keyloggers in custom roms. - Samsung Galaxy Note 9 Questions & Answers

i am concerned.
i love to root my device and remove bloatware. ya. samsung devices. full of junk.
i use titanium backup but it seems to have trouble with magisk because its systemless and not like supersu.
anyways, my concern is about custom roms that we download from these forums.
what are the odds of rom creators infecting "Keyloggers" in these roms? i mean these days we use Lastpass to enter in our master password which contains all our passwords for our emails and other sites.
as well as authy.
its just a question.
yes. i prefer a custom rom and favor it as opposed to samsung roms.
any feedback?

@cylent
It's absolutely possible from looking at the Android Accessibility APIs:
developer.android.com/guide/topics/ui/accessibility
But, from my knowledge and testing, the key logger would need EXPLICIT access to the 'Accessibility Services'.
(Options > Settings > Accessibility) + see the attached screen shot.
If you installed a custom ROM and saw an application listed here not explicitly defined in the release notes, ensure it isn't enabled. Next query the developer as to its purposes. It's possible that just because it shows here that it isn't necessarily malicious and might serve a greater purpose.
If you receive no response or a runaround, disable it under 'Accessibility' and find the corresponding name under 'Apps' and remove it.
For that matter, dump the ROM altogether and find another immediately. I'd like to think our savvy little community would pick up on this breach of trust ASAP.
For testing purposes, mine is called 'Android Keylogger' but a malicious user could (and likely would) call it something less threatening.
Hopes this helps!

Related

[Q] Android development capabilities

Hey guys,
I'm in the very very early stages of my masters work and I was toying around with the idea of using an Android tablet for part of it. I want to ask you devs what can be done when modifying the Android OS itself specifically in terms of a few things.
1. Logins - I would like to implement a classic user/password combination with levels of access for user, administrator, and some sort of superuser.
2. Restriction of User account - I would like to lock the user into one particular application. It must be relaunched when the device is booted and if the application crashes (hopefully not!) it must be restarted. Additionally, no market access, web access, etc.
3. Remote management if possible
4. Data encryption if possible
5. Prevent anything from being introduced from USB ports, SD slot, etc if unwanted.
I guess this brings me around to - is Android even the most suitable platform for such an endeavor. I'm not sure, to be honest, but I would love to get into development myself and this seems like a great way to learn. This is all just one part of a much larger project that I don't want to discuss just yet so sorry for being lax on details.
Thanks guys!
Android runs a virtual machine system called dalvik, in which each application gets it's own insuranceof the machine. It's implemented in such a way that each application gets assigned a user id, which unfortunately for you means each app is a different user, at least to the system. That's going to be a major wrench in the multi user plans. taking that into consideration, to have the same level of control over your tablet you'd have to give even the most basic user level "root" access or else the apps will start crapping their collective pants. As far as unwanted usb, there are a few apps that implement this functionality freely available through the market. Same with remote management. What I haven't seen yet is total encryption and I don't know enough about it to say it's possible or not. Seems feasible though.
My advice: write a custom login screen widget and then bake all these features into a pretty rom.

[Q] Capture Stylus events before they go to Apps

Reposting from where I previously put this, on the suggestion that folks here might have more idea what I am talking about.
Yes, this is a question but I couldn't see that it fit in better to one of the other forums. If I am wrong please accept my apologies and redirect me, thanks.
I'm trying to work with a custom build of Android based on KitKat to incorporate a stylus, copying some of the functionality (though not code) from Samsung which sells Android-with-stylus builds for e.g. the Note 3. I'm not including details of the specific device because right now I am working on a custom dev device and my aim is to write code which is generic enough to be usable from any Android (based on KitKat). The build (written by others) already incorporates drivers and sends stylus events correctly as motion events etc. Programming at the app level I can receive onHover, onTouch, onClick etc
The specific functionality I am trying to achieve is to pick up a stylus-button-click while hovering. It's perfectly possible to do this in any app, using an onGenericMotion Listener.
However, I want to make my "stylus-action" have system-wide effect - so that anywhere (in any other app, or in the launcher or whatever) I will pick up the event (prior to any other app) and bring up my custom menu. (just like AirCommand in Samsung Note 3) I guess in my custom Android this would then make that particular action somewhat protected or unusable for other users, but I'm ok with that.
In older Android (prior to ICS) you could try something by putting up a System Overlay (i.e in regular app code, without hacking the ROM at all), but this is no longer possible.
