Stage Fright - Galaxy Note 4 Q&A, Help & Troubleshooting

Hello and thank you for reading this. I need some guidence. Stage fright and stage fright 2.0 are a huge issue around the board. As i do quite a bit from my device i have some concerns. I use various programs to help protect my device however i am not sure the full extent of stage frights abilities.
So my question, availability of patches for us that are available? At the moment im on DU but is there a patch that is standard acroos all ROMs or mabey even across platforms?
Any info would be recieved with much appreciation. Thank you. If the answer to this has already been posted elsewhere i was unable to find it but MOD if this is unwelcome here please guide me the correct place. Thank you again.

in the messaging app of your choice untick "automatically retrieve MMS", that will prevent malicious mms. Other then that we just have to wait for Samsung to release the patch.

Samsung won't do anything about these issues unless a big attack happens sadly. Same goes with most other carriers.

Im running tekxodous 5.1.1 now. The OP says the patch is integrated into the rom. Does that mean im fully secure or is there still some kimd of risk?

mattdiehl83 said:
Im running tekxodous 5.1.1 now. The OP says the patch is integrated into the rom. Does that mean im fully secure or is there still some kimd of risk?
Click to expand...
Click to collapse
If you download an app from play store called stagefright and run it then the writing in red will tell you the security wholes in your phone.

Zionator said:
If you download an app from play store called stagefright and run it then the writing in red will tell you the security wholes in your phone.
Click to expand...
Click to collapse
And this app is prove 100% safe as well as accurate? Excuse me if i am asking too much or asking an answer that cant really be given. If so i do appologize. Thank you BTW for the responses.

Related

[Q] Security for Android

OK, I did search for this before I posted so I hope I don't get anybody mad for starting a new thread if this has been covered.
Regarding security threats and android phones. I did see the thread about a malware program out of Russia affecting android phones (installed via a movie program?). But in general, security issues do not seem to be a big issue.
The other threads I've found seem to have conflicting opinions.
So my question(s) is, how much do you all worry about security issues? Does anybody use Lookout (free mobile security app)? I did see that it has high ratings on the market, but I put more stock in what this community has for opinions than the market users.
Again, if this has been covered to death and I missed it, I apologize.
I do have concerns over security and therefore really don't install many apps. Since I have had an android phone, my gmail account has been compromised once, allowing spam to be sent from my gmail account and also spam to be placed on my Blogger site. While I cannot be certain it was something on my phone that allowed this, I rarely use my computer to access any of my Google apps. I also had never had issues with any email or other accounts being compromised for as long as I've had a computer. I also rarely get spam. So while I can't be certain, the fact it showed my account being logged into by a mobile device in Malaysia makes me very suspicious.
Sent from my HERO200 using XDA App
Thanks for the reply. I take it you haven't used Lookout or any of the other security apps?
Lookout looks legit, but I am a little skeptical. Guess I'll wait and see if I get any other responses before I do anything with it.
I haven't tried it in the past, as I'm skeptical too. I went ahead and installed it though after my post just to see. It is now being installed by some of the carriers by default apparently and I guess has won some awards, so hopefully it's been poked at a bit by people to where it itself isn't a large threat. Figure if it doesn't impact performance a lot there can't be any harm in trying it. Now, as for how effective it really is, I'd imagine that's something many people will never know.
Sent from my HERO200 using XDA App
Again, thanks for your input.
Performance impact is basically what I was worried about. I actually installed it the other day but when I realized it was on ALL the time, I uninstalled it before really giving it a chance.
I guess it's worth a shot. I'll install it again tonight and run a couple before and after quadrant benchmarks to see how much of an impact.
If I don't get anybody else posting here, I'll still post my experience in a couple/few days, so if you're interested, check back later in the week.
Thanks dpeeps, have a good one.
Paranoid much?
Sent from my HERO200 using XDA App
Eric_1966_FXE said:
Thanks for the reply. I take it you haven't used Lookout or any of the other security apps?
Lookout looks legit, but I am a little skeptical. Guess I'll wait and see if I get any other responses before I do anything with it.
Click to expand...
Click to collapse
seriously? lookout is featured in a Droid commercial for verizon. (i think its verizon anyhow)
i use it, i really haven't noticed any effect on the performance.
Vandelay007 said:
Paranoid much?
Sent from my HERO200 using XDA App
Click to expand...
Click to collapse
Not paranoid .... just cautious.
There is so much good information on this site that when I search for something that sounds too good (for free), and I can't find anything, yes, I'm going to "err on the side of caution".
ngholson, thanks for the input.
Eric_1966_FXE said:
ngholson, thanks for the input.
Click to expand...
Click to collapse
you are welcome. i use it mostly for the lost feature. if i lose it i can activate the gps and locate it that way, and i can also make it scream (caution this is really loud, and the only way to stop it is a battery pull) if it is somewhere close to me. it is very effective.
EDIT: they changed the scream feature, now it will scream for 1 minute and you can stop it by turning the volume down on the phone.

