Another reason why NOT to use root toolkits.. - Nexus 7 General

Another reason to NOT use root toolkits.. http://www.symantec.com/connect/fr/blogs/malware-uses-google-go-language
Malware Uses Google Go Language
Designed in 2007 and introduced in late 2009, the Go programming language developed by Google has been gaining momentum the past three years. It is now being used to develop malware. Recently seen in the wild, Trojan.Encriyoko is a new threat associated with components which are written in Go. The Trojan attempts to encrypt various file formats on compromised computers, rendering the encrypted files unusable.
The original sample we acquired, a file named GalaxyNxRoot.exe, is actually a dropper written in .NET which disguises itself as a rooting tool to trick users into installing it.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Figure 1. GalaxyNxRoot.exe properties
Once executed, the GalaxyNxRoot.exe file drops and launches two executable files, both written in Go:
%Temp%PPSAP.exe
%Temp%adbtool.exe
The dropped PPSAP.exe file is an information-stealing Trojan. It collects system information such as current running processes, user name, MAC address, etc., and posts it to the following remote location:
[http://]golang.iwebs.ws/about/step1.php
The dropped adbtool.exe file downloads an encrypted file from the following remote location:
[http://]sourceslang.iwebs.ws/downs/zdx.tgz
This file is decrypted as a Dynamic-link library (DLL) file and then loaded. It attempts to encrypt various file formats on the compromised computer. The targeted file formats include:
Source code files (.c, .cpp, .cs, .php, .java, .pas, .vb, .frm, .bas, .go, .asp, .aspx, .jsp, .pl, .py, .rb)
Image files (.jpg, .png, .psd)
Audio files (.wav, .wma, .amr, .awb)
Archive files (.rar, .zip, .iso, .gz, .7z)
Document files (file extensions containing the following strings: doc, xls, ppt, mdb, pdf)
Other types of files (file extensions containing the following strings: dw, dx, sh, pic, 111, win, wvw, drw, grp, rpl, mce, mcg, pag)
Figure 2. Targeted file formats
The file paths are confirmed by the Trojan in order to avoid encrypting files under certain paths, such as %Windir%, %ProgramFiles%, %UserProfile%\Local Settings, and others.
The encryption uses the Blowfish algorithm. It either reads the encryption key from D:\nepia.dud or randomly generates one. The names of all of the encrypted files are then saved to the following location:
%Temp%\vxsur.bin
Restoration of the encrypted files will be difficult, if not impossible.
Symantec detects all these files: GalaxyNxRoot.exe as Trojan.Dropper, PPSAP.exe as Infostealer, adbtool.exe as Downloader, and zdx.dll as Trojan.Encriyoko.
Click to expand...
Click to collapse

Or..just use ones here on XDA made by trusted members? I don't understand your point.

simms22 said:
Another reason to NOT use root toolkits.. http://www.symantec.com/connect/fr/blogs/malware-uses-google-go-language
Click to expand...
Click to collapse
That's the difference between grabbing a random root tool kit from the web and getting one from a trusted member of the forums.

mustbepbs said:
Or..just use ones here on XDA made by trusted members? I don't understand your point.
Click to expand...
Click to collapse
Since there are no tools needed, the point is to not use something that is now even used to hurt your machine.

mustbepbs said:
Or..just use ones here on XDA made by trusted members? I don't understand your point.
Click to expand...
Click to collapse
airmaxx23 said:
That's the difference between grabbing a random root tool kit from the web and getting one from a trusted member of the forums.
Click to expand...
Click to collapse
its your device, enjoy your malware :silly:

Great now I have to examine my toolkit I downloaded.... although most people on xda are not like this... I would hope at least those that have rep here.
Sent From My N7 via White Tapatalk

Every time I see a one click tool for nexus devices, a part of me dies

I only used it to go back to stock as that is a little bit more complex than unlocking and rooting.
Sent From My N7 via White Tapatalk

steevp said:
Click to expand...
Click to collapse
exactly

I used a rootkit at first, only because I didn't realize how easy it was to get a custom recovery onto my device. Now that I know how easy it is... no more rootkit. Ever.

Thanks to pointing out.
Was new to the Nexus devices and unfortunately used a rookit as well (now I know more how to use fast boot etc).
No more rootkits for sure
But how exactly can I check if the rootkit is infected?

Mutalisk said:
Thanks to pointing out.
Was new to the Nexus devices and unfortunately used a rookit as well (now I know more how to use fast boot etc).
No more rootkits for sure
But how exactly can I check if the rootkit is infected?
Click to expand...
Click to collapse
You can probably upload it to VirusTotal and give it a check over if you want to be absolutely sure

I'm not sure I understand the point the OP is trying to make. Don't use a root toolkit because it could really be malware in disguise?
Unfortunately that's silly advise, because you can make that argument for pretty much any software. I work in IT support and almost daily I see computers infected with viruses because the user click on what they thought was a legitimate anti-virus warning. However I'm not warning people to never install anti-virus software in case it is really malware.
Root toolkits are just like any piece of software you download from the Internet. It's all about getting it from a trusted and reputable source. Anything could be infected with malware if you get it from the wrong place.

Ravynmagi said:
I'm not sure I understand the point the OP is trying to make. Don't use a root toolkit because it could really be malware in disguise?
Unfortunately that's silly advise, because you can make that argument for pretty much any software. I work in IT support and almost daily I see computers infected with viruses because the user click on what they thought was a legitimate anti-virus warning. However I'm not warning people to never install anti-virus software in case it is really malware.
Root toolkits are just like any piece of software you download from the Internet. It's all about getting it from a trusted and reputable source. Anything could be infected with malware if you get it from the wrong place.
Click to expand...
Click to collapse
Actually, the point he is trying to make is this is a nexus device. It's DESIGNED for developers. You can easily root it with a few simple commands. The real service Simms is trying to provide is to get people to understand how adb works, how fastboot works. This does two things. 1. Gets users to understand the device a bit more, which benefits everyone, and 2. The more comfortable the users are with adb and fastboot, and the more they know about the basic android os, the better feedback they can provide to the developers. (For most of us, logs and last kernel messages are very easy. Just remember it's not the case for everyone.)
But, people like to do it the lazy way. Simms is just saying it's dangerous. While a necessary evil on some devices, a nexus isn't one of them. (Not to say what you said isn't true. I work in IT myself, I know firsthand how easy it is to get viruses. But on a device where all you have to do is reboot into booloader, type fastboot oem unlock, and bamn no hacking needed, why take the chance?)

mstrk242 said:
But, people like to do it the lazy way. Simms is just saying it's dangerous. While a necessary evil on some devices, a nexus isn't one of them. (Not to say what you said isn't true. I work in IT myself, I know firsthand how easy it is to get viruses. But on a device where all you have to do is reboot into booloader, type fastboot oem unlock, and bamn no hacking needed, why take the chance?)
Click to expand...
Click to collapse
I don't personally know Mark Skippen (aka mskip), the developer of Nexus 7 Toolkit and also the Galaxy Nexus Toolkit (and probably other things). But I've used his root toolkits for quite a while, as have many, many other people. Zero complaints.
When I use his toolkit to root, I don't feel like I'm taking a chance of being infected with malware.
I can root myself, I have. But I use the toolkit because it is a nice time saver.

