Related
hello, i am new to the rooting scene and droid. i have the AT&T S4 and i would like to remove all this crap that AT&T loads on the phone. i would also like to know that if i root my S4 can i use my sdcard to install apps to since the default "8gb" might not be enough so i bought a 32gb sdcard. please advise, i don't even know if this is the purpose of rooting a phone or not, sorry it its a dumb question.
Thanks
Well you're not new to xda. This belongs in Q&A, not development.
Sent from my SAMSUNG-SGH-I337 using Tapatalk 2
how do i move this to the correct area. i am not new to the forum new to droid. i many years ago i had a htc 6800 for verizon i used to "cook" roms for.
plwalsh88 said:
Well you're not new to xda. This belongs in Q&A, not development.
Sent from my SAMSUNG-SGH-I337 using Tapatalk 2
Click to expand...
Click to collapse
LilSnoop40 said:
how do i move this to the correct area. i am not new to the forum new to droid. i many years ago i had a htc 6800 for verizon i used to "cook" roms for.
Click to expand...
Click to collapse
You can click on the triangle in the upper right corner of the post, and report to a moderator for moving/maintenance. I already reported it for you.
Please read forum rules before posting
Questions and help issues go in Q&A
Thread moved
Thank you for your cooperation
Friendly Neighborhood Moderator
Development is only for developers to post work
LilSnoop40 said:
hello, i am new to the rooting scene and droid. i have the AT&T S4 and i would like to remove all this crap that AT&T loads on the phone. i would also like to know that if i root my S4 can i use my sdcard to install apps to since the default "8gb" might not be enough so i bought a 32gb sdcard. please advise, i don't even know if this is the purpose of rooting a phone or not, sorry it its a dumb question.
Thanks
Click to expand...
Click to collapse
It seems nobody has answered this, only moved your thread around. ^_^
In short, rooting just allows you to do things to your phone that normally would be against the manufacturer's/carrier's intent. One such example would be to remove carrier-added bloatware that is otherwise not removable. I personally use root for the following:
Titanium Backup Pro: This would let me backup my apps AND data for each app. Google does a decent job at backing up most my apps, but if I "sideload" an app (install from a different source other than the Play Store), I can back it up also. Plus Google doesn't always backup the DATA part of an app, which can be important for me (e.g. an authenticator, or RSA token for work). In addition, TiBu also allows you to easily "freeze" the bloatware, which prohibits it from running or showing up anywhere. This is usually a better option than completely uninstalling it, because it's usually much easier to recover from de-bloating the wrong bloat.
AdFree: An advertisement blocker. Typically Root is required to do this properly, as it modifies the "hosts" file on your android. In the end, it overrides your phone's DNS such that when an app or webpage requests data from a known advertising website, the phone will redirect the request to "nothing", and the ad will not show. Use with discretion - some people frown upon this because they "lose" revenue from the ads that are not shown. I won't comment further, fearing I'll start a verbal war here.
Greenify: Allows you to put certain apps to sleep while they are not being actively used. I use it for Facebook Messenger, because I've found that if this app is allowed to run in the background, it kills my battery. I leave Facebook running in the background, so that I'll still get notifications of new FB messages. Seems to work out for me well.
"Some Tethering Applications or Methods": Some of the better ways to tether/hotspot from your phone will require root. Again, I'll leave this one lie. Personally, I rarely use it, but I've been in a bind before without internet access, and I've needed to use it. I don't want to lose my unlimited data with AT&T, so I really have no choice to add a tethering plan anymore. Regardless, it's nice to know I have it available as an emergency option.
While I could recommend the root, I also have to warn you that this will effectively void your Warranty. There's ways (read through the forums here) to "hide" the root, by using SuperSU instead. But just be forewarned.
EDIT: Here's the link to the thread with the video - How to Root & Remove Unlock Icon & Unroot
First thing's first; learn correct terminology. The Galaxy S4 is certainly not a Droid phone. "Droid" is a term used by Verizon to attempt to label and unify their line of Android phones. "Android" is the name of Google's open-source mobile OS.
