Phonlab E-Campus Free Course

Share if the site was helpful

Phonlab E-Campus free Chromebook Support course

I have been working with Phonlab for many months now and we decided to bring everyone a FREE course on Chromebooks to help techs and repair shops trouble shoot and fix customer devices. If you want to get access to this FREE course just head over to Phonlab.Teachable.com and enroll. Once you enroll in the Chromebook Support course you will have access to all the lessons. We hope you enjoy them and if you find them handy you may want to check out Phonlab E-Campus where we cover smartphone repairs and security.

 

RootJunky

 

How to set up SuperSu root manager after root

Share if the site was helpful

How to set up SuperSu root manager after root

If you have SuperSu on your device you must be familiar with rooting. So what is SuperSu application and what can you do with it? In general it is the tool which manages root permissions for all the applications on the phone which require root, with SuperSu you can select which apps have root access and which do not.

Lets have a look inside SuperSu, inside you have 3 sections: Apps, Logs and Settings.

The 1st section (APPS) shows you list of  applications installed on the device which asked for root access.

Click on app to open menu: next to option ACCESS you can select PROMPT, GRANT or DENY, depending if you want application to gain root privileges. Try to keep list of apps with granted permissions as short as you can, allow permissions only for the apps which either work with root only or have more privileges with it.

Next option is NOTIFICATIONS, you can choose options: “Global Default” to see  notifications if app is gaining access on the screen or “Disabled”, to switch off annoying dialog for specific app.

The 2nd section (LOGS) Shows you which app asked for root permission, time and which action was taken (allowed or denied) in case you switched on Logging option in settings. Pretty simple. Let’s move further!

The 3nd section (SETTINGS) Settings is the largest one and the most important – Settings. Correct set up is of great importance to avoid problems.

Enable SuperSu – switches on/off root on the phone, should have checkmark for root t work;

Re-authentication – disabled in case you do not want SuperSu to ask permissions again in case app is reinstalled or upgraded. If option was enabled SuperSu will always ask again permissions for the app after upgrade/reinstallation. I keep it disabled to avoid annoying dialogue pop-up.

Default access – selects default root access for all apps in case no option was chosen when prompt appears. You can choose GRANT / PROMPT/DENY.

Auto deny countdown (available for PRO version only) – gives you option to set up countdown time on SuperSu prompt asking to grant or deny access, basically that is how long user will see prompt on the screen to decide the destiny of app, in case no option selected – default value is chosen. Keep in mind that setting the countdown more than 10 seconds may cause crashes for apps which are written not in perfect way. As for me it is a bit useless:)

Show notifications – you have two options to select: “Global Default”  – if you wish to see notifications in notification menu bar about gaining access, “Disabled” – in case notifications are annoying for you and you want to get rid of them. I always select second one.

Logging – if you are not a developer, do not plan to be developer and do not need to get debug logs from SuperSu or even do not know what it is  – select option NONE, otherwise if debugging is important choose GLOBAL DEFAULT. Keep in mind it may cause crash of the application in case root permissions are asked great deal of times and logs are saved, stored, fill up memory of the phone.

Clear logs after – time-frame during which SuperSu logs are saved in case Logging is enabled. Otherwise option is grayed out.

Logs date format – choose format of date displayed.

 The Auto-refresh apps and logs tab allows the phone automatically refresh apps and logs tabs as new entries are added. Detection depends on access and notification settings.

PIN code (Pro version only) – gives option to protect SuperSu with PIN, may be useful in case Multiusers option was enabled and different users use device.

Enable Su during boot – applies all permissions during boot in case option enabled. Otherwise, permissions are applied randomly after the boot. Better to keep option enabled for boot settings to be set up properly. This option is disabled by default – make sure you switch it on.

Launcher icon – gives you variety of SuperSu  logo options, also you can select INVISIBLE to hide icon.

