the backup file unreadable without a password, otherwise this feature is useless.
And I think if you disable USB debugging, you can make installing ROMs and stuff not very possible (but I'm not sure - I just assume, since every flashing tutorial starts with 'enable USB debugging')
edit: http://support.google.com/android/bin/answer.py?hl=en&answer=2425151
truehybridx said:
Now if they made a backup first using the tool kit and restored when they were done, I feel they may undo everything they tried to put on your device.
Granted they would have a complete backup of your device on hand after everything's said and done
Click to expand...
Click to collapse
Thanks for your response.
Sorry I miss explain the chronology:
The attacker switch off the device (could be done even if screen locked)
Reboot to the boot loader
Make the back up with the Nexus Root Kit. --> No password required, correct?
Unlock boot loader --> Device wiped.
Root the device
Restore the backup
Include malicious code
Unroot
Re-lock
If any one can confirm what stated is correct and if there is a way to prevent it.
Sent from my Nexus 7 using xda app-developers app
issak42 said:
You can encrypt the tablet in Security settings, and while I don't really know what that does, it should make the backup file unreadable without a password, otherwise this feature is useless.
Click to expand...
Click to collapse
The encryption only cipher apps and other personal data. It does not cypher the system files... To bad
Sent from my Nexus 7 using xda app-developers app
Honestly, what are you afraid of happening? What do you keep on your device that would make someone go to the trouble to do this? They wouldn't even be able to boot into the OS if it was encrypted. The encryption is your best bet. Or, just don't let the device out of your sight (or pocket).
Sent from my Nexus 7 using Tapatalk HD
korockinout13 said:
Honestly, what are you afraid of happening? What do you keep on your device that would make someone go to the trouble to do this? They wouldn't even be able to boot into the OS if it was encrypted. The encryption is your best bet.
Click to expand...
Click to collapse
We need to secure several N7 that will be use by top management. We choose the N7 because no physical ports (unless the USB...). The back of the device will be glued, we will use a tailored version of Android (no google services at all) plus VPN for all data connection but we still get the physical access flaw issue.
Re: encryption
It does not cipher system file.
Sent from my Nexus 7 using xda app-developers app
patarchy said:
We need to secure several N7 that will be use by top management. We choose the N7 because no physical ports (unless the USB...). The back of the device will be glued, we will use a tailored version of Android (no google services at all) plus VPN for all data connection but we still get the physical access flaw issue.
Re: encryption
It does not cipher system file.
Sent from my Nexus 7 using xda app-developers app
Click to expand...
Click to collapse
Hmm... In that case, you might just have to secure it physically. The only way to prevent the exploit you mentioned would be to develop a custom bootloader that doesn't allow fastboot without proper authentication. But that's unrealistic.
Sent from my Nexus 7 using Tapatalk HD
patarchy said:
We need to secure several N7 that will be use by top management. We choose the N7 because no physical ports (unless the USB...). The back of the device will be glued, we will use a tailored version of Android (no google services at all) plus VPN for all data connection but we still get the physical access flaw issue.
Re: encryption
It does not cipher system file.
Sent from my Nexus 7 using xda app-developers app
Click to expand...
Click to collapse
In that case you might look into well, a case with a lock to block the USB or maybe some other hardware hacks that impede the device from connecting to a computer.
A case with charge ports to the pogo pins that obstruct the USB might be an option.
But like what was said, i custom boot loader might be a better option, contact Google directly about how to block boot loader unlocks
Super glue the usb port and charge through pogo pins
Sent from my Nexus 7 using Tapatalk 2
Thanks a lot to all of you for your contributions.
We will super glue the USB port.
Sent from my Nexus 7 using xda app-developers app
A few days ago my phone arrived from Ebay. I set it up and all was OK until I put it on the wireless charger. Then I noted that someone started to remotely operate the phone - to switch applications and so on.
During the set-up I upgraded to 4.3 and installed stuff from big and known companies (Facebook, Microsoft, etc.), all from Google Play. I haven't installed anything else. Usually I am very careful with what I install on my devices because I've been developing software for long time and have some experience with security (although this is my first Android phone).
After I noted the issue I restored the phone to its factory settings, installed even less apps, however I experienced the same. The hacker even wrote something playful.
Could you pls tell me how to find out what is going on? Like how was it possible to put a Trojan that would survive an Android update and a factory restore? How to find the Trojan and so on. I later installed some antivirus/antimalware that reported that the phone is clean.
