I recently just wipe did a factory reset on a encrypted (factory encryption) Galaxy S3, after rebooting it i have found that i am unable to get past the initial password prompt screen. I have tried to flash stock ROM, multiple times, to no avail as after each reboot i get the same password prompt screen. i have tried to flash custom ROM, multiple times, this to to no avail as it will not even go onto the device through push in Samsung toolkit v7 or slideloader. i have wiped the ROM to the point of nothing being on the phone and re-installed the factory ROM again this to with not avail as it still has the password screen. Now before i go back to t-mobile and see if they will help me, i decided to get community input to see if there is anything that can be done outside of the Factory as i have void warranty using Samsung Galaxy S3 Toolkit v7.
******UPDATE******* for those with similar problem, i just fixed this. Issue is as follows with possible fix action:
Issue was that encrypting the Samsung Galaxy S3 with the factory encryption and then wiping the system will cause the password file to be deleted but the encryption to stay on the phone. My fix action was that download original ROM from the provider, delete existing ROM on phone till it is basically a brick with USB debugging on and re install the original providers ROM. After it is re install you have to go in and wipe the phone's data one more time. This resulted in the password prompt screen disappearing and the basic start setup being initiated as if you just bought the phone from the store. Although this is my fix and other fixes for future reference would be much appreciated to. *********UPDATE************
zidale said:
I recently just wipe did a factory reset on a encrypted (factory encryption) Galaxy S3, after rebooting it i have found that i am unable to get past the initial password prompt screen. I have tried to flash stock ROM, multiple times, to no avail as after each reboot i get the same password prompt screen. i have tried to flash custom ROM, multiple times, this to to no avail as it will not even go onto the device through push in Samsung toolkit v7 or slideloader. i have wiped the ROM to the point of nothing being on the phone and re-installed the factory ROM again this to with not avail as it still has the password screen. Now before i go back to t-mobile and see if they will help me, i decided to get community input to see if there is anything that can be done outside of the Factory as i have void warranty using Samsung Galaxy S3 Toolkit v7.
******UPDATE******* for those with similar problem, i just fixed this. Issue is as follows with possible fix action:
Issue was that encrypting the Samsung Galaxy S3 with the factory encryption and then wiping the system will cause the password file to be deleted but the encryption to stay on the phone. My fix action was that download original ROM from the provider, delete existing ROM on phone till it is basically a brick with USB debugging on and re install the original providers ROM. After it is re install you have to go in and wipe the phone's data one more time. This resulted in the password prompt screen disappearing and the basic start setup being initiated as if you just bought the phone from the store. Although this is my fix and other fixes for future reference would be much appreciated to. *********UPDATE************
Click to expand...
Click to collapse
When you say you reinstalled the original provider's ROM, I'm not sure if you mean you used ODIN. I believe ODIN install is the only way to recover from this as it reformats the partitions.
An ODIN flash back to OTA did not help my issue.
My company now requires the encrypt device policy for exchange, so I went ahead encrypted the device while running CM10. The encryption succeeded, but every time the screen timed out, it would turn off the device instead of just turn off the screen (CM10 bug?) - didn't want to have to deal with having to cold boot the device every time I want to do something, not to mention the phone being off :/
So I did a nandroid restore to my last known state and now I get prompted for the unencrypt password. However, the password doesn't work. Probably because the password file was deleted, but the system and data partitions are still encrypted.
I've tried doing a full wipe in TWRP and flashing multiple ROMs. I've also tried ODIN flashing root66 and OTA JB 4.1.1 with no success. It still asks for the unencrypt password. I suspect the only way to fix this is to completely re-create the system and data partitions.
If anyone knows how to accomplish this, I'd be grateful because I have a soft brick right now (i.e. can't get past unencrypt password prompt with any ROM)
OMG THANK YOU SO MUCH FOR THIS. I was in the same exact situation you were in and thank god for this thread. I thought my phone was pretty much done for.
fix
BTT8 said:
OMG THANK YOU SO MUCH FOR THIS. I was in the same exact situation you were in and thank god for this thread. I thought my phone was pretty much done for.
Click to expand...
Click to collapse
flash ur rom. then flash CF-Auto-Root, boot to recovery, factory restore, done
Hi
My Nexus 5X is arriving this week. I had many nexus devices before, but now I saw that you can add a password at the startup of the phone and I wanted to know how this is working with an unlocked bootloader.
In the Nexus 5 (2013) I used to keep my bootloader closed because with the bootloader open there was a risk: you were able to install (fastboot flash) or boot (fastboot boot) a CUSTOM recovery and flash things without wiping data, or even, access the internal memory of the phone from the custom bootloader. (This didn't happen with the locked bootloader because you were forced to wipe /data before flash a custom bootloader).
