Nexus 4 & 5 security vulnerability uncovered - Nexus 5 General

A Security researcher andhacker, named John Gordon,has found an easy way to bypass the security of locked smartphones running Android 5.0 and 5.1 (Build LMY48M). Many of us use various security locks on our devices like Pattern lock, PIN lock and Password lock in order to protect the privacy of our devices. However, a vulnerability could now allow anyone to take your Android smartphone (5.0 build LMY48I) with locked screen, perform a "MAGIC TRICK" and as a result crash the user interface (UI) for the password screen and gain access to your device.
The vulnerability, assigned CVE-2015-3860, has been dubbed as "Elevation of Privilege Vulnerability in Lockscreen".
How the Attack Works?
The secret behind the researcher's "MAGIC TRICK" is as follows:
Get the device and open the Emergency dialer screen. Type a long string of numbers or special characters in the input field and copy-n-paste a long string continuously till its limit exhausts.
Now, copy that large string. Open up the camera app accessible without a lock. Drag the notification bar and push the settings icon, which will show a prompt for the password.
Now, paste the earlier copied string continuously to the input field of the password, to create an even larger string.
Come back to camera and divert yourself towards clicking pictures or increasing/decreasing the volume button with simultaneously tapping the password input field containing the large string in multiple places.
All this is done to make the camera app crash. Further, you will notice the soft buttons (home and back button) at the bottom of the screen will disappear, which is an indication that will enable the app to crash.
At this time, stop your actions and wait for the camera app to become unresponsive.
After a moment, the app will crash and get you to the Home Screen of the device with all the encrypted and unencrypted data.
Now without wasting time go to Settings > Developer Options > Enable USB Debugging and control the device by installing the Android Debug Bridge (ADB) utility.
In addition to this, if we notice the number of users with Android 5.0 and 5.1 with hardware compatibility as Nexus 4 and software installed as Google factory image - occam 5.1.1 (LMY47V) are less.
Therefore, the risk associated will affect those users only.
Furthermore, for those users we have a good news that is - the patch has released for the vulnerability and is made public by Google.
My question is, will it also affect other L users???

First off:
That text formatting,</thread> also, this will affect anyone running Roms with pretty much unaltered SystemUI based on 5.1.1_r8 (or lower)
Roms that alter heavily SystemUI (i.e samsung and lg stock roms) are unaffected. hence this issue didnt get a wide spread across news sites

opssemnik said:
First off:
That text formatting,</thread> also, this will affect anyone running Roms with pretty much unaltered SystemUI based on 5.1.1_r8 (or lower)
Roms that alter heavily SystemUI (i.e samsung and lg stock roms) are unaffected. hence this issue didnt get a wide spread across news sites
Click to expand...
Click to collapse
Thanks for informing me. But sure that WILL affect users of CyanogenMod, Cataclysm and other non-modded AOSP based ROMs.
Sent from my HTC Desire 616 dual sim using Tapatalk

MSF Jarvis said:
Thanks for informing me. But sure that WILL affect users of CyanogenMod, Cataclysm and other non-modded AOSP based ROMs.
Sent from my HTC Desire 616 dual sim using Tapatalk
Click to expand...
Click to collapse
Cm has already merged r14 so its safe, cataclysm is based stock roms, so if it has a version for the lastest, then its also safe.
any rom with code base post r8 its safe, which afaik should be a lot of them.RR, rastapop,omni,cm,chroma,D.U. are the ones i remember that has the fix
if you want a deeper look, see if the rom has this fix
https://android.googlesource.com/platform/frameworks/base/+/8fba7e6

opssemnik said:
Cm has already merged r14 so its safe, cataclysm is based stock roms, so if it has a version for the lastest, then its also safe.
any rom with code base post r8 its safe, which afaik should be a lot of them.RR, rastapop,omni,cm,chroma,D.U. are the ones i remember that has the fix
if you want a deeper look, see if the rom has this fix
https://android.googlesource.com/platform/frameworks/base/+/8fba7e6
Click to expand...
Click to collapse
Whew. Now as I think, I remember my cousin's N5 getting a ~100 MB FOTA update, maybe that includes the r14 fix.
Sent from my HTC Desire 616 dual sim using Tapatalk

