How to tether in Gingerbread using built in 3g hotspot. - Droid X General

Gingerbread on Droidx has broken my wifi tether. When attempting to enable wifi tether the default (vzw/moto) 3g tether app comes up in notification area. Anyone have any solutions? If/when I find the solution is will update this post.
Thanks
Sent from my NookColor using Tapatalk
Click to expand...
Click to collapse
I figured out how to fix it. The Team black hat patcher works.
1. Download the file below (from your phone probably easiest)
2. Launch DROID 2 BOOTSTRAPPER which can also be downloaded from below.
3. Bootstrap recovery
4. Reboot recovery
5. Install zip from SDcard
6. If using the default Android browser, the file will be in /download
7. Install the zip
8. Reboot phone, launch 3g hotspot (Wireless Tether for Root users not necessary)
9. Enable 3g, connect with computer/laptop/nook/tablet
10. Enjoy free 3g!!!
Downloads:
1. Team Black Hat Patcher
2. Team Black Hat Unpatcher
3. Droid 2 Bootstrapper
I take no credit for any of this! I just put it together and followed directions. All thanks goes to Koush, P3Droid, Team Black Hat, etc...

Deleted.
sdf

Anyone else can confirm this working?

Brenardo said:
Anyone else can confirm this working?
Click to expand...
Click to collapse
I updated the OP. Works great for me!

why does using the stock app make me nervous

faber78 said:
why does using the stock app make me nervous
Click to expand...
Click to collapse
LOL. Probably because VZW is big and scary and their favorite color is red. All they want from their customers is blood!
LOL. More info on how this works can be found here:
http://www.mydroidworld.com/forums/android-hacks/5156-tbh-droid-3g-hotspot-nvram-hack.html
Here's their explanation:
This thread is intended to explain the principles behind tethering and how to use RadioComm to modify the NVM to allow tethering via all methods
on any Motorola Droid device by all users, regardless of whether they are rooted or not.
This is the method we at TeamBlackHat used to create the Tether_Repair patches that were released recently for rooted DX/D2 users in update.zip format
and applied via the Koush bootstrap recovery.
It is based on years old knowledge developed in the early days of CDMA Motorola hacking on the V710/V3c/e815 devices.
All of the information, techniques and software tools to do this are in the public domain already.
What we did is simply take that knowledge and apply it with the latest Service software and methods to the Droid generation devices and packaged it
in a new format for delivery that was never previously available to us before the advent of Android.
We will be releasing the manual method for RadioComm when we have worked through all the details for doing it on Win 7.
Currently the versions of RadioComm available on the net are for Win XP only.
We did it initially as a Proof of Concept of methods for writing to NV items via update.zip using Motorola's own binaries that we have recently developed.
We were not intending to release it at all and all agreed that it would be very controversial and raise many ethical questions as well as attracting the wrong
kind of attention to us as a group at a time when we had just been served a C&D for leaking the 2.3.9 update.zip file.
All of this really came about as a direct result of the examination of the NVM we did investigating nenolod's claims about an Engineering mode "switch"
that unlocked the bootloader on DX/D2. Those claims turned out to be unfounded and false and our work, and in particular MotoCache1's incisive analysis
of the boot process with help from [mbm], was instrumental in revealing that fact.
Not exactly what we had in mind to do but we were among the few who had the tools and wherewithall to determine the validity of what nenolod was claiming,
particularly in the beginning when he had released very little hard data to back up his suggestion that there was such a string hiding in the NVM.
Nonetheless, while revisiting the NVM and exploring methods to dump the memory we came upon this set of NV items that determines how the radio builds the
authentication strings it autowrites at bootup for data services. I was aware of their existence for month's since they were revealed in a thread
I participated in on HoFo for service programming on the original Droid. That thread was directed towards the methods required to get the Droid on
a different carrier like Cricket or Metro.
In any event, I knew what they would do if modified in this way and decided to use that as a test of MotoCache1's work with the update.zip binaries.
I used RadioComm to edit them individually and MotoCache1 did the really brilliant work of turning this very old school hack into a beautiful,
elegantly delivered package. This proved the power of what we were capable of as a team and we still unanimously decided against releasing
a packaged theft of services hack as not the right thing to do.
We have reconsidered now in the light of these other exploits surfacing which utilize various software level tricks for getting "Free" tethering
with the new 3G Mobile Hotspot app included on DX and D2. I had always felt that this was inevitable and that others would soon put the pieces together
in the same way we had done.
This is a fundamentally different modality but accomplishes exactly the same thing as any other exploit designed to subvert VZW's intent
to differentiate between externally routed modem data and internal data use and charge for that service.
This includes all forms of exploits and applications like PDAnet and WMWiFiRouter(WinMo 6.1) and now Barnacle, whose entire business model is to use
software level methods to mask tethered data and have marketed them as such for years.
All of these methods absolutely violate the TOS agreement with VZW.
This method simply alters that behavior at the lowest level possible on the device, the radio NVM.
It works because of the way VZW chose to setup authentication on their network when they released the first EvDO capable phones in late 2004-2005.
The methods and software tools to access the NVM as well as the blocks put in place by Qualcomm and Motorola for protecting these
authentication components have evolved dynamically over the years with advancements in chipset design and software, but the principles
have always remained the same. Hex editing the NVM items via a given tool to make the Tethered NAI(Network Access Identifier) strings
match the NAI strings for internal data.
These are basically your user name on the network and consist of the MIP profile byte, a line length byte and your 10 digit telephone number
followed by either @dun.vzw3g.com for tethered NAI or @vzw3g.com for the NAI. By removing the "dun." from the tethered NAI string
you enable all forms of data use to appear to the network as internal and using the normal NAI string.
The difference between the current technique and former methods is that the items edited for this hack are not those strings themselves,
but actually where the default values are stored that the radio uses to build the full strings that it autowrites to the fixed, protected locations in the NVM
for the authentication components in the MIP(Mobile Internet Protocol) profile itself, which happens at bootup.
This is the means by which they prevented the items from being modified by typical service programming tools like QPST.
But, because we know the location for those hidden partial strings, it actually makes our work much simpler.
After editing these four strings, the phone itself uses those values to autowrite the properly configured MIP profile strings for you.
It couldn't be any easier!
Despite our initial concern about releasing this publicly, we have decided after much discussion to do so anyway.
With all of the recent exploits that are directly targeting the 3g Mobile Hotspot app we feel that revealing the way to do it properly
will level the playing field for everyone as well as giving the community a truer and more complete understanding of how it works.
This way users can make up their own minds as to whether to use any of the available methods of "free" tethering with a clear view
of the ethical and technical issues involved.
Hopefully this thread will generate a healthy discussion about the issues.
We at TeamBlackHat believe in providing the knowledge so users can make their own decisions with the best information available.
Please use your own judgment about whether to use this or any tethering modifications.
Enjoy!
Click to expand...
Click to collapse

So can anyone else confirm this working? Besides snwagner?

