Note 10+, user certificates and package disabler - Samsung Galaxy Note 10+ Questions & Answers

Alright, I'm in that nice panic stage where you've learned enough to scare yourself but don't know enough to reassure yourself.
Had a factory reset recently, seems likely it was due to 3rd party lock/wipe app i triggered while dealing with my dog. (But not 100% sure there was a drop just prior and I've had stability issues since school has required me add a work profile but, of course tech support for both Microsoft and my school have zero response to inquiries)
Any way, user certificates now has two:
FindMyMobile
AttestationKey_com_wssyncmldm
And I have no idea how to verify those in any way. Its quite possible isn't it that an app could have actually installed them right?
Findmymobile, obviously is such a cert, allowing for find my mobile. It has a key a CA cert and user cert.
AttestationKey_com_wssyncmldm
Has a user key and user cert

I would say it's the school/work profile. Microsoft InTune is for enterprise IT management. If your school's IT managers don't know how to configure it, it can screw things up for everyone.
Try deleting your school profile and see what happens.
My company recently migrated from Google to Microsoft services and when I added my company as a work profile, my phone started acting wonky.
Sent from my SM-N976V using Tapatalk

I would reload and not put the crapware back on it.
It's your phone... my favorite word is No!
I have zero faith in the new MS; don't run any of their cloud junk on my 10+ and never will.
Find my device is normally present. You can disable it as a device administrator in advanced security settings.
It will auto enable on reboot or sometimes when you go to Playstore.

HungryRobotics said:
Alright, I'm in that nice panic stage where you've learned enough to scare yourself but don't know enough to reassure yourself.
Had a factory reset recently, seems likely it was due to 3rd party lock/wipe app i triggered while dealing with my dog. (But not 100% sure there was a drop just prior and I've had stability issues since school has required me add a work profile but, of course tech support for both Microsoft and my school have zero response to inquiries)
Any way, user certificates now has two:
FindMyMobile
AttestationKey_com_wssyncmldm
And I have no idea how to verify those in any way. Its quite possible isn't it that an app could have actually installed them right?
Findmymobile, obviously is such a cert, allowing for find my mobile. It has a key a CA cert and user cert.
AttestationKey_com_wssyncmldm
Has a user key and user cert
Click to expand...
Click to collapse
So are these both normal then?

sirv said:
So are these both normal then?
Click to expand...
Click to collapse
I don't know. I don't have a work profile set, and I show no user certificates.
The names seem off too. I see why the OP was a bit shook up. I'm running a AT&T 10+
Here's how they show on my 10+, it's running fast and clean.

sirv said:
So are these both normal then?
Click to expand...
Click to collapse
Find my mobile is for find my mobile being active when you have a VPN that may block it.
The other I still don't know but may be Knox related under same circumstances.

Thank you, @blackhawk and @HungryRobotics
I had a similar guess, that findmymobile was the Samsung service. Since I was using a VPN-based ad block (Adguard), it makes sense that it appeared there.
As for the other one (AttestationKey_com_wssyncmldm), I'm still not sure, but I wonder if it was for the Link to PC service.
It's alarming to find anything in User Certificates, honestly, and there seems no way to get information that they are legit. My hope is that it is only the system apps that can install certificates without user intervention.

sirv said:
Thank you, @blackhawk and @HungryRobotics
I had a similar guess, that findmymobile was the Samsung service. Since I was using a VPN-based ad block (Adguard), it makes sense that it appeared there.
As for the other one (AttestationKey_com_wssyncmldm), I'm still not sure, but I wonder if it was for the Link to PC service.
It's alarming to find anything in User Certificates, honestly, and there seems no way to get information that they are legit. My hope is that it is only the system apps that can install certificates without user intervention.
Click to expand...
Click to collapse
wssyncmldm is the infamous AT&T updater usually listed as in my previous screen shot.
Seems it might have something to do with this.
My guess is it has to do with setting up the work profile.
If it was there on the AT&T stock rom, after a factory reset it should be ok.
Maybe check with AT&T.

blackhawk said:
wssyncmldm is the infamous AT&T updater usually listed as in my previous screen shot.
Seems it might have something to do with this.
My guess is it has to do with setting up the work profile.
If it was there on the AT&T stock rom, after a factory reset it should be ok.
Maybe check with AT&T.
Click to expand...
Click to collapse
I don't have AT&T, but it could be an updater for my carrier.

sirv said:
I don't have AT&T, but it could be an updater for my carrier.
Click to expand...
Click to collapse
Those apps have every permission under the sun. Check to see what is set as system administrators. Find my Device will be there.
I don't know.
Maybe it's nothing but what if it's something

I found these and other User Certificates on another device, too. It's disconcerting. Is it known, can any app install User Certificates?

