RSupport vulnerable Certifi-Gate, how to disable - G4 General

According to news there are several remote exploitable remote support tools. One is preinstalled on LG G3 & G4 WITHOUT a User Interface.
It's called RSupport. Never heard of this company or software, I couldn't care less about their bloatware. How to securely disable or remove it completely when there is only their plug-in on your phone? I do have root access.
http://blog.checkpoint.com/2015/08/06/certifigate/

I found com.rsupport.rsperm "Remote support service" Version 3.0.1.6 (Build 306), apk path: /system/app/rspermlge/rspermlge.apk on my LG G4.
Frooze it with TiBa. I recommend adding this to your list of bloatware you might want to disable!

Huh, the sperm file isn't present on the H811
Sent From My LG G4

Lol, that's what she said
Sent from outer space using telepathy

fpsq said:
According to news there are several remote exploitable remote support tools. One is preinstalled on LG G3 & G4 WITHOUT a User Interface.
It's called RSupport. Never heard of this company or software, I couldn't care less about their bloatware. How to securely disable or remove it completely when there is only their plug-in on your phone? I do have root access.
http://blog.checkpoint.com/2015/08/06/certifigate/
Click to expand...
Click to collapse
Use the bloatware removal tool to disable it. It's in the Q&A forum.
Do not try to absolve me by some quirk of quantum mechanics.

Rydah805 said:
Huh, the sperm file isn't present on the H811
Sent From My LG G4
Click to expand...
Click to collapse
Agreed. No seamen in my phone.

The semen was present on my phone. I wiped it off quickly though.

I don't see the rsupport file, but the app referenced in the Check Point blog says "Your device model is affected by Certifi-gate vulnerabilities. "

Doesn't seem to be on the Verizon version
Sent from my VS986 using XDA Free mobile app

graysooner said:
I don't see the rsupport file, but the app referenced in the Check Point blog says "Your device model is affected by Certifi-gate vulnerabilities. "
Click to expand...
Click to collapse
+1
Wonder if there's another app????

I have it on my SEA V10B version

I don't have it on my H815T (rooted V10c-HKG-XX)

Related

Master Key Exploit patch?