Works perfectly.....

Been using TBH's 3G hotspot patch since they released it. Worked fine on Froyo and fine now on GB

Works perfect did it before and after gb leak
Sent from my DROIDX using XDA Premium App

Works for past 4 months no extra on vzw bill either
Beamed from my Gingerbreaded DroidXtreme

Works for me.

Followed the steps, still no go...
I came from Liberty 1.5 and used the wifi tether for root with no problems. I followed the steps and installed the Tether Patcher. My laptop can get an IP address from the phone but I cant do anything more than that. Any Ideas?

I am having the same issue with the tether patch. I get an ip address, but no data comes through (tried on multiple computers). I, however, did not come from liberty - stock rom / (but rooted, obviously).
+++edit to add+++
When I first upgraded to GB, I installed the Android Wifi Tether app (3.0-pre12). That didn't work correctly (both the wifi app and hotspot app icons came on in the tray and it was really buggy), so I uninstalled the wifi app and applied the patch. The patch, as I said, would assign an ip but not transmit any data. So, I just reinstalled the tether app (with the patch still applied) and it works! Now only the stock icon appears in the tray and it works faster than ever. Using it as I type.
wifi tether app: hxxp://code.google.com/p/android-wifi-tether/downloads/detail?name=wifi_tether_v3_0-pre12.apk&can=2&q=

bndggle said:
I am having the same issue with the tether patch. I get an ip address, but no data comes through (tried on multiple computers). I, however, did not come from liberty - stock rom / (but rooted, obviously).
+++edit to add+++
When I first upgraded to GB, I installed the Android Wifi Tether app (3.0-pre12). That didn't work correctly (both the wifi app and hotspot app icons came on in the tray and it was really buggy), so I uninstalled the wifi app and applied the patch. The patch, as I said, would assign an ip but not transmit any data. So, I just reinstalled the tether app (with the patch still applied) and it works! Now only the stock icon appears in the tray and it works faster than ever. Using it as I type.
wifi tether app: hxxp://code.google.com/p/android-wifi-tether/downloads/detail?name=wifi_tether_v3_0-pre12.apk&can=2&q=
Click to expand...
Click to collapse
Thanks! I Installed the Android Wifi Tether app and managed to get it working too. Initially after installing the Wifi Tether, it would get an IP, I could ping the gateway but still couldn't get to the outside world even though the computer said it had internet access. (incidently I would also have both the wifi and builtin app icons in the tray). What worked for me was to enable access control and then disable access control. Now I have just the Wifi Icon in the tray and Im using it flawlessly right now.
After a reboot, I do have both icons in the tray again but it still works without issue. That works for me!

In order to get the stock tethering app working I had to change my dns servers.

I was in the same boat as bndggle. Tryed his fix and nothing happened. The only thing that worked before I tried his fix and after is just leaving the tether running. After a few min I will get a message on my status bar saying that my 3g connection failed. I lose 3g, then it returns and I magically have internet access.
An other thing I noticed is that when I start the tether not only is the host not connected to the internet, the phone is also.

I don't get the point of this when you can just download the wireless tether app from the store for free. What's the difference? OR is the reason that people are using this method because the wireless tether app doesn't work on GB? if that is true, than I'll stay with froyo until that gets fixed in the OTA release of GB.

do you patch , and unpatch???? or just patch... i tried to patch, and the tether still does not work... any suggestions

iammebane said:
do you patch , and unpatch???? or just patch... i tried to patch, and the tether still does not work... any suggestions
Click to expand...
Click to collapse
Uninstall the Android Wifi Tether app (3.0-pre12) and reinstall. Then reboot. Thats what worked for me. I have not removed the patch.