I learned basics of how to use SDK, fastboot, adb on day 1 of my maguro watching YouTube vids a while back.. :what:So easy and at least you learn something and not use someone's work around, makes sense to me... If I'm gonna do something I might as well learn it the right way, try and gain a lil knowledge into this deal.. On other devices I use Odin.. No need for toolkits really, Odin and Fastboot are simple enough. I'm a slow learner to this stuff & I have enough down to where I can do what I must when necessary.. :sly:
Rasbeanjelly/Trinity 111

I just used a Root ToolKit, it's pretty nice, downloads things you need (e.g. stock images) without having to search the web for it. I had to return my device to stock. I do know all the fastboot and ADB commands but I prefer these because I don't have to sit on the PC typing each command for bootloader, recovery, system ,etc.. I can just press enter, grab a bite or something and come back, finished. the automated driver installer is also very nice because I've had issues with my PC not being able to find the correct adb/fastboot driver.
I have no problem with them, but users shouldn't just randomly download from the internet, It's just common sense, some users don't have any. I understand if you want to look like a 1337 pr0 h4xx0r, typing each command into a terminal though. It's just something we grow out of-

This stuff always fails virus checks. Big whoop. Make sure you get it from the main sources and live happy.
Sent from my Nexus 7 using xda premium

I've always hated the idea of one click root, I always said if you're going to do this you should have at least a basic working knowledge of what's going on. Because of these we get a lot of people on the forums who are completely clueless messing with the inner workings of their devices. If you do something to your phone and have no idea how to undo it you get what you deserve.