Has HTC push the patch? Samsung already roll out security patches to S4. I Just scanned, my ONE is unpatched/vulnerable.
Here’s How You Can Check If Your Android Device Is Patched Against The Master Key Exploit.http://www.redmondpie.com/check-if-your-android-device-is-patched-against-the-master-key-exploit/
Sent from my HTC One using xda app-developers app
the Google Edition roms are patched
IINexusII said:
the Google Edition roms are patched
Click to expand...
Click to collapse
THe sense based roms have not been patched yet but when i reached out to them they said that it will be resolved soon with a update. They could not give me an ETA on when it would be coming out but assured me they take it very seriously and are working hard to get it rolled out.
crackeyes said:
THe sense based roms have not been patched yet but when i reached out to them they said that it will be resolved soon with a update. They could not give me an ETA on when it would be coming out but assured me they take it very seriously and are working hard to get it rolled out.
Click to expand...
Click to collapse
That app says I'm patched and I'm running InsertCoin with the latest elementalX. I wonder if the master key patch is in the kernel. If so, that makes sense.
Sent from my HTC One using Tapatalk 2
It appears 4.2.2 build/soft no. 2.24.401.1 / HTC 5.34 is patched as well :good:
@Wiss said:
It appears 4.2.2 build/soft no. 2.24.401.1 / HTC 5.34 is patched as well :good:
Click to expand...
Click to collapse
What CID and OTA or custom Rom?
Sent from my HTC One using Tapatalk 4 Beta
Ye in the last OTA it is patched. The 4.2.2
My One is "patched." I don't download warez, steal paid apps, or install third-party app stores that are untrusted.
I have no sympathy for anyone who does the above and gets their phone jacked up.
BTW Can someone give us a technical (not too technical) explanation of what is this ?
Thanks.
KekeJr said:
BTW Can someone give us a technical (not too technical) explanation of what is this ?
Thanks.
Click to expand...
Click to collapse
Applications are cryptographically signed. The idea is that another software house or or anybody else can't come up with an "update" to that app, as the signature will be different.
The exploit allows exactly that to happen.
Lets say you download Google maps v7 from the internet because you're impatient, and you install it over the top of the existing one. In theory, if it succeeds, it must have come from Google and hasn't been tampered with to install a Trojan or virus or whatever.
With this exploit, the apk can be modified whilst retaining the same signature. Basically you can't trust downloads that didn't come from the play store until the exploit is patched.
BenPope said:
Basically you can't trust downloads that didn't come from the play store
Click to expand...
Click to collapse
Fixed.
This is, and has been, true for every single Android "security issue, virus alert, malware warning," etc that's ever existed.
Sent from my HTC One
BenPope said:
Applications are cryptographically signed. The idea is that another software house or or anybody else can't come up with an "update" to that app, as the signature will be different.
The exploit allows exactly that to happen.
Lets say you download Google maps v7 from the internet because you're impatient, and you install it over the top of the existing one. In theory, if it succeeds, it must have come from Google and hasn't been tampered with to install a Trojan or virus or whatever.
With this exploit, the apk can be modified whilst retaining the same signature. Basically you can't trust downloads that didn't come from the play store until the exploit is patched.
Click to expand...
Click to collapse
First i want to thank you !
Second: ....so, basically this means that it was not that BAD... as the media said !
We all knew that only Play store has trustable content.
Thanks, again !
This patch is in a play store update not an Android update. I have it in play store 4.1.10, there is an app which lets you check I think it's called bluebox or something.you can also check in Google settings if you have an option to verify apps.
unremarked said:
Fixed.
This is, and has been, true for every single Android "security issue, virus alert, malware warning," etc that's ever existed.
Sent from my HTC One
Click to expand...
Click to collapse