Theme – select dark or light theme of SuperSu interface

Language – gives option to select convenient language from the list of available.

Install SuperSu into /system – option to make SuperSu system app, in this case you will not be able to remove it from regular application manager. To delete SuperSu you will need to use either Alternative App manager (Titanium backup), or use ADB, one more option – factory reset of the phone.

Trust system user – option to give root access to the apps that are located in /system/app (System applications).

Reinstall – designed to fix SuperSu crashes (SuperSu has stopped), click on it to clean up previous installation, then install from PlayStore. Not advised to use this option if no SuperSu issues occur.

Switch Superuser app – designed to change root manager, will clean up SuperSu. As for me SuperSu is the best app to manage root access, however if you prefer another one or just want to experiment – can try, that is your choice. Note that root can be lost during process and you will need to start all over again.

Full unroot – important option but tricky. Allows you completely remove root from device. Be careful with it – it can softbrick phone, I am seriously. Before clicking this button very important to switch off option Enable SuperSu, on the top of settings. Once done you can unroot, but not before unless you wish to flash stock firmware.

Pretty wide variety of options. Cannot really skip mentioning what to do if you selected option for SuperSu icon to be invisible.

In case the icon was hidden and you need to launch SuperSu there are a few options:

1) Dial one of codes on the dial pad, one of them may work:*#1234#* or *#*#1234#*#* or *#7873778#* or *#*#7873778#*#* (does not work on Android 6.0)

2) Download Enable_SuperSU.apk  (google it) and manually install on the phone. Once you launch it app will ask root access > hit GRANT. You will see pop-up with options to Enable Su and Make it visible (100% working).

3) Open PlayStore – find SuperSu and follow steps: Uninstall > Install > Open (sometimes may cause issue with updating binaries).

4) Use adb terminal (phone and adb drivers should be installed on PC) and type adb shell am start -a android.intent.action.MAIN -n eu.chainfire.supersu/.MainActivity (100% working)

You can also use Terminal emulator (available on PlayStore) and type there am start -a android.intent.action.MAIN -n eu.chainfire.supersu/.MainActivity

No need to type “adb shell” as you are already in shell 🙂

 

What if you rooted phone with the other application and now have KingUser or SuperUser but SuperSu is in your dreams and you cannot sleep even because of that.

There are several options how you can change root manager app. Keep in mind is not safe.

There are 2 options:

1) Download SuperSume application from PlayStore it costs 4$ approximately. Install it on the phone and launch > you will  get prompt asking root access > hit ALLOW. Then click on large blue button with Android guy and wait, process takes up to 5 minutes. In case nothing happens in 5 minutes – reboot phone and try again.

Phone may be rebooted automatically during process, do not panic. In case you see SuperSu after reboot  – means operation was succeed.

Open SuperSu – application will ask to update binaries – hit Continue and select Normal installation. Updating binaries may take up to 5 minutes, in case it is taking longer – reboot and try again.

In case update was successful – will get notification about that – restart the phone and use SuperSu, you are done and awesome.

In case you get error during binaries update – reboot and try again. Make sure KingUser/Kingroot was removed from the phone, if no – disable it from Application manager and try updating binaries again.

In case Kingroot/SuperUser was removed but SuperSu was not installed – try installing the one from PlayStore.

Keep in mind this method can cause bootloop and is not very safe, in case you do not want such thing to happen to your phone and have headache restoring it  think carefully why do you want to change root manager, what is purpose. Strongly NOT recommended for Alcatel, Huawei, ZTE and other Chinese phones.

2) Use adb or Terminal emulator and script to change icon. This method is more safe, but more difficult.

Firstly download mrw folder, place it in the internal storage of the phone.

Then  download ADB and drivers on the PC, connect phone and make sure it is recognized with adb. Then type: adb shell

In case you do not want to use PC/do not have it try Terminal Emulator from PlayStore on the phone> open it and ALLOW root access.