Mod Edit
Thread Closed at OP request
ronnie498
Senior Moderator

Related

More Cupcake questions

"cupcake" development branch
A link to this was posted on the G1-Hackers mailing list. I haven't seen it here yet so I figured I would share. You can find the original post at http://source.android.com/roadmap/cupcake.
---------------------------------------------------------------------------------
"cupcake" development branch
From http://source.android.com/roadmap:
During Android's transition to anopen-source project, some development has continued to happen in aprivate branch. We are working to move the rest of these changes intothe open as soon as possible, and all future open-source work willhappen in the public git repositories. All changes that have alreadybeen submitted to the public repositories will be merged into the newercode base, so nothing should be lost.
The Android team has begun pushing these changes to the public git repositories, in the "cupcake" branch.
About this code drop:
The "cupcake" branch is a read-only mirror of the private Android branch.cupcake is still very much a work in progress. It is a development branch, not a release.
Thefirst drop is a large roll-up commit of all of the changes sincerelease-1.0. We will transition to regular, smaller roll-up drops,ultimately pushing individual commits.The cupcake branch willbe merged into the master branch, so that all of the public patches canbe used with the new code base. None of the commits in the publicrepositories will be lost, unless they no longer make sense or areobsoleted by the new code base. Due to the United States' holidayseason, though, this may not be finished until early January.
To check out the cupcake branch:mkdir cupcake # create a new client directory
cd cupcake
repo init -u git:/android.git.kernel.org/platform/manifest.git -b cupcake
repo sync
Notable changes introduced in cupcake:
Applications
MMS
New features
Save attachments from MMS.
Significant bug fixes
Faster conversation list scrolling
Email
Significant bug fixes
Accounts that were marked "never check" are not auto-checked.
Date & time displayed using user preference (e.g. 24 hr vs. AM/PM).
cc: displayed in message view.
Relaxed POP3 parser rules so it works with non-compliant email servers.
Password quoting bugs in IMAP. Makes it work for users with funny chars in their password (e.g. spaces).
Various sources of errors in auto & manual account setup.
Improvements on how we report various connection errors. Makes it much easier for user to diagnose failed account setups.
New-mail notifications for POP3 accounts.
Properly recover from POP3 connection failures, so that the next connection has a chance of working properly.
Remove automatic accounts setup entries that were broken or nottestable. Minor fixes to a few of the remaining entries. Improvementsto warning dialogs used for a few special cases.
New accounts are now set to check every 15 minutes (instead of defaulting to "never").
Fixed a bug causing approximately 1 in 25 outbound messages to freezeup the IMAP connection (to a Gmail based server) when transferred tothe Sent folder. This broke the entire connection so new messagescould not be downloaded either.
Unit test framework so Email can be extended & tested more reliably.
Fix IMAP manually-created accounts so message delete works properly.
Alarm Clock
Significant bug fixes
Alert now plays audio/vibe directly, rather than through AlarmManager.AlarmClock alert starts playing audio/vibe in its IntentReceiver,rather than on activity start. These changes should prevent alarms frombeing blocked by modal dialogs.
Package Installer
Significant bug fixes
Bugs related to replacing existing applications.
Settings
New features
New menu option to list running processes in Settings->ManageApplications.
Music
New features
Music playback fades in after suspending for phone call.New media search intent allows for 3rd party apps to launch or respondto media searches based on artist, album, or title.
Affects: MusicPlayer, YouTube, Browser applications.
Browser
New features
Updated WebKit browser core, synced with Nov 2008 WebKit version.
Support for new, optimized JavaScript engine (SquirrelFish).
Copy/ paste is enabled in the browser. To copy with touch, press and holdthe shift key and select the text. Releasing the shift key or endingthe touch drag copies the text. To copy with the trackball, press andhold the shift key, move the cursor to the selection start, click thetrackball, and move the trackball to the extend the selection.Releasing the shift key, or clicking the trackball a second time,copies the text.
Find is enabled in the browser. To find text, choose it from the menu and type the text to find.
Drawinghas been sped up substantially by supporting partial contentinvalidates and partial screen invalidates. Pages with animations are5x faster.
VoiceDialer
New features
VoiceDialer supports 'open app' command
Camera/Gallery
New features
Video recorder mode
Share intent for videos
Video thumbnailsLocal file playback
Download manager
New features
Support for HTTP codes 301, 302, 303 and 307 (redirects).
HTTP code 503 is now handled, with support for retry-after in delay-seconds.
Downloads that were cleanly interrupted are now resumed instead of failing.
Applications can now pause their downloads.
Retry delays are now randomized.
Connectivity is now checked on all interfaces.
Downloads with invalid characters in file name can now be saved.
"cupcake" development branch continued
Framework
New features
Support of touch events in WebView.New JavaScript engine (SquirrelFish) in WebView.
Input method framework, for soft keyboards and other on-screen inputmethods. Includes new APIs for applications to interact with inputmethods, and the ability for third party developers to write their owninput methods.
Access to the raw audio data for playback and recording from application code.
New PendingIntent.FLAG_UPDATE_CURRENT option.
Support for top-level boolean resources.
Tactile feedback to the LockPatternView. Tactile feedback can beenabled/disabled by going to Settings > Security & location andthen checking/unchecking "Use tactile feedback". Note that this can beused independently of the visual feedback of the lines ("Use visiblepattern"). Thus it gives users a middle ground between showing thelines on the screen and having no feedback at all.
PackageManager changes to support un-installation ofpartially installed applications. Added new flagPackageManager.GET_UNINSTALLED_PACKAGES to include partially installedapps in all relevant PackageManager api's. ManageApplications screennow lists such partially installed apps and the user can uninstallthese applications completely.
Support third party updates of system applications. Newmenu options in Settings->ManageApplications to list updated systemapplications.
Framework support to list current running processes. New API in ActivityManager.
Framework feature to declare required configurations by applications.New manifest attribute uses-configuration in android manifest.
Hardware accelerated video encode (video recorder) in opencore.
Simplified SREC speech recognition API available.
Streaming audio I/O for applications.
Significant bug fixes
Fixed issues with saving state in the view hierarchy, so that you canproperly subclass from something like TextView and create your ownstate that inherits from that provided by TextView.
TextView now implements onKeyMultiple(), so that flinging the trackballwill result in accelerated scrolling. This required some changes tomovement methods, and included some improvements to the accelerationcomputed when flinging.
Framework bug fixes in PackageManager to share/un-share permissions for applications with shared uid's.Significant rework of Settings->ManageApplications Performance and UI enhancements.
Anumber of settings in android.provider.Settings.System were moved toandroid.provider.Settings.Secure. Only system software can modify thesesettings. Additionally, a new permission, WRITE_SECURE_SETTINGS, isrequired to access these settings. The old constants in Settings.Systemhave been deprecated. It is possible to read settings values viaSettings.System using the deprecated constants. However, attempts tomodify these settings via Settings.System will result in a log messageand the setting value will be left unchanged.Many bug fixes in the media framework
Bluetooth
New features
Support for A2DP & AVRCP profiles.
Significant bug fixes
First connection after pairing always fails on many carkits.
Mini Cooper and some late model BMW cars fail to use Bluetooth or take 2 minutes for Phone Book transfer.
System software
New features
New kernel based on Linux 2.6.27.
Improvements to the wakelock API.
Work to transition to the USB Gadget Framework underway.
Basic x86 support.
Radio & Telephony
New features
SIM Application Toolkit 1.0.
Green CALL button is no longer a shortcut for "add a new call". Thishas been a rarely used feature and confusing if triggered accidentally.
Longer in-call screen timeout when using the speakerphone.
"Show dialpad" / "Hide dialpad" item added to the in-call menu, to make it easier to discover the DTMF dialpad.
Significant bug fixes
An obscure case where the Phone UI could cause the device to not go tosleep on its own. This would happen if user bails out of the in-callscreen by hitting HOME, followed by the call disconnecting remotely. Don't allow a single tap to open the in-call dialpad. Itis now required to touch and drag it. This makes it much harder toaccidentally open the dialpad by touching the screen with your face.
Developer Tools
New features
Enable handset manufacturers to extend the Android SDK with add-ons. SDK add-ons will include:
systemlibraries to let developers use additional APIs provided by handsetmanufacturers or from other 3rd party vendors that handsetmanufacturers chose to include
emulator system images,skins, and hardware configuration to let developers test theirapplications on their Android implementation
This is work-in-progress. Please note that the latest Android SDK (Android 1.0 SDK, Release 2) is not compatible with the SDKplugin in the new branch, please use ADT 0.8.0. SDK add-on support is planned for future SDK release.
Build System
New features
The functions in build/envsetup.sh should be much more useful
nice, this is some secret undercover stuff that is much needed!! you all rock!
hbguy
I'm wondering would it be available to install for non-jailbraked phone?
worry said:
I'm wondering would it be available to install for non-jailbraked phone?
Click to expand...
Click to collapse
We are talking about Android source code here. It would need to be compiled appropriately to even flash to any phone. Your phone would still subject it to the same key test before it will flash it. So, No this won't work... Yet. Hopefully we will find a way to sign these images with the OTA keys instead of just test keys as we do now.
"Chicken Soups for Andy Phones"
Yes, I am aware of you should compile it first.
So you are saying, since it is not officially signed by google, you'll be able to install it only on dev or has-proper-boot-image phones?
wait, how do we get all these updates in the future though? sdk?
also what you mean as finding a way to sign these images with ota keys instead of just test key? meaning with jf's mod rc30 we could get these update?
hbguy
man, well these were a few of the things that i wanted to see changed its good that they are keeping in touch with the ppl runnin the app. this is very compelling information. can i suggest and addendum to the title, something alluding to the "update" nature of this dev team. i dont think theres a date, but ill def be willing to pick a G1 back up for that, esp if they managed to make a few of the processes faster.
hbguy said:
wait, how do we get all these updates in the future though? sdk?
also what you mean as finding a way to sign these images with ota keys instead of just test key? meaning with jf's mod rc30 we could get these update?
hbguy
Click to expand...
Click to collapse
Cupcake can't be built to run on Dream hardware yet. Not to worry as an OTA RC with the cupcake code drops should be available by year's end or early Jan 09.
Support third party updates of system applications. New menu options in Settings->ManageApplications to list updated system applications.
Click to expand...
Click to collapse
I haven't had a chance to look into it too much but, depending on the applications and files made accessible, this looks very promising. Things like the autorotating browser, maybe even skinning, could potentially be "legitimized" and no longer require root.
so how would one go about compiling to run on the dream?
korndub said:
so how would one go about compiling to run on the dream?
Click to expand...
Click to collapse
Right now...... You wait. There isn't 100% of the code here. Nothing specific to the dream hardware etc. I am hopeful we will be seeing things come soon though.
As far as what I meant about the keys... Right now in order to be able to flash an update that is signed with test keys, aka the keys we have right now, you need to use an exploit to gain root access and modify the keys the system looks for when updating. There are two possible ways that I see to get OTA RC30 flashed with with an unofficial image. The first way is for some ingenious person to find an exploit that can be used to obtain root again and therefore be able to change the keys the system looks for. The other option would be for someone to come up with a way to sign the image with the OTA keys.
kronarq said:
Right now...... You wait. There isn't 100% of the code here. Nothing specific to the dream hardware etc. I am hopeful we will be seeing things come soon though.
As far as what I meant about the keys... Right now in order to be able to flash an update that is signed with test keys, aka the keys we have right now, you need to use an exploit to gain root access and modify the keys the system looks for when updating. There are two possible ways that I see to get OTA RC30 flashed with with an unofficial image. The first way is for some ingenious person to find an exploit that can be used to obtain root again and therefore be able to change the keys the system looks for. The other option would be for someone to come up with a way to sign the image with the OTA keys.
Click to expand...
Click to collapse
kronarq is there a way to merge the existing source with the cupcake to fill in the parts that are missing?
Anyone else having problems pulling the source with repo?
hbguy said:
nice, this is some secret undercover stuff that is much needed!! you all rock!
hbguy
Click to expand...
Click to collapse
This was not "undercover" work. Google wanted to be able to work on stuff, yet release the G1 with a semi-stable firmware.
kronarq said:
We are talking about Android source code here. It would need to be compiled appropriately to even flash to any phone. Your phone would still subject it to the same key test before it will flash it. So, No this won't work... Yet. Hopefully we will find a way to sign these images with the OTA keys instead of just test keys as we do now.
Click to expand...
Click to collapse
This won't be the case. This is an official Google release, meaning when they merge them together in January, they will release an OTA update with all of these features.
I'm hoping there will be an OTA update with all these new goodies, but just because google is rolling "cupcake" into the open-source project, that does not mean that it will get rolled out to our G1's. That's up to T-Mobile and HTC. Let's just keep our fingers crossed.
Ok, maybe I'm missing something, but where are people getting the idea that this is not dream specific? From how I read it these are all things that are being built into the main source and as such will be compiled as an ota as other updates have been done in the past. Someone enlighten me here as I'm just not seeing the "specific" requirements people are putting on this? I'm no coder, but it doesn't look like anything more then just enabling what was already there or planned on being there. [/rant?]
MMTest97 said:
Ok, maybe I'm missing something, but where are people getting the idea that this is not dream specific? From how I read it these are all things that are being built into the main source and as such will be compiled as an ota as other updates have been done in the past. Someone enlighten me here as I'm just not seeing the "specific" requirements people are putting on this? I'm no coder, but it doesn't look like anything more then just enabling what was already there or planned on being there. [/rant?]
Click to expand...
Click to collapse
Agreed... everything that is dream specific is either on the android git repository or can be extracted from stock G1 Firmware
MMTest97 said:
Ok, maybe I'm missing something, but where are people getting the idea that this is not dream specific? From how I read it these are all things that are being built into the main source and as such will be compiled as an ota as other updates have been done in the past. Someone enlighten me here as I'm just not seeing the "specific" requirements people are putting on this? I'm no coder, but it doesn't look like anything more then just enabling what was already there or planned on being there. [/rant?]
Click to expand...
Click to collapse
Everything in the open source repository should be non-device specific (with the obvious exception of stuff like binary drivers). The repo will build an emulator image. To build for dream, there are some additional instructions. However the cupcake branch cannot be built for Dream at this time, so it is definitely not Dream-specific.
Datruesurfer said:
Agreed... everything that is dream specific is either on the android git repository or can be extracted from stock G1 Firmware
Click to expand...
Click to collapse
The differences between G1 and the repo extend beyond just Google-proprietary apps. There are subtle differences in the framework too.