Related

Security breach found on htc devices

The Vulnerability
In recent updates to some of its devices, HTC introduces a suite of logging tools that collected information. Lots of information. LOTS. Whatever the reason was, whether for better understanding problems on users' devices, easier remote analysis, corporate evilness - it doesn't matter. If you, as a company, plant these information collectors on a device, you better be DAMN sure the information they collect is secured and only available to privileged services or the user, after opting in.
That is not the case. What Trevor found is only the tip of the iceberg - we are all still digging deeper - but currently any app on affected devices that requests a single android.permission.INTERNET (which is normal for any app that connects to the web or shows ads) can get its hands on:
the list of user accounts, including email addresses and sync status for each
last known network and GPS locations and a limited previous history of locations
phone numbers from the phone log
SMS data, including phone numbers and encoded text (not sure yet if it's possible to decode it, but very likely)
system logs (both kernel/dmesg and app/logcat), which includes everything your running apps do and is likely to include email addresses, phone numbers, and other private info
Normally, applications get access to only what is allowed by the permissions they request, so when you install a simple, innocent-looking new game from the Market that only asks for the INTERNET permission (to submit scores online, for example), you don't expect it to read your phone log or list of emails.
But that's not all. After looking at the huge amount of data (the log file was 3.5MB on my EVO 3D) that is vulnerable to apps exploiting this vulnerability all day, I found the following is also exposed (granted, some of which may be already available to any app via the Android APIs):
active notifications in the notification bar, including notification text
build number, bootloader version, radio version, kernel version
network info, including IP addresses
full memory info
CPU info
file system info and free space on each partition
running processes
current snapshot/stacktrace of not only every running process but every running thread
list of installed apps, including permissions used, user ids, versions, and more
system properties/variables
currently active broadcast listeners and history of past broadcasts received
currently active content providers
battery info and status, including charging/wake lock history
and more
Let me put it another way. By using only the INTERNET permission, any app can also gain at least the following:
ACCESS_COARSE_LOCATION Allows an application to access coarse (e.g., Cell-ID, WiFi) location
ACCESS_FINE_LOCATION Allows an application to access fine (e.g., GPS) location
ACCESS_LOCATION_EXTRA_COMMANDS Allows an application to access extra location provider commands
ACCESS_WIFI_STATE Allows applications to access information about Wi-Fi networks
BATTERY_STATS Allows an application to collect battery statistics
DUMP Allows an application to retrieve state dump information from system services.
GET_ACCOUNTS Allows access to the list of accounts in the Accounts Service
GET_PACKAGE_SIZE Allows an application to find out the space used by any package.
GET_TASKS Allows an application to get information about the currently or recently running tasks: a thumbnail representation of the tasks, what activities are running in it, etc.
READ_LOGS Allows an application to read the low-level system log files.
READ_SYNC_SETTINGS Allows applications to read the sync settings
READ_SYNC_STATS Allows applications to read the sync stats
Theoretically, it may be possible to clone a device using only a small subset of the information leaked here.
I'd like to reiterate that the only reason the data is leaking left and right is because HTC set their snooping environment up this way. It's like leaving your keys under the mat and expecting nobody who finds them to unlock the door. For a more technical explanation, see the section below.
Additionally, and the implications of this could end up being insignificant, yet still very suspicious, HTC also decided to add an app called androidvncserver.apk to their Android OS installations. If you're not familiar with the definition of VNC, it is basically a remote access server. On the EVO 3D, it was present from the start and updated in the latest OTA. The app doesn't get started by default, but who knows what and who can trigger it and potentially get access to your phone remotely? I'm sure we'll know soon enough - HTC, care to tell us what it's doing here?
Technical Details
In addition to Carrier IQ (CIQ) that was planted by HTC/Sprint and prompted all kinds of questions a while ago, HTC also included another app called HtcLoggers.apk. This app is capable of collecting all kinds of data, as I mentioned above, and then... provide it to anyone who asks for it by opening a local port. Yup, not just HTC, but anyone who connects to it, which happens to be any app with the INTERNET permission. Ironically, because a given app has the INTERNET permission, it can also send all the data off to a remote server, killing 2 birds with one stone permission.
In fact, HtcLogger has a whole interface which accepts a variety of commands (such as the handy :help: that shows all available commands). Oh yeah - and no login/password are required to access said interface.
Furthermore, it's worth noting that HtcLogger tries to use root to dump even more data, such as WiMax state, and may attempt to run something called htcserviced - at least this code is present in the source:
/system/xbin/su 0 /data/data/com.htc.loggers/bin/htcserviced
HtcLoggers is only one of the services that is collecting data, and we haven't even gotten to the bottom of what else it can do, let alone what the other services are capable of doing. But hey - I think you'll agree that this is already more than enough.
Patching The Vulnerability
... is not possible without either root or an update from HTC. If you do root, we recommend immediate removal of Htcloggers (you can find it at /system/app/HtcLoggers.apk).
Stay safe and don't download suspicious apps. Of course, even quality-looking apps can silently capture and send off this data, but the chance of that is lower.
Affected Phones
Note: Only stock Sense firmware is affected - if you're running an AOSP-based ROM like CyanogenMod, you are safe.
EVO 4G
EVO 3D
Thunderbolt
EVO Shift 4G? (thanks, pm)
MyTouch 4G Slide? (thanks, Michael)
the upcoming Vigor? (thanks, bjn714)
some Sensations? (thanks, Nick)
View 4G? (thanks, Pat)
the upcoming Kingdom? (thanks, Pat)
most likely others - we haven't verified them yet, but you can help us by downloading the proof of concept above and running the APK
HTC's Response
After finding the vulnerability, Trevor contacted HTC on September 24th and received no real response for five business days, after which he released this information to the public (as per RF full disclosure Policy). In my experience, lighting fire under someone's ass in public makes things move a whole lot faster, which is why responsible disclosure is a norm in the security industry. (This is where we come in.)
As far as we know, HTC is now looking into the issue, but no statement has been issued yet.
HTC, you got yourself into this mess, and it's now up to you to climb out of the hole as fast as possible, in your own interest.
The ball is in your court.
Credit
ANDROID POLICE
Huge thank you to Trevor Eckhart who found the vulnerability and Justin Case for working with us today digging deeper.
Hi there, I need help, someone is consistently hacking into my phone, htc evo 4g, they are penetration testers and pc savvy, currently I cant login to the phn for trying to do a factory reset. They kept intercepting me and now my password does not work. Who knows maybe they changed it on their side. I wrote down everything I saw. I was seeing all these process running for the same app. in my applications. My phone was getting hot, freezes but its people that live in my apt complex and at work. can you help?
zzm5 said:
Hi there, I need help, someone is consistently hacking into my phone, htc evo 4g, they are penetration testers and pc savvy, currently I cant login to the phn for trying to do a factory reset. They kept intercepting me and now my password does not work. Who knows maybe they changed it on their side. I wrote down everything I saw. I was seeing all these process running for the same app. in my applications. My phone was getting hot, freezes but its people that live in my apt complex and at work. can you help?
Click to expand...
Click to collapse
Is your device rooted?
I used root explorer and removed the HtcLoggers.apk and other than the forced close loop that removing it caused (requiring me to remove the battery), after rebooting all seems to be working fine.
EDIT: Actually I didn't just delete HtcLoggers.apk but moved it to a safe location on the SD Card in case there was a problem and it needed to be restored. I highly suggest you do this instead of just deleting it, or better yet, a nandroid backup.
there are a few good ROMS out there that have the ICQ loggers removed already.
Do we really need three threads on the front page about the same thing?

Testers wanted for PeerDeviceNet -sharing thru wifi, wifi direct and mobile hotspot