Related

[Android 1.5+] - PocketPermissions - Security info on the go

[ Please note this is for Android 2.0+ now ]
update: PocketPermissions 2.0 has been released!
All newly rebuilt with Honeycomb (tablet), and ICS optimization
New: Show your list of apps and how many permissions they request
New: Automatic search suggestions for permissions
New: Sort by number of permissions requested, name, risk, and more
New: Details screen for apps, listing permissions and other useful info
New: Multi-pane layout for tablets
Reorganized home screen for easier navigation
Hey all,
Many of you have read my guide on permissions and security. (Though this is more for beginners than some of the more seasoned XDA vets )
And, thanks to some of the great feedback and support on this and other Android related forums, I decided to make an app version.
Because, well, where better to read about permissions for your phone, than on your phone?
So who is it for?
Well, lots of us are watching as our less tech-savvy friends grab new Android phones and would like to set them up with some good habits.
It's my hope that this will help people feel more secure and informed and not feel like they've been tossed into the wild west or have to rely soley on anti-virus. The idea is that you can set them up with this app, or keep it as a quick reference for yourself.
________________
The app is $1.99 on the Market.
Requires: Android 2.0 or newer
Web:
https://market.android.com/details?id=com.alostpacket.pocketpermissions
Phone:
market://details?id=com.alostpacket.pocketpermissions
Amazon:
Amazon.com: PocketPermissions - Android security info on the go: Appstore for Android
FEATURES
Explains permissions and why they matter
Tips on good safety habits
Details the possible dangers out there
Search for permissions
See which apps have requested a specific permission
SCREENSHOTS
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
.
Pleasing interface and valuable information. Thanks.
Looks interesting. Any plans to add functionality to disable or block permissions on an app by app basis?
Thanks for the kind words guys, and sorry for the delay in getting back to this thread.
At this time there aren't any plans for blocking permissions, as that is a much more serious undertaking and requires root and modifying the OS itself and/or decompiing and recompiling the apps you want to change.
There are at least two apps out there that do try to block permissions but how effective they are I can't say.
My approach is more to educate users rather than to change the OS/Apps.
Edit:
Also, I just uploaded 1.0.4
- Better support for tablet-sized devices
- Many typo fixes
- Some editing for clarity
1.0.5 and 1.0.6 have are out, and the app just got accepted at the Amazon AppStore
http://www.amazon.com/gp/mas/dl/android?p=com.alostpacket.pocketpermissions
Changelog:
-New feature: after searching by permission, you can click on an app to be taken to its appilcation settings page. (Only tested on Android 2.1, 2.2, 2.3 - please let me know if you have any trouble with this feature!)
-Updated "make phone calls" permission
-Added better support for tablet-sized screens
-Many typo fixes and some editing for clarity
Updated to v1.1
What's new:
-Font size option in preferences
-Show all permissions option in preferences
-Show tech details about each permission, to see the official developer documentation about a permission
-Color coded permission list to show importance
-Filter out system apps option in preferences
-More consistent font styles/some graphics tweaks
Not bad, but I prefer this since its free and can disable/block permissions.
http://market.android.com/details?id=com.stericson.permissions
BenKranged said:
Not bad, but I prefer (a different app) this since its free and can disable/block permissions.
Click to expand...
Click to collapse
That's cool, and that's your choice of course. But my goal is to educate users rather than to modify other apps. So both these apps fill a different need and I think compliment each other.
Stericson's app is for advanced and rooted users, and can potentially break other apps or even your phone (as you can see in the reviews). Dont get me wrong, Stericson's a great guy and fatastic dev, but his approach and mine are fundamentally different.
My app is to help people learn about their phone and Android in general, as well as elighten them as to what the apps are asking for. I think people should be more aware of what the ramifications of permissions are, and why they shouldn't download apps when permissions exceed what's required.
Also, if you would like the free guide, you can always visit my website -- it includes a printer friendly version and downloadable PDF of this guide. The text of my guides is released under the Creative commons license. I have been writing and updating this guide for almost 2 years now. It has always been for free, and it's been read over 100k times.
So I ask for people to pay $0.99 if they would like extra features in an app and to have the guide specially formatted for a phone.
As a dev I need to eat and pay rent just like anyone else. I cant make everything free. But nearly half of my work is free. So please respect that fact.
http://alostpacket.com/2010/02/20/how-to-be-safe-find-trusted-apps-avoid-viruses/
Finally, I would appreciate if you would kindly not promote other apps in my announcement thread. Thank you.
So alp can you give me a laymen explaination of what exactly your app does and why a noob and/or a experienced user would find this app useful?
bountyhunter644 said:
So alp can you give me a laymen explaination of what exactly your app does and why a noob and/or a experienced user would find this app useful?
Click to expand...
Click to collapse
Sure and thanks for a constructive question
The basic idea is that it contains a plain-english guide on all the basics of security a new user should know. The text of the guide is the same as my free guide on the web which has been read over 100,000 times with hundreds of messages, emails, and posts of people thanking me for the effort.
(Incidentally the guide is released under the creative commons license and if it were printed to a book it would be roughly 25 pages of text. It was something that I have been working on and updating from time to time over the past two years -- since right when the original Droid came out).
In the app however, the guide is formatted nicely for a phone or tablet -- you can even change the font size for easier reading.
The content of the guide is written to teach about the Android community, how to check permissions, location tracking, privacy and more. But most of all, it teaches people how to understand these things in the CONTEXT of what they are doing with their phone and Android specifically. Location tracking can sound very scary or very useful, depending on what context it is being used in and for.
It also gives plain-english descriptions of each of the most common and important permissions, and color codes them based on how dangerous they are. The explanations that are given in the Market have gotten much better over the past year, but some are still very technical or vague, and dont help users understand why an app would want a permission.
Take the "Read Contacts" permission for example. The Android Market unhelpfully explains it like so:
Allows an application to read all of the contact (address) data stored on your device. Malicious applications can use this to send your data to other people.