This may be helpful:
How To Remove all Stored Certificates on Android - Technipages
Ever been greeted by a popup saying, "The certificate doesn't come from a trusted authority?" when trying to access a website? These security certificates
www.technipages.com
Lockdown time, add Karma Firewall, a VNP based freeware app that uses almost no battery and has logging. Can run at boot up.
I also use this setting to globaly block ads...

blackhawk said:
This may be helpful:
How To Remove all Stored Certificates on Android - Technipages
Ever been greeted by a popup saying, "The certificate doesn't come from a trusted authority?" when trying to access a website? These security certificates
www.technipages.com
Lockdown time, add Karma Firewall, a VNP based freeware app that uses almost no battery and has logging. Can run at boot up.
I also use this setting to globaly block ads...
Click to expand...
Click to collapse
It's strange, I can find nothing online about common entries in User Certificates on Android. My thought is that they get generated when VPN is used, such as AdGuard.
Thanks for the Private DNS tip for ad blocking. In the meantime, I have been using Disconnect Pro (based on Knox).

sirv said:
It's strange, I can find nothing online about common entries in User Certificates on Android. My thought is that they get generated when VPN is used, such as AdGuard.
Thanks for the Private DNS tip for ad blocking. In the meantime, I have been using Disconnect Pro (based on Knox).
Click to expand...
Click to collapse
Can you delete them?
If you don't do/want OTA updates wssyncmldm isn't needed.
I'm still happily running on Pie...

Related

Track lost phone with GPS?

I know that Android based phones have applications where you can track your phone through GPS software should it ever get lost. Is there such an application for our phones? I'd hate to lose my phone that has GPS capability and not be able to find it. And the thought of losing it and someone else finding it, hack it, and use it for their own personal use would be very more irritating.
And I know that the Motorola CLIQ even has the capability to erase all your stored information on the phone should you lose it to prevent someone from hacking into the phone and retrieving your sensitive information. Again, is there any software for our phones also?
Im Packing said:
I know that Android based phones have applications where you can track your phone through GPS software should it ever get lost. Is there such an application for our phones? I'd hate to lose my phone that has GPS capability and not be able to find it. And the thought of losing it and someone else finding it, hack it, and use it for their own personal use would be very more irritating.
And I know that the Motorola CLIQ even has the capability to erase all your stored information on the phone should you lose it to prevent someone from hacking into the phone and retrieving your sensitive information. Again, is there any software for our phones also?
Click to expand...
Click to collapse
Sprite Terminator:
http://store.spritesoftware.com/?page_id=280
Search the forum, there are already two threads on this subject:
http://forum.xda-developers.com/showthread.php?t=479257
http://forum.xda-developers.com/showthread.php?t=469415&highlight=anti+theft
i personally prefer remotetracker.
i lost my phone b4. n it works fine. i able to track bak my phone.
[email protected] said:
Search the forum, there are already two threads on this subject:
http://forum.xda-developers.com/showthread.php?t=479257
http://forum.xda-developers.com/showthread.php?t=469415&highlight=anti+theft
Click to expand...
Click to collapse
I always do use the "Search" function, but even with sifting through posts I didn't come across the two you listed. Thank you. Maybe I'm trying to be too technical with my searches...
Free web services (and Beta), with "Find" and "Erase" functions, among others:
www.flexilis.com
www.mobiwee.com
I just tried the Maspware GuardsMobile and ended up locking my phone up. It recommended disabling balloon pop-ups and a soft-restart. I allowed that then it gave me errors loading some related tracking.exe file. I tried to enter the default pin and it didn't work. Gave me 3 attempts. After the 3rd attempt the phone was locked! Searched around and came up with nothing. There's not even a guide explaining what happens.
So now I'm forced to reflash the phone and restore my PIM. I do not recommend this program for anyone with cooked ROMs.
I'm going to now play with Ultimate Theft Alert.
Can't find any command lines for Ultimate Theft Alert V35. I don't think I really like it a whole lot as some of the others...think I'll try my luck at Maspware GuardMobile again.
Ok, reinstalled GuardMobile. Activated it (fingers crossed). It recommended disabling the SMS bubbles again and a soft-reset. I let it and amazingly my phone didnt lock up this time when entering the demo password "1234".
I feel much more comfortable trialing this program than Ultimate Theft Alert as they list the commands on their website, and you don't get ANY commands list until you've purchased UTA. So without having any commands to trial the program I will not be purchasing UTA.
Time to play around with MaspWare GuardMobile now...
Ok, just tried to exit GuardMobile and I got the freaking error again!
"An unexpected error has occurred in GuardMobile_TS.exe.
Select Quit and them restart this program, or select Details for more information.
Luckily this time I didn't leave it active while testing. Reset phone and it works. But everytime I try and test the locate or monitor it fails to send SMS. Then I exit the program and it crashes. I'm going to uninstall and forget this program...AGAIN!
Sprite Terminator seems to work so far. Only exception is that I can't use the "Alternate GPS" It doesn't give me a lock on my position and comes up with all ZEROS. Going to keep playing with this.
Had you tried any of the web services I've posted?
They both work fine for me. And they are both free (at least, for now, at Beta stage...).
there's a program called WIMP, i havent tried it yet though
Sprite Terminator works, BUT when it intercepts the SMS code it doesn't text back.
vmiguel said:
Had you tried any of the web services I've posted?
They both work fine for me. And they are both free (at least, for now, at Beta stage...).
Click to expand...
Click to collapse
Haven't tried them...yet, but I've already downloaded the programs and thank you for the suggestions.
moukun said:
there's a program called WIMP, i havent tried it yet though
Click to expand...
Click to collapse
Wimp didn't work receiving SMS codes.
Do any of these programs have a "explode and burn the face off the thief who stole my phone" option?
illmurs said:
Do any of these programs have a "explode and burn the face off the thief who stole my phone" option?
Click to expand...
Click to collapse
Only in the professional edition.
illmurs said:
Do any of these programs have a "explode and burn the face off the thief who stole my phone" option?
Click to expand...
Click to collapse
Well, Flexilis have a "Scream" command, that will make the phone starts playing a rather anoying horn sound, for 30 seconds.
Handy to find a lost device, at least. And to get some atention on a stolen one, but the thief can just turn it off...
Kaspersky Mobile Security 8
Looks like no one has mentioned or tried this software yet.
I've already tried the 1 month trial version and then purchased a 1 year plan which I believe is worth every penny.
It's an anti virus, anti spam, sms and phone blocker and phone locater.
link:
http://www.kaspersky.com/kaspersky_mobile_security?thru=reseller=kmssidebanner3
Features:
Block access to contacts, photos or files on your phone if it is lost or stolen
Get the GPS location of a lost or stolen phone
Encrypt sensitive personal and business data
Remotely wipe your smartphone if necessary
Block unwanted calls and SMSs
Cybercrime and your smartphone
Stop cybercriminals hijacking your smartphone to make money
Block the sending of data to third parties
Prevent corruption of personal data
Hope this helps!
jpijper said:
Only in the professional edition.
Click to expand...
Click to collapse
vmiguel said:
Well, Flexilis have a "Scream" command, that will make the phone starts playing a rather anoying horn sound, for 30 seconds.
Handy to find a lost device, at least. And to get some atention on a stolen one, but the thief can just turn it off...
Click to expand...
Click to collapse
Hmm might be at least a bit useful like you say - maybe a password to turn off sound will be better?
Well, they are in Beta, so accepting ideas and feature requests... why don't you send them an e-mail?
I'm going to give kaspersky a run, it sounds good.