This is not an attempt to tapjack or whatever, I understand why this functionality has been removed from the domain of the regular programmer, and I don't want to regress my ROM back to pre-ICS behaviour by allowing the System Overlay hack. Now I am programming the system (if my change is good enough I'd like to submit it back to AOSP) so I would like to know the best method to address this. Since Samsung have already done this, it must be legal (using legal in the terms of "Android will allow it"), and I want to do it right.
Is it possible to write something similar to the System Overlay when you are running from a system service? Or is there a good choke-point to capture events before they are broadcast to the current running apps?
I was looking at (sorry, not allowed to post links) AndroidXRef /frameworks/base/core/java/android/view/View.java specifically in the function dispatchHoverEvent() which looks like a promising place. My naive idea is that I would place code here checking the MotionEvent to see if the button is pressed and if it is, don't call any listeners and instead call my little menu app (or broadcast a custom message, or something anyway). However, I've never written code on the ROM level before (LOTS of experience writing app code) so I don't know if this is a really bad point or a good point to add in code. Should I be putting things at a higher level or a lower one? Will this capture all events or not? Is it all just trial and error?
If this is the wrong place to ask questions like this, please tell me where on XDA I should be asking it. If it's the right place - please answer
Thanks
Kibi

UNA ROM, Private, Fast, And Good Looking:)

After weeks of hard work we (Setmov and uncle Fab) proudly present you the first Una ROM for the galaxy Grand I9082, based on 4.1.2 XXAMF7.​
DISCLAIMER​As usual, your phone your responsability, we won't take any responsability if it flies out of the window or if your girlfriend/boyfriend runs away with it.
PLEASE, DO READ OP COMPLETELY AND CAREFULLY BEFORE ASKING ANY QUESTIONS, ANSWERS TO MOST PROBLEMS ARE THERE
WHAT IS UNA?​Una is a new concept that takes security to a new level.
Are you tired of seeing so much blatant, outrageous and shameless invasion of your privacy and data mining hidden behind nice sentences like "enhanced use experience" or "complete integration with the system"? We decided to develop secure ROMs where privacy means just that – Private!.
It’s free of charge, we are a non profit structure and we are not here to make big bucks.
WHAT UNA ISN'T​UNA isn't a way to help you to stealthily buy massive destruction weapons to foment a coup d'etat in your favorite banana republic or to prepare the third world war:silly:.
UNA secures what leaves from your phone (ie your personnal data doesn't leak and no app can look over your shoulder to spy your activities), but it can't competely secure what comes into your phone.
Why is that?
Because it's just not possible to fully secure a phone from what comes into it, and anyone claiming to be able to do it is either a liar, or an ignorant, or both.
There are too many attacks, some not well documented, if documented at all, and some unknown to the public, and there are too many ways to hack a phone, especially if the user doesn't use his/her common sense.
If you are the type of person that installs apps from shaddy source and/or warez web sites (sites offering cracked paid apps) chances are that at some point you will unknowingly install a malware or a spyware. The same applies if you click on any link, specially on SMS' and emails, if you let any pop out window appear or if you don't protect your lockscreen with a password/pin/pattern and let anyone get physical access to your phone.
A bit of judgment and common sense can save you a lot of trouble, but there's unfortunately nothing UNA can do about it.
Then, if you use your phone to call through GSM your provider will know where you are. If he didn't you wouldn't be able to make any call, the signal has to find you and there's nothing UNA or anyone can do about it.
The only way to prevent that is to disable the phone functions (but then your phone will turn into a wifi only device) and reenable them when needed, head to the scripts section to learn how to do it.
Last but not least, bear in mind that the agencies have armies of tech savvy henchmen and 10 storeys computers, and tricks we can't even imagine, so think twice and use your brain before you attempt to outsmart them...
UNA IS FOR YOU IF:​. You are willing to learn how to use an unconventional ROM and generally speaking to understand how things work, even if it sometimes requires a little effort to fix this or that little problem (bear in mind that it took us a lot of work to develop Una to where it is now),
. You don't mind a few little occasional bugs here and there that come from all the restrictions the ROM contains,
. You want to take back ownership of your phone from google’s claws.
UNA IS NOT FOR YOU IF:​. All that you care about is the latest gimmick in the latest OS,
. You can't live without the google’s apps,
. You are the kind of person that never reads through the OP and only scroll down to the download section, and then complain that things don't work and/or ask stupid questions in which are answered OP. An example? One guy makes a mod and writes clearly in OP that it's specifically for 4.2.2. Then some people complain: "it doesn't work on 4.4.2"...