Master Key Exploit patch?

Has HTC push the patch? Samsung already roll out security patches to S4. I Just scanned, my ONE is unpatched/vulnerable.
Here’s How You Can Check If Your Android Device Is Patched Against The Master Key Exploit.http://www.redmondpie.com/check-if-your-android-device-is-patched-against-the-master-key-exploit/
Sent from my HTC One using xda app-developers app
the Google Edition roms are patched
IINexusII said:
the Google Edition roms are patched
Click to expand...
Click to collapse
THe sense based roms have not been patched yet but when i reached out to them they said that it will be resolved soon with a update. They could not give me an ETA on when it would be coming out but assured me they take it very seriously and are working hard to get it rolled out.
crackeyes said:
THe sense based roms have not been patched yet but when i reached out to them they said that it will be resolved soon with a update. They could not give me an ETA on when it would be coming out but assured me they take it very seriously and are working hard to get it rolled out.
Click to expand...
Click to collapse
That app says I'm patched and I'm running InsertCoin with the latest elementalX. I wonder if the master key patch is in the kernel. If so, that makes sense.
Sent from my HTC One using Tapatalk 2
It appears 4.2.2 build/soft no. 2.24.401.1 / HTC 5.34 is patched as well :good:
@Wiss said:
It appears 4.2.2 build/soft no. 2.24.401.1 / HTC 5.34 is patched as well :good:
Click to expand...
Click to collapse
What CID and OTA or custom Rom?
Sent from my HTC One using Tapatalk 4 Beta
Ye in the last OTA it is patched. The 4.2.2
My One is "patched." I don't download warez, steal paid apps, or install third-party app stores that are untrusted.
I have no sympathy for anyone who does the above and gets their phone jacked up.
BTW Can someone give us a technical (not too technical) explanation of what is this ?
Thanks.
KekeJr said:
BTW Can someone give us a technical (not too technical) explanation of what is this ?
Thanks.
Click to expand...
Click to collapse
Applications are cryptographically signed. The idea is that another software house or or anybody else can't come up with an "update" to that app, as the signature will be different.
The exploit allows exactly that to happen.
Lets say you download Google maps v7 from the internet because you're impatient, and you install it over the top of the existing one. In theory, if it succeeds, it must have come from Google and hasn't been tampered with to install a Trojan or virus or whatever.
With this exploit, the apk can be modified whilst retaining the same signature. Basically you can't trust downloads that didn't come from the play store until the exploit is patched.
BenPope said:
Basically you can't trust downloads that didn't come from the play store
Click to expand...
Click to collapse
Fixed.
This is, and has been, true for every single Android "security issue, virus alert, malware warning," etc that's ever existed.
Sent from my HTC One
BenPope said:
Applications are cryptographically signed. The idea is that another software house or or anybody else can't come up with an "update" to that app, as the signature will be different.
The exploit allows exactly that to happen.
Lets say you download Google maps v7 from the internet because you're impatient, and you install it over the top of the existing one. In theory, if it succeeds, it must have come from Google and hasn't been tampered with to install a Trojan or virus or whatever.
With this exploit, the apk can be modified whilst retaining the same signature. Basically you can't trust downloads that didn't come from the play store until the exploit is patched.
Click to expand...
Click to collapse
First i want to thank you !
Second: ....so, basically this means that it was not that BAD... as the media said !
We all knew that only Play store has trustable content.
Thanks, again !
This patch is in a play store update not an Android update. I have it in play store 4.1.10, there is an app which lets you check I think it's called bluebox or something.you can also check in Google settings if you have an option to verify apps.
unremarked said:
Fixed.
This is, and has been, true for every single Android "security issue, virus alert, malware warning," etc that's ever existed.
Sent from my HTC One
Click to expand...
Click to collapse