[kernel] Do we need data security (aka a working firewall)?

Dear kernel developer,
do you have a firewall on your destop computer?
I think, the answer is "yes, of course!"
Why don't you wan't a firewall for your phone?
Your answere: "It is linux, we don't need it!"
Sure?
In contrast to the "safe a.p.p.l.e market" we are free to get our application from everywhere...
But every person with minimum programming skills is able to use tools like "apktool", "smali/baksmali" to modify existing applications.
Why not integrate some spy functions (send private photos, use camera and microphone, send phonebook and email-adresses).
Solution:
There is always a FREE program to disallow or allow applications the use of wifi or mobile data connections:
DROIDWALL ( h ttp://code.google.com/p/droidwall/ )
But this superb program need some special compiling parameters in the kernel compilation process.
(Something like 'iptables', 'multiport', 'iprange' and 'ipowner')
I found only one working kernel+rom, which is DroidWall compatible: "Six O´Clock A.M." from user 'oclock',
( h ttp://android.modaco.com/content/htc-desire-desire-modaco-com/312051/oclock-custom-rom/ )
This is a fine and stable release, but it is a v2.1 rom (not froyo).
Please, please froyo-kernel-developer: get the right parameters for kernel compilation, so we can use DroidWall.
So everybody can decide by himself, which application is allowed to send data to wifi or mobile data connection.
Kind Regards
i knew linux didnt need an antivirus, thought it still needed a firewall...
since ive always had one set up on my linux installs... but then again, im a linux noob.
What about using the phone as a hardware firewall for your laptop when on public wifi?
I'd have no use for it personally but I am sure others might.
You do not NEED a firewall on your computer. You need a firewall between your computer and the internet. If your computer has a public routable IP then you need a software firewall. If you have a hardware firewall that is a good known brand and it is not OLD then this will be fine providing you do not illegally download software - generally. And therefore there is no requirement for a software firewall.
You need a firewall to deny traffic to port's (and IP addresses) that are not closed by default. These open ports potentially open a security risk providing there is an exploit for said port.
Please inform us of which ports are open on our Android phones? I mean open for inbound communication of which did not get opened due to software making an outbound connection.
I can do an NMAP to my desire over wifi sometime this week to discover... But right now I can pretty much say you do not need a firewall on your phone. It will only cause you problems with software needing the internet. And besides, our phone ISPs put us on a private network - they dont usually allow connections between hosts / customers, and we sit behind a corporate type hardware firewall...
iptables
Actually Andorid has a Firewall installed, its called iptables.
It's not a personal firewall... but thous are just to get money from PPL without any advanced security... Linux does, by design not have open ports... like windows where you need a program to close what shouldn't be open anyway... And when you Install an APP you see what the APP wants to do, if it wants access to your contacts or internet or what else... so there is absolutely no need for a user scaring Personal Firewall
kuhine said:
So everybody can decide by himself, which application is allowed to send data to wifi or mobile data connection.
WiHerr
Click to expand...
Click to collapse
OK, a classic firewall is looking only to the used network-ports and allow or disallow the communication: this type of firewall can not make a difference between a good and bad data transmission (for example the firewall built-in in our wifi-routers).
But extented versions of firewalls have a built-in behavior control of applications:
I want to decide, which application is allowed to communicate WITHOUT ANY USERCONTROL over Wifi or a mobile data connection and which one not.
- I want to stop (possible) spyware from sending my private data out
- I want to stop software looking to their developers server an stop working when the developer say "stop, buy the new the new version - the old one is out of order yet"
And in linux there is a system function, which has the information, which network sockets are owned by which application (ipuser?).
There are only a few parameters to set when compiling a new kernel, to activate these functions
Please look to the Droidwall site and the screenshot of the software.
Regards
safttuete said:
Actually Andorid has a Firewall installed, its called iptables.
Click to expand...
Click to collapse
That is the point, but IPTABLES is not working on allmost all android kernels, except the oclock roms. Or am I wrong?
Droidwall is only a graphical frontend for iptables! Not more.
Everytime when we install new software (i.e. out of the android market), we get a list displayed of what the program likes to do. And there is allmost "unrestrictive network use" for even the smallest witgets... I want to decline this network use, but it is a "take all or nothing" thing.
I'm not a modern facebook/twitter user: take all my data... here a some more private details... and here are photos and addresses from all my friends, too.
What is so scary to select out some applications from sending data?
And with a working iptables we can do so.
Dramatical continuance...
the real reason could be: there are some application installed on the phone, which must not re-check their licenses on every use...
(only to save mobile data volume... without switching to flight mode)
I think an app that can edit the given permissions would be much more useful than a firewall. But I haven't found something like that yet.
@kuhine
I think nearly every custom ROM has iptables, CM has it for sure. I don't know about ipuser though.
uTauro said:
I think an app that can edit the given permissions would be much more useful than a firewall. But I haven't found something like that yet.
Click to expand...
Click to collapse
It's impossible for now. Android convention is to give all required permissions to an app or don't install it at all, so apps aren't designed to support lack of permissions. Most of them will probably FC, even if you will block out some minor feature.
Hello all,
today I saw the message, that a wallpaper app sent private information to their server in china:
h t t p ://mobile.venturebeat.com/2010/07/28/android-wallpaper-app-that-steals-your-data-was-downloaded-by-millions/
In the meantime I choose this rom with "DROIDWALL" firewall support:
[ROM-FroYo AOSP] OpenDesire v2.3a
And I found a new free firewall program named "ANDFIRE", but I didn't test it yet.
kuhine said:
And I found a new free firewall program named "ANDFIRE", but I didn't test it yet.
WiHerr
Click to expand...
Click to collapse
Checked ANDFIRE out. Seems to work fine on my DeFrost 2.2c release. Will check it out further. Interface looks very similar to DroidWall and that also seems to work fine on my device.
Will have to investigate further, but it's a good idea to get it working.
suffer not adware to live
kuhine said:
That is the point, but IPTABLES is not working on allmost all android kernels, except the oclock roms.
Click to expand...
Click to collapse
If the kernel features you need are not an option consider a less horrible option:
LBE privacy guard
kuhine said:
That is the point, but IPTABLES is not working on allmost all android kernels, except the oclock roms. Or am I wrong?
Droidwall is only a graphical frontend for iptables! Not more.
Everytime when we install new software (i.e. out of the android market), we get a list displayed of what the program likes to do. And there is allmost "unrestrictive network use" for even the smallest witgets... I want to decline this network use, but it is a "take all or nothing" thing.
I'm not a modern facebook/twitter user: take all my data... here a some more private details... and here are photos and addresses from all my friends, too.
What is so scary to select out some applications from sending data?
And with a working iptables we can do so.
WiHerr
Dramatical continuance...
the real reason could be: there are some application installed on the phone, which must not re-check their licenses on every use...
(only to save mobile data volume... without switching to flight mode)
Click to expand...
Click to collapse
May be you should have a look for LBE privacy....

Root for the Pixel Xl from the google store?