LilSnoop40, I got your private message, but I'm going to post some stuff here on this thread for everyone to see, just in case there are others that need some help with the rooting as well. Here goes:
The actual part of rooting your device is not too difficult using "Motochopper". The hardest part is just getting ADB setup and your phone recognized in ADB. For the Motochopper root and a basic outline of how to do the root, see this thread:
http://forum.xda-developers.com/showthread.php?t=2252248
Some recommendations:
- Be sure the phone is in USB Debugging mode. You'll have to enable the Developer options first. Let me know if you need help with this part. IT involves repeatedly clicking something in Settings to enable Dev options, and then there's just a checkbox to check after that to enable the debugging mode. This is "Step 3" in that thread I linked.
- Be sure you have the latest samsung drivers for your phone. There's a few threads around here that have JUST the drivers, and not the whole Samsung Kies software package (completely unnecessary!). If you can't find them, I'll see if I can search around and provide a link. This is "Step 2" of the thread.
- If you're in Debugging Mode, the drivers should also being installed for the "ADB device" - I forget the actual name of it, but it's a device on your computer that says something about ADB. This will only appear when you have the phone in debugging mode of course.
- super-important: When you run the root/hack/motochopper thing, you'll be prompted on your device to allow the ADB connection. It will say something about accepting a certificate or something like that. If you don't respond in 10 seconds, it will deny it, and the root will fail. This is "step 6" on the thread I linked.
Also, if you manage to do all this successfully, you'll see that the root was successful, and you'll have a new app on your phone: Superuser. This new app is what allows you to approve root access by other applications (more-or-less). A side-effect of having this app installed will be that the system will detect the presence of root, and when you boot your phone, it will show an open padlock and "custom". If you follow my basic instructions in this post, you can get rid of that.
Feel free to ask for any clarifications, etc. I'll try to be as helpful as possible.
First android phone I've owned since coming from years of iPhones, does the recent update that I downloaded affect the ability to root the device? I keep seeing people talking about versions but I don't see the numbers that they are saying so not sure what to look at, or if it matters at all? Will this work on any quadcore S4?
Skattered said:
First android phone I've owned since coming from years of iPhones, does the recent update that I downloaded affect the ability to root the device? I keep seeing people talking about versions but I don't see the numbers that they are saying so not sure what to look at, or if it matters at all? Will this work on any quadcore S4?
Click to expand...
Click to collapse
Short answer: No, the update won't affect your ability to root.
What carrier do you have? For the basic model number, you can read the label that's under your battery. The AT&T version, for example, will read: "SGH-I337". You can also get very specific information about your phone, the model number, build number, etc. bu doing the following: Go to Settings -> More... (The "Build number" is probably the numbers your looking for.)
If I'm not mistaken, the Motochopper root works on all I337 models?
Okay sweet, it is a 1337 (guess the signature tells me that too) and its on at&t
Sent from my SAMSUNG-SGH-I337 using Tapatalk 2
My Galaxy 1 was stolen from me in Feb, after that i went through a lent s3 and now proud owner of an s4 (i9500).
So i have two questions on this:
1) is there an equivalent for what a bios password is in a PC?
(have to go short something in hardware to bypass, only is asked upon powerup/hard reboot).
2) Is is technically possible for an app to lock on custom sim? (possibly modifying efs folder)
Thanks!
Abrojo said:
My Galaxy 1 was stolen from me in Feb, after that i went through a lent s3 and now proud owner of an s4 (i9500).
So i have two questions on this:
1) is there an equivalent for what a bios password is in a PC?
(have to go short something in hardware to bypass, only is asked upon powerup/hard reboot).
2) Is is technically possible for an app to lock on custom sim? (possibly modifying efs folder)
Thanks!
Click to expand...
Click to collapse
http://bit.ly/174zPh6
LeJolly said:
http://bit.ly/174zPh6
Click to expand...
Click to collapse
Thank you for patronizing me but that didnt answer my question, already been through pages of results when i previous galaxy was stolen (even tried locking from google play). None of the apps listed on a google search for locking and tracking do what i ask.
Centralized cloud based locking doesnt work (a blacklisted imei can get reinstated fairly easy), neither does the standard password Operating System level password.
Thats why i am asking for specific alternative ways of locking the phone that should be (if possible) more tampering resistant.