Click to expand...
Click to collapse
That sounds pretty scary and doesn't really give a user any idea why an app might request it.
My guide tries to explain further that many social apps, SMS replacement apps, social games, and more, might want this permission just to help you "invite a friend" and help provide typing suggestions for you.
So, as you can see, the intended audience is for new users who aren't yet knowledgeable in the context of Android and smartphones.
For tech savvy people, it can also be a quick reference, or something they can give to their friends who are less tech savvy.
I figured a lot of us have introduced our friends to Android with great enthusiasm. but I wouldn't want to toss my friend out into the wild west without teaching them what to do first.
So basically the idea was, where better to learn about the security of your phone, than on your phone?
Additionally the app offers:
- The ability to search for a permission
- A full list of any apps using that permission
- An option to filter system apps
- An option to view the complete technical permission list, which includes, uncommon, unused, and system-only permission
- The ability to see the developer documentation of each permission
Hope that covers it all
Cheers,
-alp
I've cleaned the thread of the childish arguing. Please keep the discussion on topic, that is, about the app being promoted by the OP. If you don't like it, how about just saying what you think would improve it.
alostpacket said:
Sure and thanks for a constructive question
The basic idea is that it contains a plain-english guide on all the basics of security a new user should know. The text of the guide is the same as my free guide on the web which has been read over 100,000 times with hundreds of messages, emails, and posts of people thanking me for the effort.
(Incidentally the guide is released under the creative commons license and if it were printed to a book it would be roughly 25 pages of text. It was something that I have been working on and updating from time to time over the past two years -- since right when the original Droid came out).
In the app however, the guide is formatted nicely for a phone or tablet -- you can even change the font size for easier reading.
The content of the guide is written to teach about the Android community, how to check permissions, location tracking, privacy and more. But most of all, it teaches people how to understand these things in the CONTEXT of what they are doing with their phone and Android specifically. Location tracking can sound very scary or very useful, depending on what context it is being used in and for.
It also gives plain-english descriptions of each of the most common and important permissions, and color codes them based on how dangerous they are. The explanations that are given in the Market have gotten much better over the past year, but some are still very technical or vague, and dont help users understand why an app would want a permission.
Take the "Read Contacts" permission for example. The Android Market unhelpfully explains it like so:
That sounds pretty scary and doesn't really give a user any idea why an app might request it.
My guide tries to explain further that many social apps, SMS replacement apps, social games, and more, might want this permission just to help you "invite a friend" and help provide typing suggestions for you.
So, as you can see, the intended audience is for new users who aren't yet knowledgeable in the context of Android and smartphones.
For tech savvy people, it can also be a quick reference, or something they can give to their friends who are less tech savvy.
I figured a lot of us have introduced our friends to Android with great enthusiasm. but I wouldn't want to toss my friend out into the wild west without teaching them what to do first.
So basically the idea was, where better to learn about the security of your phone, than on your phone?
Additionally the app offers:
- The ability to search for a permission
- A full list of any apps using that permission
- An option to filter system apps
- An option to view the complete technical permission list, which includes, uncommon, unused, and system-only permission
- The ability to see the developer documentation of each permission
Hope that covers it all
Cheers,
-alp
Click to expand...
Click to collapse
Thats for the taking to time to educate me! AWESOME answer, it makes much more sense now. I consider myself an educated/experienced user but I can totally see how this would benefit me as well. I mean really, there are times when, even though i think i know what a permission is, that I have NO idea why a certain app needs a certain permission. I see this helping tremendously.
Thanks for all the hard work ALP!!
PLease take note
Gents,
You will notice that this thread has now been cleaned, please keep posts on topic, respectful and constructive.
Failure to do so will involve infractions been given.
Thank you.
So this app actually will tell me out of ALL the apps i have installed which one uses a certain permission? Then gives me a 'most likely' reason it needs said permission?
bountyhunter644 said:
So this app actually will tell me out of ALL the apps i have installed which one uses a certain permission? Then gives me a 'most likely' reason it needs said permission?
Click to expand...
Click to collapse
Yep. There is also a long guide explaining permissions and security for novice users.
Many (most all) on XDA aren't novice users of course, but I posted it here just in case. Certainly many of us have friends and relatives we probably converted to Android that could benefit from the guide. That's my hope anyways.
Anywho, Just want to post a few updates.
Because of this guide, I got quoted in Atlanta Journal Constitution on Tues.
The article was on privacy & security for mobile apps.
The reporter had read my security guide online somewhere and emailed me asking for an interview. So we chatted last Friday and I explained Android Permissions to her for about 20 mins heh.
Edit: Link
https://www.ajc.com/business/the-downside-to-mobile-1215319.html
Mobile security experts said there are a couple of things users can do to protect themselves. Patrick Cousins, an application developer and blogger, said the most important thing is to vet the applications, read the reviews and check out user comments, he said.
“It’s all about context. It’s OK to give Internet access to some applications if you can see a valid use for it,” Cousins said. “If I download a game of checkers and it wants access to all my contacts, that wouldn’t make a whole lot of sense in context. It doesn’t need to read contacts for me to play checkers.”
Click to expand...
Click to collapse
Also, just wanted to post that I'm working on the tablet version and hopefully it will be out soon (now that Google's compatibility library is fixed)
Here's a preview screenshot:
Quick bump since PocketPermissions 2.0 has been released!
All newly rebuilt with Honeycomb (tablet), and ICS optimization
New: Show your list of apps and how many permissions they request
New: Automatic search suggestions for permissions
New: Sort by number of permissions requested, name, risk, and more
New: Details screen for apps, permissions and other useful info
New: Multi-pane layout for tablets
Reorganized home screen for easier navigation
yesss i m right to you
nice
Enviado desde mi GT-I9100 usando Tapatalk 2
Is this like privacy guard & app ops?. Does it have startup, awake, keep awake option?.