!!! updated 12/28/2012: add code to detect and use mobile hotspot to enable sharing among devices !!!
I'd like to invite people to participate an open testing session for app "PeerDeviceNet - sharing thru WiFi and WiFi-Direct".
It runs on android 2.2 and above. It is free at google play:
https://play.google.com/store/apps/details?id=com.xconns.free.peerdevicenet
I have done tests using Nexus 7, Samsung Tab 2.0, Kindle fire(1gen), Galaxy Vibrant. I'd like more complete coverage of devices and vendors.
It supports 4 kinds of device-device connections:
1. for devices at the same wifi net: start PeerDeviceNet at devices simultaneously will allow them find and connect to each other automatically.
2. for devices which are all wifi direct enabled: from system preferences, you can setup wifi direct group connection; PeerDeviceNet will pick up this group info and connect devices in group automatically.
3. if only one device is wifi direct enabled: you can use PeerDeviceNet to create a softwareAP/hotspot at this device (PeerDeviceNet->Connection settings->Create wifi direct hotspot), other wifi devices can use generated ssid and passphrase to connect.
4. for devices with mobile hotspot, you can use mobile hotspot to connect devices and enable sharing.
It extends android's "share/send" feature to allow sharing of the following data:
1. photos/videos (single or multiple) (gallery), audios(astro, solid-browser, or other browsers)
2. web pages (browsers)
3. contact info(Contacts)
4. pdf, word docs (astro or other file managers)
5. apps (google play)
I'll highly appreciate it if you can spend some time installing the app and try out some of the above scenarios. If you encounter Force Closure, please post your device info, android version, or ROM info.
Thanks!
This works fantastically between all of my devices, ranging from Ginger Bread, Honey Comb, and Jelly Bean.
WiFi hotspot also works very well.
This really is a handy app, something like this should definitely be implemented into base Android. Sharing files between devices that have NFC is a breeze, but legacy devices can be troublesome. This is an excellent solution for both worlds.
downloading
looks good
Installed and gave it a test drive.
Works perfectly on our Galaxy S III, Galaxy S II, Galaxy Tab 10.1, Xperia X8, Packard Bell Liberty Tab G100 and Wildfire S - after adding the devices manually. For some unknown reason they don't see each other, though the local LAN has no restrictions put into place.
Hi, I´ve been testing this between SGN2 N7100 (Stock Rooted) and MyTouch 4g Slide (CM9.1 R8) and it works great (no FC etc.)
I have several questions though:
a) I´d like to buy you a beer. There is a paid version but that one is far behind the free one in updates...
b) chat works great (as long as I have signal. but within a flat its mostly great). Will there be an implementation into the full version?
c) if I buy the full version, will you be updating it?
Thanks! Keep it up!
EDIT: seems to me that your app fights with anyconnect VPN (even if that one is running in background I get FC from anyconnect and superuser permissions asked all time... I´ll look into the behavior a bit closer if I find some time) else everything works good.
EDIT: after reinstall of anyconnect it works flawlessly. Keep it up!
File Expert by Geek Software Technology
I have been using File Expert to do similar things... perhaps I don't understand this program's full benefits or potential. FE also connects via bluetooth and runs both a web and FTP server.
It would be nice if you implement an option to close the app...
Option to close the app.
paul1508 said:
It would be nice if you implement an option to close the app...
Click to expand...
Click to collapse
Agree with that. It's quite painful to close an app by going into settings instead of hitting some button from the home interface.
Testing now
Downloaded and tried it..
I have a GS3 that it seems to work on, and a Nook color (the original one) from like 2 years ago running CM7 that it just gives a black screen on. I can use the regular wifi connect from the Nook and connect to the hotspot from your PeerDeviceNet but there's no sharing of data back and forth, unfortunately. If the app worked on both I'm sure it'd be much better, but I don't suspect the older Nooks will be a big percentage of your users.
issues related to peer discovery
B.Jay said:
Installed and gave it a test drive.
Works perfectly on our Galaxy S III, Galaxy S II, Galaxy Tab 10.1, Xperia X8, Packard Bell Liberty Tab G100 and Wildfire S - after adding the devices manually. For some unknown reason they don't see each other, though the local LAN has no restrictions put into place.
Click to expand...
Click to collapse
Thanks for your feedback. The failure to see peer devices in LAN could be related to one issue i fixed in the latest release; please give it a try.
Also PeerDeviceNet's "search and connect" is based on peer-peer "pairing": no one is acting as server and waiting for other clients. All participating peer devices must start search at same time or in same short time period so that they can find each other. If one peer finished its searching when a new peer starts searching, the new one cannot see the one just finished. It is for security reason.
Regards
Yigong
XCONNS LLC
a) I´d like to buy you a beer. There is a paid version but that one is far behind the free one in updates...
b) chat works great (as long as I have signal. but within a flat its mostly great). Will there be an implementation into the full version?
c) if I buy the full version, will you be updating it?
I am working on refactoring code and bug fixing for the full edition. Thanks for your feedback.
Regards
Yigong
XCONNS LLC
compare to file expert
eonix said:
I have been using File Expert to do similar things... perhaps I don't understand this program's full benefits or potential. FE also connects via bluetooth and runs both a web and FTP server.
Click to expand...
Click to collapse
File expert is a powerful browser with many nice features. PeerDeviceNet is a totally different creature.
As a app, it plainly extends android native "sharing" protocol (send/send_multiple) to connected devices, to allow you share content from one device to another. (As a framework, it provides the components and runtime to support connected mobile apps). It has minimal GUI to support connecting devices and monitoring send/recv sessions. It has strong support for connecting multiple devices, run multiple concurrent send/recv sessions, and running in background.
So normally you will use your favorite apps to browse/view content, and when you want to share the content with another device, you hit "share" button and PeerDeviceNet will be there to help connect to other devices.
So you can use Astro file manager or Solid explorer with PeerDeviceNet to share files across devices similar to file expert.
Also PeerDeviceNet allows you share contact info, web links, or apps from google play to connected devices.
Regards
Yigong
how to close it
xbroadcaster1991 said:
Agree with that. It's quite painful to close an app by going into settings instead of hitting some button from the home interface.
Click to expand...
Click to collapse
There is "shutdown" button for that : "Connection settings" -> "Shutdown". It will shut down all background services and clean up notifications.
Regards
Yigong
peerdevicenet said:
There is "shutdown" button for that : "Connection settings" -> "Shutdown". It will shut down all background services and clean up notifications.
Regards
Yigong
Click to expand...
Click to collapse
Mmm, too many button presses to get there. It would be easier to have a "Shutdown" button in the notification shade. Otherwise well done! I tested sharing files between LG Optimus 3D (p920) and Xperia Mini (st15i) connected on the same LAN. Everything worked fine.
Can one add a function to "tether" a hotspot? but from wifi and not from 3g?
This would be really awsome.
Greets
Sent from my Xperia X10 using xda app-developers app
Yo so I got the full version. The lite is good but wanted to buy you a beer... Managed to transfer 4gb of data in few minutes between my and friends Samsung phone (unfortunately in 3 steps because of the data amount limit). Very useful, the chat also works good.
When will we see full version updated with chat and unlimited data transfer?
Thanks
Sent from my GT-N7100 using xda premium
tether to wifi router
keenofhiphop said:
Can one add a function to "tether" a hotspot? but from wifi and not from 3g?
This would be really awsome.
Greets
Not sure this will really help. because when connecting to PeeerDeviceNet hotspot, we already use wifi connection, so why not just connect to external wifi router directly?
Regards
yigong
Click to expand...
Click to collapse
unlimited capacity
Narhim said:
Yo so I got the full version. The lite is good but wanted to buy you a beer... Managed to transfer 4gb of data in few minutes between my and friends Samsung phone (unfortunately in 3 steps because of the data amount limit). Very useful, the chat also works good.
When will we see full version updated with chat and unlimited data transfer?
Thanks
Sent from my GT-N7100 using xda premium
Click to expand...
Click to collapse
Thanks for using PeerDeviceNet and offering beer. I am still working on the full edition. For now i removed the limit of transfer capacity. Please chek out the new release at google play. https://play.google.com/store/apps/details?id=com.xconns.free.peerdevicenet
Regards
Yigong
SonyVaio+Htc Salsa=possible?
While my sony laptop has wifi direct facility my htc salsa lacks one and just has traditional wifi and wifi hotspot facility...how do i connect bothe these devices for transferring the data to and fro?