1) bios equivalent password.(requiering hardware shorting to bypass)
2) custom simlock
I use avast! free mobile security (https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity&hl=en),
the anti-theft module has option to block the phone if the sim card is changed
LeJolly said:
http://bit.ly/174zPh6
Click to expand...
Click to collapse
What a woeful answer. Try reading before you be a ****.
In answer, no there is nothing similar to a BIOS lock on Android phones, however like mist813 said, Avast is quite good. If you have root access you can install it as a system apk then even if the thief wipes your phone, it's still there.
You could also try lookout its free. Can do tracking, remote wipe and also takes a photo of anyone trying to unlock your phone.
I don't think there is anything that can prevent someone from just flashing a new firmware and wiping the phone completely.
Sent from my Nexus 10 using Tapatalk 2
I don't think there is an equivalent to BIOS lock in Android. I'm not sure if you tried Lookout or the native Samsung remote control under security settings. Both gives you the options to locate, lock, scream or wipe your data. I tried the locate and scream options and they work. Never tried lock or wipe, but they should also work! Now going to the fact of wether someone can bypass or overcome these security measures, then I personally think it's possible and whatever we do he can find a way to go around it depending on how smart and resourceful he is! If my phone is stolen, frankly speaking I won't waste my time trying to find it or just lock it. All what I'll care about is to wipe the data off, and hopefully these softwares will work if needed!
Sent from my SGS IV using Tapatalk 2
Abrojo said:
Thank you for patronizing me but that didnt answer my question, already been through pages of results when i previous galaxy was stolen (even tried locking from google play). None of the apps listed on a google search for locking and tracking do what i ask.
Centralized cloud based locking doesnt work (a blacklisted imei can get reinstated fairly easy), neither does the standard password Operating System level password.
Thats why i am asking for specific alternative ways of locking the phone that should be (if possible) more tampering resistant.
1) bios equivalent password.(requiering hardware shorting to bypass)
2) custom simlock
Click to expand...
Click to collapse
Okay lets not be a **** this time.
1) There's nothing equivalent to that bios thing
2) http://stackoverflow.com/questions/...-the-device-on-removal-of-sim-card-or-sd-card
There are also apps that just notify you if sim card is changed for example this https://play.google.com/store/apps/details?id=instigate.simCardChangeNotifier&hl=fi
And of course there are some apps that let you remotely control your phone for example http://forum.xda-developers.com/showthread.php?p=7567932
Abrojo,
You don't really need a third-party app for this.
Please check out the Samsung Dive service. (www.samsungdive.com)
You can track your phone, lock it with a custom password, sound an alarm, etc...
The problem is, the phone needs to have Internet access.
I am using the Cerberus app (https://play.google.com/store/apps/details?id=com.lsdroid.cerberus&hl=en)
This is the best rated Anti-theft app you can find for your Android.
a license costs 3USD if I remember correctly. With one license you can secure up to five Android phones.
Featuers:
Track your phone
Remote lock
Remote wipe
And a lot more options...
A couple of things that I think are extremely useful:
When a wrong password or pattern is drawn to unlock your phone, a picture is taken with the front camera and emailed to you together with the location of the phone.
When the SIM is swapped, you can configure up to three phone numbers that will receive an SMS with the new SIM card number and the location of the phone.
You can hide the app from the App Drawer.
Check it out... very useful
i use also cerberusapp 4 years now. everything is perfect. when u install as system app u can do everything.
Sent from my ThL W8 using xda premium
Apparently there is also rumors of LoJack already being built into these phones, with the possibility to activate it some time in the near future. Don't remember all the details, but I just read an article about that. Not being patronizing when I say it, but Google Galaxy S4 LoJack and look into it.
Also, I am on Verizon, and am testing out their mobile security app that is preinstalled. It's $1 a month, but they allow you to remotely lock your phone, wipe it, and track it should you lose it. I don't believe it embedded at the hardware level, but it is something that gives me a little piece of mind.
Edit: I went to switch to the Norton Mobile Security app, since I use it for all of my other devices, and discovered that the Verizon Mobile Security App - once activated - cannot be uninstalled, force stopped, you cannot clear the data, and you cannot disable it. In order to do so, I first have to go into my Verizon account online, sign in, and unsubscribe from the service. After realizing that, I have chosen to keep the Verizon security app, because it has that extra layer of security. Are there ways of bypassing that, I'm sure there are. But assuming that my phone is stolen by some low level thief and not some crazy high level criminal circuit, I should have no problem retrieving it.