That's funny, because the app store is littered with adware and malware. Just a few days ago, there was an app in the top 20 that was clearly malware, and it remained there for weeks before (presumably) being pulled off. As a general rule, I don't download any apps that require the "run at startup" or "install shortcuts" permissions, unless I fully trust the developer. By the way, there's an easy solution; Google could let us control our own privacy settings (like every other OS on the market), but then again, that would eat into their bottom line After all, Google's business model is to literally steal user data and sell it to others.
unremarked said:
Fixed.
This is, and has been, true for every single Android "security issue, virus alert, malware warning," etc that's ever existed.
Sent from my HTC One
Click to expand...
Click to collapse
It's easy to put malicious apps on the play store since there's no review process like apple, but things tend to get flagged quickly.
Basically don't install a calculator app that has full phone/internet/device permissions
The android security model is actually quite good IMO, there's been some exploits but everybody has them (not just android) and they get patched relatively quickly. Potential exploits aside it's actually quite good.
Sent from my HTC One using Tapatalk 2
REDACTED
Sent from my HTC One using xda app-developers app
WhatsAUsername said:
That's funny, because the app store is littered with adware and malware. Just a few days ago, there was an app in the top 20 that was clearly malware, and it remained there for weeks before (presumably) being pulled off.
Click to expand...
Click to collapse
Really? What app was that? I mean, I get annoyed at Candy Crush Saga spam too, but I hardly consider it malware.
WhatsAUsername said:
By the way, there's an easy solution, Google could let us control our own privacy settings (like every other OS on the market), but then again, that would eat into their bottom line After all, Google's business model is to literally steal user data and sell it to others.
Click to expand...
Click to collapse
You're kidding yourself if you think Apple or Microsoft isn't collecting as much data about you as they can and doing what they want with it. Beyond that, I always take point with folks who accuse any company of "stealing your information." They're not. You're freely giving them access to it (as outlined in that Terms of Service/ELEU agreement you don't read) to utilize their services. If you don't want them to have your info, then don't share your info with them.
bbedward said:
It's easy to put malicious apps on the play store since there's no review process like apple, but things tend to get flagged quickly.
Click to expand...
Click to collapse
Halfway true. It's more difficult than you think to get malicious apps on the Play store. Most of the "successful" attacks have been from someone uploading the 1.0 version of their app(which is perfectly clean, and passes inspection by Google Bouncer) then pushes an update to it with some of the malicious code. As you noted, it usually gets flagged and removed at this point. The other way I've heard of people getting "infected" from apps off the Play store is when the author ties their ads into a nasty website, tricks the user into clicking on it, then further tricks them into downloading an unsigned/untrusted APK.
Yup, as long as your not doing some silly things like getting you apps from the Pirate Bay or Joes crazy world of underground apps you will be more or less safe.
godutch said:
This patch is in a play store update not an Android update. I have it in play store 4.1.10, there is an app which lets you check I think it's called bluebox or something.you can also check in Google settings if you have an option to verify apps.
Click to expand...
Click to collapse
I don't think the update patch is on play store. Latest update scan tell's you to Ask your device vendor for update. So it should be security update OTA from HTC?
Sent from my HTC One using xda app-developers app
alanchai said:
I don't think the update patch is on play store. Latest update scan tell's you to Ask your device vendor for update. So it should be security update OTA from HTC?
Sent from my HTC One using xda app-developers app
Click to expand...
Click to collapse
Check your play store version I have 4.1.10 and I am patched