That's funny, because the app store is littered with adware and malware. Just a few days ago, there was an app in the top 20 that was clearly malware, and it remained there for weeks before (presumably) being pulled off. As a general rule, I don't download any apps that require the "run at startup" or "install shortcuts" permissions, unless I fully trust the developer. By the way, there's an easy solution; Google could let us control our own privacy settings (like every other OS on the market), but then again, that would eat into their bottom line After all, Google's business model is to literally steal user data and sell it to others.
unremarked said:
Fixed.
This is, and has been, true for every single Android "security issue, virus alert, malware warning," etc that's ever existed.
Sent from my HTC One
Click to expand...
Click to collapse
It's easy to put malicious apps on the play store since there's no review process like apple, but things tend to get flagged quickly.
Basically don't install a calculator app that has full phone/internet/device permissions
The android security model is actually quite good IMO, there's been some exploits but everybody has them (not just android) and they get patched relatively quickly. Potential exploits aside it's actually quite good.
Sent from my HTC One using Tapatalk 2
REDACTED
Sent from my HTC One using xda app-developers app
WhatsAUsername said:
That's funny, because the app store is littered with adware and malware. Just a few days ago, there was an app in the top 20 that was clearly malware, and it remained there for weeks before (presumably) being pulled off.
Click to expand...
Click to collapse
Really? What app was that? I mean, I get annoyed at Candy Crush Saga spam too, but I hardly consider it malware.
WhatsAUsername said:
By the way, there's an easy solution, Google could let us control our own privacy settings (like every other OS on the market), but then again, that would eat into their bottom line After all, Google's business model is to literally steal user data and sell it to others.
Click to expand...
Click to collapse
You're kidding yourself if you think Apple or Microsoft isn't collecting as much data about you as they can and doing what they want with it. Beyond that, I always take point with folks who accuse any company of "stealing your information." They're not. You're freely giving them access to it (as outlined in that Terms of Service/ELEU agreement you don't read) to utilize their services. If you don't want them to have your info, then don't share your info with them.
bbedward said:
It's easy to put malicious apps on the play store since there's no review process like apple, but things tend to get flagged quickly.
Click to expand...
Click to collapse
Halfway true. It's more difficult than you think to get malicious apps on the Play store. Most of the "successful" attacks have been from someone uploading the 1.0 version of their app(which is perfectly clean, and passes inspection by Google Bouncer) then pushes an update to it with some of the malicious code. As you noted, it usually gets flagged and removed at this point. The other way I've heard of people getting "infected" from apps off the Play store is when the author ties their ads into a nasty website, tricks the user into clicking on it, then further tricks them into downloading an unsigned/untrusted APK.
Yup, as long as your not doing some silly things like getting you apps from the Pirate Bay or Joes crazy world of underground apps you will be more or less safe.
godutch said:
This patch is in a play store update not an Android update. I have it in play store 4.1.10, there is an app which lets you check I think it's called bluebox or something.you can also check in Google settings if you have an option to verify apps.
Click to expand...
Click to collapse
I don't think the update patch is on play store. Latest update scan tell's you to Ask your device vendor for update. So it should be security update OTA from HTC?
Sent from my HTC One using xda app-developers app
alanchai said:
I don't think the update patch is on play store. Latest update scan tell's you to Ask your device vendor for update. So it should be security update OTA from HTC?
Sent from my HTC One using xda app-developers app
Click to expand...
Click to collapse
Check your play store version I have 4.1.10 and I am patched