Samsung Dive down?
I cant seem to have this page load up www.samsungdive.com
Is it down for you too?
Sm007hCriminal said:
I cant seem to have this page load up www.samsungdive.com
Is it down for you too?
Click to expand...
Click to collapse
It's working with me.
Sent from my SGS IV using Tapatalk 2
First of all, forgive me if this is not the right forum to ask this question, because I'm not sure what is.
Hi everyone,
So the company that provides the TV channels in my country (like the cable companies in the US) has a streaming service that streams most of these channels online to phones, tablets, computers.
The problem is that their app is, according to them "not supported on hacked devices". Just so we're clear, we're talking about Android here, and hacked = root/custom rom, which this stupid company considers illegal. In some devices, they check both root and custom rom, in some only one of them, and in some the app will work even if you have both. For example, on my Nexus 4 the app worked with stock rom that was rooted. Now that I am running a custom rom, trying to hide root using various apps does not work. So obviously the problem, with my device at least, is running the custom rom.
I'm currently learning Java & Android development and have decided to use the little knowledge that I have to try to find the lines of code responsible for this idiotic check.
I looked up many tools for decompiling apps and have finally found a good one, called JadX.
http://androidcracking.blogspot.co.i...ler.html#links
This decompiler is excellent, but gives me a scary amount of code files to look. Even so, trying to search all of them (JadX has that functionality) for the code that checks for root/custom rom has turned up nothing. I have also tried to search for the message they give me when I open the app (about hacked devices not working) but I found nothing, again.
One more thing - a developer that also tried to solve this problem said he traced the problem back to DxDrmDlcCore. I searched it, found it a some class, but not sure what to do now (delete the entire class and recompile?)
Can someone here direct me towards what I need to be looking for?
OR
Is the solution really simple, such as editing my build.prop? Someone suggested it once, but did not know what lines to edit.
If someone is ready to step up to the challenge, I can upload the apk.
Thank you!
Noticed on my samsung device that is slowing down that this is running/trying to keep open network communications.
Sounds like one of those things I dont use. How to stop it?
Is it a system app or thrid party app.
you do not give enough information so we can tell you how to remove or disable it.
there is no more info, it isnt an "app" i can find persay, but a process running with a suspicious name, and its probably system as many other threads seem to think it is.
you can stop it but you may have to root your phone. As you know rooting will void the warranty.
you will need access to the system files to disable.
I do not know if you can access it without rooting.
cant root samsung devices that are locked down or i wouldn't be wasting my time on here.
so what is this garbage and how did it get turned on in the first place?
might be the face recognition for the camera take?
I know this thread is a few months old, but did you ever find more info on FaceProvider? From what I've read, it's definitely a system thing (not sure if it's a legit app) and it isn't anything suspicious. I guess it's something exclusive to Samsung devices, because Sammy owners seem to be the only ones that talk about it. I read in another thread that it may control certain stock gallery functions, and disabling it may make your gallery app act funny. You should be good if you use a 3rd party gallery app, though. The reason I'm interested in FaceProvider is it supposedly allows certain apps to block screenshots. Apparently if you disable or enable FaceProvider (the thread wasn't clear which) you can bypass screenshot blocks. However, I'm running a custom rom on my rooted Note 5, and I don't see that I have FaceProvider anywhere on my device. So I'm trying to find a way to download and install it. Just thought I'd share what I know about it with you, and ask if you've learned anything about it.