So now, with the 5X and the startup password, how does it works with an open bootloader? If I open the bootloader, the only way to flash anything is knowing the startup password? Or you can access fastboot mode without any password and good to go?
If that's the case, then I think I'll keep my bootloader locked!
I'm asking this prematurely because I don't want to install everything, and then wipe to open the bootloader, and start from scratch again.
Thanks
Sebastian!
thesebastian said:
Hi
My Nexus 5X is arriving this week. I had many nexus devices before, but now I saw that you can add a password at the startup of the phone and I wanted to know how this is working with an unlocked bootloader.
In the Nexus 5 (2013) I used to keep my bootloader closed because with the bootloader open there was a risk: you were able to install (fastboot flash) or boot (fastboot boot) a CUSTOM recovery and flash things without wiping data, or even, access the internal memory of the phone from the custom bootloader. (This didn't happen with the locked bootloader because you were forced to wipe /data before flash a custom bootloader).
So now, with the 5X and the startup password, how does it works with an open bootloader? If I open the bootloader, the only way to flash anything is knowing the startup password? Or you can access fastboot mode without any password and good to go?
If that's the case, then I think I'll keep my bootloader locked!
I'm asking this prematurely because I don't want to install everything, and then wipe to open the bootloader, and start from scratch again.
Thanks
Sebastian!
Click to expand...
Click to collapse
You can access without password.
Thanks Oblox. Then I think I'm keeping a locked bootloader for now!
I don't understand why they don't request a password to access the bootloader.... it could be much more secure.
Sent from my E5823
thesebastian said:
Thanks Oblox. Then I think I'm keeping a locked bootloader for now!
I don't understand why they don't request a password to access the bootloader.... it could be much more secure.
Sent from my E5823
Click to expand...
Click to collapse
Agreed in principal, security concerns raised by unlocking the bootloader would be much less of an issue if they allowed it to be password protected.
However id imagine it would cause headaches when flashing new bootloader (Where does the unlock info sit?) and when ADB'ing via usb etc that are too much effort to address. Id imagine most users dont ever unlock so dont suffer and 'developers' who do are suitably warned.
thesebastian said:
Hi
My Nexus 5X is arriving this week. I had many nexus devices before, but now I saw that you can add a password at the startup of the phone and I wanted to know how this is working with an unlocked bootloader.
In the Nexus 5 (2013) I used to keep my bootloader closed because with the bootloader open there was a risk: you were able to install (fastboot flash) or boot (fastboot boot) a CUSTOM recovery and flash things without wiping data, or even, access the internal memory of the phone from the custom bootloader. (This didn't happen with the locked bootloader because you were forced to wipe /data before flash a custom bootloader).
So now, with the 5X and the startup password, how does it works with an open bootloader? If I open the bootloader, the only way to flash anything is knowing the startup password? Or you can access fastboot mode without any password and good to go?
If that's the case, then I think I'll keep my bootloader locked!
I'm asking this prematurely because I don't want to install everything, and then wipe to open the bootloader, and start from scratch again.
Thanks
Sebastian!
Click to expand...
Click to collapse
It depends what you are trying to protect.
When you boot the phone it will pick some random key and encrypt your user partition, so your user partition is ALWAYS encrypted using a private randomly generated key.
Then if you don't select a pattern, pin, or password, that random key is (rather than being stored in plaintext) encrypted using the default string "password" plus some phone specific information accesible on the phone itself.
If you do select a pattern, pin, or password, then the random key is reencrypted with a process that includes your pattern, pin, or password.
In this way, when you change your pattern, pin, or password, the whole user partition does not need to be re-encrypted, just the random private key used to encrypt your user partition needs to be re-encrypted.
The password you enter upon startup is to unlock/decrypt the user partition.
So if you have unlocked bootloader, someone can steal your phone but can't get access to your data easily unless you leave the phone with no pattern, pin, or password.
They can overwrite your system and boot partitions, but if you have pattern, pin, or password when they try to factory reset your phone there is some Android factory reset protection that will ask them to enter your pattern, pin, or password when the phone connects to Google. This actually often locks users out of their own phones when they forget the pattern they used because it was just temporary when they entered it or it was an old pattern they used a long time ago and it comes back on factory restore.
The best they can hope for would be to install custom boot/system images and trick you into giving them your pattern, pin, or password, prior to stealing your phone.
So it really depends what you are trying to protect.
Locked bootloader, on the other hand, if you mess things up, can be a big impediment to fixing your phone.
My suggestion would be to unlock your bootloader, create a pattern/pin/password, and leave Nexus factory reset protection turned on.