Has anyone made anything that roots the pixel xl, the variant from the google store with the unlocked bootloader? I want to root my device, no need for custom recovery and install a system wide adblocker.
lovenokia said:
Has anyone made anything that roots the pixel xl, the variant from the google store with the unlocked bootloader? I want to root my device, no need for custom recovery and install a system wide adblocker.
Click to expand...
Click to collapse
Not yet. Partitions are different on the Pixel compared to other phones which is going to create a different method for root. It will happen when the devs figure it out. I am looking forward to tinkering with my new Pixel.
lovenokia said:
Has anyone made anything that roots the pixel xl, the variant from the google store with the unlocked bootloader? I want to root my device, no need for custom recovery and install a system wide adblocker.
Click to expand...
Click to collapse
Chain fire is waiting for his to be delivered to his country. Once he gets it then he will start working on root. He says it will be a little harder so it will take a little longer. Also the dev beanstown is on the waiting list for November so we will start seeing root and custom Roms by December I bet.
lovenokia said:
Has anyone made anything that roots the pixel xl, the variant from the google store with the unlocked bootloader? I want to root my device, no need for custom recovery and install a system wide adblocker.
Click to expand...
Click to collapse
Have you tried Adguard, no root needed and easy to toggle on/off, I started using it on my work phone and have found that it works very well, enough that I've switched to it on my personal phone and on the desktop.
Local link: http://forum.xda-developers.com/android/apps-games/adguard-ad-blocker-doesnt-require-root-t2958895
If you find a need for the premium functions googling "adguard stacksocial" will give you a much cheaper option for multi device usage.
rgbc said:
Have you tried Adguard, no root needed and easy to toggle on/off, I started using it on my work phone and have found that it works very well, enough that I've switched to it on my personal phone and on the desktop.
Local link: http://forum.xda-developers.com/android/apps-games/adguard-ad-blocker-doesnt-require-root-t2958895
If you find a need for the premium functions googling "adguard stacksocial" will give you a much cheaper option for multi device usage.
Click to expand...
Click to collapse
This is totally speculation, but since Adguard appears to use the android VPN to block ads, I imagine this may have some kind of negative affect on Wi-Fi assistant (if you have it enabled). I would test it, but honestly I don't trust that this company is tunneling all the traffic of all your apps through them. Seems a bit sketchy to me, but to each their own.
EDIT: Seems I misunderstood how the application functions. I'll still be waiting for root, but thanks to rgbc for the info.
bigbabys said:
This is totally speculation, but since Adguard appears to use the android VPN to block ads, I imagine this may have some kind of negative affect on Wi-Fi assistant (if you have it enabled). I would test it, but honestly I don't trust that this company is tunneling all the traffic of all your apps through them. Seems a bit sketchy to me, but to each their own.
Click to expand...
Click to collapse
The app sets up a local (on-device) VPN for ad filtering, web traffic isn't being routed through Adguard's servers.
I don't use wifi assistant (traffic routed through Google's servers) as I use a third party VPNfor all public wifi however when Adguard senses a remote VPN connection being setup it disabled it's self automatically. It also has a root option for alternative filtering methods for use with VPNs.
Cheers,
Rob
rgbc said:
The app sets up a local (on-device) VPN for ad filtering, web traffic isn't being routed through Adguard's servers.
I don't use wifi assistant (traffic routed through Google's servers) as I use a third party VPNfor all public wifi however when Adguard senses a remote VPN connection being setup it disabled it's self automatically. It also has a root option for alternative filtering methods for use with VPNs.
Cheers,
Rob
Click to expand...
Click to collapse
My bad, as I said total speculation. Didn't mean to spread mis-information. I'm probably still going to wait for root, but it's nice to know there is an alternative.