Just got stagefright hacked, Verizon Lg g4 (number orginally from T-mobile)

Well that's nice, I was watching a youtube video and android system media crashed, figured it didn't mater since stagefright had been patched. I was wrong, seconds later apps began installing themselves on my phone, I didn't get any notification other then when the shortcuts were created. They were appearing so fast they some didn't even show up in my draw, they just were added to my home screen.
I'm on the latest version, and just this morning my phone was wiped. I got the message "deleting", but it looked like it was because someone kept trying passwords.
Mu number was transferred over from T-Mobile, only unusual thing. (but that was months ago)
It's not fully patched... was only patched against the first known set of vulnerabilities.
https://blog.zimperium.com/zimperiu...me-new-vulnerability-processing-mp3mp4-media/
I'd assume there will be even more in the weeks and months to come. And as for making use of the exploit... I assume everything can be fully automated... and fairly easy to generate phone numbers and scan thru millions... so probably won't matter what carrier you're on etc etc.
autoprime said:
It's not fully patched... was only patched against the first known set of vulnerabilities.
https://blog.zimperium.com/zimperiu...me-new-vulnerability-processing-mp3mp4-media/
I'd assume there will be even more in the weeks and months to come. And as for making use of the exploit... I assume everything can be fully automated... and fairly easy to generate phone numbers and scan thru millions... so probably won't matter what carrier you're on etc etc.
Click to expand...
Click to collapse
Well that's disappointing
autoprime said:
It's not fully patched... was only patched against the first known set of vulnerabilities.
https://blog.zimperium.com/zimperiu...me-new-vulnerability-processing-mp3mp4-media/
I'd assume there will be even more in the weeks and months to come. And as for making use of the exploit... I assume everything can be fully automated... and fairly easy to generate phone numbers and scan thru millions... so probably won't matter what carrier you're on etc etc.
Click to expand...
Click to collapse
Just ran the stage fright detector, I'm vulnerable to eveything but 3828. My OnePlus one is way older and isn't. °-°
Aaahh said:
Just ran the stage fright detector, I'm vulnerable to eveything but 3828. My OnePlus one is way older and isn't. °-°
Click to expand...
Click to collapse
the stagefright detector only detects what is patched so far as well... the link I posted mentions newer exploits not yet assigned CVE's and still no patch... and until patch is available from Google they won't have a fully up-to-date detector.
So even if OPO isn't vuln to what's currently being scanned.. it still may be open to others not yet able to be detected.
Of course that doesn't excuse Verizon from not keeping up to date on patches either. Many G4's have had recent OTA's to patch everything "known to date" (but will still require a new patch for the most recent findings)... I guess it's just Verizon being slow on updates as usual.
Stagefright framework seems to be like swiss cheese when it comes to remote attacks... thankfully companies like zimperium are on the case. But if I were a criminal enterprise.. I'd be focusing all my work on finding new remote attacks against the framework... it's possibly the most effective remote attack to date.
Frightening isn't it?
autoprime said:
the stagefright detector only detects what is patched so far as well... the link I posted mentions newer exploits not yet assigned CVE's and still no patch... and until patch is available from Google they won't have a fully up-to-date detector.
So even if OPO isn't vuln to what's currently being scanned.. it still may be open to others not yet able to be detected.
Of course that doesn't excuse Verizon from not keeping up to date on patches either. Many G4's have had recent OTA's to patch everything "known to date" (but will still require a new patch for the most recent findings)... I guess it's just Verizon being slow on updates as usual.
Stagefright framework seems to be like swiss cheese when it comes to remote attacks... thankfully companies like zimperium are on the case. But if I were a criminal enterprise.. I'd be focusing all my work on finding new remote attacks against the framework... it's probably the most effective remote attack to date.
Frightening isn't it?
Click to expand...
Click to collapse
Its frightening to know where it's being exploited, so much for privacy. That being said, how were the apps installed?
Assuming I was owned by an old hack
The first bug 1538 doesn't give you access to everything, just camera, mic and things.
Or am I wrong to assume that, and you actually more access with it?
Aaahh said:
Its frightening to know where it's being exploited, so much for privacy. That being said, how were the apps installed?
Assuming I was owned by an old hack
The first bug 1538 doesn't give you access to everything, just camera, mic and things.
Or am I wrong to assume that, and you actually more access with it?
Click to expand...
Click to collapse
not fully up on the chain of attacks possible with it to be honest... but pretty sure some of them can manage to get root... or at least system access... and from there you can do all sorts of things.
If I have to take a wild guess (and that's all this is)... I could imagine using a remote attack and gaining system/root access then downloading a compressed file containing a set of apps/scripts it wanted to install/run.. unzip.. install.. and does whatever it needs to. Kinda odd they weren't very stealth about it.. letting you see apps being installed on the homescreen.
