Related
So I just saw the the little news about towelroot on the xda front page I'm wondering if that would work with the chromecast? Should I unplug this thing to stop updates or what?
Asadullah said:
So I just saw the the little news about towelroot on the xda front page I'm wondering if that would work with the chromecast? Should I unplug this thing to stop updates or what?
Click to expand...
Click to collapse
Sadly, I don't think it has any effect on Chromecast.
The trouble is that towelroot is an APK.
Chromecast won't let you sideload APKs due to whitelist.
Non-vulnerable Chromecast won't load unsigned code from bootloader/recovery.
Because you can't "just run an app" the way to get root on Chromecast is by flashing a pre-rooted ROM.
The only way to flash a ROM is to use FlashCast, which requires a vulnerable bootloader, because FlashCast is not signed by Google.
Non-vulnerable bootloaders will only run Google-signed code.
Thus, the existing root methods for Chromecast remain:
FlashCast on vulnerable bootloaders only
Replace the firmware/bootloader via physical chip removal and reprogramming
Once the bootloader gets (auto) updated, you can't flash anything because the bootloader will not execute FlashCast.
Another possibility would be to use a Chrome sandbox escape vulnerability and try to execute the kernel exploit this way - good luck with that :/
deeper-blue said:
Another possibility would be to use a Chrome sandbox escape vulnerability and try to execute the kernel exploit this way - good luck with that :/
Click to expand...
Click to collapse
That's an idea, but the trick is getting Chrome to execute the exploit to begin with... Essentially the Chromecast whitelist acts like parental control on a router - Chromecast can only access approved addresses unless it's been made a developer unit.
bhiga said:
That's an idea, but the trick is getting Chrome to execute the exploit to begin with... Essentially the Chromecast whitelist acts like parental control on a router - Chromecast can only access approved addresses unless it's been made a developer unit.
Click to expand...
Click to collapse
And even if you could manage to get it to run inside CCast Chrome...I'm sure the Sandbox seals it off from making any changes to the root or bootloader status.
bhiga said:
That's an idea, but the trick is getting Chrome to execute the exploit to begin with... Essentially the Chromecast whitelist acts like parental control on a router - Chromecast can only access approved addresses unless it's been made a developer unit.
Click to expand...
Click to collapse
There is one thing that comes to mind. The Netflix client on the Chromecast runs as native code out of /netflix/. I have a feeling there is some sort of vulnerability exposed there
neobear said:
There is one thing that comes to mind. The Netflix client on the Chromecast runs as native code out of /netflix/. I have a feeling there is some sort of vulnerability exposed there
Click to expand...
Click to collapse
possible... but you gotta find it, use it, then hope the big G doesn't push an update to fix it soon after.
-= this post enhanced with bonus mobile typos =-
neobear said:
There is one thing that comes to mind. The Netflix client on the Chromecast runs as native code out of /netflix/. I have a feeling there is some sort of vulnerability exposed there
Click to expand...
Click to collapse
Still have the issue being that the only way to launch it is via Netflix...
bhiga said:
possible... but you gotta find it, use it, then hope the big G doesn't push an update to fix it soon after.
-= this post enhanced with bonus mobile typos =-
Click to expand...
Click to collapse
even if they do it can be rooted therefore and updates blocked.. hence mission accomplished... like Sony's ps3.. I think sunny finally had given up now...
Sent from my Nexus 5 using Tapatalk
persianrisk said:
even if they do it can be rooted therefore and updates blocked.. hence mission accomplished... like Sony's ps3.. I think sunny finally had given up now...
Click to expand...
Click to collapse
Yes, much like the current bootloader exploit that FlashCast uses. It becomes major cat-and-mouse because Chromecast auto-updates without waiting for user intervention though.
Sony can give up more easily because a game console's success is not as heavily tied to content providers. Chromecast, on the other hand, would be sunk without any apps. Let's face, Chromecast for YouTube alone just won't cut it, even at $35.
bhiga said:
Yes, much like the current bootloader exploit that FlashCast uses. It becomes major cat-and-mouse because Chromecast auto-updates without waiting for user intervention though.
Sony can give up more easily because a game console's success is not as heavily tied to content providers. Chromecast, on the other hand, would be sunk without any apps. Let's face, Chromecast for YouTube alone just won't cut it, even at $35.