I Came across an interesting YouTube video(actually 2 videos of the same phone) of a way to remove frp from a Google Nexus running Nougat 7.0/7.1.1 using Termux and terminal emulator along with Dirtycow and Gam6-7.1.1 apk files. The video itself is in Portuguese according to YouTube auto translate, but with careful study and pausing its pretty straight forward. Now the ZTE Blade Z max z982 is no Nexus for sure but being this is a tutorial using Termux apk and terminal emulator apk to remove Google frp 7.0-7.1.1. (Blade Z Max comes out of box with 7.1.1.) I figured I'd give it a shot after multiple attempts to access without any computer as the everyday device user has basic computer knowledge and relies on step by step video tutorial to work into their device. Now this does require having the Z982 bypass the setup wizard which I'm sure if you have been searching for a way back into your device after forgetting your email password or if you bought second hand (like myself) and the previous owner incorrectly reset the device before selling you probably already know this method. If not a simple YouTube search will turn up results as to how to do that. So with all necessary downloaded files I gave it a shot. Worked flawlessly even let me install GAM6.apk.Worked well up until the part where he hit the disable option on Google Account Manager (16:48 in video) 3 times and the icon changed to a sdcard icon and read "com.google.android.gsf.login". Now I think this guy is pretty clever with this method but I'm clueless as to how he was able to do exactly what he did at that point in the video. I am not sure if this has been fixed by a patch. I am patched at August 1 2017. Also it dosent clarify the chipset but am quite sure the Nexus runs Qualcomm and not MTK, as does the Blade. I translated the page to read a few comments and the main issue seemed to be the same issue I'm facing. I do know that "com.google.android.gsf.login" is the key step in the list of activities that GAM performs upon startup that is blocked until previous email and password are provided and permissions are granted to that particular activity. I was hoping that a more experienced member or user familiar with system level apps and privileges could make sense of what exactly he has done in the video as I am a intermediate user and I am still learning Android systems and using developer tools. If anyone has any knowledge with these core level apps and could possibly figure out a work around or contribute to what he has done with the Nexus phone I'm positive this would be very helpful to Z982 owners and Nougat users across all devices as I'm sure with this method the phone is 95% the of the way through a successful "no computer needed" bypass method. This is by no means a walk in the park for the everyday user and will require some knowledge and a bit of research to complete the tutorial for those who may come upon this post and decide to try. I do know of methods to bypass this issue but have dedicated my time and research to finding a handset method only as this would help many z982 owners immensely. This is intended for the rightful owners of this device and all devices applied who may have forgotten their gmail password or for those who purchased second hand or obtained legally and the previous owner incorrectly reset the device and can't be contacted. This is NOT intended for the use by thieves who obtain phones through deceptive measures. I do not condone any illegal activity and may karma find you when you least expect it for those who partake in such activities! The video is pretty lengthy not in English and be prepared to use the pause button numerous times unless your advanced and are familiar with Termux and terminal commands. Also using the Blade Z Max meant a few small steps had to be changed in order to get the files to copy to Termux. For this I suggest using the storage tab in settings/phone/used space/other and hit explore and find download folder which will allow you to copy gam6.apk and Dirtycow fIle(unzip first) into Termux. Hopefully we will find a solution to this problem for this device for those who have no or limited computer access or knowledge of flashing and firehose files and more advanced removal methods. I'll keep hunting and researching and will update upon discovery of a successful method. Links are posted below.
Edit: Being this is my first post and Im noob status I cannot offer links to the videos.
The videos you want to see are posted by Mcbo Unlock
-How to remove Google FRP lock on Nexus 6 6p 5x Android 7/7 1 1-
How to remove Nougat Google frp lock on Nexus 6 6p 5x Android 7/ 7 1 1
Search both or find his page.
To get the required files type "Gam7.apk" in Google search bar and select "rootjunkys index of/files/apps/Android 7.0" (should be second search option from top).