Curious... what sort of apps were installed? And were they installed in data or in system?
autoprime said:
not fully up on the chain of attacks possible with it to be honest... but pretty sure some of them can manage to get root... or at least system access... and from there you can do all sorts of things.
If I have to take a wild guess (and that's all this is)... I could imagine using a remote attack and gaining system/root access then downloading a compressed file containing a set of apps/scripts it wanted to install/run.. unzip.. install.. and does whatever it needs to. Kinda odd they weren't very stealth about it.. letting you see apps being installed on the homescreen.
Curious... what sort of apps were installed? And were they installed in data or in system?
Click to expand...
Click to collapse
That's why I wasn't as frightened at first
They were stupid apps like knights of hearts and go90(what's this?) And rhysop something
Data
Aaahh said:
That's why I wasn't as frightened at first
They were stupid apps like knights of hearts and go90(what's this?) And rhysop something
Data
Click to expand...
Click to collapse
hmm go90 is a new verizon app coming out today. so maybe it was verizon pushing that. not sure on others.
https://www.go90app.com/
http://www.usatoday.com/story/tech/2015/10/01/verizon-launches-go90-mobile-video-service/73138654/
autoprime said:
hmm go90 is a new verizon app coming out today. so maybe it was verizon pushing that. not sure on others.
https://www.go90app.com/
http://www.usatoday.com/story/tech/2015/10/01/verizon-launches-go90-mobile-video-service/73138654/
Click to expand...
Click to collapse
I knew it sounded familiar, but I can't justify the other apps. II know g4 comes with games but not that rpshuo music player
The go90 didn't have a shortcut, too bad I erased it.
Anyone knows if turning off auto retrieve MMS is enough to protect my phone against the new stagefright hacks?
No?
I read this morning that T-mobile USA has been hacked and the hackers got data since Sept. 2013 lol.
Looks like they got some german IT specialists.
http://www.t-mobile.com/landing/experian-data-breach.html?icid=WOR_NA_CLRSKY_GP21HHC35JV3079
In the midst of an attack, what's the quickest way to stop it (airplane mode?) then a factory reset?
Sent from my LGLS991 using Tapatalk
Cozmos23 said:
No?
I read this morning that T-mobile USA has been hacked and the hackers got data since Sept. 2013 lol.
Looks like they got some german IT specialists.
http://www.t-mobile.com/landing/experian-data-breach.html?icid=WOR_NA_CLRSKY_GP21HHC35JV3079
Click to expand...
Click to collapse
This is completely unrelated to stagefright. The Tmobile hack is actually an attack on Experian..
bitbitbit said:
Anyone knows if turning off auto retrieve MMS is enough to protect my phone against the new stagefright hacks?
Click to expand...
Click to collapse
Anyone want to answer this question ?
---------- Post added at 09:01 AM ---------- Previous post was at 08:49 AM ----------
autoprime said:
the stagefright detector only detects what is patched so far as well... the link I posted mentions newer exploits not yet assigned CVE's and still no patch... and until patch is available from Google they won't have a fully up-to-date detector.
So even if OPO isn't vuln to what's currently being scanned.. it still may be open to others not yet able to be detected.
Of course that doesn't excuse Verizon from not keeping up to date on patches either. Many G4's have had recent OTA's to patch everything "known to date" (but will still require a new patch for the most recent findings)... I guess it's just Verizon being slow on updates as usual.
Stagefright framework seems to be like swiss cheese when it comes to remote attacks... thankfully companies like zimperium are on the case. But if I were a criminal enterprise.. I'd be focusing all my work on finding new remote attacks against the framework... it's possibly the most effective remote attack to date.
Frightening isn't it?
Click to expand...
Click to collapse
The main vector is still "specially crafted MP3 or MP4 files can lead to arbitrary code execution".
That was known back in April. So if you can prevent such files ending up on your device then there is no problem.
The way to do that AFAIK is disabling auto retrieve of MMS.
Sorry to hear man. Did it wipe SD card data too?
Sent From My LG G4
Nevermind, I got the answer.
bitbitbit said:
Anyone knows if turning off auto retrieve MMS is enough to protect my phone against the new stagefright hacks?
Click to expand...
Click to collapse
I dont think so, an attacker could lead you to a website containing specially crafted media files...
For more information on the stagefright vulnerability and the (un)likelyhood of getting hacked I found this article on Android Central:
http://www.androidcentral.com/stagefright
Reading through that, OP, it seems possible you could have picked up a virus somewhere that started downloading all that software. Have you ever downloaded or clicked on a link other than a trusted site?
FadeFx said:
I dont think so, an attacker could lead you to a website containing specially crafted media files...
Click to expand...
Click to collapse
Would it make a difference if I don't click on play? I guess I can't always tell if a media file has been tampered with, but at least if not playing the file can help, I can avoid doing that on sketchy websites.