Remote Wipe Vulnerability

Hi Guys, the browser hack that wipes Samsung phones is not limited to just those handsets. These guys do a better job of describing the whole thing:
http://www.theverge.com/2012/9/26/3412432/samsung-touchwiz-remote-wipe-vulnerability-android-dialer
Here is a direct link to the exploit test:
http://dylanreeve.com/phone.php
I'm running MavRom4 with the China telco radio image and my device is vulnerable. Just wanted to share the info so people are aware; having two dialers and no default will force the exploit to ask you to actively pick a dialer; this would neutralize most cases but that is a pretty annoying work around.
Maybe people can post D3 Roms that aren't vulnerable.
majatt said:
I'm running MavRom4 with the China telco radio image and my device is vulnerable. Just wanted to share the info so people are aware; having two dialers and no default will force the exploit to ask you to actively pick a dialer; this would neutralize most cases but that is a pretty annoying work around.
Click to expand...
Click to collapse
Also, installing DialerOne and making it the default will protect you as well - you do not have to leave it without a default dialer set. DialerOne is actually a good dialer - I used to use it with my Droid Eris with CyanogenMod ROMs, in order to have the dial by name function that the Sense dialer supported back. And you can still leave the stock dialer set in a home page or on the launcher dock - it will still work if you call it up. It will not be called up if you launch the dialer from another app, though, if you make DialerOne the default.
The stock dialer is vulnerable - a predictable result, based on the vulnerability of MavRom, but I did want to say that I tested it. I haven't tested any other ROM - at this point, I don't have much time to try some out, and I think I recently deleted my most recent Liberty and Bionic Nandroid backups.
Let's see how long before Moto releases a critical patch update for stock.
Thanks, this is good to know. I thought it was only Samsung phones that had the issue, but since I'm still on stock 2.3.4 it appears I'm vulnerable. I have GrooveIP Lite installed on my phone, an app that allows you to make voice calls with using your Google Voice number. With this app installed I get a complete action using Dialer or GrooveIP window so I should be safe if I get a random popup Ill be sure to not select Dialer.
I heard about this "wipe" problem and when I saw it was just passing dialer codes to the fone I knew it would affect more than just Samsung.
Does anyone know if they have a list started of fones that might be vulnerable?
I read somewhere (though haven't tested it...) that the D3 does not have a dialer code that resets the phone, as the Samsung phones do/did. So, the D3 fails the display the IMEI test, but I believe that the reset code does not work with the D3.
FYI: CM10 kexec isn't vulnerable. Probably b/c it's JB (I think they fixed the vulnerability in JB). I go to the site and dialer pops up w/ *#06# No IMEI displayed
Sent from my AOKP JB GT-P3113 using Tapatalk

[Q] Capture Stylus events before they go to Apps

Reposting from where I previously put this, on the suggestion that folks here might have more idea what I am talking about.
Yes, this is a question but I couldn't see that it fit in better to one of the other forums. If I am wrong please accept my apologies and redirect me, thanks.
I'm trying to work with a custom build of Android based on KitKat to incorporate a stylus, copying some of the functionality (though not code) from Samsung which sells Android-with-stylus builds for e.g. the Note 3. I'm not including details of the specific device because right now I am working on a custom dev device and my aim is to write code which is generic enough to be usable from any Android (based on KitKat). The build (written by others) already incorporates drivers and sends stylus events correctly as motion events etc. Programming at the app level I can receive onHover, onTouch, onClick etc
The specific functionality I am trying to achieve is to pick up a stylus-button-click while hovering. It's perfectly possible to do this in any app, using an onGenericMotion Listener.
However, I want to make my "stylus-action" have system-wide effect - so that anywhere (in any other app, or in the launcher or whatever) I will pick up the event (prior to any other app) and bring up my custom menu. (just like AirCommand in Samsung Note 3) I guess in my custom Android this would then make that particular action somewhat protected or unusable for other users, but I'm ok with that.
In older Android (prior to ICS) you could try something by putting up a System Overlay (i.e in regular app code, without hacking the ROM at all), but this is no longer possible.
This is not an attempt to tapjack or whatever, I understand why this functionality has been removed from the domain of the regular programmer, and I don't want to regress my ROM back to pre-ICS behaviour by allowing the System Overlay hack. Now I am programming the system (if my change is good enough I'd like to submit it back to AOSP) so I would like to know the best method to address this. Since Samsung have already done this, it must be legal (using legal in the terms of "Android will allow it"), and I want to do it right.
Is it possible to write something similar to the System Overlay when you are running from a system service? Or is there a good choke-point to capture events before they are broadcast to the current running apps?
I was looking at (sorry, not allowed to post links) AndroidXRef /frameworks/base/core/java/android/view/View.java specifically in the function dispatchHoverEvent() which looks like a promising place. My naive idea is that I would place code here checking the MotionEvent to see if the button is pressed and if it is, don't call any listeners and instead call my little menu app (or broadcast a custom message, or something anyway). However, I've never written code on the ROM level before (LOTS of experience writing app code) so I don't know if this is a really bad point or a good point to add in code. Should I be putting things at a higher level or a lower one? Will this capture all events or not? Is it all just trial and error?
If this is the wrong place to ask questions like this, please tell me where on XDA I should be asking it. If it's the right place - please answer
Thanks
Kibi