Enabling Tethering (Internet Sharing) if carrier blocks it

I've tested this with both Cricket and AT&T on my Lumia 1520 and it's working great. I'm assuming it will work with other carriers and phones but would need to be tested. It requires registry editing capabilities. I used the CustomPFD registry editor with it running as the Preview for Developers app. (note: I had to use this method to get registry write access)
Basically you just have to set the following registry keys. For carriers like Cricket that completely blocks tethering you'll need the ICSSVC & system settings but for others like AT&T that allow it but only on certain plans you'll only need the ICSSVC settings.
Code:
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\ICSSVC\Settings]
"Enabled"=dword:00000001
"EntitlementRequired"=dword:00000000
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}]
@="Soft AP"
"Location"="app://5B04B775-356B-4AA0-AAF8-6491FFEA5629/Default"
"Plugin"="{09c51652-2cbc-49d5-883e-20606f9a47ff}"
"QuickSettingsIconURI"="res://UIXMobileAssets{ScreenResolution}!actioncenter.hotspot.tier25.png"
"QuickSettingsTitle"="@\\windows\\system32\\Settings3Res.dll,-535"
"Title"="@\\windows\\system32\\Settings3Res.dll,-242"
"Type"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{69DAA7D1-09EA-4eae-A67E-56E4B0B4CA5B}\SecureItems]
"{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}"=dword:000000b0
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\QuickSettingElements]
"{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}"=dword:00000007
Note: dword:000000b0 is integer 176. Also, if you change sims this will get reset and will need to be redone. I've seen vague references to some of this info but never a good writeup so hopefully this helps other people.
Hello! I have a Lumia 630 with WP8.1 Update 1 (latest available from the Previews for Developers). I'm on Crickets network and would love to enable the tether option.
Can you elaborate step by step what I need to do? I have Developer Unlocked my phone already. And I'm assuming I will need to use a computer to export the XAPs?
Thanks
Ok, so I deployed the CustomWPSystem app. I've got as far as trying to patch the target app but no matter which of the target apps I try and patch, the tool crashes to the home screen. However, the target apps still open and function as normal. This makes me think it's not even trying to patch them.
Any ideas?
x_orange90_x said:
Ok, so I deployed the CustomWPSystem app. I've got as far as trying to patch the target app but no matter which of the target apps I try and patch, the tool crashes to the home screen. However, the target apps still open and function as normal. This makes me think it's not even trying to patch them.
Any ideas?
Click to expand...
Click to collapse
The same thing happens on my phone, hence the alternate more manual method linked in the OP. I used this app to unlock the wpsystem folder so I can copy the files and whatnot.
Filr
RustyGrom said:
The same thing happens on my phone, hence the alternate more manual method linked in the OP. I used this app to unlock the wpsystem folder so I can copy the files and whatnot.
Click to expand...
Click to collapse
I've installed the Windows 10 Technical Preview and for some reason I can't unlock the WPSystem folder. When I click Phone after Add Provider in Pocket File Manager I get a black screen. This actually happens anytime I choose Phone as a location in any app. I think it's MS blocking out any possible access to the system files during the beta stages..
RustyGrom said:
I've tested this with both Cricket and AT&T on my Lumia 1520 and it's working great. I'm assuming it will work with other carriers and phones but would need to be tested. It requires registry editing capabilities. I used the CustomPFD registry editor with it running as the Preview for Developers app. (note: I had to use this method to get registry write access)
Basically you just have to set the following registry keys. For carriers like Cricket that completely blocks tethering you'll need the ICSSVC & system settings but for others like AT&T that allow it but only on certain plans you'll only need the ICSSVC settings.
Code:
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\ICSSVC\Settings]
"Enabled"=dword:00000001
"EntitlementRequired"=dword:00000000
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}]
@="Soft AP"
"Location"="app://5B04B775-356B-4AA0-AAF8-6491FFEA5629/Default"
"Plugin"="{09c51652-2cbc-49d5-883e-20606f9a47ff}"
"QuickSettingsIconURI"="res://UIXMobileAssets{ScreenResolution}!actioncenter.hotspot.tier25.png"
"QuickSettingsTitle"="@\\windows\\system32\\Settings3Res.dll,-535"
"Title"="@\\windows\\system32\\Settings3Res.dll,-242"
"Type"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{69DAA7D1-09EA-4eae-A67E-56E4B0B4CA5B}\SecureItems]
"{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}"=dword:000000b0
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\QuickSettingElements]
"{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}"=dword:00000007
Note: dword:000000b0 is integer 176. Also, if you change sims this will get reset and will need to be redone. I've seen vague references to some of this info but never a good writeup so hopefully this helps other people.
Click to expand...
Click to collapse
Works for me; Lumia 830(originally bought from ATT) on Straight Talk! Awesome work OP.
No SD Card
Any suggestions for those of us without memory card slot. How can I get write access (Nokia Lumia Icon, Running Denim)
cdguider said:
Any suggestions for those of us without memory card slot. How can I get write access (Nokia Lumia Icon, Running Denim)
Click to expand...
Click to collapse
nothign for users without an SD card. The insider app is fixed too so you cant do it through any of the fiddler methods too. I think someone is working on a way to bypass that. Lets hope it works or else wait till next month
Just tried this. No dice - the Internet Sharing setting says there's no data connection available to share.
I have an ATIV S Neo that was fully interop unlocked and is running Microsoft dev preview updates since GDR3, and I've updated to the latest 8.1 update available through Preview for Developers.
The SecureItems DWORD value was different (54), and I successfully set it to 176 using SamWP8 Tools. I also changed the EntitlementRequired value from 1 to 0 and rebooted. All other values in the OP were already the same on my phone. What am I missing?
shifuimam said:
Just tried this. No dice - the Internet Sharing setting says there's no data connection available to share.
I have an ATIV S Neo that was fully interop unlocked and is running Microsoft dev preview updates since GDR3, and I've updated to the latest 8.1 update available through Preview for Developers.
The SecureItems DWORD value was different (54), and I successfully set it to 176 using SamWP8 Tools. I also changed the EntitlementRequired value from 1 to 0 and rebooted. All other values in the OP were already the same on my phone. What am I missing?
Click to expand...
Click to collapse