Now type following in the command line (both, PC or phone):

su

Hit enter, you will get prompt to allow root permissions, hit ALLOW.

The command line will move to next line and you will see # sign.

Now type:

sh /sdcard/mrw/root.sh

hit Enter, you will see code is running, some errors may appear but do not pay attention, SuperSu will be automatically launched in case of Success, application will ask to update binaries – hit Continue and select Normal installation. Updating binaries may take up to 5 minutes, in case it is taking longer – reboot and try again.  Make sure KingUser/Kingroot was removed from the phone, if no – disable it from Application manager and try updating binaries again.

In case update was successful you will get notification about that – restart the phone and use SuperSu. You are done and awesome.

In case SuperSu was not launched after script – check manually if you have it on the phone. If nothing appears – guess what? You are right – reboot and try again from the very beginning.

Note, script will not work in case mrv folder is located in the other location, different from specified /sdcard/mrw/root.sh

-Diana Lisovenko

R1 HD Amazon Bootloader unlock

Share if the site was helpful

R1 HD Amazon Bootloader unlock

BOOTLOADER UNLOCK METHOD 1

Hi Guys thanks to a team effort the Amazon R1 HD has root access with SP Flash Tool and TWRP recovery image.
I went ahead with the help of jcase and unlocked the bootloader because i wanted full access.

What i did is put together this script that will walk you through the steps to unlocking your Amazon R1 HD bootloader.
Steps are simple you just download this script that i created and click on the batch file once you have extracted it to your desktop. Follow the script it will walk you through everything.
Note Root access is required to use the script and you can watch a video on how to root the device below. My Script as been updated to work on Linux Mac or Windows

Download Files Here
BLU-R1-HD-Amazon-Bootloader-Unlock.zip

How to unlock the bootloader video

How to root and install twrp recovery video

Here are the steps to check if your bootloader is unlocked since people are asking. With the device turned on and adb debugging working. Run these commands in terminal or command window
adb reboot bootloader
Once in fastboot mode run this command to check if unlocked.
fastboot getvar all
It will return yes for unlock and no for locked.

BOOTLOADER UNLOCK METHOD 2

Steps
1. Download SP-Flash-Tool-bootloader-unlock.zip
2. Extract the SP-Flash-Tool-bootloader-unlock.zip to your desktop. Note 7zip is great to extract files.
3. lauch Flash_tool.exe
4. select scatter-loading and browser to load MT6735_Android_scatter_R1_Unlock.txt
5. click download button to start.
6. now plug your phone into the computer. to boot the device to preloader and start the flash. You can do it two ways: 1. power off the phone and flash will start or 2. From a powered off stat power on the device while plugged into the computer. either way will start the sp flash tool.
7. once the flash is complete which should take seconds you can unplug the device and reboot it. Congrats you can now unlock the bootloader like any normal device now.

WARNING UNLOCKING YOUR BOOTLOADER WILL WIPE DATA FACTORY RESET THE DEVICE
How to unlock the bootloader now that you have turned on this feature.
1. power off the device
2. holder volume up and power until you are at the boot menu with recovery fastboot and normal as options scroll with volume up to fastboot then press power button to select
3. once in fastboot mode you will need to option a command window on your computer and make sure you have your adb and fastboot files
4. cd to the folder with your adb and fastboot files then run these commands
5. to maks sure your devices are working correctly
fastboot devices
6. to unlock the bootloader
fastboot oem unlock
7. follow the directions on your device screen. once it is finished unlocking you can check it with
fastboot getvar all
8. Next to reboot the device use
fastboot reboot
thats it your bootloader is unlocked
Note: if you have twrp recovery install and unlock your bootloader with METHOD 2 the device will try and boot to recovery and wipe data which will fail because you and twrp installed.
The only way to fix this is to boot to fastboot mode and run this command
fastboot format userdata
then just reboot out of fastboot mode and the device will boot up.
fastboot reboot