If you are that type of person, please do yourself and us both a favour, and close this window now.
ARE WE PARANOID TIN FOIL HATS? OR TERRORISTS? OR CARTEL BOSSES?​Nope, we only are people that don't see why we shouldn't be in control of our phones. Or why our phones can be wiped remotely, why apps or updates or who knows what can be downloaded and installed without asking for our consent, why SMS' can be sent without us to know, why we should pay for the bandwidth used for data mining and unwanted downloads, and why all those activities should deplete our battery and kill our RAM.
You think we are overreacting here?
You don't have to take our word for it, just download and install Network Log from here:
https://f-droid.org/repository/browse/?fdfilter=network+log&fdid=com.googlecode.networklog
Give it root permission, start logging and open some web pages. Come back to Network Log after a few minutes and see for yourself, you'll be surprised (or maybe horrified?) to find out that your android system, your settings, your kernel etc. connect to all sorts of funny IPs, including and foremost google’s.
Now you see what we mean?
It's time to go for Una
UNA'S FEATURES​. Rooted.
. Deodexed.
. Zipaligned.
. Busybox and sqlite installed.
. Init.d support and scripts.
. Auto start disabled for most apps.
. About 120 system apps, 40 framework jars, 30 permissions xmls and 25 libs removed, plus files here and there.
. Very low RAM and CPU consumption, more than 8 hours screen time with the WIFI on, 1% battery decrease every 10-12 hours while in stand by.
. Heavily and extensively modified system, in order to make it secure and prevent it from leaking your data.
. App Settings, Firewall and Xprivacy built-in, and already applied out of the box to make sure you are well protected.
. Xprivacy is a fantastic tool but it has one big limitation, it can't restrict the Android System from accessing your serial numbers and leaking it. For that reason these IDs have been edited as follows:
build.serial (androidboot.serialno) and ro.serialno are both set to "1",
android id is set to "android",
net.hostname is set to "1".
. Wlan serial number set to "00000001" (this number identifies you everytime you connect to the internet, and Xprivacy can't do anything about it).
. USB ID (iSerial) set to 1.
. Unreadable cp access.
. Vulnerabilities patched thanks to Master Key Multi Fix and Fake ID Fix.
. ADB disabled (can be re-enabled, see below).
. By default ADB, all google access (including youtube, blogspot and google search) and the Media Storage are disabled. You can re-enable some or all of them, instructions are in the "HOW TO USE THE ROM" section.
. Plenty of under the hood modifications to make the ROM fast and fluid.
. Multi-purpose navigation keys.
. Call button in contacts.
. Because secure doesn't mean ugly, the whole ROM has been themed with a beautiful green color (if there are enough requests other themes will follow), transparency, and Lollipop HD wallpapers.
. KK style pop-up toasts.
. Multiwindows have been revamped, they are no longer only static in Samsung style but now they can float and be resized too, like on a computer.
. All apps can be opened in floating mode.
. Possibility to choose between different multiwindows layouts in KK's style.
. Heaps of hand picked and carefully scrutinized open source apps.
There are 2 non open source apps (Greenify and Quick Pic) but they are safe, believe me, I have thoroughly examined them. Still, you can always uninstall them if you feel like it.
In time we will develop our own apps, but first we want to see how people respond to the Una concept...
Installed apps/tools​. 920 Editor, to create and edit scripts or text files.
. AF+ Firewall.
. Alarm clock.
. APG, to encrypt messages.
. App Settings, to restrict apps' permissions, change DPI on a per app basis and more.
. Arity, a calculator.
. Conversations, a secure and encrypted chat, modded by uncle Fab for increased security.
. Fdroid, an alternative to the Play Store, and all the apps are open source!
. Floating stickies, to make small notes on the fly.
. FTP Server, to copy files to/from your phone wirelessly.
. Ghost Commander, a very powerful dual panel root file manager.
. Gravity Box, a theming engine.
. Greenify, to make apps behave by hibernating them when not in use.
. K9 Mail, an email client.
. Kernel Adiutor, if you feel like playing with kernel tweaks (but you have to know what you are doing).
. Lightning, a fast and light weight browser.
. Multiwindows Manager.
. Network Log, to check where your apps connect and chase unwanted connections.
. Open Camera.
. Tor (Orbot) for Android, modded by uncle Fab for increased security.
. Orweb, a browser designed to work along with Tor.
. OS Monitor, to monitor and kill your phone's processes, and more.