Please Disregard

The application has been pulled out before anybody could buy it, because I felt like it didn't offer something that made it stand out from Delayed Lock (which is an awesome application btw, definitely check it out). I may add a few features in order to make it a bit more competitive and release the app again.
Warning: The application requires root to function.
Introduction:
Loxkip (pron. Lock Skip) is an application which gives you the convenience of easily accessing your phone when you're connected to a chosen secure WiFi network by hiding the lockscreen.
While the idea isn't new, Loxkip does have special attributes that differentiates it from similar applications; most importantly of which are compatibility and reliability.
Click to expand...
Click to collapse
Features:
Should work (theoretically) with any device running android ice-cream sandwich (4.0) and above, including Samsung devices, which usually have problems with similar applications, and even tablets.
Confirmed to be working with Pattern, PIN, Face Unlock and Password, however it should work with any type of lockscreen including fingerprint scanner and other lockscreens.
A battery-friendly design, and a very easy to use UI. Set the application up one time and forget that it's there.
Very reliable due to the root-requiring method used to hide the lockscreen.
Some settings so that you can personalize the behavior of the application to your liking.
Click to expand...
Click to collapse
​
Find the application on Google Play Store
FAQ:
-Q: Will support for Bluetooth devices as secure devices be added in the future?
-A: It depends on the user feedback. If a lot of users request this feature, then I'll look into implementing it.
-Q: What devices has this application been tested on and confirmed to be working?
-A: Most flagship Samsung devices, Nexus 4, Nexus 5, Acer Tablet running AOSP, LG G3 and an HTC One (M7). It has been confirmed to work on all of the aforementioned devices except the HTC One with a very weird issue, incompatibility confirmation required.
Click to expand...
Click to collapse

UNA ROM, Private, Fast, And Good Looking:)