Possibly way to unroot using the Drammer process?

I was reading about drammer and how they have tested multiple phones on unrooting them? could someone possibly get this to work on the S7? i know it wont lead to roms, and i have no clue if this is really helpful but i just wanted to ask. and to also inform them about the this new threat.
I tried posting the web link but im "new" (what i get for not posting as much) you can just google Drammer and it should come out it is also named Rowhammer bitflips
Enlighten us. What the heck is the drammer process? You introduced the subject so let us know exactly what it is and how it works. I don't want to search.
gaz189 said:
I was reading about drammer and how they have tested multiple phones on unrooting them? could someone possibly get this to work on the S7? i know it wont lead to roms, and i have no clue if this is really helpful but i just wanted to ask. and to also inform them about the this new threat.
I tried posting the web link but im "new" (what i get for not posting as much) you can just google Drammer and it should come out it is also named Rowhammer bitflips
Click to expand...
Click to collapse
Drammer roots phones, it doesn't unroot phones from what i've read....
I downloaded the apk to test if you are vulnerable and i didn't see any flips, so we may not be vulnerable. It's still too early to tell at this point...
Here is the link for the test app....
https://www.vusec.net/projects/drammer/
Also need to look in to the DirtyCow root process....
https://nakedsecurity.sophos.com/2016/10/25/dirtycow-linux-hole-works-on-android-too-root-at-will/
dkb218 said:
Enlighten us. What the heck is the drammer process? You introduced the subject so let us know exactly what it is and how it works. I don't want to search.
Click to expand...
Click to collapse
DylanTheVillian said:
Drammer roots phones, it doesn't unroot phones from what i've read....
I downloaded the apk to test if you are vulnerable and i didn't see any flips, so we may not be vulnerable. It's still too early to tell at this point...
Here is the link for the test app....
https://www.vusec.net/projects/drammer/
Click to expand...
Click to collapse
dkb: i will explain further when i am out of school and work.
and dylan that stress app is not used for unrooting it was simply a field test where they can see which phones can be compromised. but what i meant was in the same way they did can someone possibly look into developing a way. because if you scroll down they released the templating code. which they also mention they have not released it as a exploit but maybe they will and maybe from that code someone can compile a root maybe?
gaz189 said:
dkb: i will explain further when i am out of school and work.
and dylan that stress app is not used for unrooting it was simply a field test where they can see which phones can be compromised. but what i meant was in the same way they did can someone possibly look into developing a way. because if you scroll down they released the templating code. which they also mention they have not released it as a exploit but maybe they will and maybe from that code someone can compile a root maybe?
Click to expand...
Click to collapse
I'm not sure you know what you're talking about... you keep saying "unroot" that would be to remove root... the exploit roots phones and allows us to gain root not remove it....
And That is exactly what i said.... "I downloaded the apk to test if you are vulnerable and i didn't see any flips, so we may not be vulnerable."
DylanTheVillian said:
I'm not sure you know what you're talking about... you keep saying "unroot" that would be to remove root... the exploit roots phones and allows us to gain root not remove it....
And That is exactly what i said.... "I downloaded the apk to test if you are vulnerable and i didn't see any flips, so we may not be vulnerable."
Click to expand...
Click to collapse
sorry I am meaning root, just getting things mixed up, and yeah but they also stated not all device may be ticked at the same time, it can be when device is on low battery.. stuff like that. or simply we might be vulnerable, but we wont know till someone actually tries it out
DylanTheVillian said:
I'm not sure you know what you're talking about... you keep saying "unroot" that would be to remove root... the exploit roots phones and allows us to gain root not remove it....
And That is exactly what i said.... "I downloaded the apk to test if you are vulnerable and i didn't see any flips, so we may not be vulnerable."
Click to expand...
Click to collapse
Curious... How long did it run with you? I'm running it atm (its been over 45 mins) on aggresive and its still running... ..
djr4x4 said:
Curious... How long did it run with you? I'm running it atm (its been over 45 mins) on aggresive and its still running... ..
Click to expand...
Click to collapse
I didn't run on aggressive I left it at default and it didn't run for more than 2 minutes...
Is your device still responsive? Is the word flip or flips in any of the output on the screen?
Sent from my SM-G935U using Tapatalk
Still responsive and its still running.. the times i have glanced at it.. flips is still at 0.. its running right now and im using the phone to type this..
Sent from my SM-G935T using Tapatalk
---------- Post added at 05:56 PM ---------- Previous post was at 05:53 PM ----------
Just finished and showed 0 flips..
Sent from my SM-G935T using Tapatalk
So far, "Drammer," as the researchers have dubbed their exploit, has successfully rooted the following handsets: the Nexus 4, Nexus 5, and G4 from LG; Moto G models from 2013 and 2014 made by Motorola; the Galaxy S4 and Galaxy S5 from Samsung; and the One from OnePlus. In some cases, the results aren't always consistent. For example, only 12 of the 15 Nexus 5 models were successfully rooted, while only one of two Galaxy S5 were compromised.
Click to expand...
Click to collapse
ref: http://arstechnica.com/security/201...tflips-to-root-android-phones-is-now-a-thing/
It's not even a sure bet with the Samsung phones two generations ago. So I doubt that it'll work.