. Pale Moon, based on Firefox for Android, for a full desktop experience with Mozilla add-ons preinstalled for enhanced security.
. PDF Reader.
. Preferences Manager, to edit the otherwise difficult to read shared_prefs files in data/data.
. Quick Dic, a good selection of free dictionaries.
. Quick Pic, a Gallery app.
. Rmaps, a maps app where you can download maps from various sources for offline use.
. Search Light, a torch.
. Terminal Emulator, fire up your commands and show your phone who is the boss!
. Text Secure, a secure and encrypted SMS app, modded by uncle Fab for increased security.
. Tint Browser, another fast web browser.
. Urecord, to record sounds with different sample rates.
. USB Mass Storage Enabler, to connect your phone to any computer (note that it only mounts the external SD).
. Viper4Android FX, a powerful sound enhancer.
. Viper4Android XHiFi, some more sound enhancements.
. VLC, a video and music player favourite.
. WI-Fi Privacy Police, to secure your connections even better than they already are.
. Xposed Installer, a great framework that enables apps like App Settings or Xprivacy to work.
. Xprivacy, last but not least, the best privacy app.
WHY IS THIS ROM 4.1.2 BASED AND NOT 4.2.2?​
Because Samsung did a complete failure with its 4.2.2 version for Galaxy Grand.
High RAM consumption, no floating windows, bugs.
Plus, the newer the android version the more spying there is, despite google's sweet talk about "enhanced user's experience", the infamous Fused Location being a good example.
INSTALLATION​As usual, make a backup first!
Do backup your contacts and whatever is important because all your apps and data will be erased (your sd card contents won't be deleted though).
Do backup your /system/csc folder, in case you need it for later.
Do backup your efs folder (VERY IMPORTANT).
Open an android terminal from your phone, first type "su" (without the quotes), enter, then type:
busybox dd if=/dev/block/mmcblk0p17 of=/sdcard/efs.img
This will create an efs backup caled efs.img in your sd card.
If you need to restore it type:
busybox dd if=/sdcard/efs.img of=/dev/block/mmcblk0p17
Before you install the ROM, download Philz recovery from here:
http://forum.xda-developers.com/showthread.php?t=2452985
We chose Philz since AFAIK it's the only one that allows you to lock you recovery with a password (highly recommended, if your recovery is not password protected it wouldn't take more than 2 minutes for someone to disable your pattern or pin protected lockscreen and access all your personal data on the phone).
Philz' installation instructions
You need to have Samsung drivers installed.
Boot your phone into download mode (press volume down and power at the same time).
Open Odin 3.07 and connect your phone.
Click on the PDA slot, navigate to where the Philz recovery is located and select it.
DOUBLE CHECK AND MAKE SURE THAT "RE-PARTITION" IS UNTICKED (only "Auto Reboot" and "F.Reset Time" should be selected).
Click start and wait while Odin flashes Philz.
If everything went well your phone will now auto-reboot into the system. Go into recovery, you should see your brand new Philz.
If you are still on stock recovery then repeat the above steps, but this time untick “Auto Reboot” in Odin.
When in recovery, if before you reboot you see a text on the screen displaying “yes – disable flash recovery”, select it to avoid stock recovery overwriting Philz.
Now, download Una from here (scroll down until you get to the download section):
http://unaos.com/
Unzip the ROM and copy it to the backup folder that is inside the clockworkmod folder in your sd card (if there's no backup folder create it by choosing "mkdir" in Ghost Commander).
Boot into recovery.
Go to restore from sdcard, choose 2015-03-23.10.56.05, and go for it!
Once it's done reboot, congratulations, you have installed Una ROM on your phone!
The screenlock password is 23052015​
IMPORTANT!!!​I haven't tried the latest 4.2.2 ROMs and I don't know if they have Knox or not (the earlier versions hadn't).
If they have it and if you are on such a ROM you'll have to choose custom restore and uncheck boot in the menu, because since the bootloader you have is Knoxed you may get a brick if you downgrade it to a pre-Knox version, don't play with that!
If you choose to proceed, you do so at your own risk, but in any case look first on the internet to find out if it's doable.
If it doesn't work for you then I'm sorry, you are out of luck, shame on you Knox...
If it works please report it here so that other people will know, thanks in advance!
HOW TO USE THE ROM​. Swipe down to access the applications drawer.
. Swipe up to open the notifications.
. Go to settings and set a stong password/pin/pattern protected lockscreen (recommended), default password is 23032015.
. Go in recovery and set a recovery password (recommended).