Private DNS ad-blocking

I used to always unlock bootloaders, install TWRP, flash clean Android and load up AdAway until my latest S20 acquisition. The intention was to wait out the 2yr warranty period and then do it until I learned that ad blocking was possible using the Private DNS setting.
Over the first days of using my new S20 I was really shocked at the volume of crap blasting at me that AdAway was blocking in the past, so trying out Private DNS was a welcome relief (dns.adguard.com).
It's only been a few days since I've done this and I just applied the setting to the wife's (stock) Huawei P20 Pro, and yes a large volume of ads are now missing, a sight for very sore eyes.
Just wondering if others have had positive and/or negative experiences using Private DNS for ad blocking. I saw Pixel 2s were rebooting but I'm sure the latest versions of Android would have sorted this by now. I haven't experienced anything untoward so far but I'm a very light user and only had the phone 4 days.
Works great for me! No more Blokada, DNS66, et al. Been using this since my Note 9.
Install youtube vanced and you're all set.
Tried dns.adguard.com before but some ads were still going through so i stuck to blokada, but now it seems to work fine, no more vpn icon
Used AdAway on rooted devices too ... with dns.adguard.com i had no problems while using it .... if you want, try this.. dns.keweon.center ..which i currently use...also excellent DNS
No need to use VPN Ad blockers.
Instead of dns.adguard.com use nextdns.io
Get free account and configure it as You want, with many filters full loging etc. It's better than AdAway.
Then You can set private dns to Your custom nextdns config.
krogoth said:
No need to use VPN Ad blockers.
Instead of dns.adguard.com use nextdns.io
Get free account and configure it as You want, with many filters full loging etc. It's better than AdAway.
Then You can set private dns to Your custom nextdns config.
Click to expand...
Click to collapse
Thanks for this tip.
I've just set it up after a week of quite successful dns.adguard.com ad blocking but I really like the enormous flexibility of nextdns.io and its (potential) threat protection, as well as the logging (in CH) and analytics. Reminds me of OpenDNS but with ad blocking as well!
I have recommended it to a friend with two younger boys, he might appreciate the content filtering side for them, but generally the one thing that has irked me about smartphones is the potential for accidentally landing on a new malware site even if it is unlikely to infect Android.
The problem with the any DNS or VPN based blocking method: Chrome will randomly stop functioning whenever I am connected to any wifi network.
It will just stop loading random sites, not show all pictures in Google Image search, not show anything anymore when you click back and forward or just stop loading anything at all.
Go to mobile connection, it immediately works. Disable the DNS/VPN blocker, it immediately works.
Reconnect wifi, it will work again for a while. Can be two days, can be ten minutes. It's completely random.
I am not able to figure out ANY reason why this is happening.
I know Chrome has its own DNS resolver and you should disable it when using DNS based blocking methods (disable async dns resolver and clear dns cache), and while this fixes the problem that not all ads are blocked in a reliable way, it doesn't fix the wifi connection loss.
Using DNS or VPN based blockers only cause problems in Chrome, no other app.
I know I could just switch browsers, its just that I use Chrome on desktop as well and like the synced bookmarks.
Does anyone have any idea why using a VPN/DNS based adblocker would cause Chrome to specifically stop working randomly only in a wifi network, but not via mobile?
I have had this issue over several devices and Android versions for years now and I can't figure it out.
fBx said:
Does anyone have any idea why using a VPN/DNS based adblocker would cause Chrome to specifically stop working randomly only in a wifi network, but not via mobile?
Click to expand...
Click to collapse
Does it happen only on your home network? If so, are you using additional adblockers such as Pi-hole or dns.adguard..com as your router's default DNS?
Interesting that it happens only with mobile Chrome. Just another reason to stop using Chrome....
just use Disconnect Pro instead, Adblock through KNOX.
Sorry guys you all lying to urselfs... best adblock is still only via root available! Energized or AdAway is where it's at.
chieco said:
Sorry guys you all lying to urselfs... best adblock is still only via root available! Energized or AdAway is where it's at.
Click to expand...
Click to collapse
Thanks captain obvious! Now go root my north american snapdragon s20...
Adguard for Android is nice, not the app store version either. It's on adguard.com
Sent from my SM-G988U using Tapatalk
[email protected] said:
just use Disconnect Pro instead, Adblock through KNOX.
Click to expand...
Click to collapse
This is a fantastic solution!
[email protected] said:
just use Disconnect Pro instead, Adblock through KNOX.
Click to expand...
Click to collapse
Thank you for this! I missed adhell so much since it worked through Knox as well. Right now I'm running private dns on my phone from adguard and I'm going to use this app along with it as well.
Just go buy a Raspberry Pi Zero W and throw an SD card into it, install Pihole on it and VPN into your home network. Most modern routers have a VPN server built into them, Samsung phones all have a VPN client built in, and you can get a Pi Zero for $10 (or under $20 bundled with an MicroSD if you don't have one lying around from an old phone).
No root or special software on the phone end needed, and once the Pi is set up it's plug and play.
---------- Post added at 05:51 PM ---------- Previous post was at 05:40 PM ----------
sublimaze said:
Does it happen only on your home network? If so, are you using additional adblockers such as Pi-hole or dns.adguard..com as your router's default DNS?
Interesting that it happens only with mobile Chrome. Just another reason to stop using Chrome....
Click to expand...
Click to collapse
Chrome is purposely crippled to do this - there's even a dev flag to disable the behavior. It's the main reason I stopped using it and disabled it entirely. I went to Samsung's browser and have actually been really happy with it - the dark mode actually makes all web sites dark, even the ones that don't work with Chrome's.
Thank you.
Do you see any issues accessing very secure sites like banks thru the DNS blocks?
sublimaze said:
Does it happen only on your home network? If so, are you using additional adblockers such as Pi-hole or dns.adguard..com as your router's default DNS?
Interesting that it happens only with mobile Chrome. Just another reason to stop using Chrome....
Click to expand...
Click to collapse
rustyram02 said:
Do you see any issues accessing very secure sites like banks thru the DNS blocks?
Click to expand...
Click to collapse
If the blocker is doing its job correctly, it shouldn't have issues with any legit site. This actually protects you since most of the blockers also block malicious domains so if you accidentally click a phishing link it *might* keep you from getting to it.
The problems you WILL see if that sponsored results in search engines will stop working, because they route through an ad site rather than directly to the thing you want to go to. Once you get used to ignoring the top few results in Google, it's not so bad. There's also the issue of sites that block you if they detect an ad blocker. Most sites aren't smart enough to be able to detect a DNS based blocker, but if they are you will either not be able to use the site, or you'll need to turn the DNS blocker off or whitelist the site while you do.
Illrigger said:
If the blocker is doing its job correctly, it shouldn't have issues with any legit site. This actually protects you since most of the blockers also block malicious domains so if you accidentally click a phishing link it *might* keep you from getting to it.
The problems you WILL see if that sponsored results in search engines will stop working, because they route through an ad site rather than directly to the thing you want to go to. Once you get used to ignoring the top few results in Google, it's not so bad. There's also the issue of sites that block you if they detect an ad blocker. Most sites aren't smart enough to be able to detect a DNS based blocker, but if they are you will either not be able to use the site, or you'll need to turn the DNS blocker off or whitelist the site while you do.
Click to expand...
Click to collapse
Yeah I stopped clicking the top search results a long time ago. I was an avid AdGuard user, but their app used too much battery. I changed my default DNS to dns.adguard.com and it blocks ads as well as their app, without the battery hit.
In 2017, I purchased two Adguard lifetime licences for $10/each ($20 total), one of my best purchased ever! Now the same license is $70/each.
Have not had a need to root and still no ads on our phones for years now!