Need help with these commands check out this video jump ahead to 6min 45sec to see commands above

Quadrooter Qualcomm Exploit

Share if the site was helpful

Quadrooter Qualcomm Exploit

Quadrooter-vulnerability-affects-nearly-1-billion-Snapdragon-powered-Android-devices

QuadRooter sounds like another serious Android security exploit. One which can apparently allow a malicious app to gain root access on Qualcomm based Android phones and tablets, enabling the app to then do pretty much what it pleases. According to Check Point, the research group that discovered QuadRooter, up to 900 million Qualcomm Android devices could be affected. This exploit targets the Qualcomm drivers which is why it is specific to this hardware. As of the Augusts 1st security update Google has patched 3 of the 4 vulnerabilities and will patch the last one in the September 1st update. To keep your device safe from these bugs it is always bests to stay on top of your security updates. One of the best ways to protect your phone from malicious software is to only download apps from google play or trusted sources.

quadrooter-scanner

If you want to check and see if your device can possible be vulnerable to this threat then you can download and run QuadRooter Scanner by check pointPersonally I am hoping that a developer can figure out this exploit and use it to get many android users root access. I am sure someone can create a app that gets root then injects supersu and su binary into the device. If you are hoping for the same I recommend not updating to new security patches and give the developers some time to get devices root access. 

I wouldn’t be surprise to see this QuadRooter vulnerability implemented into Kingroot app some time soon, as it would make there app unstoppable on Android devices. What do you think about this bug please comment below and let me know.

RootJunky

 

Sony Xperia Bootloader Unlock Tutorial

Share if the site was helpful

Sony Xperia Bootloader Unlock Tutorial

unlockbootloader_phones

Sony just like many other manufacturers has there own Bootloader Unlock program.  This program is designed for Developers but can be used by anyone to get greater control over there Android device.  In most cases unlocking the bootloader on your Sony Xperia device will void the warranty. The best practice is to fully test the operation of your device before you unlock the bootloader. Most of the time when you unlock your bootloader it will wipe data factory reset the device so make sure you backup everything of importance before starting this process. Now that the WARNINGS are out of the way lets get into this tutorial.

Directions you will need to unlock the bootloader on your Sony Xperia device

Install the Android SDK or just the ADB and fastboot files extract the adb and fastboot files to a folder.

If you are on windows you may need the drivers for your device also and HERE is a great place to look for them

adb fastboot files

 

In your device, open the dialler and enter *#*#7378423#*#* to access the service menu.

Tap Service info > Configuration > Rooting Status. Check if Bootloader unlock allowed says Yes. Also write down your IMEI from this screen.

Screenshot_2016-06-05-06-05-13Screenshot_2016-06-05-06-05-24

Now that you have your files setup and your IMEI number written down you can go to the SONY DEVELOPER UNLOCK BOOTLOADER SITE

Select your Sony Xperia device from the list at the bottom of the site and click continue.

On the next page you need to enter your email address so that Sony can verify that you arent a bot and sent you a link with your unlock code.

Open your email account and look for email from Sony with this in it. “You have requested to unlock the boot loader of your Xperia™ device. To verify this, click the following link: Click Here To Proceed”

Once the website loads up you will need to enter your IMEI number that you wrote down earlier or dail *#06# from the phone dailer to view your IMEI number.

IMEI2

Once you submit your IMEI you will get the rest of the directions to unlock the bootloader like below.

sony commands

Now that you have the full directions from Sony its time to unlock the bootloader on your Xperia device.

These direction will be for windows but it is basically the same for mac and linux.