Sorry bro, if you're on Sp rint, no one seems to have a solution....unless I missed something. It seems like all threads related to internet sharing seem to go dead once someone asks about Sp rint.
Of course, I may have missed something but nothing seems to work...
-tdecision10
tdecision10 said:
Sorry bro, if you're on Sp rint, no one seems to have a solution....unless I missed something. It seems like all threads related to internet sharing seem to go dead once someone asks about Sp rint.
Of course, I may have missed something but nothing seems to work...
-tdecision10
Click to expand...
Click to collapse
I feel like it might be an APN thing, but what do I know.
If Sprint would let me tether for free, I would do it. I only use it in emergencies - it's not like I'm streaming Netflix in HD on my computer from my phone or anything.
shifuimam said:
I feel like it might be an APN thing, but what do I know.
If Sprint would let me tether for free, I would do it. I only use it in emergencies - it's not like I'm streaming Netflix in HD on my computer from my phone or anything.
Click to expand...
Click to collapse
It most likely is an APN things. Something with TetheringNAIConnection, see below from MS web page:
"TetheringNAIConnection
Optional. Specifies the CDMA TetheringNAI Connection Manager cellular connection that internet sharing will use as a public connection.
If a CDMA mobile operator requires using a Tethering NAI during internet sharing, they must configure a TetheringNAI connection and then specify the connection in this node.
Specified connections will be mapped, by policy, to the internet sharing service. All attempts to enumerate Connection Manager connections for the internet sharing service will return only the mapped connections.
Note: The mapping policy will also include the connections specified in the DedicatedConnections as well.
If the specified connections do not exist, internet sharing will not start because it will not have any cellular connections available to share
Additional requirements for CDMA networks:
For CDMA networks that use a separate Network Access Identity (NAI) for internet sharing, the Connections parameter TetheringNAI is used. The following sample demonstrates how to specify the connection"
Sprint & Tethering
I switched to Sprint almost 5 years ago when the HTC Arrive came out. I called up sprint and they said they don't offer tethering for that device. XDA came out with a custom rom that had it so I flashed and was tethering like normal. In December they cut off peer to peer stuff (which is fine with me) Then In February they sent me a nasty letter saying I was tethering and using too much data (on my unlimited data plan) In June they cut me off. So all I can say is Sprint is getting serious about not allowing tethering. Mind you my phone was 3g so..... they just dont like anyone tethering without paying for it.
Worked perfectly on my Lumia 1520 on the H2O network. Only had to change the entitlement reg key.
Didn't work for me on my 830 on Cricket. I can enable the connection settings and connect from my laptop (gets an IP and everything), but I can't connect to anything online (limited network connectivity). Any suggestions?
Nevermind, it was just my Hyper-V client IP settings. Working great now, thanks!
RustyGrom said:
I've tested this with both Cricket and AT&T on my Lumia 1520 and it's working great. I'm assuming it will work with other carriers and phones but would need to be tested. It requires registry editing capabilities. I used the CustomPFD registry editor with it running as the Preview for Developers app. (note: I had to use this method to get registry write access)
Basically you just have to set the following registry keys. For carriers like Cricket that completely blocks tethering you'll need the ICSSVC & system settings but for others like AT&T that allow it but only on certain plans you'll only need the ICSSVC settings.
Code:
[HKEY_LOCAL_MACHINE\System\ControlSet001\Services\ICSSVC\Settings]
"Enabled"=dword:00000001
"EntitlementRequired"=dword:00000000
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}]
@="Soft AP"
"Location"="app://5B04B775-356B-4AA0-AAF8-6491FFEA5629/Default"
"Plugin"="{09c51652-2cbc-49d5-883e-20606f9a47ff}"
"QuickSettingsIconURI"="res://UIXMobileAssets{ScreenResolution}!actioncenter.hotspot.tier25.png"
"QuickSettingsTitle"="@\\windows\\system32\\Settings3Res.dll,-535"
"Title"="@\\windows\\system32\\Settings3Res.dll,-242"
"Type"=dword:00000001
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{69DAA7D1-09EA-4eae-A67E-56E4B0B4CA5B}\SecureItems]
"{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}"=dword:000000b0
[HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\QuickSettingElements]
"{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}"=dword:00000007
Note: dword:000000b0 is integer 176. Also, if you change sims this will get reset and will need to be redone. I've seen vague references to some of this info but never a good writeup so hopefully this helps other people.
Click to expand...
Click to collapse
after following the steps on my Cricket lumia 635 there was no internet connection sharing in settings. I have triple checked all settings with custom pfd registry editor and all are correct. my phone is interop unlocked. any ideas?
su8z3ro said:
after following the steps on my Cricket lumia 635 there was no internet connection sharing in settings. I have triple checked all settings with custom pfd registry editor and all are correct. my phone is interop unlocked. any ideas?
Click to expand...
Click to collapse
I just did a lumia 630 on cricket the other day for my buddy.
It didn't go the first time so I reset the phone and boom it worked the second time
jaygriggs said:
I just did a lumia 630 on cricket the other day for my buddy.
It didn't go the first time so I reset the phone and boom it worked the second time
Click to expand...
Click to collapse
Got it working..... there are extra backslashes in the paths that I had to remove..... the WPTweaker app can do the edits for you but you have to remove the extra backslashes.....
@su8z3ro, you mean these values?
Code:
<entry path="HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}" name="QuickSettingsTitle" type="string">
<value>@\\windows\\system32\\Settings3Res.dll,-535</value>
</entry>
<entry path="HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}" name="Title" type="string">
<value>@\\windows\\system32\\Settings3Res.dll,-242</value>
</entry>
[UPDATE] just tested this tweak and confirm - you've right. Updated tweak.xml committed to the github.
sensboston said:
@su8z3ro, you mean these values?
Code:
<entry path="HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}" name="QuickSettingsTitle" type="string">
<value>@\\windows\\system32\\Settings3Res.dll,-535</value>
</entry>
<entry path="HKEY_LOCAL_MACHINE\Software\Microsoft\Settings\{1DEF9B7D-2322-40eb-A007-16A75D5CDA6F}" name="Title" type="string">
<value>@\\windows\\system32\\Settings3Res.dll,-242</value>
</entry>
Click to expand...
Click to collapse
Yes..... I just removed the extra backslashes rebooted and it showed up in settings......