Question Hacked pixel 6

Can anyone help me carrier unlock my Verizon phone? My phone has been hacked and I hope being able to flash it will help me to get rid of whatever they have done to it. Can anyone tell me why I get this message when I reset my phone? Any help would be greatly appreciated
there is no carrier unlock for VZW models. if you can boot into recovery, sideload the OTA version that was last on your device.
What did you do that resulted in the phone being hacked? With the sectors being wiped that are shown in the images, it looks like you have provided total device access to something whilst having an unlocked bootloader or something similar. If you let us know what happened, it might help us to figure out what options you may still have.
But definitely see if you can do what @uicnren mentioned first.
Im not sure who or how they wiped anything. It happened one day after connecting to my girlfriends wifi. I got ahold of Verizon and they sent me a new phone and as soon as I started it the same thing happened to it also
How do I find what OTA version was used on my phone?
Nothing hacked here... this is an error when wiping the Secure Element (the trusted secure module).
(https://android-review.linaro.org/p...cure_element/1.0/SecureElementHalCallback.cpp line #66)
Are you initiating the wipe from the recovery? If so, that's likely the reason. If there is an account attached to the device, a wipe must first be initiated from within Android (Settings)
Woodruff87 said:
Im not sure who or how they wiped anything. It happened one day after connecting to my girlfriends wifi. I got ahold of Verizon and they sent me a new phone and as soon as I started it the same thing happened to it also
Click to expand...
Click to collapse
what symptoms were you seeing that made you think you were hacked?
Those errors are normal in Recovery Mode. I see them all the time, sometimes they don't appear, usually they do.
Did you remove your google accounts from settings, do a factory reset from the reset menu and lastly in recovery mode where you posted the screenshots from.
Your Account might be hacked but the phone is unlikely hacked. You would get a message at boot telling you that the device has been modified. With a locked bootloader its extremely unlikely (unless NSO Group is targeting you).
Woodruff87 said:
Can anyone help me carrier unlock my Verizon phone? My phone has been hacked and I hope being able to flash it will help me to get rid of whatever they have done to it. Can anyone tell me why I get this message when I reset my phone? Any help would be greatly appreciated
Click to expand...
Click to collapse
Did you unlock the bootloader? Have custom firmware/kernel installed?
A "hacker" wins nothing by resetting/wiping your phone. They want data, and that only works if the phone can turn on and works. This looks like a wipe/factory reset gone wrong, which spells user error or software error and less likely a "hacker" attack. Most hacks you will never notice. A hacker that makes you notice that something went wrong, is either an amateur or did it on purpose. Ergo, he wants you to know that something went wrong, which usually only happens in order to extort you. If there is no extortion, then an obvious act by a hacker is highly unlikely.
We need some more information. What firmware had you installed? What happened exactly when. Did you install any new apps recently? What did you do prior to something going wrong? All the information that could help us troubleshoot your issue.
You said your phone wiped itself a day after connecting to your girlfriends wifi, and that a replacement device that you got sent by your carrier, did the same. Did you check your Google account? Do you have two factor authentication activated? It sounds like your phone got wiped over wifi, which would require access to your Google account. It's just odd that you get errors, which normally shouldn't happen if someone would use the erase a lost Android device function.
It's also possible that your backup from your GAccount is simply corrupted (many people had issues with random reboots). You should try and set up your (replacement) phone anew without any backup, maybe that can fix your issue.
Beyond that Google account thing-y, anything else is highly unlikely. Even specialized companies have serious issues getting into a modern smartphone, lest alone an Android 12 phone with a Google Server grade Titan m2 chip. The newer the firmware, the less likely the chance that someone from the outside could get in, especially with a phone like a Pixel that isn't very common. Most security firms/govermental agencies can only abuse older, known security loopholes. It's more likely that very popular phones like a Samsung or IPhone are targets from "the bad guys", since there will be bigger payoff for breaking the security of those phones, since there is a greater pool of users to target. Most hacks I've witnessed weren't random, they were targeted. Ask yourself: Am I worth the trouble of getting hacked? Do you have anything of interest on your phone that would warrant an excessive use of resources? Managing to hack a Pixel is not only unlikely in terms of the security you need to breach, but also in terms of the potential payoff in relation to the necessary knowhow and resources. It's just "not worth it".
What you should do immediately, just in case, is secure your Google account. Change your password. Maybe even change your two-factor authentication, if you have one (sms is not secure, use a token generating software/device). Change the wifi password from your girlfriend and check the list of connected devices. make a list of these connected devices + history (find that in the rooter software) and check them against the devices you know of. Also check the list of connected devices to your GAccount. Use the option to log out ALL devices from your Google account, so only your device is connected.
Do any other people have access to your phone? Do any other people know your passwords? Does your girlfriend has access? Do any other people have biometric security saved on your phone? Do you trust your girlfriend completely?