. Long pressing on the menu key toggles expanded desktop (full screen, no more navigation bar and no more status bar).
. Double pressing the menu key kills and hibernates the current application.
. Long pressing the recent key brings you back to the last application (convenient to switch from one app to another).
. Between the home and the back key there's a supplementary key that can display up to 12 apps (editable in gravity box).
Double pressing that key shows the sound panel, long pressing it shows the reboot menu (note that there's an option to take screenshots in the reboot menu).
. When you open an app you'll see a cascade icon at the top or the bottom right, press it and the app will turn into a floating window like on a computer. Now, open the notifications and check the 4 icons at the top, click any of them and the currently opened floating window (s) will be reorganised according to the layout you chose.
. Go to /system/etc/security/cacerts, check the certificates that are there (you'll find the certificate's name approximately by the middle of the file), and erase the ones you don't need/like.
When you want to transfer files to/from your phone open the USB Mass Storage Enabler app and enable mass storage, that's it. When you are done, don't forget to eject your phone from the computer and to reenable MTP from the app.
. When you install a new application, by default it will be fully restricted in both Xprivacy and the Firewall.
Before you open the newly installed app wait until the Xprivacy icon appears in the status bar, then and only then can you open it.
Most likely the app will crash.
Go to Xprivacy, open its settings and then usage data, you will see what restrictions caused the crash. Re enable some, provided that they are not too invasive.
Many apps require "load.Library" to be allowed in the shell section, that's ok.
Others may need to access the sd card, that's in the storage section and it's ok to allow it for apps that really need to access the storage, like players, cameras or file managers (for other apps try to keep it restricted).
Root apps obviously need "su" and/or 'sh", and sometimes "exec", in the shell section.
Always try to enable as few fields as possible, and bear in mind that data requested by an app is not necessarily needed for that app to work (especially true for identification, internet and mcc/mmc access).
Lastly, give the app internet access in the Firewall if, and only if, it needs it, and restrict some more permissions in App Settings.
If you can't tame the app consider uninstalling it and look for a similar one that has less built-in spyware.
SCRIPTS​. As said above, by default ADB, all google access (including youtube, blogspot and google search) and the Media Storage are disabled.
If you want to re-enable some or all of them, open the folder on your home screen called "scripts". Click on the desired script and it will be automagically executed.
If you choose to enable/disable google access you ll have to go to the Firewall to reapply its script. Open the firewall, go to settings, choose set custom script, click OK.
. You will see more scripts to disable/enable the Bluetooth, the FM Radio and the Phone.
If you disable the Phone and later want to re-enable it do as follows:
untick App Settings in Xposed's modules section, re-enable Phone, reboot, then enable App Settings again.
. Some scripts will enable you to backup/restore your efs partition and flash a recovery.img (to restore or flash an .img, make sure it's in your internal sd and execute the script).
. Other scripts can enable/disable am and pm, but don't play with it unless you know what you're doing.
. You can uninstall the Wallpaper Chooser and the Media Storage if you want, or keep them disabled and resurrect them when needed.
. If you are very privacy concerned you should consider using the "uncle's phone lite" mod because it enables you to call with only the Phone and the Telephony Provider apps (CSC, Contacts, Contacts Storage, Logs Provider and STK are completely de-activated). That's the method I use to make calls, but you have to know that the dialler forces close after you complete the call (not a big deal in my opinion but still, I may look into it one of these days). You'll find the mod in the add-ons section.
BUGS​. For some reason the ADW Launcher doesn't allow transparency in the navigation bars while in portrait, I'm working on that.
. You can't download anything from Lightning and Tint Browser, that's because the Download Manager and the Download UI have been uninstalled. If you need to download something, copy the link and paste it in Pale Moon, it has its own download engine.
. Part of the lockscreen and the dialer don't show in landscape mode, it's because the DPI has been modified in order multi layouts floating windows to work.
. All the installed apps work, but other apps you install may crash. I call that kind of apps "google’s henchmen", they only work if the play store services or the bla bla app are installed and of course they won't on Una since all that garbage has been removed.
If I install your app, why do you want to force me to install your boss' app too? Forget about those apps and search Fdroid, you'll find what you need...
. Depending the way you use your phone you may have to fine tune Xprivacy and reenable some permissions, I'm sorry for the inconvenience but it's impossible to set Xprivacy for all users since we all have different ways to use our phone.
ADD-ONS​. Uncle's themed Sony keyboard, flash it in recovery. It's not open source and that's why it's not included in the rom by default, but it's my every day keyboard because it works fine and because I themed it to make it look nice.