Oreo 8.1 rom Ok Google function.

Hi
As most of us all know that oreo roms are stable and giving good results.but all roms lack Ok Google feature when screen is off.and no one seems to fix it i wonder is it because its difficult or simply because people don't find it compelling enough.
What if i wanted to fix this issue? What would be a good start in the right direction?
Also if any one knows or has info that can help please share.
Thanks
Sanabil said:
Hi
As most of us all know that oreo roms are stable and giving good results.but all roms lack Ok Google feature when screen is off.and no one seems to fix it i wonder is it because its difficult or simply because people don't find it compelling enough.
What if i wanted to fix this issue? What would be a good start in the right direction?
Also if any one knows or has info that can help please share.
Thanks
Click to expand...
Click to collapse
My Moto Z Play on 7.1.1 does not have "OK Google" with screen off and it's completely stock. Is there an example of a phone with "OK Google" working with the screen off?
Guapo613 said:
My Moto Z Play on 7.1.1 does not have "OK Google" with screen off and it's completely stock. Is there an example of a phone with "OK Google" working with the screen off?
Click to expand...
Click to collapse
Bro almost all nexus phones have this functionality to activate Ok Google from screen off. I do not know about other manufacturers though but i think it can be turned on in most phones via voice or assistant settings.
Sanabil said:
Hi
As most of us all know that oreo roms are stable and giving good results.but all roms lack Ok Google feature when screen is off.and no one seems to fix it i wonder is it because its difficult or simply because people don't find it compelling enough.
What if i wanted to fix this issue? What would be a good start in the right direction?
Also if any one knows or has info that can help please share.
Thanks
Click to expand...
Click to collapse
I haven't fixed it for LineageOS, because I didn't know where to start.
Additionaly it's not very important for me.
Elektroschmock said:
I haven't fixed it for LineageOS, because I didn't know where to start.
Additionaly it's not very important for me.
Click to expand...
Click to collapse
Oh i see ? well in that case what do you suggest?
may be this feature is useful for some, like myself.
And it will be nice to see it in !
Sanabil said:
Oh i see well in that case what do you suggest?
may be this feature is useful for some, like myself.
And it will be nice to see it in !
Click to expand...
Click to collapse
My suggestion?
Fix it
I know this isn't very helpful, but I really don't know what changed with O and why it isn't working any more.
Perhaps you can start to find out why shamu's custom TriggerTraining.apk isn't launched anymore like it used to be on N.
Elektroschmock said:
My suggestion?
Fix it
I know this isn't very helpful, but I really don't know what changed with O and why it isn't working any more.
Perhaps you can start to find out why shamu's custom TriggerTraining.apk isn't launched anymore like it used to be on N.
Click to expand...
Click to collapse
:laugh: ok let's see.
Elektroschmock said:
My suggestion?
Fix it
I know this isn't very helpful, but I really don't know what changed with O and why it isn't working any more.
Perhaps you can start to find out why shamu's custom TriggerTraining.apk isn't launched anymore like it used to be on N.
Click to expand...
Click to collapse
You see i am no developer, but i see your statement gives hints and certain clues to what to look for. ?
I searched and found a thread on xda from 2016 , Op was suggesting to modify build.prop via text editor , so changed device name to pixel xl , finally rebooted
AAAaanddddd
It didn't worked ?
Back to more searching,
Sanabil said:
I searched and found a thread on xda from 2016 , Op was suggesting to modify build.prop via text editor , so changed device name to pixel xl , finally rebooted
AAAaanddddd
It didn't worked
Back to more searching,
Click to expand...
Click to collapse
If it was that easy it would have been fixed already.
Elektroschmock said:
If it was that easy it would have been fixed already.
Click to expand...
Click to collapse
Can i ask you something?
All the devs who put out such ROMs can't they just debug or know where code requires modification.??