Good flexibility with reasonable protection.
The password you enter at startup is so the kernel can finish the boot process, otherwise it cannot read your user partition.
You'd need to enter that password when running TWRP custom recovery as well or it won't be able to read your user partition.
thesebastian said:
Hi
My Nexus 5X is arriving this week. I had many nexus devices before, but now I saw that you can add a password at the startup of the phone and I wanted to know how this is working with an unlocked bootloader.
In the Nexus 5 (2013) I used to keep my bootloader closed because with the bootloader open there was a risk: you were able to install (fastboot flash) or boot (fastboot boot) a CUSTOM recovery and flash things without wiping data, or even, access the internal memory of the phone from the custom bootloader. (This didn't happen with the locked bootloader because you were forced to wipe /data before flash a custom bootloader).
So now, with the 5X and the startup password, how does it works with an open bootloader? If I open the bootloader, the only way to flash anything is knowing the startup password? Or you can access fastboot mode without any password and good to go?
If that's the case, then I think I'll keep my bootloader locked!
I'm asking this prematurely because I don't want to install everything, and then wipe to open the bootloader, and start from scratch again.
Thanks
Sebastian!
Click to expand...
Click to collapse
Just one thing to add onto the words of everyone else. This is my first Nexus but it is my understanding that previous Nexus devices have allowed users to lock/unlock the bootloader on the fly via an app. If this is something you intend to do, you should be aware that does not exist on the 5X. The bootloader must be unlocked after enabling OEM Unlock in Developer Settings. You can now install sideload OTAs from Google's website though.
Sent from my Nexus 5X using Tapatalk
Thanks you very much for all your posts.
I think I'll stay with a locked bootloader for now. At the end of my N5 2013 life I wasn't really using root features. Later I spent too much time with a Z5 Compact where opening a bootloader has bad consequences. So now I'm pretty much used to closed bootloaders.
So considering that fast boot and recovery mode don't need the startup PIN I'll stay with a locked bootloader.
However I already got a reason to unlock the bootloader. If there's any way to record videos in [email protected] I'd root the phone.
Sent from my Nexus 5X
I think sfhub said that you'd need a password to boot into the recovery as well. So unlocking your bootloader and leaving the phone encrypted with rest of the security features turned on does seem quite secure than i initially imagined. Too bad I never stayed encrypted long enough to play around with these.
But does it still ask for a password if you flash a different/custom recovery? I'm guessing it will, assuming the passwords are located on /data partition which is encrypted.
That said, someone in PN thread mentioned that knowledgeable hackers can still gain access to an unlocked, but encrypted phone via methods I'm unaware of. But I'd say it is very unlikely that my phone will end up in the hands of someone with such abilities.
The conversation is here: http://forum.xda-developers.com/nex...nexus-layers-fi-wifi-calling-t3244601/page351
roofrider said:
I think sfhub said that you'd need a password to boot into the recovery as well. So unlocking your bootloader and leaving the phone encrypted with rest of the security features turned on does seem quite secure than i initially imagined.
Click to expand...
Click to collapse
You don't need a password to boot into Recovery. You need to enter a pattern/PIN/password into TWRP (TWRP's UI is the one presenting the UI to ask for your password) to allow TWRP to mount your user partition as without that information the user partition is just gibberish.
roofrider said:
But does it still ask for a password if you flash a different/custom recovery? I'm guessing it will, assuming the passwords are located on /data partition which is encrypted.
Click to expand...
Click to collapse
Whether the different custom recovery asks you a password or not will depend on the custom recovery, but if your recovery doesn't ask for a password, then that recovery has no ability to access your user partition as it won't be able to decrypt the contents. Even if it does ask for a password, sometimes it can't access due to mismatch in decryption procedures. Some earlier versions of TWRP had this problem.
roofrider said:
That said, someone in PN thread mentioned that knowledgeable hackers can still gain access to an unlocked, but encrypted phone via methods I'm unaware of. But I'd say it is very unlikely that my phone will end up in the hands of someone with such abilities.
Click to expand...
Click to collapse
If you leave your bootloader unlocked (especially if a bad actor has physical access to your phone), if someone is determined enough they can eventually get access, but with current features it is significantly more difficult/annoying (compared to how trivial it was prior to encryption) to the point most normal people won't bother:
1) AES encrypted user partition
2) multiple password failure reset
3) mixing your pattern/PIN/password with phone specific salt
4) factory reset protection
5) remote reset
The easiest way for them to get access to your phone is to install a custom android or recovery that records your pattern/PIN/password and getting you to enter that information on your own, prior to stealing your phone.