  1. Turn on developer Options on your device and enable adb debugging. outlined in picture above.
  2. Open your adb and fastboot folder. Then with your mouse right click and select open a command window here. Alternative is to open command prompt and CD to the adb and fastboot folder.
  3. Now enter this command ( adb devices ) in the command window. you should have a popup on the phone to allow adb from this computer. allow it
  4. run command ( adb devices ) again this time you should see your serial number followed by the word device. if you get this far it means that your drivers and adb are working properly.  See picture below

adbsss

5.  From here lets reboot the device to bootloader mode with command ( adb reboot bootloader ) or follow sonys lead by powering off the device then press the Volume up button at the same time as you connect the other end of the USB-cable.  Either method will reboot the device to bootloader mode.

6.  Now run command ( fastboot devices ) again this will return with your device serial number and say fastboot after it.

fastbootssss

7.  Finally we can send the Unlock command that we got from Sony. Mine is ( fastboot -i 0x0fce oem unlock 0xE30FD3E75A61F33C ) but yours will very.

8.  look at your phone and follow any directions that come up on the screen and then thats it your done.

Once the process has fully finished then you can send command ( fastboot reboot ) to boot the device back up again. First boot up will take much longer then normal, it could take as long as 10 minutes to boot up.

Now that you have unlocked your bootloader you can easily install custom roms with cool hacks and mods. Root access and using root apps is in your near future. If you want to learn more about your sony device check out some of my video tutorials HERE

RootJunky Out

TWRP 3.0.0-0 Released with new features

Share if the site was helpful

TWRP 3.0.0-0 Released

Screenshot_1970-04-22-23-14-54Screenshot_1970-04-22-23-14-25Screenshot_1970-04-22-23-14-39

New features in TWRP 3.0.0-0:

  • Completely new theme – Much more modern and much nicer looking (by z31s1g)
  • True Terminal Emulator – Includes arrow keys, tab and tab completion, etc. (by _that)
  • Language translation – It won’t be perfect and especially some languages that require large font files like Chinese & Japanese won’t be availble on most devices. Also some languages may only be partially translated at this time. Feel free to submit more translations to OmniROM’s Gerrit. (mostly by Dees_Troy)
  • Flashing of sparse images – On select devices you will be able to flash some parts of factory images via the TWRP GUI (by HashBang173)
  • Adopted storage support for select devices – TWRP can now decrypt adopted storage partitions from Marshmallow
  • Reworked graphics to bring us more up to date with AOSP – includes support for adf and drm graphics (by Dees_Troy)
  • SuperSU prompt will no longer display if a Marshmallow ROM is installed
  • Update exfat, exfat fuse, dosfstools (by mdmower)
  • Update AOSP base to 6.0
  • A huge laundry list of other minor fixes and tweaks

WARNING: This is our first release in a long time. We have a lot of new and somewhat aggressive changes in this new release. The changes to the graphics back-end may cause some devices to not boot up properly or have other display-related issues. If you are not in a position to reflash an older build of TWRP, then wait until you are or at least wait until others have tried the new TWRP 3.0.0-0 for your specific device. You don’t want to end up with a non-working recovery and have to wait several hours or days to get to a computer to be able to fix it.

Team Win Recovery Project has been my favorite recovery ever since it was released. Dees_Troy and his team have done one amazing job at keeping up with this custom recovery and i am really thankful to them for all there hard work. If you love TWRP as much as i do please send then a little donation to say thanks 🙂

Donate to TWRP HERE

Going a quick search of the TWRP site it looks like there are already a bunch of official supported device that have builds of TWRP 3.0.0-0 available today and more to come soon i am sure, here are some of them.

Nexus 6P, Nexus 5X, Nexus 9, LG G4, Moto X Pure Edition, Moto G 2015, Galaxy Note 5. Many more are available these are just some of the mosts popular.

Click HERE to see if this new version of TWRP is available for your device.

 

Discovering the Hidden Power of Android

Share if the site was helpful

How to harness the full power of your Android devices.

