Certifi-Gate Vulnerability - Verizon LG G4

Certifi-Gate Scanner:
https://play.google.com/store/apps/details?id=com.checkpoint.capsulescanner&hl=en
So according to numerous articles, this vulnerability was demoed at Black-Hat Security Conference today. It affects pre-loaded apps where Verizon would use remote access to fix any problems in a user's phone.
http://www.engadget.com/2015/08/06/android-certifigate/
I know that Verizon does have this app and the VS986 is vulnerable. Does anybody know what the app is called so I can disable it? I went through all of the system apps but still not sure. I think it might be in VZMobileSecurity.apk

Related

Lookout & Wavesecure now incompatible?

Hey all,
I've had a Wavesecure license about a year now using it for security and locating my phone if lost, I also use Lookout for malicious app scanning etc.
I updated one of these 2 last night (I don't remember which) and now Wavesecure is telling me that it cannot run alongside Lookout for some reason, considering standard Wavesecure doesn't have any malware scanning I'm surprised, although do have some common features it wasn't a problem before.
Anyone else had this issue?
Thanks

[Q] Non-rooted S3 questions

So I feel like I know my way around rooting and putting custom roms on android devices. I've done it multiple times and love the features doing those two bring to your device. I recently received a GS3 from my employer and this will be my main device for work and personal use. But the company I work for has an application that is installed on every phone with company information on it so that the app can do things like wipe the device remotely if the phone is lost/stolen for obvious security reasons. But this application also restricts side loading apks and root users on the devices as well.
The application is Maas360:
https://play.google.com/store/apps/details?id=com.fiberlink.maas360.android.control.samsung&hl=en
I actually work with the helpdesk of the company, and we have what Maas360 calls 'security policies' that include the settings restrictions for each of the devices with android or iOS... some of the restrictions set in place are like I said with not be able to side load apks, no root users, must have a screen lock with pattern or pin (depending of which security policy is applied), along with other little things.
1.) Is there a way to get the Samsung bloatware off the device by flashing a Stock, non-root custom rom?
2.) Is possible to side load apps with Maas360 installed? The usual setting of 'Allow the installation of non-Google market apps' is grayed out and unchangeable currently...
If there are any other suggestions, those would be great as well. I just want my device to have the flexibility and openness of what a true Android device should have. Thanks
Typically employers put software like that not just for security measures of lost or stolen, but also to prevent their employees from doing exactly what you are wanting to do. As such, you are essentially asking people here to potentially help break your company's policy and bypass security measures they have installed. As far as I am concerned, you are on your own.
Sent from my SAMSUNG-SGH-I747 using xda app-developers app

Anyone else have a strange VR app mysteriously install itself?

Earlier tonight I noticed a new app, "Rooms" with a pretty generic Android head as its icon, had installed itself. Not unheard of, especially on a Verizon handset, but I have DT Ignite disabled. I clicked it to see what opened but got an "insert phone into Gear VR" screen, which I didn't do since I wanted to find out more about what it is and where it came from. When I open the Oculus app it's not showing in my library.
Only thing I can think of is a day or so ago I sideloaded Deo VR video player and that must have opened up some sort of backdoor into a third party being able to install apps without authorization. But this installed itself tonight (I only know this for sure because of Samsung's ****ty ui choice of always putting new apps at the end of the drawer, and it's the last one behind another app I purposefully installed tonight).
I can't find anything that seems to be related to a GearVR app called "Rooms", and r/gearvr has no info on it.
Anyone else have this happen? Have you opened it with the phone in the GearVR? What is it?
Rooms
It showed up on my Note 7 as well. Don't know what it is. Didn't get into the VR system to find out. Uninstalled it but it keeps coming back.
Check to see if the dt ignite re enabled itself. When i read about that app online, it said it has the tendency to to that . (Haven't seen it happen yet... it's just what the article said)
Sent from my SM-N930V using Tapatalk
Rooms
This has also installed itself onto my s7 edge last night I have not installed or removed any app for a while so no idea where it came from, it refuses to be remove and if you open it and put phone in vr gear it just says page can not be displayed and get in touch with Oculus.
Someone on Reddit did some digging and it looks like it's part of one of the recent Oculus platform updates but isn't actually implemented yet. Supposedly a newer Oculus update removes it again. It's a chatroom type platform Oculus is working on, supposedly.
JinxtPhoto said:
Someone on Reddit did some digging and it looks like it's part of one of the recent Oculus platform updates but isn't actually implemented yet. Supposedly a newer Oculus update removes it again. It's a chatroom type platform Oculus is working on, supposedly.
Click to expand...
Click to collapse
Hotfix update rolled out today

Strange "RootPA" app on my HTC 10. Is it a potential security issue?