I am guessing multiple password failure reset can be bypassed with bootloader unlocked, so brute force is likely easier.
Now if someone comes out with tools to automate brute force of phones with bootloader unlocked then you might only have real protection from brute force if you enter a complex password rather than pattern/PIN. This still wouldn't protect you from having someone replace your recovery or OS with something that records your pattern/PIN/password but it would protect against the most likely case of someone stealing your phone and trying to access your user data.
I have another question
Can you open the bootloader if the phone is encrypted and with startup pin/password?
If so (I assume yes) /data is wiped and then the phones encryption is reserved? (Just like out of the box)
Sent from my Nexus 5X
thesebastian said:
I have another question
Can you open the bootloader if the phone is encrypted and with startup pin/password?
If so (I assume yes) /data is wiped and then the phones encryption is reserved? (Just like out of the box)
Click to expand...
Click to collapse
I assume you mean "unlock" the bootloader.
The answer is yes and no.
You must first go into developer options to allow OEM unlocking.
If you have a locked bootloader and set up a pattern/PIN/password, then for somebody else (w/o your pattern/PIN/password) to enable OEM unlocking would prove to be a challenge since they can't easily get past your Android login and I haven't an easy way for them to enable it through other means.
Assuming they can get past your pattern/PIN/password (or you just left OEM unlocking enabled yourself) then yes, they can unlock the bootloader and it will enforce a data wipe in the process.
Android factory reset protection might also kick in after the phone connects to Google and they may be forced to enter your pattern/PIN/password to access your system.
I don't know what you mean by "encryption is preserved" The user partition starts off unencrypted. Upon first boot, the kernel will see it isn't encrypted and will encrypt it. From that point on the user partition is always encrypted.
If your data gets wiped due to bootloader unlock, the user partition will be erased, reformatted (at which point it'll be briefly unencrypted), then will be re-encrypted upon first boot of kernel.
sfhub said:
I assume you mean "unlock" the bootloader.
The answer is yes and no.
You must first go into developer options to allow OEM unlocking.
If you have a locked bootloader and set up a pattern/PIN/password, then for somebody else (w/o your pattern/PIN/password) to enable OEM unlocking would prove to be a challenge since they can't easily get past your Android login and I haven't an easy way for them to enable it through other means.
Assuming they can get past your pattern/PIN/password (or you just left OEM unlocking enabled yourself) then yes, they can unlock the bootloader and it will enforce a data wipe in the process.
Android factory reset protection might also kick in after the phone connects to Google and they may be forced to enter your pattern/PIN/password to access your system.
Click to expand...
Click to collapse
Oh yes sorry! I totally forgot about that option under dev settings when I asked the question. So fastboot oem unlock will never work without knowing my PIN (I never had this the Nexus 5 and older Nexus).
That means that a Nexus 5X with a locked bootloader and that option disabled is completely useless for a thief? (Without including advanced concepts like "change the internal memory") Or you can still rewrite /data with a locked bootloader and get rid of the encryption?
(This applies also for the stock recovery "wipe data" function?)
These last questions I've made are not about privacy, are more about anti-theft features.
Sent from my Nexus 5X
thesebastian said:
Oh yes sorry! I totally forgot about that option under dev settings when I asked the question. So fastboot oem unlock will never work without knowing my PIN! (I never had this the Nexus 5 and older Nexus).
That means that a Nexus 5X with a locked bootloader and that option disabled is completely useless for a thief? Or you can still rewrite data with a locked bootloader and get rid of the encryption?
Click to expand...
Click to collapse
I think "useless" is in the eye of the beholder.
IMO with locked bootloader, OEM unlock disabled, pattern/PIN/password created, standard encryption enforced, it would be extremely difficult to access your data.
They could boot into recovery and reset your user partition, but in that case, they wouldn't be accessing your data and upon connection to google will likely get hit with android factory reset protection and need to enter your pattern/PIN/password to access the phone.
They may be able to force LG recovery mode and rewrite your phone. I don't know what happens with Android factory reset protection in this case, but they won't be accessing your user data unless they can easily break AES-256 brute force (which is not really possible today unless your keys get compromised through social engineering)
I think worse case, with a bunch of work, they might have a functioning phone that will lock them out if they ever connect to a network. They can probably sideload some games and use it for that.
---------- Post added at 12:24 PM ---------- Previous post was at 12:08 PM ----------
One other thing, keep in mind this is how things are designed to work with all the chains being secure (bootloader, kernel, recovery, android, etc.)