Just got stagefright hacked, Verizon Lg g4 (number orginally from T-mobile)

Well that's nice, I was watching a youtube video and android system media crashed, figured it didn't mater since stagefright had been patched. I was wrong, seconds later apps began installing themselves on my phone, I didn't get any notification other then when the shortcuts were created. They were appearing so fast they some didn't even show up in my draw, they just were added to my home screen.
I'm on the latest version, and just this morning my phone was wiped. I got the message "deleting", but it looked like it was because someone kept trying passwords.
Mu number was transferred over from T-Mobile, only unusual thing. (but that was months ago)
It's not fully patched... was only patched against the first known set of vulnerabilities.
https://blog.zimperium.com/zimperiu...me-new-vulnerability-processing-mp3mp4-media/
I'd assume there will be even more in the weeks and months to come. And as for making use of the exploit... I assume everything can be fully automated... and fairly easy to generate phone numbers and scan thru millions... so probably won't matter what carrier you're on etc etc.
autoprime said:
It's not fully patched... was only patched against the first known set of vulnerabilities.
https://blog.zimperium.com/zimperiu...me-new-vulnerability-processing-mp3mp4-media/
I'd assume there will be even more in the weeks and months to come. And as for making use of the exploit... I assume everything can be fully automated... and fairly easy to generate phone numbers and scan thru millions... so probably won't matter what carrier you're on etc etc.
Click to expand...
Click to collapse
Well that's disappointing
autoprime said:
It's not fully patched... was only patched against the first known set of vulnerabilities.
https://blog.zimperium.com/zimperiu...me-new-vulnerability-processing-mp3mp4-media/
I'd assume there will be even more in the weeks and months to come. And as for making use of the exploit... I assume everything can be fully automated... and fairly easy to generate phone numbers and scan thru millions... so probably won't matter what carrier you're on etc etc.
Click to expand...
Click to collapse
Just ran the stage fright detector, I'm vulnerable to eveything but 3828. My OnePlus one is way older and isn't. °-°
Aaahh said:
Just ran the stage fright detector, I'm vulnerable to eveything but 3828. My OnePlus one is way older and isn't. °-°
Click to expand...
Click to collapse
the stagefright detector only detects what is patched so far as well... the link I posted mentions newer exploits not yet assigned CVE's and still no patch... and until patch is available from Google they won't have a fully up-to-date detector.
So even if OPO isn't vuln to what's currently being scanned.. it still may be open to others not yet able to be detected.
Of course that doesn't excuse Verizon from not keeping up to date on patches either. Many G4's have had recent OTA's to patch everything "known to date" (but will still require a new patch for the most recent findings)... I guess it's just Verizon being slow on updates as usual.
Stagefright framework seems to be like swiss cheese when it comes to remote attacks... thankfully companies like zimperium are on the case. But if I were a criminal enterprise.. I'd be focusing all my work on finding new remote attacks against the framework... it's possibly the most effective remote attack to date.
Frightening isn't it?
autoprime said:
the stagefright detector only detects what is patched so far as well... the link I posted mentions newer exploits not yet assigned CVE's and still no patch... and until patch is available from Google they won't have a fully up-to-date detector.
So even if OPO isn't vuln to what's currently being scanned.. it still may be open to others not yet able to be detected.
Of course that doesn't excuse Verizon from not keeping up to date on patches either. Many G4's have had recent OTA's to patch everything "known to date" (but will still require a new patch for the most recent findings)... I guess it's just Verizon being slow on updates as usual.
Stagefright framework seems to be like swiss cheese when it comes to remote attacks... thankfully companies like zimperium are on the case. But if I were a criminal enterprise.. I'd be focusing all my work on finding new remote attacks against the framework... it's probably the most effective remote attack to date.
Frightening isn't it?
Click to expand...
Click to collapse
Its frightening to know where it's being exploited, so much for privacy. That being said, how were the apps installed?
Assuming I was owned by an old hack
The first bug 1538 doesn't give you access to everything, just camera, mic and things.
Or am I wrong to assume that, and you actually more access with it?
Aaahh said:
Its frightening to know where it's being exploited, so much for privacy. That being said, how were the apps installed?
Assuming I was owned by an old hack
The first bug 1538 doesn't give you access to everything, just camera, mic and things.
Or am I wrong to assume that, and you actually more access with it?
Click to expand...
Click to collapse
not fully up on the chain of attacks possible with it to be honest... but pretty sure some of them can manage to get root... or at least system access... and from there you can do all sorts of things.
If I have to take a wild guess (and that's all this is)... I could imagine using a remote attack and gaining system/root access then downloading a compressed file containing a set of apps/scripts it wanted to install/run.. unzip.. install.. and does whatever it needs to. Kinda odd they weren't very stealth about it.. letting you see apps being installed on the homescreen.