[Q] VIRUS in All-In-One P990 ToolKit v1.1 |KDZ???

Hi
Im not allowed to write in develop tred so i hope sombody can see this and give me an explanation
AVG reports virus in tool from [TOOL] All-In-One P990 ToolKit v1.1 |KDZ FLASH|ROOT|Quick repartioning| .. and more
in tread
http://forum.xda-developers.com/showthread.php?t=1008070
Can anybody confirm?
the file marked it http.exe
Don't always trust your virus software, they live on your fears so a lot are dangerous to you. In a world of hacks and tweaks you make a choice, understand? I tried a new virus software, went out and when home again I couldn't access anything because there were 37 viruses, I trew that software and reinstalled windows which I bought once, but keys were out of date, I'll stick to Linux and mac. I need windows too, but I'd rather have a backdoor from "bie" than giving money to ms huh bought 2 ultimate and office pro, first time ever bought a software and turns out to be date expired.
FREEWARE MADE BY AND FOR FREE PEOPLE
SuperSkill said:
Don't always trust your virus software, they live on your fears so a lot are dangerous to you. In a world of hacks and tweaks you make a choice, understand? I tried a new virus software, went out and when home again I couldn't access anything because there were 37 viruses, I trew that software and reinstalled windows which I bought once, but keys were out of date, I'll stick to Linux and mac. I need windows too, but I'd rather have a backdoor from "bie" than giving money to ms huh bought 2 ultimate and office pro, first time ever bought a software and turns out to be date expired.
FREEWARE MADE BY AND FOR FREE PEOPLE
Click to expand...
Click to collapse
Thanks for your debate about win/mac/free!
But can somb please confirm that ToolKit v1.1
torsoen said:
Thanks for your debate about win/mac/free!
But can somb please confirm that ToolKit v1.1
Click to expand...
Click to collapse
It is safe. Alert was probably caused by too high heuristic analization level.
torsoen said:
Thanks for your debate about win/mac/free!
But can somb please confirm that ToolKit v1.1
Click to expand...
Click to collapse
Its to do with the root option. as the exploit to root the phone is seen as a virus in most antivirus programs.
its been verified as safe. No worries
necrowakker said:
Its to do with the root option. as the exploit to root the phone is seen as a virus in most antivirus programs.
its been verified as safe. No worries
Click to expand...
Click to collapse
Microsoft Security Essentials also reports a virus in the toolkit. It is not the root exploit that is causing it, it is the offline kdz flash option, as the http.exe is flagged as a virus.
I can't remember which virus it is flagged as, because I just deleted that file as I didn't need the offline flash option.
Sent from my LG-P990 using Tapatalk 2
torsoen said:
Thanks for your debate about win/mac/free!
But can somb please confirm that ToolKit v1.1
Click to expand...
Click to collapse
kingvortex said:
Microsoft Security Essentials also reports a virus in the toolkit. It is not the root exploit that is causing it, it is the offline kdz flash option, as the http.exe is flagged as a virus.
I can't remember which virus it is flagged as, because I just deleted that file as I didn't need the offline flash option.
Sent from my LG-P990 using Tapatalk 2
Click to expand...
Click to collapse
Avast also reported that too, but the root exploit was found and ignored on my scan.
My av software does not show any warnings.
torsoen said:
Hi
Im not allowed to write in develop tred so i hope sombody can see this and give me an explanation
AVG reports virus in tool from [TOOL] All-In-One P990 ToolKit v1.1 |KDZ FLASH|ROOT|Quick repartioning| .. and more
in tread
http://forum.xda-developers.com/showthread.php?t=1008070
Can anybody confirm?
the file marked it http.exe
Click to expand...
Click to collapse
Never trust AVG
Sent from my LG-P990 using xda premium
torsoen said:
Hi
AVG reports virus in tool from [TOOL] All-In-One P990 ToolKit v1.1 |KDZ FLASH|ROOT|Quick repartioning|
Click to expand...
Click to collapse
Several people already responded, but i just wanted to mention one thing... The software you are talking about could be described as a "hack tool", if you will, because some of its components are essentially exploits and "workarounds" that give you certain functionality and the access level you are normally not supppsed to have. Many AV programs see it as such, and trigger an alert. You have several options here:
1. Use other AV scanners (many available online) to get a "second opinion".
2. Use your common sense, and decide if you can trust the author/publisher of the software.
3. Always trust your AV, and immediately delete all flagged "offenders".
Your choice.
Thanks for a lot of answers, i have decided to trust this source
kt-Froggy said:
Several people already responded, but i just wanted to mention one thing... The software you are talking about could be described as a "hack tool", if you will, because some of its components are essentially exploits and "workarounds" that give you certain functionality and the access level you are normally not supppsed to have. Many AV programs see it as such, and trigger an alert. You have several options here:
1. Use other AV scanners (many available online) to get a "second opinion".
2. Use your common sense, and decide if you can trust the author/publisher of the software.
3. Always trust your AV, and immediately delete all flagged "offenders".
Your choice.
Click to expand...
Click to collapse
common sense is sadly what 90% of computer users in general lack (especially the bandwagon windows-hating mac-loving types).
haven't been infected for over 9 years and I never once felt the need to install any 3rd party AV software. The closest I came to getting infected was when MSE on windows 7 detected a virus on my friend's flash drive and cleaned it.
It's all about watching what you surf. I admit to even doing things that Hollywood and the RIAA don't take kindly too, and not once have I received any malware from it - because I check my source.
I primarily use windows btw, but very often I run multiple Linux virtual machines in VMware and have at least above-average knowledge of that OS. Also used to own a Macbook in university, great OS, but what I like about it can also be found within Ubuntu.
back in university and high school I often got called to "clean s**t up" by less savvy friends. All it took was one look at the browsing history to immensely narrow down possible sources of the malware. So I did them a favour and edited the hosts file to preemptively block those infected sites after doing the cleanup. Within hours I get called up being asked if I did something that broke the computer. *facepalm* Oh yeah these guys would install at least 3 or 4 different freeware AV programs that did nothing but hog the CPU as they were powerless against new malware due to their update warnings always getting ignored.
bottom line is: If you're a savvy user (knowing how to root and install custom ROMs is relatively high by world standards) the best antivirus software is your own god damned brain
btw, I passed my macbook to my mother 2 years ago in hopes that she would finally be able to use a computer without infecting it every 2-3 months, since it was easier to give her a newb-friendly UNIX-based OS rather than teach her how to use Windows properly or god forbid teach her how to use Linux. It just got infected last night =.=
machoman1337 said:
common sense is sadly what 90% of computer users in general lack (especially the bandwagon windows-hating mac-loving types).
haven't been infected for over 9 years and I never once felt the need to install any 3rd party AV software. The closest I came to getting infected was when MSE on windows 7 detected a virus on my friend's flash drive and cleaned it.
It's all about watching what you surf. I admit to even doing things that Hollywood and the RIAA don't take kindly too, and not once have I received any malware from it - because I check my source.
I primarily use windows btw, but very often I run multiple Linux virtual machines in VMware and have at least above-average knowledge of that OS. Also used to own a Macbook in university, great OS, but what I like about it can also be found within Ubuntu.
back in university and high school I often got called to "clean s**t up" by less savvy friends. All it took was one look at the browsing history to immensely narrow down possible sources of the malware. So I did them a favour and edited the hosts file to preemptively block those infected sites after doing the cleanup. Within hours I get called up being asked if I did something that broke the computer. *facepalm* Oh yeah these guys would install at least 3 or 4 different freeware AV programs that did nothing but hog the CPU as they were powerless against new malware due to their update warnings always getting ignored.
bottom line is: If you're a savvy user (knowing how to root and install custom ROMs is relatively high by world standards) the best antivirus software is your own god damned brain
btw, I passed my macbook to my mother 2 years ago in hopes that she would finally be able to use a computer without infecting it every 2-3 months, since it was easier to give her a newb-friendly UNIX-based OS rather than teach her how to use Windows properly or god forbid teach her how to use Linux. It just got infected last night =.=
Click to expand...
Click to collapse
Then i also trust may god damned brain
LoA