There could always be some zero day bug that could be exploited to break the design. If there was a kernel memory overrun bug that wasn't patched, that could potentiall be exploited to replace the code that resets the phone upon too many mistaken password entries, and then that combined with a 4 digit PIN code might result in a brute force attack on your PIN being feasible, there are only 10,000 combinations to try.
That is similar to what happen with the San Bernardino iPhone case. They were able to disable the phone reset after incorrect PIN entry functionality then just brute force the PIN.
sfhub said:
I think "useless" is in the eye of the beholder.
IMO with locked bootloader, OEM unlock disabled, pattern/PIN/password created, standard encryption enforced, it would be extremely difficult to access your data.
They could boot into recovery and reset your user partition, but in that case, they wouldn't be accessing your data and upon connection to google will likely get hit with android factory reset protection and need to enter your pattern/PIN/password to access the phone.
They may be able to force LG recovery mode and rewrite your phone. I don't know what happens with Android factory reset protection in this case, but they won't be accessing your user data unless they can easily break AES-256 brute force (which is not really possible today unless your keys get compromised through social engineering)
I think worse case, with a bunch of work, they might have a functioning phone that will lock them out if they ever connect to a network. They can probably sideload some games and use it for that.
Click to expand...
Click to collapse
So if a thief get my phone and do a wipe data in the stock recovery. The phone is still encrypted? They can't add a new Google account and use it like an out of box Nexus?
I'm not concerned about privacy anymore (encryption seems to be good enough). Now I'm asking about how this device is protected against the black market
Sent from my Nexus 5X
Regarding privacy in Android N I just read this article that adds more (future) information to the topic:
http://m.androidcentral.com/how-android-n-addresses-security
Sent from my Nexus 5X
thesebastian said:
So if a thief get my phone and do a wipe data in the stock recovery. The phone is still encrypted? They can't add a new Google account and use it like an out of box Nexus?
I'm not concerned about privacy anymore (encryption seems to be good enough). Now I'm asking about how this device is protected against the black market
Click to expand...
Click to collapse
IIRC they may be able to factory reset using stock recovery (or Google could have enhanced stock recovery to ask for pattern/PIN/password as well) but upon connection to Google it'll reinstall pattern/PIN/password.
So they can probably get the phone to be usable until they connect to Internet at which point it isn't usable. How usable your phone is without a network connection is debatable.
If Google has enhanced recovery to ask for pattern/PIN/password then they couldn't even get that far, unless they somehow force LG recovery mode and use LGUP to overwrite the phone.
I would test this all out for you but I don't have a phone I can spare being used as a test right now.
sfhub said:
IIRC they may be able to factory reset using stock recovery (or Google could have enhanced stock recovery to ask for pattern/PIN/password as well) but upon connection to Google it'll reinstall pattern/PIN/password.
So they can probably get the phone to be usable until they connect to Internet at which point it isn't usable. How usable your phone is without a network connection is debatable.
If Google has enhanced recovery to ask for pattern/PIN/password then they couldn't even get that far, unless they somehow force LG recovery mode and use LGUP to overwrite the phone.
I would test this all out for you but I don't have a phone I can spare being used as a test right now.
Click to expand...
Click to collapse
No problem! Thanks for the answer. Really helpful.
This is also useful in case I wanted to buy a used Nexus phone. (Well I bought mine directly from "Amazon Warehouse deals" but I could had used Wallapop who knows!)
I assume that a Factory Reset made by the legit owner from the "Settings" menu and not from the "Recovery" is enough to make the Nexus "tradable" again.
Sent from my Nexus 5X
thesebastian said:
No problem! Thanks for the answer. Really helpful.
This is also useful in case I wanted to buy a used Nexus phone. (Well I bought mine directly from "Amazon Warehouse deals" but I could had used Wallapop who knows!)
I assume that a Factory Reset made by the legit owner from the "Settings" menu and not from the "Recovery" is enough to make the Nexus "tradable" again.
Click to expand...
Click to collapse
Ok, I think you jogged my memory.
I believe what happens is this.
When you tie a Google account to your phone, it sets some information in the UEFI bios storage area (or some other area that survives factory reset). When you factory reset from recovery, during the initial setup it'll force you to connect to the most recent account associated with the phone (normally upon initial boot, it won't force connection of Google account)
This tends to hit buyers of used phones when the seller factory resets their phone right before selling it without removing pattern/PIN/password and removing google accounts.
So the proper way to sell a phone is
1) remove pattern/PIN/password
2) remove all Google accounts associated with this device
3) factory reset phone
Every manufacturer might have slightly different factory reset protection routines. I believe some states passed laws that required devices have ability to be remotely locked in case stolen and all this is part of that infrastructure. You can look at that as government wanting control over locking your phone or government trying to reduce the value of stolen phones for your benefit.