After weeks of hard work we (Setmov and uncle Fab) proudly present you the first Una ROM for the galaxy Grand I9082, based on 4.1.2 XXAMF7.​
DISCLAIMER​As usual, your phone your responsability, we won't take any responsability if it flies out of the window or if your girlfriend/boyfriend runs away with it.
PLEASE, DO READ OP COMPLETELY AND CAREFULLY BEFORE ASKING ANY QUESTIONS, ANSWERS TO MOST PROBLEMS ARE THERE
WHAT IS UNA?​Una is a new concept that takes security to a new level.
Are you tired of seeing so much blatant, outrageous and shameless invasion of your privacy and data mining hidden behind nice sentences like "enhanced use experience" or "complete integration with the system"? We decided to develop secure ROMs where privacy means just that – Private!.
It’s free of charge, we are a non profit structure and we are not here to make big bucks.
WHAT UNA ISN'T​UNA isn't a way to help you to stealthily buy massive destruction weapons to foment a coup d'etat in your favorite banana republic or to prepare the third world war:silly:.
UNA secures what leaves from your phone (ie your personnal data doesn't leak and no app can look over your shoulder to spy your activities), but it can't competely secure what comes into your phone.
Why is that?
Because it's just not possible to fully secure a phone from what comes into it, and anyone claiming to be able to do it is either a liar, or an ignorant, or both.
There are too many attacks, some not well documented, if documented at all, and some unknown to the public, and there are too many ways to hack a phone, especially if the user doesn't use his/her common sense.
If you are the type of person that installs apps from shaddy source and/or warez web sites (sites offering cracked paid apps) chances are that at some point you will unknowingly install a malware or a spyware. The same applies if you click on any link, specially on SMS' and emails, if you let any pop out window appear or if you don't protect your lockscreen with a password/pin/pattern and let anyone get physical access to your phone.
A bit of judgment and common sense can save you a lot of trouble, but there's unfortunately nothing UNA can do about it.
Then, if you use your phone to call through GSM your provider will know where you are. If he didn't you wouldn't be able to make any call, the signal has to find you and there's nothing UNA or anyone can do about it.
The only way to prevent that is to disable the phone functions (but then your phone will turn into a wifi only device) and reenable them when needed, head to the scripts section to learn how to do it.
Last but not least, bear in mind that the agencies have armies of tech savvy henchmen and 10 storeys computers, and tricks we can't even imagine, so think twice and use your brain before you attempt to outsmart them...
UNA IS FOR YOU IF:​. You are willing to learn how to use an unconventional ROM and generally speaking to understand how things work, even if it sometimes requires a little effort to fix this or that little problem (bear in mind that it took us a lot of work to develop Una to where it is now),
. You don't mind a few little occasional bugs here and there that come from all the restrictions the ROM contains,
. You want to take back ownership of your phone from google’s claws.
UNA IS NOT FOR YOU IF:​. All that you care about is the latest gimmick in the latest OS,
. You can't live without the google’s apps,
. You are the kind of person that never reads through the OP and only scroll down to the download section, and then complain that things don't work and/or ask stupid questions in which are answered OP. An example? One guy makes a mod and writes clearly in OP that it's specifically for 4.2.2. Then some people complain: "it doesn't work on 4.4.2"...
If you are that type of person, please do yourself and us both a favour, and close this window now.
ARE WE PARANOID TIN FOIL HATS? OR TERRORISTS? OR CARTEL BOSSES?​Nope, we only are people that don't see why we shouldn't be in control of our phones. Or why our phones can be wiped remotely, why apps or updates or who knows what can be downloaded and installed without asking for our consent, why SMS' can be sent without us to know, why we should pay for the bandwidth used for data mining and unwanted downloads, and why all those activities should deplete our battery and kill our RAM.
You think we are overreacting here?
You don't have to take our word for it, just download and install Network Log from here:
https://f-droid.org/repository/browse/?fdfilter=network+log&fdid=com.googlecode.networklog
Give it root permission, start logging and open some web pages. Come back to Network Log after a few minutes and see for yourself, you'll be surprised (or maybe horrified?) to find out that your android system, your settings, your kernel etc. connect to all sorts of funny IPs, including and foremost google’s.
Now you see what we mean?
It's time to go for Una
UNA'S FEATURES​. Rooted.
. Deodexed.
. Zipaligned.
. Busybox and sqlite installed.
. Init.d support and scripts.
. Auto start disabled for most apps.
. About 120 system apps, 40 framework jars, 30 permissions xmls and 25 libs removed, plus files here and there.
. Very low RAM and CPU consumption, more than 8 hours screen time with the WIFI on, 1% battery decrease every 10-12 hours while in stand by.
. Heavily and extensively modified system, in order to make it secure and prevent it from leaking your data.
. App Settings, Firewall and Xprivacy built-in, and already applied out of the box to make sure you are well protected.
. Xprivacy is a fantastic tool but it has one big limitation, it can't restrict the Android System from accessing your serial numbers and leaking it. For that reason these IDs have been edited as follows:
build.serial (androidboot.serialno) and ro.serialno are both set to "1",
android id is set to "android",
net.hostname is set to "1".
. Wlan serial number set to "00000001" (this number identifies you everytime you connect to the internet, and Xprivacy can't do anything about it).
. USB ID (iSerial) set to 1.
. Unreadable cp access.
. Vulnerabilities patched thanks to Master Key Multi Fix and Fake ID Fix.
. ADB disabled (can be re-enabled, see below).
. By default ADB, all google access (including youtube, blogspot and google search) and the Media Storage are disabled. You can re-enable some or all of them, instructions are in the "HOW TO USE THE ROM" section.
. Plenty of under the hood modifications to make the ROM fast and fluid.
. Multi-purpose navigation keys.
. Call button in contacts.
. Because secure doesn't mean ugly, the whole ROM has been themed with a beautiful green color (if there are enough requests other themes will follow), transparency, and Lollipop HD wallpapers.
. KK style pop-up toasts.
. Multiwindows have been revamped, they are no longer only static in Samsung style but now they can float and be resized too, like on a computer.
. All apps can be opened in floating mode.
. Possibility to choose between different multiwindows layouts in KK's style.
. Heaps of hand picked and carefully scrutinized open source apps.
There are 2 non open source apps (Greenify and Quick Pic) but they are safe, believe me, I have thoroughly examined them. Still, you can always uninstall them if you feel like it.
In time we will develop our own apps, but first we want to see how people respond to the Una concept...
Installed apps/tools​. 920 Editor, to create and edit scripts or text files.
. AF+ Firewall.
. Alarm clock.
. APG, to encrypt messages.
. App Settings, to restrict apps' permissions, change DPI on a per app basis and more.
. Arity, a calculator.
. Conversations, a secure and encrypted chat, modded by uncle Fab for increased security.
. Fdroid, an alternative to the Play Store, and all the apps are open source!
. Floating stickies, to make small notes on the fly.
. FTP Server, to copy files to/from your phone wirelessly.
. Ghost Commander, a very powerful dual panel root file manager.
. Gravity Box, a theming engine.
. Greenify, to make apps behave by hibernating them when not in use.
. K9 Mail, an email client.
. Kernel Adiutor, if you feel like playing with kernel tweaks (but you have to know what you are doing).
. Lightning, a fast and light weight browser.
. Multiwindows Manager.
. Network Log, to check where your apps connect and chase unwanted connections.
. Open Camera.
. Tor (Orbot) for Android, modded by uncle Fab for increased security.
. Orweb, a browser designed to work along with Tor.
. OS Monitor, to monitor and kill your phone's processes, and more.
. Pale Moon, based on Firefox for Android, for a full desktop experience with Mozilla add-ons preinstalled for enhanced security.
. PDF Reader.
. Preferences Manager, to edit the otherwise difficult to read shared_prefs files in data/data.
. Quick Dic, a good selection of free dictionaries.
. Quick Pic, a Gallery app.
. Rmaps, a maps app where you can download maps from various sources for offline use.
. Search Light, a torch.
. Terminal Emulator, fire up your commands and show your phone who is the boss!
. Text Secure, a secure and encrypted SMS app, modded by uncle Fab for increased security.
. Tint Browser, another fast web browser.
. Urecord, to record sounds with different sample rates.
. USB Mass Storage Enabler, to connect your phone to any computer (note that it only mounts the external SD).
. Viper4Android FX, a powerful sound enhancer.
. Viper4Android XHiFi, some more sound enhancements.
. VLC, a video and music player favourite.
. WI-Fi Privacy Police, to secure your connections even better than they already are.
. Xposed Installer, a great framework that enables apps like App Settings or Xprivacy to work.
. Xprivacy, last but not least, the best privacy app.
WHY IS THIS ROM 4.1.2 BASED AND NOT 4.2.2?​
Because Samsung did a complete failure with its 4.2.2 version for Galaxy Grand.
High RAM consumption, no floating windows, bugs.
Plus, the newer the android version the more spying there is, despite google's sweet talk about "enhanced user's experience", the infamous Fused Location being a good example.
INSTALLATION​As usual, make a backup first!
Do backup your contacts and whatever is important because all your apps and data will be erased (your sd card contents won't be deleted though).
Do backup your /system/csc folder, in case you need it for later.
Do backup your efs folder (VERY IMPORTANT).
Open an android terminal from your phone, first type "su" (without the quotes), enter, then type:
busybox dd if=/dev/block/mmcblk0p17 of=/sdcard/efs.img
This will create an efs backup caled efs.img in your sd card.
If you need to restore it type:
busybox dd if=/sdcard/efs.img of=/dev/block/mmcblk0p17
Before you install the ROM, download Philz recovery from here:
http://forum.xda-developers.com/showthread.php?t=2452985
We chose Philz since AFAIK it's the only one that allows you to lock you recovery with a password (highly recommended, if your recovery is not password protected it wouldn't take more than 2 minutes for someone to disable your pattern or pin protected lockscreen and access all your personal data on the phone).
Philz' installation instructions
You need to have Samsung drivers installed.
Boot your phone into download mode (press volume down and power at the same time).
Open Odin 3.07 and connect your phone.
Click on the PDA slot, navigate to where the Philz recovery is located and select it.
DOUBLE CHECK AND MAKE SURE THAT "RE-PARTITION" IS UNTICKED (only "Auto Reboot" and "F.Reset Time" should be selected).
Click start and wait while Odin flashes Philz.
If everything went well your phone will now auto-reboot into the system. Go into recovery, you should see your brand new Philz.
If you are still on stock recovery then repeat the above steps, but this time untick “Auto Reboot” in Odin.
When in recovery, if before you reboot you see a text on the screen displaying “yes – disable flash recovery”, select it to avoid stock recovery overwriting Philz.
Now, download Una from here (scroll down until you get to the download section):
http://unaos.com/
Unzip the ROM and copy it to the backup folder that is inside the clockworkmod folder in your sd card (if there's no backup folder create it by choosing "mkdir" in Ghost Commander).
Boot into recovery.
Go to restore from sdcard, choose 2015-03-23.10.56.05, and go for it!
Once it's done reboot, congratulations, you have installed Una ROM on your phone!
The screenlock password is 23052015​
IMPORTANT!!!​I haven't tried the latest 4.2.2 ROMs and I don't know if they have Knox or not (the earlier versions hadn't).
If they have it and if you are on such a ROM you'll have to choose custom restore and uncheck boot in the menu, because since the bootloader you have is Knoxed you may get a brick if you downgrade it to a pre-Knox version, don't play with that!
If you choose to proceed, you do so at your own risk, but in any case look first on the internet to find out if it's doable.
If it doesn't work for you then I'm sorry, you are out of luck, shame on you Knox...
If it works please report it here so that other people will know, thanks in advance!
HOW TO USE THE ROM​. Swipe down to access the applications drawer.
. Swipe up to open the notifications.
. Go to settings and set a stong password/pin/pattern protected lockscreen (recommended), default password is 23032015.
. Go in recovery and set a recovery password (recommended).
. Long pressing on the menu key toggles expanded desktop (full screen, no more navigation bar and no more status bar).
. Double pressing the menu key kills and hibernates the current application.
. Long pressing the recent key brings you back to the last application (convenient to switch from one app to another).
. Between the home and the back key there's a supplementary key that can display up to 12 apps (editable in gravity box).
Double pressing that key shows the sound panel, long pressing it shows the reboot menu (note that there's an option to take screenshots in the reboot menu).
. When you open an app you'll see a cascade icon at the top or the bottom right, press it and the app will turn into a floating window like on a computer. Now, open the notifications and check the 4 icons at the top, click any of them and the currently opened floating window (s) will be reorganised according to the layout you chose.
. Go to /system/etc/security/cacerts, check the certificates that are there (you'll find the certificate's name approximately by the middle of the file), and erase the ones you don't need/like.
When you want to transfer files to/from your phone open the USB Mass Storage Enabler app and enable mass storage, that's it. When you are done, don't forget to eject your phone from the computer and to reenable MTP from the app.
. When you install a new application, by default it will be fully restricted in both Xprivacy and the Firewall.
Before you open the newly installed app wait until the Xprivacy icon appears in the status bar, then and only then can you open it.
Most likely the app will crash.
Go to Xprivacy, open its settings and then usage data, you will see what restrictions caused the crash. Re enable some, provided that they are not too invasive.
Many apps require "load.Library" to be allowed in the shell section, that's ok.
Others may need to access the sd card, that's in the storage section and it's ok to allow it for apps that really need to access the storage, like players, cameras or file managers (for other apps try to keep it restricted).
Root apps obviously need "su" and/or 'sh", and sometimes "exec", in the shell section.
Always try to enable as few fields as possible, and bear in mind that data requested by an app is not necessarily needed for that app to work (especially true for identification, internet and mcc/mmc access).
Lastly, give the app internet access in the Firewall if, and only if, it needs it, and restrict some more permissions in App Settings.
If you can't tame the app consider uninstalling it and look for a similar one that has less built-in spyware.
SCRIPTS​. As said above, by default ADB, all google access (including youtube, blogspot and google search) and the Media Storage are disabled.
If you want to re-enable some or all of them, open the folder on your home screen called "scripts". Click on the desired script and it will be automagically executed.
If you choose to enable/disable google access you ll have to go to the Firewall to reapply its script. Open the firewall, go to settings, choose set custom script, click OK.
. You will see more scripts to disable/enable the Bluetooth, the FM Radio and the Phone.
If you disable the Phone and later want to re-enable it do as follows:
untick App Settings in Xposed's modules section, re-enable Phone, reboot, then enable App Settings again.
. Some scripts will enable you to backup/restore your efs partition and flash a recovery.img (to restore or flash an .img, make sure it's in your internal sd and execute the script).
. Other scripts can enable/disable am and pm, but don't play with it unless you know what you're doing.
. You can uninstall the Wallpaper Chooser and the Media Storage if you want, or keep them disabled and resurrect them when needed.
. If you are very privacy concerned you should consider using the "uncle's phone lite" mod because it enables you to call with only the Phone and the Telephony Provider apps (CSC, Contacts, Contacts Storage, Logs Provider and STK are completely de-activated). That's the method I use to make calls, but you have to know that the dialler forces close after you complete the call (not a big deal in my opinion but still, I may look into it one of these days). You'll find the mod in the add-ons section.
BUGS​. For some reason the ADW Launcher doesn't allow transparency in the navigation bars while in portrait, I'm working on that.
. You can't download anything from Lightning and Tint Browser, that's because the Download Manager and the Download UI have been uninstalled. If you need to download something, copy the link and paste it in Pale Moon, it has its own download engine.
. Part of the lockscreen and the dialer don't show in landscape mode, it's because the DPI has been modified in order multi layouts floating windows to work.
. All the installed apps work, but other apps you install may crash. I call that kind of apps "google’s henchmen", they only work if the play store services or the bla bla app are installed and of course they won't on Una since all that garbage has been removed.
If I install your app, why do you want to force me to install your boss' app too? Forget about those apps and search Fdroid, you'll find what you need...
. Depending the way you use your phone you may have to fine tune Xprivacy and reenable some permissions, I'm sorry for the inconvenience but it's impossible to set Xprivacy for all users since we all have different ways to use our phone.
ADD-ONS​. Uncle's themed Sony keyboard, flash it in recovery. It's not open source and that's why it's not included in the rom by default, but it's my every day keyboard because it works fine and because I themed it to make it look nice.
. HD Wallpapers
. Universe Wallpapers
http://unaos.com/addons
If there are many users' requests then I'll upload the following:
. Uncle's phone lite (with clipboard and dialer) for hardcore users. It's safer than using the regular phone configuration, but the dialer forces close when you hang up the call. Flash it in recovery, wipe dalvik-cache, reboot.
. Completely disable internet access for the Android System. Lightning and Tint Browser won't connect anymore since they use the same web engine as the Android System (that is anyway not very safe in 4.2.2), but Pale Moon still works thanks to its build-in web engine. Flash it in recovery, wipe dalvik-cache, reboot.
UPDATES?​There will be some, but no ETA, you'll have to be patient because now we have to design and release Una for three other phones.
Still, any suggestions/comments/bug reports are welcome, help us to improve Una!
FEATURES REQUEST​Yeah, sure, we'll see what we can do but we don't promise anything
That's all for now, enjoy the ROM!!!
The Una team
CREDITS​Big thanks to:good::
F-Droid
M66B (Xprivacy)
Rovo89 (Xposed)
Tungstwenty (App Settings, Master Key, Fake ID Fix)
Ukanth (AF+Firewall)
Jecelyin (920 Editor)
Kraigsandroid (Alarm Klock)
Thialfihar (APG)
Arity (Arity calculator)
Siacs (Conversations)
Ppareit (FTP)
Ghost Squared (Ghost Commander File manager)
Mohammad Adib (Floating Stickies)
C3C076(Gravity Box)
Oasisfeng (Greenify)
K-9 Dog Walkers (K9 Mail)
Grarak (Kernel Adiutor)
Anthonycr (Lightning)
Xperiacle (Multiwindows Manager)
Pragmatic Software (Network Log)
Mdwh2(Open Camera)
The Guardian Project (Orbot and Orweb)
Eolwral (OS Monitor)
Moon Child and Cyansmoker (Pale Moon)
Droidapps (PDF Reader)
Androguide.fr (Pimp My Rom script)
Simon Marquis (Preferences Manager)
Thad Hughes (Quick Dic)
Q-Supreme team (Quick Pic)
Robert.Developer (Rmaps)
Search Light (Search Light)
Jackpal (Terminal Emulator)
Anasthase (Tint Browser And Tint Browser Adblock Addon)
Thomasebell (Urecord)
Mohammad Abu-Garbeyyeh (USB Mass Storage Enabler)
Zhuhang (Viper4Android FX and Viper4Android XHiFi)
Videolan.org (VLC)
Brambonne (Wi-Fi Privacy Police)
Did I forget someone?
If that's the case let me know and I'll put your name here.
reserved
No screens?
ishmeet1995 said:
No screens?
Click to expand...
Click to collapse
Here you go
I like the effort but there are seriously some thinks you may not know what you are talking about, maybe because lack of knowledge.