Curious... what sort of apps were installed? And were they installed in data or in system?
autoprime said:
not fully up on the chain of attacks possible with it to be honest... but pretty sure some of them can manage to get root... or at least system access... and from there you can do all sorts of things.
If I have to take a wild guess (and that's all this is)... I could imagine using a remote attack and gaining system/root access then downloading a compressed file containing a set of apps/scripts it wanted to install/run.. unzip.. install.. and does whatever it needs to. Kinda odd they weren't very stealth about it.. letting you see apps being installed on the homescreen.
Curious... what sort of apps were installed? And were they installed in data or in system?
Click to expand...
Click to collapse
That's why I wasn't as frightened at first
They were stupid apps like knights of hearts and go90(what's this?) And rhysop something
Data
Aaahh said:
That's why I wasn't as frightened at first
They were stupid apps like knights of hearts and go90(what's this?) And rhysop something
Data
Click to expand...
Click to collapse
hmm go90 is a new verizon app coming out today. so maybe it was verizon pushing that. not sure on others.
https://www.go90app.com/
http://www.usatoday.com/story/tech/2015/10/01/verizon-launches-go90-mobile-video-service/73138654/
autoprime said:
hmm go90 is a new verizon app coming out today. so maybe it was verizon pushing that. not sure on others.
https://www.go90app.com/
http://www.usatoday.com/story/tech/2015/10/01/verizon-launches-go90-mobile-video-service/73138654/
Click to expand...
Click to collapse
I knew it sounded familiar, but I can't justify the other apps. II know g4 comes with games but not that rpshuo music player
The go90 didn't have a shortcut, too bad I erased it.
Anyone knows if turning off auto retrieve MMS is enough to protect my phone against the new stagefright hacks?
No?
I read this morning that T-mobile USA has been hacked and the hackers got data since Sept. 2013 lol.
Looks like they got some german IT specialists.
http://www.t-mobile.com/landing/experian-data-breach.html?icid=WOR_NA_CLRSKY_GP21HHC35JV3079
In the midst of an attack, what's the quickest way to stop it (airplane mode?) then a factory reset?
Sent from my LGLS991 using Tapatalk
Cozmos23 said:
No?
I read this morning that T-mobile USA has been hacked and the hackers got data since Sept. 2013 lol.
Looks like they got some german IT specialists.
http://www.t-mobile.com/landing/experian-data-breach.html?icid=WOR_NA_CLRSKY_GP21HHC35JV3079
Click to expand...
Click to collapse
This is completely unrelated to stagefright. The Tmobile hack is actually an attack on Experian..
bitbitbit said:
Anyone knows if turning off auto retrieve MMS is enough to protect my phone against the new stagefright hacks?
Click to expand...
Click to collapse
Anyone want to answer this question ?
---------- Post added at 09:01 AM ---------- Previous post was at 08:49 AM ----------
autoprime said:
the stagefright detector only detects what is patched so far as well... the link I posted mentions newer exploits not yet assigned CVE's and still no patch... and until patch is available from Google they won't have a fully up-to-date detector.
So even if OPO isn't vuln to what's currently being scanned.. it still may be open to others not yet able to be detected.
Of course that doesn't excuse Verizon from not keeping up to date on patches either. Many G4's have had recent OTA's to patch everything "known to date" (but will still require a new patch for the most recent findings)... I guess it's just Verizon being slow on updates as usual.
Stagefright framework seems to be like swiss cheese when it comes to remote attacks... thankfully companies like zimperium are on the case. But if I were a criminal enterprise.. I'd be focusing all my work on finding new remote attacks against the framework... it's possibly the most effective remote attack to date.
Frightening isn't it?
Click to expand...
Click to collapse
The main vector is still "specially crafted MP3 or MP4 files can lead to arbitrary code execution".
That was known back in April. So if you can prevent such files ending up on your device then there is no problem.
The way to do that AFAIK is disabling auto retrieve of MMS.
Sorry to hear man. Did it wipe SD card data too?
Sent From My LG G4
Nevermind, I got the answer.
bitbitbit said:
Anyone knows if turning off auto retrieve MMS is enough to protect my phone against the new stagefright hacks?
Click to expand...
Click to collapse
I dont think so, an attacker could lead you to a website containing specially crafted media files...
For more information on the stagefright vulnerability and the (un)likelyhood of getting hacked I found this article on Android Central:
http://www.androidcentral.com/stagefright
Reading through that, OP, it seems possible you could have picked up a virus somewhere that started downloading all that software. Have you ever downloaded or clicked on a link other than a trusted site?
FadeFx said:
I dont think so, an attacker could lead you to a website containing specially crafted media files...
Click to expand...
Click to collapse
Would it make a difference if I don't click on play? I guess I can't always tell if a media file has been tampered with, but at least if not playing the file can help, I can avoid doing that on sketchy websites.