I think even Factory Reset from settings can experience the problem of new buyer needing to connect to previous google account, so best to remove pattern/PIN/password and Google accounts. I believe just removing the pattern/PIN/password will remove factory reset protection and similarly removing Google account will to, but I am not absolutely sure, so best to remove both.
I know you asked from standpoint of buyer and I responded from standpoint of seller. If you purchased a used phone, you should remind the seller to do the proper steps to disable the factory reset protection. I think factory reset protection started in in devices that were pre-installed with 5.1 or higher.
If folks forget to remove factory reset protection, they'll need to contact the buyer and give them their Google account password so they can complete set up and un-associate the account from the phone. Also don't reset your Google password then give the other user the temporary password, hoping to then reset your Google password back to standard, because there is some freeze I think 24 or 72hours where you can't use the account for initial setup if your password just got changed.
@ sfhub It seems to be much more complex now. I have to sell my previous phone (Xperia Z5 Compact, shipped with lollipop, but not encrypted out of the box) one of these days. And I plan to sell this (amazing) Nexus 5X as soon as there is a new 2016 Nexus (specially if it's a bit smaller). So the tips are really welcome. Thanks
sfhub said:
Also don't reset your Google password then give the other user the temporary password, hoping to then reset your Google password back to standard, because there is some freeze I think 24 or 72hours where you can't use the account for initial setup if your password just got changed.
Click to expand...
Click to collapse
I asked a friend who went through this trauma and he confirmed that if you change your Google password, there is a 72hour (not 24hour) lock before that password can be used to unlock a phone that has been factory reset.
Further, everytime you enter the wrong Google account/password on the phone the 72hr timer is reset.
So if you are in this situation best to just let the 72hr cooldown period pass before attempting to get into the phone. Spend your initial time making sure you have the correct Google account and password that was associated with the phone in question, then just wait it out.
So I gave my mother my note 4 rooted Ultimate Note7 Hybrid SM-N930P and I wiped everything before I gave it to her. But when setting up her phone it asks for pin number for screen lock so I make one. Then when trying to unlock it it won't allow it. It looks to go to the next screen but flashes then goes back to lock screen.
Any help would be appreciated.
Thank you
Willyb211 said:
So I gave my mother my note 4 rooted Ultimate Note7 Hybrid SM-N930P and I wiped everything before I gave it to her. But when setting up her phone it asks for pin number for screen lock so I make one. Then when trying to unlock it it won't allow it. It looks to go to the next screen but flashes then goes back to lock screen.
Any help would be appreciated.
Thank you
Click to expand...
Click to collapse
Maybe a little late to reply but what did you wipe?
Recommended way to turn phone over to another user is to remove fingerprint(s) and accounts while booted. And make sure the reactivation lock isn't enabled.
You can factory reset after the above.
Maybe you can still factory reset but if that doesn't work, I don't know why it wouldn't unless reactivation lock is enabled.
Did you try the factory reset? Did that work or no?
Edit: if it's just a persistent fingerprint issue, try this but read the whole thread.
https://forum.xda-developers.com/showpost.php?p=63327098&postcount=1
Sent from my SM-N920P using Tapatalk
Willyb211 said:
So I gave my mother my note 4 rooted Ultimate Note7 Hybrid SM-N930P and I wiped everything before I gave it to her. But when setting up her phone it asks for pin number for screen lock so I make one. Then when trying to unlock it it won't allow it. It looks to go to the next screen but flashes then goes back to lock screen.
Any help would be appreciated.
Thank you
Click to expand...
Click to collapse
Flash this zip file from twrp or any custom recovery and it will bypass any lockscreen security lock. pin/pattern/password/fingerprint.
https://mega.nz/#!fQ03xarS!Rmik-8KQSxvnZ9AYFsU_t03RdmjZeqwF-ahnXLQi41s
samep said:
Maybe a little late to reply but what did you wipe?
Recommended way to turn phone over to another user is to remove fingerprint(s) and accounts while booted. And make sure the reactivation lock isn't enabled.
You can factory reset after the above.
Maybe you can still factory reset but if that doesn't work, I don't know why it wouldn't unless reactivation lock is enabled.
Did you try the factory reset? Did that work or no?
Edit: if it's just a persistent fingerprint issue, try this but read the whole thread.
https://forum.xda-developers.com/showpost.php?p=63327098&postcount=1
Sent from my SM-N920P using Tapatalk
Click to expand...
Click to collapse
I wiped it from recovery mode with the TWRP
It isn't a finger print issue. It's the 4-12 digit pin number
Willyb211 said:
I wiped it from recovery mode with the TWRP
It isn't a finger print issue. It's the 4-12 digit pin number
Click to expand...