Did I mention that I found google’s DNS in Tor (Orbot)? Pretty bad but fear not, I've patched it...
Click to expand...
Click to collapse
Most DNS lookups are local to the exit node with occasional use of Google DNS, changing a DNS itself is no guarantee for more security since the data needs to be anonymize too, that's possible if we use I2P together with TOR (because it's impossible to surf the web secure since not all provider/sites using a strong encryption for all stuff like content, external content and the whole site).
Open source vs closed
Click to expand...
Click to collapse
Well, mostly I agree open not automatically means it's safe at any time (see opensll and other popular projects) but here it would be help to see some source because you talking about trust and how can we trust you without looking in the code? Is there are proof for all your changes you done?
I've explored deep into the hidden depths of this Samsung ROM, and I didn't find anything questionable (but I had already removed around 150 apps, so there wasn't much left) from Samsung's side
Click to expand...
Click to collapse
How you do that if you don't have the source for e.g. the radio modem or other closed parts from a stock rom? Via reverse engineering? - You must have spent a lot of time for this ... I was not able to do it and not even any expert here on xda, it's impossible to one man to reverse and understand all stuff it would take years, even with good tools like IDA and 20 years of knowledge. You can maybe, maybe! only see some parts ... but not inspecting all aspects and since there is no reference I guess nobody can't say what's really secure.
Encrypting would only attract suspicion - why does he encrypt his messages? He must have something to hide!
Click to expand...
Click to collapse
Sure you have no idea what you talking about, this shows it. It's not about "..but I have nothing to hide!" it's a common thing, maybe you should read this first.
To tag something with secure is very easy but to proof that without anything is almost impossible. One of the benefit you mentioned is to hardening the OS but that also could be done with scripts/binary's or other stuff without downloading the whole rom, xda is full of it - but sadly most of all "security" things here are never really tested or under the scope from known experts. - but people always believe in the hype and the myths!
Don't get me wrong but maybe you think about it and release something we all can work with (especially the changes only as a diff or something).
CHEF-KOCH said:
I like the effort but there are seriously some thinks you may not know what you are talking about, maybe because lack of knowledge.
Most DNS lookups are local to the exit node with occasional use of Google DNS, changing a DNS itself is no guarantee for more security since the data needs to be anonymize too, that's possible if we use I2P together with TOR (because it's impossible to surf the web secure since not all provider/sites using a strong encryption for all stuff like content, external content and the whole site).
Well, mostly I agree open not automatically means it's safe at any time (see opensll and other popular projects) but here it would be help to see some source because you talking about trust and how can we trust you without looking in the code? Is there are proof for all your changes you done?
How you do that if you don't have the source for e.g. the radio modem or other closed parts from a stock rom? Via reverse engineering? - You must have spent a lot of time for this ... I was not able to do it and not even any expert here on xda, it's impossible to one man to reverse and understand all stuff it would take years, even with good tools like IDA and 20 years of knowledge. You can maybe, maybe! only see some parts ... but not inspecting all aspects and since there is no reference I guess nobody can't say what's really secure.
Sure you have no idea what you talking about, this shows it. It's not about "..but I have nothing to hide!" it's a common thing, maybe you should read this first.
To tag something with secure is very easy but to proof that without anything is almost impossible. One of the benefit you mentioned is to hardening the OS but that also could be done with scripts/binary's or other stuff without downloading the whole rom, xda is full of it - but sadly most of all "security" things here are never really tested or under the scope from known experts. - but people always believe in the hype and the myths!
Don't get me wrong but maybe you think about it and release something we all can work with (especially the changes only as a diff or something).
Click to expand...
Click to collapse
I’m sorry you feel that way. Did you install the rom at all?
Dear Dev,
Thanks for the ROM for our grand community, but after 5.0 Lollipop do you think people will shift to 4.1 ICS again?
Anyways very nice effort for great customization.
:good::good::good::good::good:
unclefab said:
UNA IS FOR YOU IF:​. You are willing to learn how to use an unconventional ROM and generally speaking to understand how things work, even if it sometimes requires a little effort to fix this or that little problem (bear in mind that it took us a lot of work to develop Una to where it is now),
. You don't mind a few little occasional bugs here and there that come from all the restrictions the ROM contains,
. You want to take back ownership of your phone from google’s claws.
UNA IS NOT FOR YOU IF:​. All that you care about is the latest gimmick in the latest OS,
. You can't live without the google’s apps,
. You are the kind of person that never reads through the OP and only scroll down to the download section, and then complain that things don't work and/or ask stupid questions in which are answered OP. An example? One guy makes a mod and writes clearly in OP that it's specifically for 4.2.2. Then some people complain: "it doesn't work on 4.4.2"...
Click to expand...
Click to collapse
hemant4409 said:
Dear Dev,
Thanks for the ROM for our grand community, but after 5.0 Lollipop do you think people will shift to 4.1 ICS again?
Anyways very nice effort for great customization.
:good::good::good::good::good:
Click to expand...
Click to collapse
I think everything is quite well explained and your question answered in the OP. Thank you for your interest.
hemant4409 said:
Dear Dev,
Thanks for the ROM for our grand community, but after 5.0 Lollipop do you think people will shift to 4.1 ICS again?
Anyways very nice effort for great customization.
:good::good::good::good::good:
Click to expand...
Click to collapse
No ..never
Edit: and 4.1 is not ICS
I expected that kind of reply, from you or from one of the forum's security experts, the same people that ignored me when I offered to share knowledge and to give advices/opinions on the security thread.
CHEF-KOCH said:
Most DNS lookups are local to the exit node with occasional use of Google DNS, changing a DNS itself is no guarantee for more security since the data needs to be anonymize too, that's possible if we use I2P together with TOR (because it's impossible to surf the web secure since not all provider/sites using a strong encryption for all stuff like content, external content and the whole site). .
Click to expand...
Click to collapse
I m not the guy that developed Tor, what you are talking about is his business, not mine.
All what i did was to change google's DNS in Tor's code, period.
Well, mostly I agree open not automatically means it's safe at any time (see opensll and other popular projects) but here it would be help to see some source because you talking about trust and how can we trust you without looking in the code? Is there are proof for all your changes you done?
Click to expand...
Click to collapse
Nobody needs to trust me.
As I wrote in OP (did you read it?):
You don't have to take our word for it, just download and install Network Log from here:
https://f-droid.org/repository/brows...ode.networklog
Give it root permission, start logging and open some web pages. Come back to Network Log after a few minutes and see for yourself, you'll be surprised (or maybe horrified?) to find out that your android system, your settings, your kernel etc. connect to all sorts of funny IPs, including and foremost google’s.
Now you see what we mean?
It's time to go for Una
Click to expand...
Click to collapse
Install the ROM, and see by yourself how it behaves.
Another thing is that all the installed apps in the ROM are open source, apart from 2 that I have reverse engineered, inspected and restricted (Greenify and Quick Pic), and as I said in OP people are fee to uninstall them.
To be honest, on my daily ROM I do use some closed source apps that are very good, that only have legit permissions, that don t spy on me whatsoever, and that dont connect anywhere.
But sadly I couldn t include them in this ROM, because I knew that if I had done it people like you would have criticized me.
How you do that if you don't have the source for e.g. the radio modem or other closed parts from a stock rom?
Click to expand...
Click to collapse
Radio modem and the like are closed source, and I never said that I did anything there.
But that s the same in an AOSP or CM ROM, and the only way to overcome that problem is either replicant (but they don support many devices) or baseband isolation.
I have full baseband isoltaion on my daily ROM, but hey, do you think that i could make such a ROM for public release? Do you think that people would like a ROM that transforms their phone in a wifi only device, and need to connect to a modem to have data connection and to call or receive sms'?
Still, people can achieve baseband isolation on this Una Rom, instructions are in OP.
Anyway, all what I said, again in OP is that :
spying that is present on AOSP too since it's google’s material as well (compare the apps' permissions and the network connections in an AOSP/custom ROM and in a stock ROM, it's more or less the same, or better, look at the code).
You can't do everything you want on a closed source ROM (I bet you can't on AOSP either), but to edit and clean the system you don't need the full source code.
Click to expand...
Click to collapse
You see?
I have removed over 100 system apps, dozens of jars, some xmls and libs, then I have cleaned the remaining apps and jars, then I have set very carefully and very restrictivey the firewall, App Settings and Xprivacy, then I have applied other security related tweaks and yes, Una is secure.
No more data mining, no more unwanted internet connections to google, amazon and who knows where, if that s not secure for you then I don t know what can be called secure.