VPN and AFWall+

I have a Shield TV arriving later today. On my previous Android box I setup a VPN with a kill switch via AFWall+. This involved the installation of the OpenVPN connect application with my VPN provider details, then I used AFWall+ to prevent any data that didn't originate via a VPN connection, effectively making this a kill switch. This involved allowing both the OpenVPN application and Android's VPN api full access. It's the latter I'm enquiring about, does this api exist on the Shield TV? I've heard that native VPN isn't possible as the normal VPN settings aren't present. But does that include the vpn service api itself?
No one?
Beefheart said:
I have a Shield TV arriving later today. On my previous Android box I setup a VPN with a kill switch via AFWall+. This involved the installation of the OpenVPN connect application with my VPN provider details, then I used AFWall+ to prevent any data that didn't originate via a VPN connection, effectively making this a kill switch. This involved allowing both the OpenVPN application and Android's VPN api full access. It's the latter I'm enquiring about, does this api exist on the Shield TV? I've heard that native VPN isn't possible as the normal VPN settings aren't present. But does that include the vpn service api itself?
Click to expand...
Click to collapse
i have the exact same setup on all my devices, including shield tv, although ive only had to allow the openvpn app, wifi/data/vpn access for things to work, ive never had to allow androids vpn ........is their a specific reason you grant android vpn access?does it not work otherwise?
I use the other openvpn app, by the way
I originally set it up on the tutorial in the link below, which mentions that the VPN Networking service needs to have full access. Is that service present on the Shield?
https://www.privateinternetaccess.c...otection-on-android-with-afwall-requires-root
Beefheart said:
I originally set it up on the tutorial in the link below, which mentions that the VPN Networking service needs to have full access. Is that service present on the Shield?
https://www.privateinternetaccess.c...otection-on-android-with-afwall-requires-root
Click to expand...
Click to collapse
I just checked for you, and yes, its there, mind you, im using zulu's full rom, not sure about stock rom but as with all my devices, i havent needed to allow this for vpn to work.
Unless theres a specific reason to do so, try without on your current devices, i suspect, vpn networking may only apply if you use androids inbuilt vpn found in settings
Edit
By the way, i dont know how far you wanna take it, but afwall has tasker plugin support, which i use to apply an afwall profile, i named "secure", that denies everything when screen turns off......aswell as other things in the same vain
Edit
I do it a little differently then what youre link suggests, i only allow the bare minimum of apps, those that i actually need internet for.......if an app has internet capability, but i have no need for that side of it, its denied, i dont whitelist ALL apps for vpn as your link suggests
I also suspect that guide was written for privateinternets method of using vpn on android, so maybe vpn networking applies if using private internet, but as for my openvpn app, its not needed.......neither is "GPS"
Cheers. Everything set up and working perfectly in stock, no DNS leaks. A combination of AFWall+, VPN and Xprivacy has the device locked down pretty well.
And what a device, the speed is in another league compared to other similar boxes and worth the extra money. I'm glad I returned my newly purchased Minix Neo U1, this thing is so much faster and not as restricted as I was lead to believe. With a bit of work the Shield TV, even on stock, can do as much as any other Android based TV box, even one based on vanilla.
Beefheart said:
Cheers. Everything set up and working perfectly in stock, no DNS leaks. A combination of AFWall+, VPN and Xprivacy has the device locked down pretty well.
And what a device, the speed is in another league compared to other similar boxes and worth the extra money. I'm glad I returned my newly purchased Minix Neo U1, this thing is so much faster and not as restricted as I was lead to believe. With a bit of work the Shield TV, even on stock, can do as much as any other Android based TV box, even one based on vanilla.
Click to expand...
Click to collapse
Yep, ive said it before and ill say it again, the shields an impressive piece of kit for sure
Xprivacy.........snap
We seem to have a very similar setup........believe me, if you wanna take it further at some point in the future.......tasker.........although, fair warning, theres a learning curve
Just some of the more basic things i automate with tasker with plugins like afwalls
When screen goes off, tasker......
Turns off wifi/3g
Turns of bluetooth
Afwall secure profile
Greenify all preselected apps
turn off "unknown sources" for extra measure, as tasker turns this off after it detects an apk install anyway
Turn of "debugging", incase i turn it on one day out of need and forget to turn off
Media volume set to 4 edit:this ones a bit out of place
Aplly afwall profiles depending on what app you happen to be using
Many possibilities with tasker, VERY usefull for many things
Non security related....kinda......... could potentially be used for such if modified
I have a small bluetooth media remote which has the numbers 1 to ten, with tasker and xposed additions module, i fooled around with it, pressing 1 connects the shields bluetooth to the bedroom speakers, long pressing 1 connects to the living room speakers..........i can imagine my self doing some neat stuff with these combination of apps and future accesories
Also, i use it to turn the shields light led to dim to let me now at a glance if the shields on or asleep, without having to change the channel
food for thought for those with similar setups
Edit
By the way, you mention dns leak, i assume you used a test site to check for the leak, any chance of a link? Incase its something very new
This ones the one i use,
https://ipleak.net/
Detects webrtc leaks on the specific browser you happen to be using at the time
Edit
For those interested
More on webrtc here
https://www.privateinternetaccess.c...ome-and-mozilla-firefox-while-using-private-i
If you use firefox or chrome, you can disable manually following this guide
https://www.purevpn.com/blog/disable-webrtc-in-chrome-and-firefox-to-protect-anonymity/
I think there are addons aswell
Edit
"and not as restricted as I was lead to believe"
Yep, i had the same thoughts, just my own assumption really, that android tv was completely different, internally, to "standard" android , pleasantly surprised, no incompatibilities so far............................good to know that stock is like that too :good:
Cheers, I'll read into all that.
One issue I'm finding at the moment is that, on a reboot, AFWall+ doesn't apply as default on the Shield and has to be done manually. This doesn't happen on my Note 3 running Lollipop. I'm sure there is a simple explanation, I'll look into it a bit more.
That website is the one I user to check leaks but there are numerous others too.
Beefheart said:
Cheers, I'll read into all that.
One issue I'm finding at the moment is that, on a reboot, AFWall+ doesn't apply as default on the Shield and has to be done manually. This doesn't happen on my Note 3 running Lollipop. I'm sure there is a simple explanation, I'll look into it a bit more.
That website is the one I user to check leaks but there are numerous others too.
Click to expand...
Click to collapse
Im not sure i understand fully, afwall is not enabled? Or, afwall IS enabled, but your prefered profile is not "applied"?
On full android at least, afwall is enabled upon reboot i havent had any issues in that regard, (saw your other post) i dont need init.d script (usefull to have though, if/when possible)
Have you tried reverting all afwalls settings to default, to rule out that likely suspect
Another likely suspect, xprivacy, but that depends if you restrict everything like i do, including system apps , if so, have you checked xprivacies usage data for afwall and global apps?
Another suspect, could be stock firmware, but i have my doubts about that one
Assuming im understanding the issue correctly
Edit
I dont have "fix startup data leak" checked(as we dont have init.d), nor ipv6 support checked as your link described

Any way to bypass T-Mobile tether?