Also do you know a coder or dev that you think has a chance of doing it.
Thanks
Sanabil said:
Can i ask you something?
All the devs who put out such ROMs can't they just debug or know where code requires modification.??
Also do you know a coder or dev that you think has a chance of doing it.
Thanks
Click to expand...
Click to collapse
I don't know what you think who those devs are. I did the oreo bringup for shamu, but I am a hardware developer and my software skills are very limited.
Additionally all devs do it in their free time and for fun. If a feature is not implemented or not fixed then there is a high chance that nobody is interested or able to fix it.
If you want it working then you should learn to debug and to code.
Elektroschmock said:
I don't know what you think who those devs are. I did the oreo bringup for shamu, but I am a hardware developer and my software skills are very limited.
Additionally all devs do it in their free time and for fun. If a feature is not implemented or not fixed then there is a high chance that nobody is interested or able to fix it.
If you want it working then you should learn to debug and to code.
Click to expand...
Click to collapse
Bro i meant no disrespect to any dev who do such work, i appreciate their hard work . I also realize that they take special time to do such work.I didn't knew much about how its all done. But since you explained, i thank you.
And i think as you mentioned i will look into it myself. :good:
Today i used nokia 6.1 with Android Oreo 8.1 , i checked its assistant and to my surprise it too did not supported ok Google function with screen off.
So my guess is that its more of an Android 8.1 change , they have limited this functionality to certain phones.
This means it is not a bug, and needs some custom coding or programming/modification to make it work again .
Well i think i am isolated but i shall continue to find what ever i can and post .
I read on Reddit post of this problem and a user posted build prop trick where one tricks the Nexus 6 into thinking its a pixel device.
I tried but it didn't worked and also camera app crashed too. Voice match remains greyd out , it did how ever at first showed sign that its working but nope upon real testing it failed.
I then tried switching name to nexus 6p and it enabled one option which was previously greyd out, it allowed me to record and voice and asked for pin to use voice match but then disabled 'use ok google from any screen' option. .... and camera was not working too..
Is it the right direction? perhaps..perhaps not.
Update:
This issue is definitely from Google's server side, the voice match issue is not present on nexus 5 and nexus 7 tablet. here is a thread of ongoing discussion.
https://productforums.google.com/forum/#!topic/nexus/0GmbO8FgvQg;context-place=forum/nexus
I think Google decided to ditch ok Google screen off functionality altogether from Nexus 6. There tech team never responded to the complaints mad by users. So it's kinda dead now.
Sanabil said:
I think Google decided to ditch ok Google screen off functionality altogether from Nexus 6. There tech team never responded to the complaints mad by users. So it's kinda dead now.
Click to expand...
Click to collapse
I've been looking for a solution to this. I spent a weekend last month flashing various 8.1 and 7.1.X roms and trying to renable it. Same story every time. Apparently Google's just decided we don't get to use this feature anymore. I'm gonna start playing with other assistants (Cortana, Alexa, Hound, Autovoice) and see if any work like we want Assistant to.
lpjunior999 said:
I've been looking for a solution to this. I spent a weekend last month flashing various 8.1 and 7.1.X roms and trying to renable it. Same story every time. Apparently Google's just decided we don't get to use this feature anymore. I'm gonna start playing with other assistants (Cortana, Alexa, Hound, Autovoice) and see if any work like we want Assistant to.
Click to expand...
Click to collapse
I wish you best of luck bro . ?
Has anyone tried this on a 100% stock, unrooted device? I got Google One for being a good Local Guide, and Google Customer Support says root may cause this. I'm going to try Magisk Hide and report back.

Categories

Resources