[ROOT/SOFF] One Click ROOT + SOFF for Nexus 4

Just like my other threads, this one is about the Google Nexus 4 and Root-A-Lot. From what some people have told me this thing has been a hit or miss, but it's rooted and s-off'd a lot of users devices, phone and tablet.
I am not the creator of this one click, but I was told it could be shared freely, as it also describes in the .ZIP contents.
I did not personally try this out myself (My One X is already rooted + S-OFF) so be sure to check it out and read all the documents before trying out this new root exploit.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
It did finally pick up my One X after about 10 mins (more like 2), but like I said I'm already rooted. It looks like it supplies a good amount of phones, and with the 3 different methods for rooting, especially the third, hopefully we will see some good results!
I'm not responsible for harm that comes from this file, I have ran and tested it out to SOME EXTENT. Please be aware of this, and like I said, READ THE DOCUMENTATION.
It states it can:
Root Android 2.x
Root Android 3.x
Root Android 4.x
Rooting Phones and Tablets
Supplies S-OFF as well (80% Chance)
So, like I said, try it out and let me know if it works!
link removed ..
Why? S-off is technically for HTC only.. Yes?.. Why would we need to unlock our NAND, assuming this can, when there aren't any limitations. Also I'm not sure if the NAND is truly locked like on HTC, as this is my first non HTC phone. And as for Root it isn't that necessary is it? It I thought there was a way to root already through flashing recovery and not unlocking boot loader. Unless secure boot removes the root without unlocked bootloader.
I Downloaded it just to see what it was, and avg yelled at me. Not saying its a virus, but I also have no need for it.
http://goo.gl/HxaiA
Sent from my Nexus 4
From what the text file reads it's not for just HTC phones... at all..
Eset Smart Security identifies a trojan horse (http://205.196.122.163/3jnnbd3yu38g/rr4ewaa9bp6ben0/Rootalot_106A.zip = ZIP = bin/androidraldaemon.exe een variant van Win32/Injector.ADPP trojan) and cut off the connection. No need for it anyway as unlocking the bootloader and rooting is a piece of cake on this phone.
Maybe it is best OP deletes this thread imo.
https://www.virustotal.com/pl/file/...76e54442cd19c39a6bd2f297e79474bacf6/analysis/
I don't think that this file is somehow harmful to PC. Lots of antiviruses are too sensitive.
lol is this the HTC One X forum???
gee2012 said:
Eset Smart Security identifies a trojan horse (http://205.196.122.163/3jnnbd3yu38g/rr4ewaa9bp6ben0/Rootalot_106A.zip = ZIP = bin/androidraldaemon.exe een variant van Win32/Injector.ADPP trojan) and cut off the connection. No need for it anyway as unlocking the bootloader and rooting is a piece of cake on this phone.
Maybe it is best OP deletes this thread imo.
Click to expand...
Click to collapse
One out of 34 Virus Scanners identified it as a "injector" variant to me. I'll leave it for the users to decide, if a Mod wants it gone so be it, I don't see the harm though, I ran it myself and noticed no difference in anything.
A lot of these type of apps are flagged by Anti-Virus, there's nothing new there
What I can't understand is why you've come in a Nexus/LG device forum with a "one click root" and S-OFF solution? S-OFF has absolutely nothing to do with the Nexus 4.
The manufacturer of this phone has provided an app called "Fastboot" which allows you to unlock the bootloader and to flash the recovery partition. It's a feature. Source.Android.com walks you through, step-by-step the incredibly simple, secure process of how to do it.
The Nexus phones released us from downloading suspicious EXE's that do God-knows-what from people off of forums, yet here we still are. It's really unbelievable.
I'd be interested in more information about this "root-a-lot" exploit. I've never heard of it, and a quick search on Google doesn't pull anything up.
As for the other two (ZergRush and PSNeuter), those holes were patched a long time ago, and they haven't worked on Android since version 4.0.1.
Somebody, sniff the traffic going through the application for suspicious trojan-like connections. Nexus devices are exclusively made for developers, with everything provided to securely unlock and do whatever you want with the device.
Do not even try to install this app without understanding the risks. Topic must be removed, author - banned.
efrant said:
I'd be interested in more information about this "root-a-lot" exploit. I've never heard of it, and a quick search on Google doesn't pull anything up.
As for the other two (ZergRush and PSNeuter), those holes were patched a long time ago, and they haven't worked on Android since version 4.0.1.
Click to expand...
Click to collapse
That's a point, when i realised something here is wrong
I searched root a lot, and this dude posted it in every forum essentially. It does not work, its a fake program. It was made in VB.net or C#, it claims to s-off phones like the HTC one, he didn't make it, there is no source to track it back to an author, it claims to s-off the HTC One X, when the only method is the one made by beaups and jcase. The list goes on.
Bottom line - it is a fake program and possibly a virus. Thread needs to be closed, as it has in almost every other XDA forum.
If you ran this program, I suggest scanning with anti-virus/malware scanners,
http://www.malwarebytes.org/
http://www.safer-networking.org/
http://www.superantispyware.com/
it may not be a virus, but it is a fake program, and virustotal picked up 2 possible threats. They may be false positives. But you should NEVER take a chance unless you know for 100000% it is in fact a false positive
Sent from my Nexus 4
Yeah I posted it for popular phones it SHOULD work with. If you're going to hate on me for simply SHARING something I thought would do good, and apparently does NO BAD then I do apologize and I'll remove it. 2/34 Virus scanners pick it up as what looks like to me, personally, to be false positives. If I was going to try to infect people with someone, I wouldn't use my main account, I've donated more then "fake programs" while I've been here, including a lot of damn time on sometimes what ends up to be nothing.
So if you want to warn people about to program, please do, but don't involve me like I'm doing something intentionally to harm people. I ran it myself, I tried it, my phone was already rooted. It just hung on me for awhile. I could of posted it in every forum, but I didn't.
Just don't make me out to be a bad guy, mkay?
jSterling said:
Yeah I posted it for popular phones it SHOULD work with. If you're going to hate on me for simply SHARING something I thought would do good, and apparently does NO BAD then I do apologize and I'll remove it. 2/34 Virus scanners pick it up as what looks like to me, personally, to be false positives. If I was going to try to infect people with someone, I wouldn't use my main account, I've donated more then "fake programs" while I've been here, including a lot of damn time on sometimes what ends up to be nothing.
So if you want to warn people about to program, please do, but don't involve me like I'm doing something intentionally to harm people. I ran it myself, I tried it, my phone was already rooted. It just hung on me for awhile. I could of posted it in every forum, but I didn't.
Just don't make me out to be a bad guy, mkay?
Click to expand...
Click to collapse
Okay
Sent from my Nexus 4
jSterling said:
Yeah I posted it for popular phones it SHOULD work with. If you're going to hate on me for simply SHARING something I thought would do good, and apparently does NO BAD then I do apologize and I'll remove it. 2/34 Virus scanners pick it up as what looks like to me, personally, to be false positives. If I was going to try to infect people with someone, I wouldn't use my main account, I've donated more then "fake programs" while I've been here, including a lot of damn time on sometimes what ends up to be nothing.
Click to expand...
Click to collapse
Cool story dude, really glad you're so sure of yourself. You know who's donated more then "fake programs" ... Grim.
jSterling said:
So if you want to warn people about to program, please do, but don't involve me like I'm doing something intentionally to harm people. I ran it myself, I tried it, my phone was already rooted. It just hung on me for awhile. I could of posted it in every forum, but I didn't.
Just don't make me out to be a bad guy, mkay?
Click to expand...
Click to collapse
How about you stop being so goddam defensive about something potentially dangerous. You clearly have no idea what it does so before you get your feathers ruffled and get snippy with Grim how about you just relax there bub.. mmkay?
Sent from my Nexus 4 using Tapatalk 2
---------- Post added at 01:43 PM ---------- Previous post was at 01:40 PM ----------
jSterling said:
I could of posted it in every forum, but I didn't.
Click to expand...
Click to collapse
Define "every"
Lmao
Sent from my Nexus 4
HTC Butterfly thread:
Quote by PG101:
Doesn't work.. I tried on the x920d (UB1).. while on, while in bootloader, while in fastboot.. doesn't work.. just sits there with message "looking for HTC Butterfly" for almost 20 mins, before I closed it.
Since I have tested it myself, I am going to close this thread, just incase someone tries something else and has a brick.
Thread: http://forum.xda-developers.com/showthread.php?p=39081847#post39081847.
Clearly MALWARE. OP should be warned/banned imo.
I'll throw my opinion in as well.
That app will not s-off the international hox (endeavoru) because even the top devs haven't even found an exploit yet. Tripnraver has managed to brick one of his hox's for the cause
Sent From My Pure LG Nexus 4
galaxys2Tav said:
I'll throw my opinion in as well.
That app will not s-off the international hox (endeavoru) because even the top devs haven't even found an exploit yet. Tripnraver has managed to brick one of his hox's for the cause
Sent From My Pure LG Nexus 4
Click to expand...
Click to collapse
Exactly. The dual core one x just recently got s-off, but about 8 were bricked for the effort. I dissected the zip and the files/method to s-off the dual core one x don't exist. Also, the dual core one x could only be rooted through 2 very particular exploits. One was checking for an OTA and the other was through restoring a backup app of the dialer i believe and doing some other things
Sent from my Nexus 4
mirGantrophy said:
Exactly. The dual core one x just recently got s-off, but about 8 were bricked for the effort. I dissected the zip and the files/method to s-off the dual core one x don't exist. Also, the dual core one x could only be rooted through 2 very particular exploits. One was checking for an OTA and the other was through restoring a backup app of the dialer i believe and doing some other things
Sent from my Nexus 4
Click to expand...
Click to collapse
You know your stuff
beaups said:
You know your stuff
Click to expand...
Click to collapse
No no no no.. you sir.. know your stuff
Sent from my Nexus 4
ChongoDroid said:
No no no no.. you sir.. know your stuff
Sent from my Nexus 4
Click to expand...
Click to collapse
Yep, because even he face palmed when it said s-off in the boot loader screen, as did we all. Lol
Sent from my Nexus 4