Click to expand...
Click to collapse
I understand. but Sony is equally tied to game content and also other media providers - hence when it was hacked its a bigger problem as some choose not to purchase their games whereas with rooted Chromecast you are still paying for the services even if using a proxy...
Sent from my Nexus 5 using Tapatalk
persianrisk said:
I understand. but Sony is equally tied to game content and also other media providers - hence when it was hacked its a bigger problem as some choose not to purchase three have whereas with rooted Chromecast you are still paying for the second albeit unusually through a proxy...
Click to expand...
Click to collapse
True, it does create an interesting secondary market.
Unfortunately, my two devices have already had the 5.1.1 OTA update installed, but I'd like to disable OTA updates so they don't inadvertently get updated again in the future.
I tired using option #3 in the script from this thread: http://forum.xda-developers.com/amazon-fire/general/installing-google-framework-playstore-t3216122
I also tried running the adb commands mentioned here: http://forum.xda-developers.com/amazon-fire/general/disable-ota-sdcard-write-access-t3220430
but from what I can tell, they still don't have OTA updates disabled. I can still get to the Settings>Device Options>System Updates page, and when I click on the "CHECK NOW" button it says "checking now", and then "No updates found". That appears to me like it is still able to check for updates.
Anyone have any other ideas?
dlazer said:
Unfortunately, my two devices have already had the 5.1.1 OTA update installed, but I'd like to disable OTA updates so they don't inadvertently get updated again in the future.
I tired using option #3 in the script from this thread: http://forum.xda-developers.com/amazon-fire/general/installing-google-framework-playstore-t3216122
I also tried running the adb commands mentioned here: http://forum.xda-developers.com/amazon-fire/general/disable-ota-sdcard-write-access-t3220430
but from what I can tell, they still don't have OTA updates disabled. I can still get to the Settings>Device Options>System Updates page, and when I click on the "CHECK NOW" button it says "checking now", and then "No updates found". That appears to me like it is still able to check for updates.
Anyone have any other ideas?
Click to expand...
Click to collapse
Be hard pressed to have a comprehensive OTA block w/o root. Not saying it can't be done but I wouldn't have confidence until proven in the wild. Amazon makes it difficult on several levels to hold at a specific release.
If you only use your Fires at home you could block amazon's IP addresses at your router but not many routers will have the option, mostly routers with dd-wrt or open-wrt. Many Buffalo brand routers have dd-wrt.
Your Fires would still try to get an OTA update but your router would say "Sorry! Can't find that address! Go frack yourself amazon!" (or more accurately, redirect the address to nowhere).
blueberry.sky said:
If you only use your Fires at home you could block amazon's IP addresses at your router but not many routers will have the option, mostly routers with dd-wrt or open-wrt. Many Buffalo brand routers have dd-wrt.
Click to expand...
Click to collapse
This was tried with the 3rd gen HDX (2013-14 timeframe). Worked for awhile then Amazon rotated IP addresses. A lot of devices got upgraded (and lost root) as a result. Things may have changed since then; Amazon might use static addresses in front of load balancers.
Lol, yea, I wouldn't trust them as far as I could throw them. Block the whole range of IPs that is known to be owned by amazon.
---------- Post added at 01:17 AM ---------- Previous post was at 12:53 AM ----------
Better would be forwarding everything to transparent squid proxy with a script that blocks any .bin file downloads. Ala upside-down-ternet.
Has anyone been able to successfully run Adhell Adhell 2 on Note 8? Like actually having it block ads? I installed Adhell2 but it doesn't install ads. It sucks but this is one of the main reasons I liked Galaxy phones.
mehdi_s82 said:
Has anyone been able to successfully run Adhell Adhell 2 on Note 8? Like actually having it block ads? I installed Adhell2 but it doesn't install ads. It sucks but this is one of the main reasons I liked Galaxy phones.
Click to expand...
Click to collapse
It's not compatible yet, We have to wait for the developers to update it. It causes restarts and other issues.
I use DNS66 and added the two OpenDNS free servers to it. it works perfectly. Haven't seen an ad yet when using Chrome Canary! They also seem to have cut down on YouTube ads as well. Which is saying something because YouTube LOVES to put ads in most of their videos.. :laugh:
I think ad block plus is working for me. Haven't had any issues with it yet
MACHEK said:
I think ad block plus is working for me. Haven't had any issues with it yet
Click to expand...