 

Android Devices today are very powerful; many of them have faster processors than your 5 year old laptop, and a higher screen resolution than that old 480p tv you bought 10 years ago. But even today, we are still faced with the fact that there are just some things that you cannot do on a smartphone that you can do on a laptop. Things like using a keyboard and mouse, or a wired controller, or being able to get into the main filesystem of your device etc. But today I am going to be showing you a few neat tricks that you can use to make these things possible.

 

Keyboard and mouse support using an OTG cable

Have you ever wanted to use your phone like a computer, to write that book report, or important document you are working on? But then you realize that your phone does not have a usb port to actually support this feature? Well all is not lost, because there is a way to make this possible. You can use a USB OTG cable to harness the power of using a keyboard, and mouse and to plug in usb drives to Android. Not only are these cables very useful, they are very cheap, some selling for just a few dollars depending where you get them from. They are very easy to find on Ebay.com and Amazon.com.

51davjmWnSL._SL1000_

Best of all, you do not have to do much of anything to get this working, since android already has this support of keyboards and mice built in. As for usb support, all phones are different and some phones require root and a root file browser, such as ES File Explorer, or Solid File Explorer to take advantage of using USB OTG storage.

Screenshot_2015-12-29-10-10-20Screenshot_2015-12-29-10-10-46Screenshot_2015-12-29-10-14-56

How to gain access to the hidden parts of Android

For those of us who like to be able to tinker and tweak our devices, or to be able to see what makes our devices tick, there is a way for us to be able to do this. Since Android is a form of linux, we are able to gain what we call Root access to a device. This root access gives us the ability to do many advanced tasks on our phones that are not possible to for the average user to do. Things such as:

  • Access and change the main filesystem using a file browser
  • Access the terminal emulator
  • Add or remove system apps to free up space
  • Backup and restore apps using titanium backup
  • Change the color and look of many parts of the system, such as the status bar menu items etc.
  • Flash a custom recovery, and install custom roms
  • Overclock the processor to make the phone faster, or underclock it to save battery life
  • Use a custom audio driver such as Viper for Android
  • The possibilities are basically endless!

 

Rooting not only does all of this to your current device, but you can also do this with an older android device and give it a second life; the after life 🙂

 

Conclusion

So to sum it all up, the possible ways to use your Android device to the fullest are basically endless. The features that i have talked about here are just scratching the surface when it comes to the possibilities that Android holds. So before you go and think about buying that next Iphone, think to yourself what things can I do with an Android that i can’t do on Iphone.

 

By: Tristin L.

Amazon Fire 5th gen SuperTool

Share if the site was helpful

Amazon Fire 5th gen 7in tablet SuperTool

amazon fire 5th

NOTE This tool has been Tested and built for the Amazon Fire 5th gen 7in tablet. some features may work on other 5th gen tablets but use it at your own risk.
Features
WINDOWS VERSION
1. ADB driver install and test
2. Install Google play store plus remove ads on some fire os versions
3. block ota updates
4. boot device to twrp recovery 5.0.1 and below
5. Install FlashFire App
6. root amazon Fire 5th gen on android 5.3.1 and below
7. replace stock fire launcher with Nova launcher
8. remove lock screen ads on fire os 5.3.1 and below
9. Update SuperTool Files

Screen Shot 201

LINUX AND MAC VERSION
Install Google play store plus remove ads on some fire os versions
block ota updates
Install FlashFire App
root amazon Fire 5th gen on android 5.3.1 and below
replace stock fire launcher with Nova launcher
remove lock screen ads on fire os 5.3.1

New Version of SuperTool available as of 10-5-16

Link to Supertool HERE

video instructions HERE

Big thanks to all the devs that have put is some awesome work on this device.