Thank you.
vkamenen said:
A few days ago my phone arrived from Ebay. I set it up and all was OK until I put it on the wireless charger. Then I noted that someone started to remotely operate the phone - to switch applications and so on.
During the set-up I upgraded to 4.3 and installed stuff from big and known companies (Facebook, Microsoft, etc.), all from Google Play. I haven't installed anything else. Usually I am very careful with what I install on my devices because I've been developing software for long time and have some experience with security (although this is my first Android phone).
After I noted the issue I restored the phone to its factory settings, installed even less apps, however I experienced the same. The hacker even wrote something playful.
Could you pls tell me how to find out what is going on? Like how was it possible to put a Trojan that would survive an Android update and a factory restore? How to find the Trojan and so on. I later installed some antivirus/antimalware that reported that the phone is clean.
Thank you.
Click to expand...
Click to collapse
Weird! What did the hacker wrote if I may ask?
I assume this is AndroRat, you can google on how to remove it (I wouldn't know).
Keep is updated!
Sent from my Nexus 4 using xda app-developers app
Factory restore doesn't touch tree system partition, so if the offending app was placed there resetting won't do anything.
Download the factory images from Google and flash them. It will revert you to complete stock
Sent from my Nexus 4 using xda app-developers app
no title
failly said:
Weird! What did the hacker wrote if I may ask?
Click to expand...
Click to collapse
He wrote something in the sort of "Flipped every turtle". I'll quote him after I manage to identify the hack (if I manage
Disconnect it from the net whilst you investigate to protect data
Sent from my Nexus 4 using xda app-developers app
as said above disconnect from wifi and remove your sim card. First thing i would do is use one of the toolkit to unlock or lock bootloader (it completely wipes everything); then do a factory reset. That should do the the trick. If the problem persist contact the police.
Locking our unlocking your bootloader doesn't wipe everything. It wipes userdata. It doesn't touch the system partition. As I said previously. The only surefire way to ensure a complete wipe is either to fully wipe all partitions and install a custom Rom.
Or if you wish to stay stock, download the nexus 4 stock images and flash them.
Doing this will erase all user data & all system data
It will then put stock files back on
Sent from my Nexus 4 using xda app-developers app
It seems like someone else is having the same behavior with their phone. Maybe it has something to do with the type of wireless charger.
Link: http://forum.xda-developers.com/showthread.php?t=2440115
It's probably just wireless charger bugging up the capacitive screen, try the stuff from above and when you flash a new image don't use the wireless charger for few days and see if it still happens.
Sent from my Nexus 4 using xda app-developers app
Has this happened to anyone elses G2? I am on verizon with 4.4.2 update and not rooted. He had complete control of her phone. Was writing me messages and kept opening pics of my 4 yr daughter. I diconnected the wifi and mobile data. He still had control of the phone. Then I factory reset it and he still was on it. Verizon is sending me a new phone and getting a new sims card. Is there a way from stoping this from happening?
I truly dont believe though that when you switched off network that someone can still connect. Anyways:
firstly, recap if the phone was ever left unattended, letting someone install something on it.
Dont do that, even if if it has a password on it, anyone not looking away when entering it on the street can see what the pincode/password is.
Apps not from play store, dont install. Ever.
Change all passwords on a safe medium (multiple antiviris vendors scanned) of wifi router, to anything, including recovery questions, make them different and non logical or affiliated to you.
Run virus scans on computer and or any medium that ever connected phone.
Then check apps/websites of mail and such for activity, likely activity at times you didnt use any of the services. Anyway facebook and such lets you close open sessions anywhere.
That should do the trick. And big tip dont get paranoid Just ponder how somehow got acces.
I find it hard to believe that someone could still control the device after a factory reset. Highly unlikely I would say.
larryvw2011 said:
Has this happened to anyone elses G2? I am on verizon with 4.4.2 update and not rooted. He had complete control of her phone. Was writing me messages and kept opening pics of my 4 yr daughter. I diconnected the wifi and mobile data. He still had control of the phone. Then I factory reset it and he still was on it. Verizon is sending me a new phone and getting a new sims card. Is there a way from stoping this from happening?
Click to expand...
Click to collapse
1. I really doubt this happened.
2. After disconnecting wifi and mobile data, it would be impossible
3. Factory reset would definitely make it impossible
4. It's more likely that the touch screen is having phantom touches
I had issues with phantom touches on my Optimus G. Drove me batty. Some days it was impossible to use the phone, as the touches were all registering in the bottom half of the screen where the keyboard appears. So random letters would be inserted into words.