Click to collapse
It doesn't work for Chrome
rawintellect said:
I use DNS66 and added the two OpenDNS free servers to it. it works perfectly. Haven't seen an ad yet when using Chrome Canary! They also seem to have cut down on YouTube ads as well. Which is saying something because YouTube LOVES to put ads in most of their videos.. :laugh:
Click to expand...
Click to collapse
Didn't work for me. Ads still showing in Chrome. Did you do anything else other than adding OpenDNS servers?
mehdi_s82 said:
Didn't work for me. Ads still showing in Chrome. Did you do anything else other than adding OpenDNS servers?
Click to expand...
Click to collapse
I did add two custom host files but that shouldn't matter. I turned them off and it's still blocking ads. I do use Chrome Canary though which is different than the stock Chrome that comes with our phones. It's an alpha release and is ALWAYS updated just about every day. Sometimes it crashes because the devs are trying new things but they usually fix it within a day. Until they fix it I then run Chrome beta. I never use stock Chrome.
As for the setup? All you have to do is make sure the host files that came with DNS66 are updated before you start the task. Click the "reload button" in the upper right hand corner then wait...once they are updated then press start. Here are screenshots of a web site I go to called "Project Free TV" It's HEAVY on ads. You can see what it looks like with DNS66 on and with it off. It's DEFINITELY working.
P.S. Make sure you add it to the ignore list or "white list" of apps NOT to kill if you're using a task killer like Advance Task Manager or Greenify.
I'm using BlockThis 3.0. It's like adguard and uses a VPN. The only downside is that stupid key icon. It's free and blocks ads well. The others are hit and miss and seem to be selectively blocking ads which is annoying to say the least. Now if they stopped youtube ads...
This is not on the play store but easily found.
cpufrost said:
I'm using BlockThis 3.0. It's like adguard and uses a VPN. The only downside is that stupid key icon. It's free and blocks ads well. The others are hit and miss and seem to be selectively blocking ads which is annoying to say the least. Now if they stopped youtube ads...
This is not on the play store but easily found.
Click to expand...
Click to collapse
I'm loathe to use any VPN tool that is not open source. You never know what traffic from your phone is sent to what server. Also VPNs in general take a toll on battery. I really hope Adhell can be fixed for Note 8
mehdi_s82 said:
I'm loathe to use any VPN tool that is not open source. You never know what traffic from your phone is sent to what server. Also VPNs in general take a toll on battery. I really hope Adhell can be fixed for Note 8
Click to expand...
Click to collapse
It's done locally, so there are no risks to your privacy. VPN is a little more battery hungry compared to DNS blocking, but Adguard doesn't leave empty blocks everywhere like other adblockers do.
EP2008 said:
It's done locally, so there are no risks to your privacy. VPN is a little more battery hungry compared to DNS blocking, but Adguard doesn't leave empty blocks everywhere like other adblockers do.
Click to expand...
Click to collapse
I know the vpn server is technically done locally but basically the app has access to ALL of the network traffic to/from your phone so it can do whatever with it and unless it's open source, I personally am not comfortable.
This is a good read. Might help someone out.
https://forum.xda-developers.com/galaxy-s8/themes/adhell-2-rootless-ad-blocking-t3663559
Sent from my SM-N950U using Tapatalk
Having same issues with Disconnect Pro it causes lag, slow Internet and restarts
Sent from my SM-N950F using Tapatalk
cpufrost said:
I'm using BlockThis 3.0. It's like adguard and uses a VPN. The only downside is that stupid key icon. It's free and blocks ads well. The others are hit and miss and seem to be selectively blocking ads which is annoying to say the least. Now if they stopped youtube ads...
This is not on the play store but easily found.
Click to expand...
Click to collapse
Yup I second this. BlockThis 3.0 has been working great so far with no issues for me.
I use Blokada, it blocks 99% of ads without root. I've installed it on all my employees phones too and they all love it. It's internal VPN based and open source.
_MetalHead_ said:
I use Blokada, it blocks 99% of ads without root. I've installed it on all my employees phones too and they all love it. It's internal VPN based and open source.
Click to expand...