Like they tittle Say anyway to bypass T-Mobile tether?
If rooted...
Then theres various ways to bypass and if used together chances are good you won't have to pay 2x for data: modifying your apn to allow dun type, adding the line: net.tethering.noprovisioning=true
to your build.prop and finally using adb from a PC (u can try this even if not rooted) type the following from cmd or powershell: "adb shell" followed by "settings put global tether_dun_required 0" without the " "s and restart your phone n hopefully that should do the trick.
If still throttled by TMo go into Magisk and install tethering_enabler or TTL tethering modules. These modules weren't specifically made for the 6T but they should still be effective. If still unsuccessful then modifying the TTL from the device your trying to tether to will help hide the source of data aim for TTL of 65 to confuse tmo.
If your not rooted then use PDANet USB tether to a PC and hide tether options then create a hotspot from the PC your USB tethered to or use the WiFi Sharing option in PDANet PC Menu. At least thats what works the best for me and I've tried many many things... One other possibility if your on stock no root is to add a new apn with all the same info as normal fast.tmobile.net lte apn only enable MVNO type to GIO for apn type leave it blank and save it. This should hide the default TMobile apn (and make the editor think your using a 3rd party like Mint) now go back and edit the new apn and under apn type put: dun,default,mms,supl try and save it. It should error n say dun not supported... Press Home and force close settings-reboot phone. The dun sometimes will stick if this method isn't patched yet I'm sure it will be soon.
Your final options are to use an app from playstore like VPN Hotspot or VPN Tether they might slow your speed a bit but they should tunnel all your data thru a VPN confusing TMo as to the origin of data. Probably the best and easiest way is by using a custom ROM as most haven't been tainted by Google's latest CarrierConfigManager commits or carrier apn restrictions. If anyone knows how to reverse these commits easily or any other methods not listed please let me know.
I'm currently looking for a clean TMo only dun enabled apns-config.xml so I can overwrite the default n modify the build.prop for a quick fix on any new ROM or update...
As you can probably tell being throttled or having to pay 2x for the same data is a pet peeve of mine and I've spent some time researching the topic. I'd love to hear what ended up working for you or if anyone knows a solid method I missed. Or has a recommendation for a good ROM with unlimited hotspot features built in for the 6t let me know.
I installed the app from this thread, https://www.xda-developers.com/vpn-hotspot-share-vpn-connection/. You can also download the app in the Playstore. I also subscribe to Private Internet Access (https://privateinternetaccess.com) and they have an app that you can download from the playstore.
My phone contract has overseas roaming for a number of days but it restricts tethering and hotspot when roaming. The way I bypass this limitation is to run the PIA VPN, then run the VPN Hotspot app, and use the "Repeater" function. This has worked flawlessly sharing my internet connection with other devices..
gigilie said:
Then theres various ways to bypass and if used together chances are good you won't have to pay 2x for data: modifying your apn to allow dun type, adding the line: net.tethering.noprovisioning=true
to your build.prop and finally using adb from a PC (u can try this even if not rooted) type the following from cmd or powershell: "adb shell" followed by "settings put global tether_dun_required 0" without the " "s and restart your phone n hopefully that should do the trick.
If still throttled by TMo go into Magisk and install tethering_enabler or TTL tethering modules. These modules weren't specifically made for the 6T but they should still be effective. If still unsuccessful then modifying the TTL from the device your trying to tether to will help hide the source of data aim for TTL of 65 to confuse tmo.
If your not rooted then use PDANet USB tether to a PC and hide tether options then create a hotspot from the PC your USB tethered to or use the WiFi Sharing option in PDANet PC Menu. At least thats what works the best for me and I've tried many many things... One other possibility if your on stock no root is to add a new apn with all the same info as normal fast.tmobile.net lte apn only enable MVNO type to GIO for apn type leave it blank and save it. This should hide the default TMobile apn (and make the editor think your using a 3rd party like Mint) now go back and edit the new apn and under apn type put: dun,default,mms,supl try and save it. It should error n say dun not supported... Press Home and force close settings-reboot phone. The dun sometimes will stick if this method isn't patched yet I'm sure it will be soon.
Your final options are to use an app from playstore like VPN Hotspot or VPN Tether they might slow your speed a bit but they should tunnel all your data thru a VPN confusing TMo as to the origin of data. Probably the best and easiest way is by using a custom ROM as most haven't been tainted by Google's latest CarrierConfigManager commits or carrier apn restrictions. If anyone knows how to reverse these commits easily or any other methods not listed please let me know.
I'm currently looking for a clean TMo only dun enabled apns-config.xml so I can overwrite the default n modify the build.prop for a quick fix on any new ROM or update...
As you can probably tell being throttled or having to pay 2x for the same data is a pet peeve of mine and I've spent some time researching the topic. I'd love to hear what ended up working for you or if anyone knows a solid method I missed. Or has a recommendation for a good ROM with unlimited hotspot features built in for the 6t let me know.
Click to expand...
Click to collapse
Be sure you reset APN to default values after you install this new file....
Thanks bro I'll test it out...if it works care if I add it to the main post? Yeah I mentioned the VPN app along with a VPN my only issue with that method is the decrease in speed and some apps/devices don't like the VPN way much. Wish google would stop letting carriers dictate Android or itd b nice if the US would put their foot down and not allow companies to bend us over lock our bootloader's, phone's, devices we pay for or try and swindle us by charging 2x for data or throttle us...
gigilie said:
Thanks bro I'll test it out...if it works care if I add it to the main post? Yeah I mentioned the VPN app along with a VPN my only issue with that method is the decrease in speed and some apps/devices don't like the VPN way much. Wish google would stop letting carriers dictate Android or itd b nice if the US would put their foot down and not allow companies to bend us over lock our bootloader's, phone's, devices we pay for or try and swindle us by charging 2x for data or throttle us...
Click to expand...
Click to collapse
seems to work for me. let me know if it works for you....
dustintinsley said:
seems to work for me. let me know if it works for you....
Click to expand...
Click to collapse
Where do I install the files?
LuCkyCn said:
Where do I install the files?
Click to expand...
Click to collapse
replace the file in /etc/
backup your old file first....
dustintinsley said:
replace the file in /etc/
backup your old file first....
Click to expand...
Click to collapse
Not sure what I did wrong, but it's not loading for me. All my APNs disappeared. I reset to default after replacing with the one provided.
Well, I know this post is rather old, but I made a Magisk module that does everything for you...
L
oloyin

Categories

Resources