To tag something with secure is very easy but to proof that without anything is almost impossible
Click to expand...
Click to collapse
.
Once more, you don t need to trust me.
Install the ROM, open Network Log, look at the Task Manager etc., and see what happens.
maybe you think about it and release something we all can work with (especially the changes only as a diff or something).
Click to expand...
Click to collapse
Why do you need to get anything from someone like me?
You said that I don t know what I am talking about, that I have a lack of knowledge etc., so why would such an expert like you benefit from it?
By the way, did you try the ROM?
BTW again, thanks for the link but sorry, I still don't feel concerned.
I don t use my phone for bank transactions, I m not working on big secret projects, I have blocked adds in the host files and I never get any spam.
Still, thanks for remembering me about encryption, I had forgotten to add in the encryption chapter in OP that Una has encryption apps (APG, Conversations, K9 Mail, Text Secure).
@hemant4409
First, the galaxy Grand will never get Lollipop from Samsung.
From custom ROMs, maybe, but that s not the point.
If people like more gimmicks and fancy transitionts than security it s their problem....
Congrats to all your work and the time spent on the Security subject and thanks for taking the time to share your work. This is the first time I see such a custom rom on XDA (on Internet I'd say) so I wanted to express my gratitude.
Hats off.
You provide a lot of information about security and privacy and the first question is 'No screenshots?' lol
Primokorn said:
Congrats to all your work and the time spent on the Security subject and thanks for taking the time to share your work. This is the first time I see such a custom rom on XDA (on Internet I'd say) so I wanted to express my gratitude.
Hats off.
You provide a lot of information about security and privacy and the first question is 'No screenshots?' lol
Click to expand...
Click to collapse
Here's screenshots
http://forum.xda-developers.com/showpost.php?p=59640778&postcount=4
oskar01 said:
Here's screenshots
http://forum.xda-developers.com/showpost.php?p=59640778&postcount=4
Click to expand...
Click to collapse
OMG!! He was kidding:cyclops:
I’m sorry you feel that way. Did you install the rom at all?
Click to expand...
Click to collapse
I'm dl'ed the rom and see what whas changed because a friend asked me to make a statement if this rom really secure anything. Btw no need to quote all stuff over and over again and again.
All what i did was to change google's DNS in Tor's code, period.
Click to expand...
Click to collapse
You can't change something you don't have access to or something that is important if we talking about DNS, you can't change the exit nodes. And as mentioned changing a DNS server is no guarantee since they also can log your stuff - it's all about trust, sure - but an OpenNIC without logging (that's proofed) would more help. For more security related stuff about DNS please first read this and this. DNS is not secure anymore, no matter which provider and according to the NSA they have some techniques to identify and infiltrate some servers.
Nobody needs to trust me.
As I wrote in OP (did you read it?):
Click to expand...
Click to collapse
Sure, nobody force anyone to install and use your stuff, that's what I'm not saying - but to say x and y was removed or changed is very hard to trust without anything except your words. It's no offensive at all.
Another thing is that all the installed apps in the ROM are open source, apart from 2 that I have reverse engineered, inspected and restricted (Greenify and Quick Pic), and as I said in OP people are fee to uninstall them.
Click to expand...
Click to collapse
I simply not care about the apps, no matter if it contains malware or not, as long they not have any root access or internet connection is simply has no effect. Most apps today do not want to destroy the hardware, they just want to collect and grap your private data and send them back if you turn wifi on (which makes t harder, because without deep package inspection you won't ever notice that there are some wired behaviors with app xy.
... people like you would have criticized me.
Click to expand...
Click to collapse
If you just one of the people that can't handle valid arguments or is unable to accept any other arguments we can just stop the whole discussion. - What I've learned from xda is that some people are unable to discuss and calling the moderator instead (for no reasons). It's not against your work, it's to inform and to show others if it's really offers that what you promise here or not. I really hope you understand it.
But that s the same in an AOSP or CM ROM,..
Click to expand...
Click to collapse
No it's not some roms use (outdated) open source modem sources, like CM which is always a big discussion because people "always" complaining about signal related stuff and possible battery drains. Or in other words some people say that with a stock modem/radio they have a better signal compared to CM.
I have removed over 100 system apps, dozens of jars, some xmls and libs, then I have cleaned the remaining apps and jars, then I have set very carefully and very restrictivey the firewall, App Settings and Xprivacy, then I have applied other security related tweaks and yes, Una is secure.
Click to expand...
Click to collapse
Installing security apps is the last line of defense, not the first. Read more about here. I guess you not touched the network code (because it's closed) so that won't change anything at all.
Install the ROM, open Network Log, look at the Task Manager etc., and see what happens.
Click to expand...
Click to collapse
Same again that won't change something on application layer, tor is also affected.
.. so why would such an expert like you benefit from it?
Click to expand...
Click to collapse
I not use it, as said a friend asked me because he usually like your work.
.. I have blocked adds in the host files and I never get any spam.
Click to expand...
Click to collapse
Blocking ads via hosts file not works if you change your mobile connection from e.g. 2G/3G/wifi/lan since on most roms the hosts never gets a re-apply. If you not getting any ads you are a lucky boy but it's very decency on which www your are or which addon you use. If you use Firefox/Plae Moon just use uBlock and configurate the filter list (so no ads at all too) but that not works for apps (but there are also minminguard or adaway [hosts] for it. Sad think about the hosts seems that it coasts more battery and usually takes longer to boot - but okay, anyway matter of taste which stuff you prefer.
Text Secure
Click to expand...
Click to collapse
Better link or integrate the SMSSecure it's based on Text Secure but encrypts SMS (since Text Secure removed that for some reasons).
.. security related tweaks
Click to expand...
Click to collapse
Which one? TCP/IP stack hardening, protocol changes like only forcing to use latest TLS or what? You see some important details are missing.
I expected that kind of reply, from you or from one of the forum's security experts, the same people that ignored me when I offered to share knowledge and to give advices/opinions on the security thread.
Click to expand...
Click to collapse
Yes, I reply'ed to this thread but my answer was way to long so I got a loading problem (the reasons I asked a mod to remove my post). I'm working on something but it's not fully done yet. The problem is that it will be the longest post here on XDA ever (if I release it here - I'm not really a xda fan) and it's very complicated so there will be a lot of people that may possible will never understand all stuff.
So, sorry if you feel that I "ignored" your post. But feel free to visit my Github stuff or just visit infosec institute to read my other stuff.
So the main question is here if you show us your mods or not? Or if you plan to release a "hardening package" or not? That's all I want to talk about.
@CHEF-KOCH
You came out of the blue on this thread, basically saying that I'm a moron that doesn't know what he's talking about and implying that this ROM is garbage, then you said you will download the rom and make a statement about whether it's secure or not.
And...?
Nothing, but you edited your post with the following:
So the main question is here if you show us your mods or not? Or if you plan to release a "hardening package" or not? That's all I want to talk about.
Click to expand...
Click to collapse
Is that fair?
Seriously, what would you think and what would you do if you were me?
If this ROM is garbage, prove it.
Otherwise, go polluting another thread...
unclefab said:
@CHEF-KOCH
You came out of the blue on this thread, basically saying that I'm a moron that doesn't know what he's talking about and implying that this ROM is garbage, then you said you will download the rom and make a statement about whether it's secure or not.
And...?
Nothing, but you edited your post with the following:
Is that fair?
Seriously, what would you think and what would you do if you were me?
Click to expand...
Click to collapse
Don't bother with @CHEF-KOCH. He just want you to share your knowledge with him, so he can "use" it and make you look like an idiot! Also, he is a liar, he didn't come here because of a "friend" but because of my post on your security thread. When he had some strange "loading issues" I also asked him very politely where was the problem....he never bother to reply, and he deleted the post, so what kind of person he is? He is a hater, and a spitter and "no constructive help" from him, so don't lose your time with him!
I'm giving up, useless to talk here.
CHEF-KOCH said:
I'm giving up, useless to talk here.
Click to expand...
Click to collapse
Thank you mister know it all, and please don t come back, there are plenty of other threads to pollute...
Too bad that you couldn t prove that this rom is garbage
And too bad that you are too arrogant to admit that you were wrong when you implied that I m an idiot and that this rom is garbage...
i can only post one :thumbup: per post , but if i could then ........... :thumbup::thumbup::thumbup: , at least some knowledgeable people are trying.
"all I can really do , is stay out of my own way and let the will of heaven be done"
Awesome thread
I do not have Grand but my brother has it. I was searching a rom for him and found your thread. I must say I did not find any thread like you in at least Samsung area. You people did a great work. Security is a great concern and if you secure the system then it itself become light weight because you take out spyware craps out of it. I appreciate your work. Good job man. Pleas e develop something in Note 3 LTE section as well.

Categories

Resources