 

please comment and let me know if it has any problems or if you have a feature you would like added

Thanks RootJunky

 

If you like this SuperTool then you should really check out some of my other Supertools batch scripts HERE

Samsung Galaxy Note 5 and S6 Edge plus

Share if the site was helpful

Samsung Galaxy Note 5 and S6 Edge Plus

 

 

The Samsung Galaxy Note 5 looks like it will be one amazing phablet that i am really excited to get my hands on. I love the Note line up from the Note 2 through the Note 4 and now the Note 5. The body on this device is nicely designed and looks very premium with the curved edges on the back. I love the way that the s-pen now ejects by pressing it in a little, which is a much needed improvement. Looking forward to see how the Exynos 7420 CPU will perform over last years model with the the qualcomm snapdragon chip and 4GB of DDR4 ram yes please and thank you 🙂  price of this new Samsung Galaxy note 5 will be 699.99 for the 32GB model and 799.99 for the 64GB device. I will probably be picking up the 64GB model as soon as i can. Release data is August 21 2015 but can be pre ordered all ready. That being said I better pre order mine right now. Order your Note 5 or S6 Edge plus HERE

 

phone-left

 

The Samsung Galaxy S6 Edge Plus what can i say here. its a s6 edge that has a bigger screen and the same specs as the Note 5. check the list of specs below. If you wish the s6 edge had a bigger screen then maybe this phone is for you. 🙂 more pictures of the Note 5 at bottom of the post.

Left Samsung Galaxy Note 5.  Right Samsung Galaxy S6 Edge Plus.

NETWORK Technology GSM / HSPA / LTE GSM / HSPA / LTE
2G bands GSM 850 / 900 / 1800 / 1900 GSM 850 / 900 / 1800 / 1900
3G Network HSDPA HSDPA 850 / 900 / 1900 / 2100
4G Network LTE LTE
Speed HSPA 42.2/5.76 Mbps, LTE Cat6 300/50 Mbps/ LTE Cat9 450/50 Mbps HSPA 42.2/5.76 Mbps, LTE Cat4 150/50 Mbps
GPRS Yes Yes
EDGE Yes Yes
DISPLAY Type Super AMOLED capacitive touchscreen, 16M colors Super AMOLED capacitive touchscreen, 16M colors
Size 5.7 inches (~75.9% screen-to-body ratio) 5.5 inches
Resolution 1440 x 2560 pixels (~518 ppi pixel density) 1440 x 2560 pixels (~518 ppi pixel density)
Multitouch Yes Yes
Protection Corning Gorilla Glass 4 Corning Gorilla Glass 4
– TouchWiz UI
– Curved edge screen
BODY Dimensions 153.2 x 76.1 x 7.6 mm (6.03 x 3.00 x 0.30 in)
Weight 171 g (6.03 oz)
SIM Yes Nano-SIM
– Fingerprint sensor (PayPal certified)
– S Pen stylus
– Fingerprint sensor (PayPal certified)
– Samsung Pay (Visa, MasterCard certified)
PLATFORM OS Android OS, v5.1.1 (Lollipop) Android OS, v5.0.2 (Lollipop)
Chipset Exynos 7420 Exynos 7420
CPU Quad-core 1.5 GHz Cortex-A53 & Quad-core 2.1 GHz Cortex-A57 Quad-core 1.5 GHz Cortex-A53 & Quad-core 2.1 GHz Cortex-A57
GPU Mali-T760MP8 Mali-T760MP8
MEMORY Card slot No No
Internal 32/64/128 GB, 4 GB RAM 32/64 GB, 4 GB RAM
CAMERA Primary 16 MP, 5312 x 2988 pixels, optical image stabilization, autofocus, LED flash 16 MP, 2988 x 5312 pixels, autofocus, LED flash
Features Dual Shot, Simultaneous HD video and image recording, geo-tagging, touch focus, face/smile detection, panorama, HDR Geo-tagging, touch focus, face detection, Auto HDR, panorama
Video 2160p@30fps, 1080p@60fps, optical stabilization, dual-video rec. 2160p@30fps
Secondary 5 MP 5 MP, 1080p

 