Im using a HTC 10 (EU variant). Today i was scrolling through "Netguard" (if you dont know it, its an app to prevent other apps from internet access), since i configured it to show system apps it displays way more apps than the normal app overview in the settings. In there i found an app called "RootPA" and one called "root", which seems strange since i didnt unlock the bootloader or root on my own. The details in the RootPA entry say "com.gd.mobicore.pa", no idea if thats helpfull to determine the origin of this mysterious app.
Can you help me with this?
Did you Google it?
I did, but the results were not realy usefull. I found someone with a modded Galaxy S3 who deleted a RootPA on accident and broke stuff, but that ssems unrelated. Are there any things i could do to find out more about the app installed on my phone without root?
I cant say its something I've ever seen. If this person in the past removed it, and it broke stuff, that would suggest that it may have been a system app and he was rooted. From what I managed to find on google, it is part of a security suite (mobicore) used by networks to monitor what the state of the phone is, presumably incase something happens, and it was the user fault, and they know for a fact because they have logs of what the phone has done.
[ACCESS_NETWORK_STATE] Allows applications to access information about networks
[INTERNET] Allows applications to open network sockets. (i.e send information)
[READ_EXTERNAL_STORAGE] Allows an application to read from external storage.
[READ_PHONE_STATE] Allows read only access to phone state.
A friend of mine got his HTC 10 2 days ago, ill ask him to look for this app. Its unlikely we would have the same virus/whatever installed.
Edit: He just reseted his 10 (due to missing language options, but thats another topic), but still found "root" and "rootPA" on his phone, so its preinstalled (although i still dont understand whats its purpose).
RootPA is provides service for provisioning secure applications that run on ARM trustzone and t-base OS (formerly mobicore). It is preinstalled in some vendors Android devices (search for this string on the internet: htc-devices-to-incorporate-trustonic-t-base-tee), but mostly unused as far as I know. The source code of some versions is available on the Internet (e.g. on github /Faryaab/android_hardware_samsung_slsi_exynos5410/tree/master/mobicore/rootpa).
It has nothing to to with rooting or unrooting the device.
PA route is very dangerous I had some I have somebody who has hacked into my phone through this particular program so to speak I have a lot of issues right now with my phone trying to get them off of my phone and this seems to be the root cause or the start of it have anybody knows how I can clear my phone and my Ram from the Vicious hacker I appreciate it I'm tired of being watched and recorded everything I do
Illfidusoon12 said:
PA route is very dangerous I had some I have somebody who has hacked into my phone through this particular program so to speak I have a lot of issues right now with my phone trying to get them off of my phone and this seems to be the root cause or the start of it have anybody knows how I can clear my phone and my Ram from the Vicious hacker I appreciate it I'm tired of being watched and recorded everything I do
Click to expand...
Click to collapse
PA route..... .rootPA ......2 different things. Hacked ? Unlikely, I think some OCD is kicking in. Want to be clean? RUU the device and do not restore anything

Question Protecting Privacy on OxygenOS

I've been using a combination of LineageOS with MicroG and /e/ on my primary and backup OnePlus phones, and frankly, I think you'd be hard pressed to find a better combination of hardware and software. I very much enjoy having a device with minimal bloat and no connection to Google.
Recently, however, the PayPal app stopped working on my phone. This isn't that much of an inconvenience, however, my thinking is that any app could be susceptible to this occurring. This could be potentially catastrophic, for example, if an app that unlocks a charging station for EVs stops functioning or a ticket application for an event (I know, these are worst case scenarios, but I think they are worth having contingency for).
Even before I started messing with custom ROMs again, I had ProtonVPN always on my device (with ads and trackers blocked), as well as using NextDNS to block more that I discovered through DuckDuckGo. Given this, and the fact that I still use YouTube and Google Play Movies on my Roku TV (as well as the fact that I used Google's services prior to commuting to protecting my data privacy), makes me wonder if I'm really getting benefit with custom ROMs. Are the privacy steps I'm already taking sufficient? Should I just disable as many Google apps as possible and call it good? I'm interested in hearing people's thoughts.

Categories

Resources