Turned out to be a driver issue with the custom kernels in some of the ROMs is using.
Factory reset and being more selective in the kernels I ran fixed the issue.
If it's still happening after a factory reset, then you have a defective touchscreen. Replace the phone under warranty.
Typos courtesy of my LG G2 (D803) running Mahdi-ROM.
I really have no reason to lie to you guys. The messages stopped after I disconnted the internet but the screen was still jumping around. That is why i figured he still had access.
I just received the new phone today. Should I go ahead and get a new sims card or I be ok with the old one?
Pat123 said:
I find it hard to believe that someone could still control the device after a factory reset. Highly unlikely I would say.
Click to expand...
Click to collapse
its possible, if he were root and had something installed as system app.
also you can set stuff like tasker to autimaticaly turn network back on.
what did the messages say, cause if they were gybrisch then it seems like phantom touches.
larryvw2011 said:
I just received the new phone today. Should I go ahead and get a new sims card or I be ok with the old one?
Click to expand...
Click to collapse
get a new one, completely clean
larryvw2011 said:
I just received the new phone today. Should I go ahead and get a new sims card or I be ok with the old one?
Click to expand...
Click to collapse
I would, you could have the old encryption method on the sim card which would make it easier to root the card. But I am guessing what happened to your wife was something more like an AndroRAT exploit.
It could be possible seeing as all you need is a phone number to find your location by txt msg, and that can be done silently without you ever knowing.
Seems it's a built in part of the RADIO AT that providers can use, if you're on the inside and know how it works it'd be a doddle, but if the txt msgs were gibberish I'd go with the majority with faulty touchscreen/drivers and nothing to worry about
Bashing away at my HTC Desire C
Tell to the hacker to try to hack my phone instead, I don't care. I will shoot exclusively for him a pic of my arse as award if he manages to hack it and he can print it, or try to sell to the newspapers.
BTW, I'm not so anxious about apps not installed directly from Play Store. You can easily check or restrict the permissions of any app as root user. I never yet faced the problems.
tetakpatalked from Nexus 7 flo
larryvw2011 said:
Has this happened to anyone elses G2? I am on verizon with 4.4.2 update and not rooted. He had complete control of her phone. Was writing me messages and kept opening pics of my 4 yr daughter. I diconnected the wifi and mobile data. He still had control of the phone. Then I factory reset it and he still was on it. Verizon is sending me a new phone and getting a new sims card. Is there a way from stoping this from happening?
Click to expand...
Click to collapse
are you sure its not an email or Google account hack?
Damasterjj said:
are you sure its not an email or Google account hack?
Click to expand...
Click to collapse
This is very likely version. Anything could be installed via remote then easily.
tetakpatalked from Nexus 7 flo
tetakpatak said:
This is very likely version. Anything could be installed via remote then easily.
tetakpatalked from Nexus 7 flo
Click to expand...
Click to collapse
yeah, all you have to do is google reset password
This could be an issue with faulty digitizer.
Sent from my BN NookHD+ using XDA Free mobile app
Thank you everyone for your responses. He was asking me what I would like him to do for me. I had her open a new gmail account.
larryvw2011 said:
Has this happened to anyone elses G2? I am on verizon with 4.4.2 update and not rooted. He had complete control of her phone. Was writing me messages and kept opening pics of my 4 yr daughter. I diconnected the wifi and mobile data. He still had control of the phone. Then I factory reset it and he still was on it. Verizon is sending me a new phone and getting a new sims card. Is there a way from stoping this from happening?
Click to expand...
Click to collapse
Verizon may have some security offerings for this.
bachera said:
its possible, if he were root and had something installed as system app.
/QUOTE]
The phone was not rooted as per OP hence I find it unlikely.
Click to expand...
Click to collapse
Pat123 said:
The phone was not rooted as per OP hence I find it unlikely.
Click to expand...
Click to collapse
ahhh the mistery what can it be, what can it be. Not sure if the typing was incoherent or not. That rules out possible digitizer issues or not.
larryvw2011 said:
I really have no reason to lie to you guys. The messages stopped after I disconnted the internet but the screen was still jumping around. That is why i figured he still had access.
Click to expand...
Click to collapse
The TOP bid would be == prank application.
Everything else would mean you're the targeted one (but how would the attacker have your new data?)
Maybe your gmail acc has some connections to another app -> look for permissions in your dashboard.
Please wake up from a dream <3