Click to collapse
Awesome! Just tried it and it works flawlessly. The only downside is the persistent vpn key icon
mehdi_s82 said:
Awesome! Just tried it and it works flawlessly. The only downside is the persistent vpn key icon
Click to expand...
Click to collapse
I actually like having that notification. I find comfort in it lol
Any update on Adhell? i'd rather not use a VPN.
Mr.Ash.Man said:
Any update on Adhell? i'd rather not use a VPN.
Click to expand...
Click to collapse
https://forum.xda-developers.com/galaxy-s8/themes/adhell-2-rootless-ad-blocking-t3663559/page10
There's the last page of the thread. Right now the dev is busy with life but is still trying to develop a working Ad Hell 2 for the Note 8. It looks like it is working for some but there is a reboot issue.
I've had Adhell 2 working on my Note 8 for over a week now, no reboots either..
https://forum.xda-developers.com/galaxy-s8/themes/adhell-2-rootless-ad-blocking-t3663559
Hey, guys. New P30 Pro owner here. I'm having a bit of an issue with VPN ad blockers. I usually use Blockada, but that's now working. I'm getting ads in Chrome. Here are my findings:
Blockada - ads randomly slipping through on various websites and in some apps.
DNS66 - Not working at all, for some reason.
Block This! - Works well, but seems to slow down page loading.
Adguard Premium - I haven't tried this yet. Last time I used it on my S10 Plus, it had a disasterous impact on my battery, though it usually blocks ads reliably.
I already made battery exceptions for all of these and enabled the host files, etc. They just aren't all working as expected.
What are other people using on their P30s and what are your findings?
Thanks.
I'm using dns.adguard.com in the phones private DNS settings and it seems to be doing a good job of blocking ads. I am not currently using a VPN and this has had zero impact on battery usage.
PsychoMania said:
I'm using dns.adguard.com in the phones private DNS settings and it seems to be doing a good job of blocking ads. I am not currently using a VPN and this has had zero impact on battery usage.
Click to expand...
Click to collapse
Thanks! I had considered that option, but never tried it. Does it block the ads in apps, too? Any issues with ads slipping through?
greyhulk said:
Thanks! I had considered that option, but never tried it. Does it block the ads in apps, too? Any issues with ads slipping through?
Click to expand...
Click to collapse
It seems to be blocking ads system wide, not noticed any in the week I've been using it.
Okay, 2 things:
I figured out why Blockada wasn't working in Chrome. I had to disable the Async DNS flag in flags. I should have remembered that.
Second, the adguard DNS only works on WiFi, so that's not an option.
greyhulk said:
Okay, 2 things:
I figured out why Blockada wasn't working in Chrome. I had to disable the Async DNS flag in flags. I should have remembered that.
Second, the adguard DNS only works on WiFi, so that's not an option.
Click to expand...
Click to collapse
The adguard DNS works over my mobile carrier, Three UK.
PsychoMania said:
I'm using dns.adguard.com in the phones private DNS settings and it seems to be doing a good job of blocking ads. I am not currently using a VPN and this has had zero impact on battery usage.
Click to expand...
Click to collapse
I've been using this too, works great - system wide including video ads in apps etc.
PsychoMania said:
The adguard DNS works over my mobile carrier, Three UK.
Click to expand...
Click to collapse
I thought I had read on the adguard forums that it does not work over mobile connections. Maybe that was before Android Pie?
greyhulk said:
I thought I had read on the adguard forums that it does not work over mobile connections. Maybe that was before Android Pie?
Click to expand...
Click to collapse
Possibly. It is totally free so give it a try.
PsychoMania said:
Possibly. It is totally free so give it a try.
Click to expand...
Click to collapse
This is from the Android instructions page, thus my confusion.
"Tap Wi-Fi on the menu. The screen listing all of the available networks will be shown (it is impossible to set custom DNS for mobile connection)"
greyhulk said:
This is from the Android instructions page, thus my confusion.
"Tap Wi-Fi on the menu. The screen listing all of the available networks will be shown (it is impossible to set custom DNS for mobile connection)"
Click to expand...
Click to collapse
This is how I did it: Settings > Wireless & Networks > Private DNS > Configure Private DNS > Type: dns.adguard.com
It works perfectly on wifi and mobile data. The only time I've had to turn it off is when I was trying to connect to free wifi in a pub.
greyhulk said:
This is from the Android instructions page, thus my confusion.