Click to collapse
Trying to help so I won't debate the issue. It's important to recall if you went back through setup wizard and were prompted for original user and account password.
I still don't know what partitions you wiped. You likely need to root again if you wiped data or factory reset. I thought a factory reset would remove fingerprints.
The reason I think it's a fingerprint issue is the prompt for pin after reboot. I think that still applies since it asks for one and won't unlock. On initial prompt after you wiped it, did you input your personal backup pin to unlock and set another pin? Original pin should be wiped but if not your accounts and likely prints still exist.
I may be wrong but you may have to restore a stock backup or go back to stock tar in Odin if the two suggestions given aren't helping. I'd suggest the same stock tar as before in case it is factory reset protection causing the issue. You may have use your original Google or Samsung account user and password to unlock it.
But before following through with Odin, one important thing to look for in phone's display is reactivation lock while phone is booted to download mode (for Odin). If enabled, factory reset protection is applied. I wouldn't flash but pull battery and factory reset and sign in with original user and password. The prompts should direct just that. After setup wizard, remove anything of yours like fingerprints and accounts and factory reset within system Settings app.
As I said in my initial reply, you need to remove your accounts and check for fingerprints and remove those if applicable. Then factory reset. I didn't mention it before but factory reset in system Settings app is recommended to avoid issues handing phone to another user. Not sure but it may be a more sanity check to ensure you've removed accounts and fingerprints and encrypted data. I forgot to mention encrypted earlier.
Sent from my SM-N920P using Tapatalk
Ok I'm on the VZW variant of the pixel XL. I have the guy Smiley or whatever his name is unlock my phone bootloader and I rooted it. As we all know when the bootloader is unlocked it wipes your phone completely clean so on first boot it's like starting the phone up right out of the box. I did not set up a pin or fingerprint or Smart Lock or anyting of the nature due to I figured I was going to be flashing or ROM or multiple ROMs soon. And everything I have read about TWRP says that you have to turn off your screen lock before you flash TWR P or a ROM so and so forth.
So my question is when I now have decided to stick with a stock ROM and just use substratum to theme it when I go in and try to setup my fingerprint for the lock screen it asked me to reenter my PIN. Keyword here being "re-enter". I'll have it no point in time created a lock screen pin or pain in TW RP or anywhere for me to have to re-enter it. I know what two or three pins would be that I normally use I have tried those and they do not work. I have tried one two three four I have tried one one one one I have tried 4 3 2 1 and I have tried 0-0-0-0. For the life of me I cannot figure out what the pan Maybe is there a default pin but furthermore why has it created a pin without my knowledge of it or authorization of it?
Any insight into my predicament would be greatly appreciated. As well as any ideas on how I can get rid of this would be greatly appreciated....
And I assumed that I could fastboot flash stock image and wipe the phone completely just like the bootloader being unlocked would. But I'm trying not to lose all my data and have to start fresh setting everything up again.
There is no default pin. Only pin is the pin that was created by the user. Ask that "Smiley or whatever his name" what he did to your phone.
mattwheat said:
Ok I'm on the VZW variant of the pixel XL. I have the guy Smiley or whatever his name is unlock my phone bootloader and I rooted it. As we all know when the bootloader is unlocked it wipes your phone completely clean so on first boot it's like starting the phone up right out of the box. I did not set up a pin or fingerprint or Smart Lock or anyting of the nature due to I figured I was going to be flashing or ROM or multiple ROMs soon. And everything I have read about TWRP says that you have to turn off your screen lock before you flash TWR P or a ROM so and so forth.
So my question is when I now have decided to stick with a stock ROM and just use substratum to theme it when I go in and try to setup my fingerprint for the lock screen it asked me to reenter my PIN. Keyword here being "re-enter". I'll have it no point in time created a lock screen pin or pain in TW RP or anywhere for me to have to re-enter it. I know what two or three pins would be that I normally use I have tried those and they do not work. I have tried one two three four I have tried one one one one I have tried 4 3 2 1 and I have tried 0-0-0-0. For the life of me I cannot figure out what the pan Maybe is there a default pin but furthermore why has it created a pin without my knowledge of it or authorization of it?
Any insight into my predicament would be greatly appreciated. As well as any ideas on how I can get rid of this would be greatly appreciated....
And I assumed that I could fastboot flash stock image and wipe the phone completely just like the bootloader being unlocked would. But I'm trying not to lose all my data and have to start fresh setting everything up again.
Click to expand...
Click to collapse
Just reset the phone, it's the most simple thing to do and you won't risk breaking something by trying to figure it out.