. HD Wallpapers
. Universe Wallpapers
http://unaos.com/addons
If there are many users' requests then I'll upload the following:
. Uncle's phone lite (with clipboard and dialer) for hardcore users. It's safer than using the regular phone configuration, but the dialer forces close when you hang up the call. Flash it in recovery, wipe dalvik-cache, reboot.
. Completely disable internet access for the Android System. Lightning and Tint Browser won't connect anymore since they use the same web engine as the Android System (that is anyway not very safe in 4.2.2), but Pale Moon still works thanks to its build-in web engine. Flash it in recovery, wipe dalvik-cache, reboot.
UPDATES?​There will be some, but no ETA, you'll have to be patient because now we have to design and release Una for three other phones.
Still, any suggestions/comments/bug reports are welcome, help us to improve Una!
FEATURES REQUEST​Yeah, sure, we'll see what we can do but we don't promise anything
That's all for now, enjoy the ROM!!!
The Una team
CREDITS​Big thanks to:good::
F-Droid
M66B (Xprivacy)
Rovo89 (Xposed)
Tungstwenty (App Settings, Master Key, Fake ID Fix)
Ukanth (AF+Firewall)
Jecelyin (920 Editor)
Kraigsandroid (Alarm Klock)
Thialfihar (APG)
Arity (Arity calculator)
Siacs (Conversations)
Ppareit (FTP)
Ghost Squared (Ghost Commander File manager)
Mohammad Adib (Floating Stickies)
C3C076(Gravity Box)
Oasisfeng (Greenify)
K-9 Dog Walkers (K9 Mail)
Grarak (Kernel Adiutor)
Anthonycr (Lightning)
Xperiacle (Multiwindows Manager)
Pragmatic Software (Network Log)
Mdwh2(Open Camera)
The Guardian Project (Orbot and Orweb)
Eolwral (OS Monitor)
Moon Child and Cyansmoker (Pale Moon)
Droidapps (PDF Reader)
Androguide.fr (Pimp My Rom script)
Simon Marquis (Preferences Manager)
Thad Hughes (Quick Dic)
Q-Supreme team (Quick Pic)
Robert.Developer (Rmaps)
Search Light (Search Light)
Jackpal (Terminal Emulator)
Anasthase (Tint Browser And Tint Browser Adblock Addon)
Thomasebell (Urecord)
Mohammad Abu-Garbeyyeh (USB Mass Storage Enabler)
Zhuhang (Viper4Android FX and Viper4Android XHiFi)
Videolan.org (VLC)
Brambonne (Wi-Fi Privacy Police)
Did I forget someone?
If that's the case let me know and I'll put your name here.
reserved
No screens?
ishmeet1995 said:
No screens?
Click to expand...
Click to collapse
Here you go
I like the effort but there are seriously some thinks you may not know what you are talking about, maybe because lack of knowledge.
Did I mention that I found google’s DNS in Tor (Orbot)? Pretty bad but fear not, I've patched it...
Click to expand...
Click to collapse
Most DNS lookups are local to the exit node with occasional use of Google DNS, changing a DNS itself is no guarantee for more security since the data needs to be anonymize too, that's possible if we use I2P together with TOR (because it's impossible to surf the web secure since not all provider/sites using a strong encryption for all stuff like content, external content and the whole site).
Open source vs closed
Click to expand...
Click to collapse
Well, mostly I agree open not automatically means it's safe at any time (see opensll and other popular projects) but here it would be help to see some source because you talking about trust and how can we trust you without looking in the code? Is there are proof for all your changes you done?
I've explored deep into the hidden depths of this Samsung ROM, and I didn't find anything questionable (but I had already removed around 150 apps, so there wasn't much left) from Samsung's side
Click to expand...
Click to collapse
How you do that if you don't have the source for e.g. the radio modem or other closed parts from a stock rom? Via reverse engineering? - You must have spent a lot of time for this ... I was not able to do it and not even any expert here on xda, it's impossible to one man to reverse and understand all stuff it would take years, even with good tools like IDA and 20 years of knowledge. You can maybe, maybe! only see some parts ... but not inspecting all aspects and since there is no reference I guess nobody can't say what's really secure.
Encrypting would only attract suspicion - why does he encrypt his messages? He must have something to hide!
Click to expand...
Click to collapse
Sure you have no idea what you talking about, this shows it. It's not about "..but I have nothing to hide!" it's a common thing, maybe you should read this first.