Make sure you use a special, new password for your GAccount, never reuse old ones that you have used somewhere else. Also check your emails on https://haveibeenpwned.com/
Beyond that, if you are not doing already, use a password manager.
Woodruff87 said:
Im not sure who or how they wiped anything. It happened one day after connecting to my girlfriends wifi. I got ahold of Verizon and they sent me a new phone and as soon as I started it the same thing happened to it also
Click to expand...
Click to collapse
Wait a sec. Verizon sent you a new (refurbished probably but new nonetheless) phone and when you turned it on weren't you greeted with the startup menu? Am I missing something?
Morgrain said:
Did you unlock the bootloader? Have custom firmware/kernel installed?
A "hacker" wins nothing by resetting/wiping your phone. They want data, and that only works if the phone can turn on and works. This looks like a wipe/factory reset gone wrong, which spells user error or software error and less likely a "hacker" attack. Most hacks you will never notice. A hacker that makes you notice that something went wrong, is either an amateur or did it on purpose. Ergo, he wants you to know that something went wrong, which usually only happens in order to extort you. If there is no extortion, then an obvious act by a hacker is highly unlikely.
We need some more information. What firmware had you installed? What happened exactly when. Did you install any new apps recently? What did you do prior to something going wrong? All the information that could help us troubleshoot your issue.
You said your phone wiped itself a day after connecting to your girlfriends wifi, and that a replacement device that you got sent by your carrier, did the same. Did you check your Google account? Do you have two factor authentication activated? It sounds like your phone got wiped over wifi, which would require access to your Google account. It's just odd that you get errors, which normally shouldn't happen if someone would use the erase a lost Android device function.
It's also possible that your backup from your GAccount is simply corrupted (many people had issues with random reboots). You should try and set up your (replacement) phone anew without any backup, maybe that can fix your issue.
Beyond that Google account thing-y, anything else is highly unlikely. Even specialized companies have serious issues getting into a modern smartphone, lest alone an Android 12 phone with a Google Server grade Titan m2 chip. The newer the firmware, the less likely the chance that someone from the outside could get in, especially with a phone like a Pixel that isn't very common. Most security firms/govermental agencies can only abuse older, known security loopholes. It's more likely that very popular phones like a Samsung or IPhone are targets from "the bad guys", since there will be bigger payoff for breaking the security of those phones, since there is a greater pool of users to target. Most hacks I've witnessed weren't random, they were targeted. Ask yourself: Am I worth the trouble of getting hacked? Do you have anything of interest on your phone that would warrant an excessive use of resources? Managing to hack a Pixel is not only unlikely in terms of the security you need to breach, but also in terms of the potential payoff in relation to the necessary knowhow and resources. It's just "not worth it".
What you should do immediately, just in case, is secure your Google account. Change your password. Maybe even change your two-factor authentication, if you have one (sms is not secure, use a token generating software/device). Change the wifi password from your girlfriend and check the list of connected devices. make a list of these connected devices + history (find that in the rooter software) and check them against the devices you know of. Also check the list of connected devices to your GAccount. Use the option to log out ALL devices from your Google account, so only your device is connected.
Do any other people have access to your phone? Do any other people know your passwords? Does your girlfriend has access? Do any other people have biometric security saved on your phone? Do you trust your girlfriend completely?
Make sure you use a special, new password for your GAccount, never reuse old ones that you have used somewhere else. Also check your emails on https://haveibeenpwned.com/
Beyond that, if you are not doing already, use a password manager.
Click to expand...
Click to collapse
Thanks I really appreciate the help and all the advice. I checked https://haveibeenpwned.com/ and my account has been pawned in 1 data breach... I will deactivate the Google account and start over fresh. Thanks again for all the info
bencozzy said:
Two things are they refurbished? And do they work without signing into google?
Click to expand...
Click to collapse
The first one was new, but the one I got from Google as a replacement was refurbished. Ill try resetting through the settings and deactivating all my accounts.
Woodruff87 said:
Thanks I really appreciate the help and all the advice. I checked https://haveibeenpwned.com/ and my account has been pawned in 1 data breach... I will deactivate the Google account and start over fresh. Thanks again for all the info
Click to expand...
Click to collapse
This, among many other things, is one of the reasons I use GrapheneOS and NO gooble services (despite all the attention they give to sandboxed gooble services).
Woodruff87 said:
Thanks I really appreciate the help and all the advice. I checked https://haveibeenpwned.com/ and my account has been pawned in 1 data breach... I will deactivate the Google account and start over fresh. Thanks again for all the info
Click to expand...
Click to collapse
your google address was found on that site for another service and you used the same password for both services, correct?
despite what some believe, your google account will not get hacked unless your password is insecure (ie. leaked or insufficient with 2FA). anything less and your asking for trouble (also using GrapheneOS).

Categories

Resources