You will need:
-gam6.apk
-gam7.1.apk(or 7 depending on android version)
-terminal.apk
-termux.apk
-Dirtycow.zip
-com.rootjunkyfrp bypass.apk
Spacebaby said:
I Came across an interesting YouTube video(actually 2 videos of the same phone) of a way to remove frp from a Google Nexus running Nougat 7.0/7.1.1 using Termux and terminal emulator along with Dirtycow and Gam6-7.1.1 apk files. The video itself is in Portuguese according to YouTube auto translate, but with careful study and pausing its pretty straight forward. Now the ZTE Blade Z max z982 is no Nexus for sure but being this is a tutorial using Termux apk and terminal emulator apk to remove Google frp 7.0-7.1.1. (Blade Z Max comes out of box with 7.1.1.) I figured I'd give it a shot after multiple attempts to access without any computer as the everyday device user has basic computer knowledge and relies on step by step video tutorial to work into their device. Now this does require having the Z982 bypass the setup wizard which I'm sure if you have been searching for a way back into your device after forgetting your email password or if you bought second hand (like myself) and the previous owner incorrectly reset the device before selling you probably already know this method. If not a simple YouTube search will turn up results as to how to do that. So with all necessary downloaded files I gave it a shot. Worked flawlessly even let me install GAM6.apk.Worked well up until the part where he hit the disable option on Google Account Manager (16:48 in video) 3 times and the icon changed to a sdcard icon and read "com.google.android.gsf.login". Now I think this guy is pretty clever with this method but I'm clueless as to how he was able to do exactly what he did at that point in the video. I am not sure if this has been fixed by a patch. I am patched at August 1 2017. Also it dosent clarify the chipset but am quite sure the Nexus runs Qualcomm and not MTK, as does the Blade. I translated the page to read a few comments and the main issue seemed to be the same issue I'm facing. I do know that "com.google.android.gsf.login" is the key step in the list of activities that GAM performs upon startup that is blocked until previous email and password are provided and permissions are granted to that particular activity. I was hoping that a more experienced member or user familiar with system level apps and privileges could make sense of what exactly he has done in the video as I am a intermediate user and I am still learning Android systems and using developer tools. If anyone has any knowledge with these core level apps and could possibly figure out a work around or contribute to what he has done with the Nexus phone I'm positive this would be very helpful to Z982 owners and Nougat users across all devices as I'm sure with this method the phone is 95% the of the way through a successful "no computer needed" bypass method. This is by no means a walk in the park for the everyday user and will require some knowledge and a bit of research to complete the tutorial for those who may come upon this post and decide to try. I do know of methods to bypass this issue but have dedicated my time and research to finding a handset method only as this would help many z982 owners immensely. This is intended for the rightful owners of this device and all devices applied who may have forgotten their gmail password or for those who purchased second hand or obtained legally and the previous owner incorrectly reset the device and can't be contacted. This is NOT intended for the use by thieves who obtain phones through deceptive measures. I do not condone any illegal activity and may karma find you when you least expect it for those who partake in such activities! The video is pretty lengthy not in English and be prepared to use the pause button numerous times unless your advanced and are familiar with Termux and terminal commands. Also using the Blade Z Max meant a few small steps had to be changed in order to get the files to copy to Termux. For this I suggest using the storage tab in settings/phone/used space/other and hit explore and find download folder which will allow you to copy gam6.apk and Dirtycow fIle(unzip first) into Termux. Hopefully we will find a solution to this problem for this device for those who have no or limited computer access or knowledge of flashing and firehose files and more advanced removal methods. I'll keep hunting and researching and will update upon discovery of a successful method. Links are posted below.
Edit: Being this is my first post and Im noob status I cannot offer links to the videos.
The videos you want to see are posted by Mcbo Unlock
-How to remove Google FRP lock on Nexus 6 6p 5x Android 7/7 1 1-
How to remove Nougat Google frp lock on Nexus 6 6p 5x Android 7/ 7 1 1
Search both or find his page.
To get the required files type "Gam7.apk" in Google search bar and select "rootjunkys index of/files/apps/Android 7.0" (should be second search option from top).
You will need:
-gam6.apk
-gam7.1.apk(or 7 depending on android version)
-terminal.apk
-termux.apk
-Dirtycow.zip
-com.rootjunkyfrp bypass.apk
Click to expand...
Click to collapse
You should do your research more thoroughly before promoting methods. None of those files (except for the frp-bypass.apk) are rootjunky's, and the method isn't his either. I discovered the dirtycow method, and I released it for free on YouTube for everybody to use as they wish and the only thing I asked in return was the credit for finding it. This is just clear evidence that I should have branded the method and charged everybody instead.
Also please PM me the URL for both of the videos you found on YouTube in other languages, guarantee they're just reuploads of my content and I'd like to copyright strike them.