Yeah yeah you're right. It's just odd though. I can use my phone just fine. Just can't set up a lockscreen. Didn't know if it had to do with anything in regards to the TWRP /pin issues. And hoping it may be a known issue that I just happen to miss in their forums. You know to make life easier if there was an easier , no data loss, fix.
Maybe this will help you.
I am not sure if I am asking this on the correct forum but I have the following issue:
A few weeks ago I made a backup of my P6P (Google Backup). I have a temporary phone, where I restored my P6P backup on, while I still had my P6P. I downgraded and resetted my P6P, and sold the device. As I had issues with the temporary phone, I resetted it again. Now I am trying to restore the P6P backup on the temporary phone, but it only says ''Incorrect PIN'', but its the PIN I have used for years, and its also the PIN I have restored the backup with before. I have tried it on multiple phones, on A12 and A13 but the Incorrect PIN message won't go away. I have tried 8 times now, and after 10 failed attempts Google will delete the backup.
Relevant(?) information:
- I was running the P6P A13 Beta, downgrading to A12 was not successful, but worked after doing it through ADB
- Restoring the backup worked with the same pin code before the P6P reset and downgrade
I don't understand with what PIN the backup is locked with, as I have always used the same PIN.
I just want to check and make sure - you don't have a newer backup from your temporary phone?
I'm afraid I don't know the solution to the PIN issue. I have the feeling that there is no solution. Question: When you reset your P6P before you sold it, did you manually remove the PIN from it first?
If you did remove the PIN before resetting the phone, did you perform another backup after removing it?
I'm guessing that you did remove the PIN, because from memory, I think the buyer of your phone would've been prompted for your PIN even after a reset, as a security feature for stolen phones - this has happened to some other users who buy a used phone.
roirraW edor ehT said:
I just want to check and make sure - you don't have a newer backup from your temporary phone?
I'm afraid I don't know the solution to the PIN issue. I have the feeling that there is no solution. Question: When you reset your P6P before you sold it, did you manually remove the PIN from it first?
If you did remove the PIN before resetting the phone, did you perform another backup after removing it?
I'm guessing that you did remove the PIN, because from memory, I think the buyer of your phone would've been prompted for your PIN even after a reset, as a security feature for stolen phones - this has happened to some other users who buy a used phone.
Click to expand...
Click to collapse
Thank you for replying!
I just want to check and make sure - you don't have a newer backup from your temporary phone?
Unfortunately not, as my temporary phone had issues I had reset it after just a day, so I didn't check if it made a backup as I thought I could restore the P6P backup.
When you reset your P6P before you sold it, did you manually remove the PIN from it first?
No and yes. I tried downgrading through the official Google way first (A13 Beta->A12), but got stuck in a bootloop. So I flashed the downgrade through ADB. The phone was reset after the downgrade, as far as I can remember there was no PIN set after I performed the downgrade. To make sure the P6P was really reset, I did a reset once more.
If the buyer did have to fill in a PIN code, he would have contacted me right away. So there was no PIN. But there was a PIN set before the downgrade. But that PIN is incorrect.
It's just a weird issue that I have never encountered after switching phones every few months.
Jordytjes said:
Thank you for replying!
Click to expand...
Click to collapse
You're welcome!
Jordytjes said:
When you reset your P6P before you sold it, did you manually remove the PIN from it first?
No and yes. I tried downgrading through the official Google way first (A13 Beta->A12), but got stuck in a bootloop. So I flashed the downgrade through ADB. The phone was reset after the downgrade, as far as I can remember there was no PIN set after I performed the downgrade. To make sure the P6P was really reset, I did a reset once more.
If the buyer did have to fill in a PIN code, he would have contacted me right away. So there was no PIN. But there was a PIN set before the downgrade. But that PIN is incorrect.
Click to expand...
Click to collapse
That's surprising. Normally, yes, you have to manually remove all lockscreen security from a phone before factory resetting it to be assured the buyer of the used phone won't have trouble, but it's possible the Android 12 downgrade caused it to act differently. I don't know if the behavior is also affected by who manufacturers a phone, although my impression is that it's a Google requirement, so it wouldn't matter who makes the old or new Android phone. I don't remember what year this security was built into Android (to require the phone's last PIN after a factory reset). I feel that I'm not remembering all the details of this.
Jordytjes said:
It's just a weird issue that I have never encountered after switching phones every few months.
Click to expand...
Click to collapse
My only guess, then, is that this too was caused by the combination of not manually removing your PIN (and making another backup after, with no lockscreen security), and the downgrade to Android 12.
I wish I had more solid information for you. Unfortunately, I suspect there's nothing you can do about it.