Amazon just sent me an email about potential security issue and update (forced?)

Hello,
We recently learned of a potential security issue with a BLU smartphone our records indicate you purchased or registered:
BLU R1 HD - 16 GB - Black - Prime Exclusive - with Lockscreen Offers & Ads
BLU intends to push out a software update that will fix the issue. Any phone that is powered on and connected to the Internet (through Wi-Fi or a cellular data connection) will automatically receive the update. For more information, including a list of affected phones and instructions for confirming that your phone has been updated, please visit www.bluproducts.com/security, or contact BLU customer service at ‪1-877-602-8762 or [email protected].
Sincerely,
Customer Service
Amazon.com
www.amazon.com
I haven't rooted mine and the update waiting is still the 6.6 one. Turned mine off just in case and going to root mine tonight.
i got this too. their website says:
Security Concern
BLU Products has identified and has quickly removed a recent security issue caused by a 3rd party application which had been collecting unauthorized personal data in the form of text messages, call logs, and contacts from customers using a limited number of BLU mobile devices.
Our customer’s privacy and security are of the upmost importance and priority.
The affected application has since been self-updated and the functionality verified to be no longer collecting or sending this information.
If you have any concerns or questions in regards to your BLU Smartphone, please call our customer service 1-877-602-8762.
Do we know what this even is...?
Sorakun_skyboy said:
Do we know what this even is...?
Click to expand...
Click to collapse
Yup, OTA update app
http://forum.xda-developers.com/showpost.php?p=69627703&postcount=1672
emc2cube said:
Yup, OTA update app
http://forum.xda-developers.com/showpost.php?p=69627703&postcount=1672
Click to expand...
Click to collapse
Thanks for that, and the link....my mind is at ease now! I followed the instructions on the Blu website to find that app, and it wasn't there because I'm all BL unlocked and debloated.
Please see this article, this is pretty bad..... http://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html
App was sending talk, text, and location information back to China every 72 hours
and even after all that they still wont fu**in update the OS.
Go to http://bluproducts.com/security/
Says to check your version of Wireless Update in settings/apps. If you're on 5.4 you're OK. I am. But then, I updated to v6.6 firmware as soon as I got the phone.
We made the DM.
http://www.dailymail.co.uk/sciencet...retly-sending-users-texts-China-72-hours.html
Full article from Kryptowire:
http://www.kryptowire.com/adups_security_analysis.html
Rehash of NYT article:
http://www.pcworld.com/article/3141...1-hd-and-other-phones-sent-data-to-china.html
Sad that BLU got hit with this crappy stuff....the hardware is good! (For the price)
Probably a stupid question, but...
I checked my apps, and I don't even see a Wireless Update app, does this mean I'm safe?
Cute as Heck said:
Probably a stupid question, but...
I checked my apps, and I don't even see a Wireless Update app, does this mean I'm safe?
Click to expand...
Click to collapse
it wont bee in your app draw , you need to be rooted and at least install link2sd to see all the apps and remove fota* named apps and the wireless app thats written out clearly .
Go to setting/apps, scroll to bottom, wireless update. v5.4 is OK. Can't be disabled, only rolled back. Don't do that.
KazuDante said:
it wont bee in your app draw , you need to be rooted and at least install link2sd to see all the apps and remove fota* named apps and the wireless app thats written out clearly .
Click to expand...
Click to collapse
I didn't mean the app drawer, I was talking about the steps outline on the Blu security page linked in the OP.
I went through [settings > apps > show system] and there's no "Wireless Update" in there.
I rooted the phone to disable ads a while ago, if whatever method I used disabled OTA's, could that be the reason I don't see Wireless Update? If so, does that mean I'm in the clear?
raderator said:
Go to setting/apps, scroll to bottom, wireless update. v5.4 is OK. Can't be disabled, only rolled back. Don't do that.
Click to expand...
Click to collapse
So even uninstalling it does not disable it?
Sent from my BLU R1 HD using Tapatalk
According to ConsumerReports, Amazon is extending its return window for this phone. Anyone trying to return 4 months later? lol
waingro808 said:
According to ConsumerReports, Amazon is extending its return window for this phone. Anyone trying to return 4 months later? lol
Click to expand...
Click to collapse
Not me. This phone has grown on me.
raderator said:
Not me. This phone has grown on me.
Click to expand...
Click to collapse
Yeah, me too. I love this phone and had that app debloated anyway.
waingro808 said:
Yeah, me too. I love this phone and had that app debloated anyway.
Click to expand...
Click to collapse
Me too, keeping it, wishing I could buy one for family.
raderator said:
Go to http://bluproducts.com/security/
Says to check your version of Wireless Update in settings/apps. If you're on 5.4 you're OK. I am. But then, I updated to v6.6 firmware as soon as I got the phone.
We made the DM.
http://www.dailymail.co.uk/sciencet...retly-sending-users-texts-China-72-hours.html
Click to expand...
Click to collapse
I am 5.4 and am on stock debloated, no OTA updates at all.
---------- Post added at 09:33 AM ---------- Previous post was at 08:51 AM ----------
jacewt said:
Me too, keeping it, wishing I could buy one for family.
Click to expand...
Click to collapse
They will be back in stock in the next 2 weeks according to a consumer reports article. Amazon pulled them all to fix the security issue, and is restocking them. They might also be a BLU R1+ version released soon(which is rumored right now). http://www.androidheadlines.com/2016/10/blu-r1-plus-hits-fcc-likely-amazon-exclusive.html
I just hope Amazon gets on BLU for not giving us the official LET band 12 update yet. Maybe Amazon will pressure Blu to get the promised Nougat update out also. we can only hope.
waingro808 said:
According to ConsumerReports, Amazon is extending its return window for this phone. Anyone trying to return 4 months later? lol
Click to expand...
Click to collapse
I just returned mine after purchasing on launch. It was just a backup phone/extra Android device anyway.