The post was meant to possibly spark ideas and gain input on a method that would cover all devices. All of us in the Android community thank you for your Discovery and contribution of the dirty cow method we really do.. But excuse and forgive me for coming across one person's video of your hijacked method before finding you or your original method first! I'm trying to help people out and if my failed attempt at trying to bypass what has now become a 6 months long frp project, generates and Sparks a new idea at attacking and approaching this issue, then it's progress logged! I can unlock and bypass it in less then 10 seconds and have dedicated my device and purposely hard reset it to try and find a way for the public who can't afford the tools I have at my disposal. The files I came across were all on this guy's YouTube. I'm passing along info not performing research for a 6th grade science project let alone tracking down the founder of the method being used. But now that I'm informed and armed with this new information I'll be sure to mention you any time I refer to the dirty cow method, anywhere in the online community. I'll gladly pm you the links.
Have to figured this out yet and found a solution for the ZTE?
Uniandroidtool can do it, it costs $50 but it's worth it. It can bypass FRP on many phones. I would do it for you but remote support is not currently available.
Sent from my Z982 using Tapatalk
please help
Can anyone help me with this FRP Unlock. literally nothing i have done, no video has cracked the case on this zte Blade Zmax, running 7.1.1. i really dont want to be out the money on this damn phone.
I too am stumped on this one and the z983. I havent tried any hardware yet just the usual and some new methods. No luck though. I cannot seem to find a way to get usb debugging enabled. Anyone had any luck here?
Follow this discord link and remove z982 frp
Follow this discord link https ://discord.gg/ and find me. will remove z982 frp after you have purchased UniAndroidTool license.
close the space between s and colon
I'm stumped as well.
I have a FRP locked ZTE Z982, I am able to get passed google sign in, and into my launcher. But can not enable developer settings.
I've disabled the Device Admins, Also Google apps. Still no luck.
Phone is encrypted , Any ideas guys ? ( Besides $50 app , which is very worth it )
Inbox me on FB. Do not add me. I'll send you the link to unlock the phone. . just did mine. FB. Com /x0joe
That's a zero in the url
Finally!!?!
Well here ya guys go, a free bypass method! Even more startling, seems like it's discovered by a 10 year old..
Nice work kid!
By the way, just a heads up, the kid goes pretty fast, but he walks you thru all the steps so watch carefully.
I verified it works, good luck.
https://youtu.be/HF9GO8XOSGQ
Method Failed
This failed for me. I can get the credentials moved over but when I go through the setup the lock is still there. I figured out that the credentials are copied over, a new user is being created in my case, and the original account is still there. . I can get to settings but I cannot enable developer move because is says I'm not the primary user. Maybe I missed a crucial step but I don't know what.
Joe
This
[]So I followed this guy's way the first time but I figured out my security patch was newer than his. So I did everything just like he did.
https://youtu.be/HF9GO8XOSGQ
Once I copied my account it kept sending me into a loop saying I still haven't verified and took me back to step one. So after so I factory reset wiped partition cash i connected wifi enabled copied account from other device went back to talk back went to talk back settings made the L gesture and paused feedback in menu then scrolled down to help on talk back settings and clicked first help topic clicked to play video then hut the clock button on the video bringing up chrome didn't sign in unchecked feedback then in the address bar I typed
https://latrelljennings.weebly.com/download-center.html
Scrolled down and downloaded the two files for ZTE and boom went through all the settings disabled administrators unchecking crap that could sync. I threw my sim card in unlocked device for any network restarted booted like normal updated phone using it now to type not using the launcher 3 app tho using Nova launcher.
ZTE blade max 982
My thoughts as well
Talysdaddy said:
Well here ya guys go, a free bypass method! Even more startling, seems like it's discovered by a 10 year old..
Nice work kid!
By the way, just a heads up, the kid goes pretty fast, but he walks you thru all the steps so watch carefully.
I verified it works, good luck.
I concur , Yes it was very startling Yet amazing in the same breath Beings That it didn't seem like it were a 10 year old kid It worked Perfectly for me After slowing the play speed down on the video And pausing Throughout so As to be able to follow each step accordingly . Very good job kid!! I have been fighting With this phone for many many Months Now As well as purchasing A different phone
Click to expand...
Click to collapse
i followed the kid a well and it worked 100%
Joeyhoey z982 ftp bypass
I can't find your fb. Link can you please help me with my z982 my fb is profile.php?id=100014628257142[/url]
It is pretty easy using uni android tools. Put into EDL mode then remove..
Manual Method: Ill post my guide on here soon when i get a minute to finish the phone.
Other Methods: Try searching techeligeble