Android Toolkit

I am really happy to share my new project with you and contribute to this great forum. I have been developing this project for a half of a year and I have finished about one month ago. I am proud to announce you that I have finished Android Toolkit.
Android Toolkit is an app for Android device managment and modification. It has a built in ADB Tools, Fastboot Tools and custom recovery flasher and much more. There is also support for Remote ADB control. There is also Android ADB Backup/Restore tool and Root Exploit (only installs Superuser.apk in system). Currently, there are only 3 devices for recovery flashing and TWRP flashing is still in development.
A whole project was developed using C# and WPF technology. You need to have installed .Net Framework 4.5 to run this app.
Home
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Home enables running other tools from app and updating the database.
Devices
Device shows the latest info about your device and validates root permissions of your device.
ADB
Fastboot
Advanced
Recovery master
Device restore
Zip flasher
Code:
Download:
[URL="https://onedrive.live.com/download?resid=208A5A6CB2859845%211235"]Download[/URL]
I will appreciate any kind of a suggestion or a critic because I am 15 and I think that this project can help you.
Click to expand...
Click to collapse
Web
Code:
Nexus 5 is added because this app would best fit with all Google Nexus devices.
XDA:DevDB Information
Android Toolkit, a Tool/Utility for the Google Nexus 5
Contributors
GabrijelBoduljak
Version Information
Status: Stable
Created 2014-03-21
Last Updated 2014-05-04
Nice job Slovencek
great, just another root toolkit to help newbs not learn a single thing about their devices.
Yeah...good job!
But I agree....before using toolkits, new guys should learn everything manually. Its quite easy when you know what you're doing. And you have more control over everything.
I will test it buddy, u did a great job. Keep it up
Sent from my Nexus 5 using Tapatalk
New version coming
Thank you guys for feedback. I am developing new faster, and more powerful version of Android Toolkit. New features include real time command view, in the other words you will be able to see what is happening with your device in real time. Also, more devices are getting suported.
wait, you're only 14 and building applications in WPF like that? Nicely done. Looks good (I'm not at home and don't have time to try it out right now, but it looks good).
Great job dude. Keep it up. Always nice for people to have s simple and easy option.
Thanks!
simms22 said:
great, just another root toolkit to help newbs not learn a single thing about their devices.
Click to expand...
Click to collapse
?? I agree it allows people to not have to learn.. but the people who dont want to learn anyways arent going to we cant change that. He deserves a lot of credit for this.
With all the toolkits for my history of phones i never just used the kit and not bother to actually understand anything.. im sure a lot of people are the same way. Kits are great after you've learned how to do things like adb push and flash recoveries, etc ,etc..they save time plus!!! this looks really nice!!!
deakelem said:
?? I agree it allows people to not have to learn.. but the people who dont want to learn anyways arent going to we cant change that. He deserves a lot of credit for this.
With all the toolkits for my history of phones i never just used the kit and not bother to actually understand anything.. im sure a lot of people are the same way. Kits are great after you've learned how to do things like adb push and flash recoveries, etc ,etc..they save time plus!!! this looks really nice!!!
Click to expand...
Click to collapse
save time? it takes seconds to unlock your bootloader and flash a custom recovery via fastboot(the right way) and not via a toolkit.
simms22 said:
save time? it takes seconds to unlock your bootloader and flash a custom recovery via fastboot(the right way) and not via a toolkit.
Click to expand...
Click to collapse
I understand this, just trying to be nice and give him some credit.
deakelem said:
I understand this, just trying to be nice and give him some credit.
Click to expand...
Click to collapse
and you will get thanked for your niceness
Nice job man, don't pay attention to the negativity. This will be a good addition to your portfolio when applying for a school or job. You have a great career in software development ahead of you. I definitely was not writing stuff like this when I was your age. Keep it up!
Sent from my Nexus 5
simms22 said:
great, just another root toolkit to help newbs not learn a single thing about their devices.
Click to expand...
Click to collapse
Oh gosh. Give the guy some credit. It's really nice. Some people don't want to learn.
sent from my Nexus 5
jphilippon said:
Oh gosh. Give the guy some credit. It's really nice. Some people don't want to learn.
sent from my Nexus 5
Click to expand...
Click to collapse
credit for what? making something that there are a bunch of available already? or credit for making it easier to be clueless about what you are actually doing to your device? the only root toolkit that ill ever give credit to is the toolkit that goes through all the steps, and teaches you what you are actually doing to your device per step, and how to fix it if you mess something up. but it doesnt exist yet.
anyways, this isnt really about the op, its about root toolkits in general. kudos to the op for being able to make it nevertheless.
jphilippon said:
Oh gosh. Give the guy some credit. It's really nice. Some people don't want to learn.
sent from my Nexus 5
Click to expand...
Click to collapse
In reality...those that don't want to learn and use toolkits, are usually the ones posting " my phone is bricked" threads.
Not knowing how this stuff works is a bad idea. Unless you have money to burn on new phones.
simms22 said:
credit for what? making something that there are a bunch of available already? or credit for making it easier to be clueless about what you are actually doing to your device? the only root toolkit that ill ever give credit to is the toolkit that goes through all the steps, and teaches you what you are actually doing to your device per step, and how to fix it if you mess something up. but it doesnt exist yet.
anyways, this isnt really about the op, its about root toolkits in general. kudos to the op for being able to make it nevertheless.
Click to expand...
Click to collapse
The kid is 15. such a waste of effort to post these stupid comments. If you're tired of telling people how to fix their phones when they don't know how to use adb stop doing it.
sent from my Nexus 5
jphilippon said:
The kid is 15. such a waste of effort to post these stupid comments. If you're tired of telling people how to fix their phones when they don't know how to use adb stop doing it.
sent from my Nexus 5
Click to expand...
Click to collapse
i think you missed my "kudos to the op for being able to make it nevertheless". if i waa tired of helping people fix their phones, i wouldnt be here. besides for trinity kernel, the only reason im here is to help people. obviously you arent here to help other people, youre here to help yourself(which you have asked for help from other people before). anyways, adb isnt needed. you can greatly enjoy modding your devices(the right way) and never learn adb. heck, i dont know adb(ok, very basically). i dont even own a computer, desktop nor laptop. what IS needed to know is just fastboot. everything else besides initially unlocking the bootloader and first recovery flash doesn't need any kind of computer access, can be done without a computer.
simms22 said:
i think you missed my "kudos to the op for being able to make it nevertheless". if i waa tired of helping people fix their phones, i wouldnt be here. besides for trinity kernel, the only reason im here is to help people. obviously you arent here to help other people, youre here to help yourself(which you have asked for help from other people before). anyways, adb isnt needed. you can greatly enjoy modding your devices(the right way) and never learn adb. heck, i dont know adb(ok, very basically). i dont even own a computer, desktop nor laptop. what IS needed to know is just fastboot. everything else besides initially unlocking the bootloader and first recovery flash doesn't need any kind of computer access, can be done without a computer.
Click to expand...
Click to collapse
I help every chance I know how, and I ask when I don't. I don't put people down for working hard.
sent from my Nexus 5
Grt job bro
Sent from my Micromax A67 using XDA Premium 4 mobile app

[Q] How could we crack bootloader?