Anyone get the NEW NOV 10 OTA UPDATE?

T-Mobile user here. Wondering if its safe to update. Don't want my root blocked. Looks like they may have improved camera auto detection.
Screenshot from V20 subreddit from user maximalx5. I did not check for the update yet.
Thanks
reddit people were showing this on Canadian phones. I love how I got unlocked and carriers are getting OTA before me. wtf.
Sent from my LG V20 US996
jayochs said:
reddit people were showing this on Canadian phones. I love how I got unlocked and carriers are getting OTA before me. wtf.
Sent from my LG V20 US996
Click to expand...
Click to collapse
T-Mobile. Just checked. Nothing yet.
I can not update too:
Now softwear is us99610a:
I want know what happen:
hehelle said:
I can not update too:
Now softwear is us99610a:
I want know what happen:
Click to expand...
Click to collapse
CHANGELOG from Korean page
Google Translate + Reddit community changes
: 1: The phenomenon of temporarily slowing down or stopping while using internal storage has been improved. 2: Rear wide angle camera When using the flash during shooting, the phenomenon of being shot in red and the phenomenon of shooting in yellow when using front camera are improved. 3: Improved compatibility problem with some car Bluetooth devices. 4: Recording in studio mode in high-quality recording app. The background music and sync did not match, and the sound quality has been improved. 5: The silence that occurred at the beginning of the call and the call interruption that occurred when moving during the call are improved. 6: U+ Box Cloud connection speed is improved.
Im on AT&T so i wont get it for a few weeks.
I got mine this morning !
frome901 said:
Im on AT&T so i wont get it for a few weeks.
Click to expand...
Click to collapse
Lol. I'm on Sprint, so I probably won't get mine for a few months! Heh.
Sent from my LG-LS997 using Tapatalk
Should be very nice to get this update for the international version. The V20B it's horrible.
markbencze said:
I got mine this morning !
Click to expand...
Click to collapse
I haven't gotten it yet.
Sent from my LG V20 using XDA Labs
It is probably best you don't take it if you have a locked bootloader. Unless you have one of the issues mentioned you run the risk of losing compatibility if they crack the bootloader or get the phone rooted because they will work on the older firmware first.
As always, flash at your own risk.
BROKEN1981 said:
I haven't gotten it yet.
Click to expand...
Click to collapse
Are you the 915 also?
markbencze said:
Are you the 915 also?
Click to expand...
Click to collapse
My phone says 918.
I'm on T-Mobile
Sent from my LG V20 using XDA Labs
BROKEN1981 said:
My phone says 918.
I'm on T-Mobile
Click to expand...
Click to collapse
Well this is a first then. Never have we (in canada) ever gotten an ota before anyone else. Usually we're 6 months after vzw if at all!
I can't even check. When I open update center it skips directly to app updates. I don't even get an option to check software. I unfroze everything I had frozen but it stays the same. Don't know what's up with that.
Want to know if the update needs to be queued :: haha
Got an update for my V20 International Model H990DS
I can also confirm update, model H990DS
Sent from my LG-H990 using Tapatalk

			
				
Haven't got an update yet.. but Sprint is showing a new one on the software updates page
Code:
https://support.sprint.com/support/article/Find-and-update-the-software-version-on-your-LG-V20/WServiceAdvisory_542_GKB101699-dvc10470001prd?INTNAV=SU:DP:eek:V:UG:LgV20:FindAndUpdateTheSoftwareVersionOnYourLgV20