"Tap Wi-Fi on the menu. The screen listing all of the available networks will be shown (it is impossible to set custom DNS for mobile connection)"
Click to expand...
Click to collapse
Yeah, I just tested it and it seems to work! Awesome sauce. Thanks!
PsychoMania said:
I'm using dns.adguard.com in the phones private DNS settings and it seems to be doing a good job of blocking ads. I am not currently using a VPN and this has had zero impact on battery usage.
Click to expand...
Click to collapse
Daaamn that works perfect on O2 UK. Thanks man ??
This is how I have it set up as well. Does seem to help but you still get some ads
I've been getting good results from Windscribe VPN as well - it has ad blocking/tracker blocking built in and speeds have been decent.
In the USA and waiting for my S21 Ultra to show up in the mail from big daddy Samsung.com.
I'm browsing thru this: https://docs.samsungknox.com/CCMode/G998U_5G_R.pdf
I'm highlighting what I want gone when the phone gets here.
[1] Is everything on that list actually loaded onto every phone? It'd be funny if my unlocked US phone was loaded with trash from every carrier instead of just my own.
[2] What in suspicion's name is "Mobile Device Information Provider" aka "com.amazon.appmanager"?! -- Is daddy Bezos trying to grope my phone?
[3] Y'all recommend Android/Google or Samsung Messages and Android/Google or Samsung Phone app?
Is anyone able to check if "Mobile Device Information Provider" aka "com.amazon.appmanager" is on their phone?
nixnixnixnix4 said:
Is anyone able to check if "Mobile Device Information Provider" aka "com.amazon.appmanager" is on their phone?
Click to expand...
Click to collapse
Not in mine (Exynos, Spain, 16/512)
rcastroc59 said:
Not in mine (Exynos, Spain, 16/512)
Click to expand...
Click to collapse
Thanks for checking.
Yeah, megacorps are especially dirty in the US market, so I'm just double checking.
In either case, can you share your model number and firmware number from the about phone panel?
Thanks in advance.
This is your list, from what I can gather: https://docs.samsungknox.com/CCMode/G998B_5G_R.pdf
It doesn't have Amazon mentioned in there.
Looks like this guy is 50 apps (1 page) shorter: https://docs.samsungknox.com/CCMode/G998U1_5G_R.pdf
Hope I'm getting U1 instead of plain U, because U1 essentially has only 3 apps I'd consider bloatware (Netflix, Facebook, etc.).
nixnixnixnix4 said:
In the USA and waiting for my S21 Ultra to show up in the mail from big daddy Samsung.com.
I'm browsing thru this: https://docs.samsungknox.com/CCMode/G998U_5G_R.pdf
[2] What in suspicion's name is "Mobile Device Information Provider" aka "com.amazon.appmanager"?! -- Is daddy Bezos trying to grope my phone?
[3] Y'all recommend Android/Google or Samsung Messages and Android/Google or Samsung Phone app?
Click to expand...
Click to collapse
com.amazon.appmanager,
(UID 10339) [18.203.4.139] per Karma Firewall
The Amazon apk is package blocked on my 10+/Pie, but the above IP address is amazon.
Apparently Wearables is trying to access it this site to update. I had to block Wearables update to preserve the current version. The update breaks Wearables, bad audio. Blocking this site stops the update... it appears. Time will tell.
WTF?
It was a bugger to troubleshoot.
USA doesn't have stringent consumer privacy laws. So it's a free for all here and except the apps and services to be the least privacy focused. Including Google , Whatsapp, fakeBook etc.
Limeybastard said:
USA doesn't have stringent consumer privacy laws. So it's a free for all here and except the apps and services to be the least privacy focused. Including Google , Whatsapp, fakeBook etc.
Click to expand...
Click to collapse
Apparently Samsung uses this site for Wearable's updates. I don't know... wysiwyg
blackhawk said:
Apparently Samsung uses this site for Wearables updates. I don't know... wysiwyg
Click to expand...
Click to collapse
What's a wearable update ? I don't wear anything
Limeybastard said:
What's a wearable update ? I don't wear anything
Click to expand...
Click to collapse
Bette'r?