FEATURES Sensors Accelerometer, gyro, proximity, compass, barometer, heart rate, SpO2 Accelerometer, gyro, proximity, compass, barometer
Messaging SMS(threaded view), MMS, Email, Push Mail, IM SMS(threaded view), MMS, Email, Push Mail, IM
Browser HTML5 HTML5
Java No No
– Wireless charging (Qi/PMA) – market dependent
– ANT+ support
– S-Voice natural language commands and dictation
– Active noise cancellation with dedicated mic
– MP4/DivX/XviD/WMV/H.264 player
– MP3/WAV/WMA/eAAC+/FLAC player
– Photo/video editor
– Document editor
– Wireless charging (Qi/PMA) – market dependent
– ANT+ support
– S-Voice natural language commands and dictation
– Smart stay
– OneDrive (115 GB cloud storage)
– Active noise cancellation with dedicated mic
– MP4/DivX/XviD/WMV/H.264 player
– MP3/WAV/WMA/eAAC+/FLAC player
– Photo/video editor
– Document editor
COMMS WLAN Wi-Fi 802.11 a/b/g/n/ac, dual-band, Wi-Fi Direct, hotspot Wi-Fi 802.11 a/b/g/n/ac, dual-band, Wi-Fi Direct, hotspot
Bluetooth v4.2, A2DP, EDR, LE v4.1, A2DP, LE, apt-X
GPS Yes, with A-GPS, GLONASS, Beidou Yes, with A-GPS, GLONASS, Beidou
NFC Yes Yes
Infrared port No No
Radio No No
USB microUSB v2.0, USB Host microUSB v2.0, USB Host
BATTERY Non-removable Li-Po 3000 mAh battery Non-removable Li-Po 3000 mAh battery
 Fast Wireless Charging  Fast Wireless Charging
 Quick Charging  Quick Charging

 

 

 

 

 

gallery-square-noblebox4-noble

gallery-rectangle-noble

android stagefright exploit

Share if the site was helpful

What is Android stagefright exploit and how does it effect me? This is the question that everybody is asking so i will be trying to cover it in this post. First lets get an understanding of what StageFright is and can do to your device. StageFright is library or lib that has been around since Android 2.2 and is still being used in android 5.1.1 today. This is the reason that it is such a big exploit and called StageFright.

How does StageFright work?

The easiest way to hack into a device with StageFright is a video sent via MMS. which theoretically could be used as an avenue of attack through the libStageFright, which helps Android process video files. Many text messaging apps including Google’s Hangouts app automatically process that video so it’s ready for viewing as soon as you open the message, and so the attack theoretically could happen without you even knowing it. StageFright could also be exploited by installing a app that has the exploit in it or every by downloading a hacked video file that could run the exploit. If StageFright is implemented on your device the hacker can view and see everything that you do, bank accounts emails and more.

What can we do about it?

First you want to open your messaging app and go into settings and turn off AUTO RETRIEVE MMS. This will keep the a hack from happening automatically at least. You could still open a MMS and get it but that is still one more step that has to happen. Next don’t install apps from unknown sources, which really is always a good idea and last be careful on the Internet. Google will be working on a patch for this and pushing it out in ota updates soon. We all now how long ota updates can take so best to address this yourself.

More info

ASLR (Address Space Layout Randomization) is a method that keeps an attacker from reliably finding the function he or she wants to try and exploit by random arrangement of memory address spaces of a process. ASLR has been enabled in the default Linux Kernel since June 2005, and was added to Android with Version 4.0 (Ice Cream Sandwich). So if your device is android 4.0 and above you are much better protected.

My Thoughts

From what i have heard stagefright isnt a exploit that has been seen working in the wild just discovered by some researchers and not implemented in real world. Since it is already public I dont think that many hackers would spend the time working on it, if it is going to be patch soon anyway.

HERE you can find a StageFright detector app that is interesting but is going to tell you that you are vulnerable unless you have the latest cm12.1 installed which already has been patch for stagefright.