Alright, so we now have root (somewhat), but now, we yearn for BL unlock. I've been investigating, but I've come up short. I'm in no way a developer (other than some basic HTML/CSS knowledge), so maybe the community can brainstorm and churn out ideas. If you have 'em, let 'em rip! :good:
EDIT: Ok, yes, I realize that I 'dun goofed. There are multiple threads about this and I made a mistake between root and WP. I know maiko1 has worked hard on getting us root, and I and everyone else appreciates it. My apologies for disturbing the peace.
jake7405 said:
Alright, so we now have root (somewhat), but now, we yearn for BL unlock. I've been investigating, but I've come up short. I'm in no way a developer (other than some basic HTML/CSS knowledge), so maybe the community can brainstorm and churn out ideas. If you have 'em, let 'em rip! :good:
Click to expand...
Click to collapse
http://forum.xda-developers.com/droid-turbo/general/bounty-disable-write-protection-unlock-t3067615
There are already multiple threads on this topic you are bringing up. Also what u have is root....there is no somewhat or in between. If you dont understand what moforoot does for the turbo then you shouldnt be tweaking your device in the first place.
I think the way is have a moto maxx and droid turbo together and study what changes with unlocking in maxx
the_rooter said:
http://forum.xda-developers.com/droid-turbo/general/bounty-disable-write-protection-unlock-t3067615
There are already multiple threads on this topic you are bringing up. Also what u have is root....there is no somewhat or in between. If you dont understand what moforoot does for the turbo then you shouldnt be tweaking your device in the first place.
Click to expand...
Click to collapse
Right, but that's a bounty thread. This isn't, I must made this for general brainstorming and idea sharing. Also I only called it somewhat root because of write protection, but I get what you mean. Sorry if I'm bringing up an already discussed topic, but I know everyone is yearning for some kind of unlock, and I figure that discussion and brainstorm is good to help keep the idea moving forward.
what gets me, and no offense to anyone, but those with the skills and knowledge to do this do not brainstorm said ideas on xda, but in other resources and areas or in idfferent areas of xda. Too many people who have no idea what they are doing would hinder the process of accomplishing the goal. while i think this threads are a good thing in a way, they are really useless because the ones with the knowledge do not really come here and discuss the insanely complicated procedure of what must be done in order to accomplish things.
Here is another thread with the same idea called Droid Turbo Think Tank.
Nearly every person I've come into contact with has said it is possible to unlock the bootloader so that gives hope. But just don't expect it soon.
jake7405 said:
Alright, so we now have root (somewhat), but now, we yearn for BL unlock. I've been investigating, but I've come up short. I'm in no way a developer (other than some basic HTML/CSS knowledge), so maybe the community can brainstorm and churn out ideas. If you have 'em, let 'em rip! :good:
Click to expand...
Click to collapse
When will this issue die? Root ACCESS, and write protection are NOT the same thing. Totally independent of each other. Everyone assuming that they are the same thing is starting to get ridiculous it has been explained here multiple times.
renegadeone8 said:
When will this issue die? Root ACCESS, and write protection are NOT the same thing. Totally independent of each other. Everyone assuming that they are the same thing is starting to get ridiculous it has been explained here multiple times.
Click to expand...
Click to collapse
Can you explain this difference? I now understand they are different. I previously thought root was defined by having read write and execute permissions everywhere (including to the system)
Clearly I'm not right. But maybe you could explain that to me
Diego1751 said:
Can you explain this difference? I now understand they are different. I previously thought root was defined by having read write and execute permissions everywhere (including to the system)
Clearly I'm not right. But maybe you could explain that to me
Click to expand...
Click to collapse
I may be wrong. That said, how I see it and how wiki answers:
Rooting "is the process of allowing users...running the Android mobile operating system to attain privileged control (known as "root access") over various Android's subsystems."
Privileged control "is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user"
So by that, we have root. We (really maiko1) have exploited a bug that has given us elevated access to the system partition which is normally protected from us, the user.
Write protection is literally what it is. Protection from unauthorized code to be written.
I look at it as, we have root. A (seemingly large portion) of people had the same definition of Root as you, so those people are all upset merely because they started from an incorrect assumption of what they want. (Write access)
So say every birthday (phone) you have, Im going to get you a cake (Root) And every birthday that cake comes out and all your friends (Write access) surround you to celebrate. Well I never said I was bringing your friends, I just said cake. Then one year no friends come and all you have is cake. Now youre saying this isnt cake, where are my friends.. And my response is, no no no, I said I was giving you cake. Heres your cake, Its not my fault you assumed the friends always came with the cake.
Diego1751 said:
Can you explain this difference? I now understand they are different. I previously thought root was defined by having read write and execute permissions everywhere (including to the system)
Clearly I'm not right. But maybe you could explain that to me
Click to expand...
Click to collapse
Basic Analogy: Compare Android to Windows for a second. Pretend that Microsoft removed the Administrator account, so nobody could use it, and they set up write-protection on C:\ and restricted your write abilities to C:\Users\YourUserName. So someone (maiko1) comes along and finds a way to re-enable the Administrator account, and you can use it, but due to write protection, you can only write to anywhere in C:\Users. Make sense?
r3pwn said:
Basic Analogy: Compare Android to Windows for a second. Pretend that Microsoft removed the Administrator account, so nobody could use it, and they set up write-protection on C:\ and restricted your write abilities to C:\Users\YourUserName. So someone (maiko1) comes along and finds a way to re-enable the Administrator account, and you can use it, but due to write protection, you can only write to anywhere in C:\Users. Make sense?
Click to expand...
Click to collapse
ntxct said:
I may be wrong. That said, how I see it and how wiki answers:
Rooting "is the process of allowing users...running the Android mobile operating system to attain privileged control (known as "root access") over various Android's subsystems."
Privileged control "is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user"
So by that, we have root. We (really maiko1) have exploited a bug that has given us elevated access to the system partition which is normally protected from us, the user.
Write protection is literally what it is. Protection from unauthorized code to be written.
I look at it as, we have root. A (seemingly large portion) of people had the same definition of Root as you, so those people are all upset merely because they started from an incorrect assumption of what they want. (Write access)
So say every birthday (phone) you have, Im going to get you a cake (Root) And every birthday that cake comes out and all your friends (Write access) surround you to celebrate. Well I never said I was bringing your friends, I just said cake. Then one year no friends come and all you have is cake. Now youre saying this isnt cake, where are my friends.. And my response is, no no no, I said I was giving you cake. Heres your cake, Its not my fault you assumed the friends always came with the cake.
Click to expand...
Click to collapse
thanks for the explanation guys. I completely understand that root and write protection are different things. I USED to think this when Mofo was released it was the first root I had to pay for and I was also curious about this write protection thing because I had thought (when others explained root to me back when I was a noob) that root was defined by advanced control to the system (which it sounds like it is but this is a VERY loose definition) including read/write/exc acceses to the system and subsystems. after reading for a while to learn the difference I happily bought mofo (partly assuming more dev work will maybe unlock bl or wp) But now people in this thread (and many others) now know
Can we stick to one thread!

Categories

Resources