Looking for 5 users for free GSM unlock

Hey guys, i'm at it again..
I'm looking for 5 users to unlock their Sprint LS997 V20 devices for GSM use, no root required.
Please post here, do not PM me regarding this.
I could use unlock on my V20
Have a Sprint V20 VZ6
thanks
Let's go! I'm game for an unlock.
I'm game
Sent from my SAMSUNG-SM-G530AZ using XDA Free mobile app
Add me on skype: stoney.lawson and we'll get it rolling!
relapsed said:
Have a Sprint V20 VZ6
thanks
Click to expand...
Click to collapse
ZV6 is perfect! add me on skype stoney.lawson
Video proof: https://www.youtube.com/watch?v=fFl8_FDffp0
Great work! We also have a APK that can do it as well.
But selling a service here is not allowed.
hook me up
hyelton said:
Great work! We also have a APK that can do it as well.
But selling a service here is not allowed.
Click to expand...
Click to collapse
I'm not outwardly selling anything, i've been providing free unlocks for some time on XDA.
What APK unlocks the device?
slawson said:
I'm not outwardly selling anything, i've been providing free unlocks for some time on XDA.
What APK unlocks the device?
Click to expand...
Click to collapse
The hidden menu APK. it changes a setting from Operational mode to "Lab operation" and it enables use of GSM. So far it works with the G5, V20, and a few low end Boost mobile/Sprint prepaid LG devices.
Sent from my iPhone using Tapatalk
hyelton said:
The hidden menu APK. it changes a setting from Operational mode to "Lab operation" and it enables use of GSM. So far it works with the G5, V20, and a few low end Boost mobile/Sprint prepaid LG devices.
Sent from my iPhone using Tapatalk
Click to expand...
Click to collapse
hiddenmenu apk no longer works on ZV6 or past December security patch, the network lab operation was removed out of the IOT menu
Although, if you're taking the device overseas, the hiddenmenu apk can be used to assist in selecting your LTE bands!
slawson said:
hiddenmenu apk no longer works on ZV6 or past December security patch, the network lab operation was removed out of the IOT menu
Click to expand...
Click to collapse
Strange. Others are reporting working results recently guess they've never updated. Latest update on the G5 is working perfectly fine though at the moment. Sucks they have to patch the simple ways lol.
Sent from my iPhone using Tapatalk
The G5 and the V20 are two different beasts as far as the software correlation..
The G5 was shipped with 6.0, the V20 shipped with 7.0, the menu options were altered to prevent unlocking with the V20 via this method..
Just as it's removed in the G6 as well.
slawson said:
The G5 and the V20 are two different beasts as far as the software correlation..
The G5 was shipped with 6.0, the V20 shipped with 7.0, the menu options were altered to prevent unlocking with the V20 via this method..
Just as it's removed in the G6 as well.
Click to expand...
Click to collapse
Yeah the G5 both 6.0 and 7.0 working correctly at the moment. Hopefully it doesn't get patched. But I've never recommended using Sprint phone outside of Sprint anyway. I've never had a stable signal in fringe areas oddly.
But outside the US Sprint devices are sold on a large scale LG devices at least.
Also with 7.0 something that may assist others, with that hiddenmenu apk, you can go to the svc menu -> port check test -> enable, then set the usb connection mode to file transfer / Always and obtain your SPC/MSL using any qualcomm LG method reader.
The apk still has many uses!
It won't ever get patched in the G5, they can't as the network operation mode is a requirement since it was built in to the framework.
slawson said:
It won't ever get patched in the G5, they can't as the network operation mode is a requirement since it was built in to the framework.
Click to expand...
Click to collapse
Awesome! Thanks for the info! I had strange issues with random battery drain and overheating during that battery drain with mine. So I got rid of it. I had a feeling something was up with a Sprint app causing it. But no one else experienced the issue.
Sent from my iPhone using Tapatalk
slawson said:
Also with 7.0 something that may assist others, with that hiddenmenu apk, you can go to the svc menu -> port check test -> enable, then set the usb connection mode to file transfer / Always and obtain your SPC/MSL using any qualcomm LG method reader.
The apk still has many uses!
Click to expand...
Click to collapse
I've been trying to get my msl from sprint for a few days now as im litterally having poor data issues where i know i have good lte. So if i do this do i just download an apk to read the msl or an exe program for windows. My main goal is to go into ##3282# menu under edit (msl) required. under lte and adjust my band priority from 25 to 3 and 26 to 2 and 41 to 1. So in theory this should work right.

Categories

Resources