To tag something with secure is very easy but to proof that without anything is almost impossible. One of the benefit you mentioned is to hardening the OS but that also could be done with scripts/binary's or other stuff without downloading the whole rom, xda is full of it - but sadly most of all "security" things here are never really tested or under the scope from known experts. - but people always believe in the hype and the myths!
Don't get me wrong but maybe you think about it and release something we all can work with (especially the changes only as a diff or something).
CHEF-KOCH said:
I like the effort but there are seriously some thinks you may not know what you are talking about, maybe because lack of knowledge.
Most DNS lookups are local to the exit node with occasional use of Google DNS, changing a DNS itself is no guarantee for more security since the data needs to be anonymize too, that's possible if we use I2P together with TOR (because it's impossible to surf the web secure since not all provider/sites using a strong encryption for all stuff like content, external content and the whole site).
Well, mostly I agree open not automatically means it's safe at any time (see opensll and other popular projects) but here it would be help to see some source because you talking about trust and how can we trust you without looking in the code? Is there are proof for all your changes you done?
How you do that if you don't have the source for e.g. the radio modem or other closed parts from a stock rom? Via reverse engineering? - You must have spent a lot of time for this ... I was not able to do it and not even any expert here on xda, it's impossible to one man to reverse and understand all stuff it would take years, even with good tools like IDA and 20 years of knowledge. You can maybe, maybe! only see some parts ... but not inspecting all aspects and since there is no reference I guess nobody can't say what's really secure.
Sure you have no idea what you talking about, this shows it. It's not about "..but I have nothing to hide!" it's a common thing, maybe you should read this first.
To tag something with secure is very easy but to proof that without anything is almost impossible. One of the benefit you mentioned is to hardening the OS but that also could be done with scripts/binary's or other stuff without downloading the whole rom, xda is full of it - but sadly most of all "security" things here are never really tested or under the scope from known experts. - but people always believe in the hype and the myths!
Don't get me wrong but maybe you think about it and release something we all can work with (especially the changes only as a diff or something).
Click to expand...
Click to collapse
I’m sorry you feel that way. Did you install the rom at all?
Dear Dev,
Thanks for the ROM for our grand community, but after 5.0 Lollipop do you think people will shift to 4.1 ICS again?
Anyways very nice effort for great customization.
:good::good::good::good::good:
unclefab said:
UNA IS FOR YOU IF:​. You are willing to learn how to use an unconventional ROM and generally speaking to understand how things work, even if it sometimes requires a little effort to fix this or that little problem (bear in mind that it took us a lot of work to develop Una to where it is now),
. You don't mind a few little occasional bugs here and there that come from all the restrictions the ROM contains,
. You want to take back ownership of your phone from google’s claws.
UNA IS NOT FOR YOU IF:​. All that you care about is the latest gimmick in the latest OS,
. You can't live without the google’s apps,
. You are the kind of person that never reads through the OP and only scroll down to the download section, and then complain that things don't work and/or ask stupid questions in which are answered OP. An example? One guy makes a mod and writes clearly in OP that it's specifically for 4.2.2. Then some people complain: "it doesn't work on 4.4.2"...
Click to expand...
Click to collapse
hemant4409 said:
Dear Dev,
Thanks for the ROM for our grand community, but after 5.0 Lollipop do you think people will shift to 4.1 ICS again?
Anyways very nice effort for great customization.
:good::good::good::good::good:
Click to expand...
Click to collapse
I think everything is quite well explained and your question answered in the OP. Thank you for your interest.
hemant4409 said:
Dear Dev,
Thanks for the ROM for our grand community, but after 5.0 Lollipop do you think people will shift to 4.1 ICS again?
Anyways very nice effort for great customization.
:good::good::good::good::good:
Click to expand...
Click to collapse
No ..never
Edit: and 4.1 is not ICS
I expected that kind of reply, from you or from one of the forum's security experts, the same people that ignored me when I offered to share knowledge and to give advices/opinions on the security thread.
CHEF-KOCH said:
Most DNS lookups are local to the exit node with occasional use of Google DNS, changing a DNS itself is no guarantee for more security since the data needs to be anonymize too, that's possible if we use I2P together with TOR (because it's impossible to surf the web secure since not all provider/sites using a strong encryption for all stuff like content, external content and the whole site). .
Click to expand...
Click to collapse
I m not the guy that developed Tor, what you are talking about is his business, not mine.
All what i did was to change google's DNS in Tor's code, period.
Well, mostly I agree open not automatically means it's safe at any time (see opensll and other popular projects) but here it would be help to see some source because you talking about trust and how can we trust you without looking in the code? Is there are proof for all your changes you done?
Click to expand...
Click to collapse
Nobody needs to trust me.
As I wrote in OP (did you read it?):
You don't have to take our word for it, just download and install Network Log from here:
https://f-droid.org/repository/brows...ode.networklog
Give it root permission, start logging and open some web pages. Come back to Network Log after a few minutes and see for yourself, you'll be surprised (or maybe horrified?) to find out that your android system, your settings, your kernel etc. connect to all sorts of funny IPs, including and foremost google’s.
Now you see what we mean?
It's time to go for Una
Click to expand...
Click to collapse
Install the ROM, and see by yourself how it behaves.
Another thing is that all the installed apps in the ROM are open source, apart from 2 that I have reverse engineered, inspected and restricted (Greenify and Quick Pic), and as I said in OP people are fee to uninstall them.
To be honest, on my daily ROM I do use some closed source apps that are very good, that only have legit permissions, that don t spy on me whatsoever, and that dont connect anywhere.
But sadly I couldn t include them in this ROM, because I knew that if I had done it people like you would have criticized me.
How you do that if you don't have the source for e.g. the radio modem or other closed parts from a stock rom?
Click to expand...
Click to collapse
Radio modem and the like are closed source, and I never said that I did anything there.
But that s the same in an AOSP or CM ROM, and the only way to overcome that problem is either replicant (but they don support many devices) or baseband isolation.
I have full baseband isoltaion on my daily ROM, but hey, do you think that i could make such a ROM for public release? Do you think that people would like a ROM that transforms their phone in a wifi only device, and need to connect to a modem to have data connection and to call or receive sms'?
Still, people can achieve baseband isolation on this Una Rom, instructions are in OP.
Anyway, all what I said, again in OP is that :
spying that is present on AOSP too since it's google’s material as well (compare the apps' permissions and the network connections in an AOSP/custom ROM and in a stock ROM, it's more or less the same, or better, look at the code).
You can't do everything you want on a closed source ROM (I bet you can't on AOSP either), but to edit and clean the system you don't need the full source code.
Click to expand...
Click to collapse
You see?
I have removed over 100 system apps, dozens of jars, some xmls and libs, then I have cleaned the remaining apps and jars, then I have set very carefully and very restrictivey the firewall, App Settings and Xprivacy, then I have applied other security related tweaks and yes, Una is secure.
No more data mining, no more unwanted internet connections to google, amazon and who knows where, if that s not secure for you then I don t know what can be called secure.
To tag something with secure is very easy but to proof that without anything is almost impossible
Click to expand...
Click to collapse
.
Once more, you don t need to trust me.
Install the ROM, open Network Log, look at the Task Manager etc., and see what happens.
maybe you think about it and release something we all can work with (especially the changes only as a diff or something).
Click to expand...
Click to collapse
Why do you need to get anything from someone like me?
You said that I don t know what I am talking about, that I have a lack of knowledge etc., so why would such an expert like you benefit from it?
By the way, did you try the ROM?
BTW again, thanks for the link but sorry, I still don't feel concerned.
I don t use my phone for bank transactions, I m not working on big secret projects, I have blocked adds in the host files and I never get any spam.
Still, thanks for remembering me about encryption, I had forgotten to add in the encryption chapter in OP that Una has encryption apps (APG, Conversations, K9 Mail, Text Secure).
@hemant4409
First, the galaxy Grand will never get Lollipop from Samsung.
From custom ROMs, maybe, but that s not the point.
If people like more gimmicks and fancy transitionts than security it s their problem....
Congrats to all your work and the time spent on the Security subject and thanks for taking the time to share your work. This is the first time I see such a custom rom on XDA (on Internet I'd say) so I wanted to express my gratitude.
Hats off.
You provide a lot of information about security and privacy and the first question is 'No screenshots?' lol
Primokorn said:
Congrats to all your work and the time spent on the Security subject and thanks for taking the time to share your work. This is the first time I see such a custom rom on XDA (on Internet I'd say) so I wanted to express my gratitude.
Hats off.
You provide a lot of information about security and privacy and the first question is 'No screenshots?' lol
Click to expand...
Click to collapse
Here's screenshots
http://forum.xda-developers.com/showpost.php?p=59640778&postcount=4
oskar01 said:
Here's screenshots
http://forum.xda-developers.com/showpost.php?p=59640778&postcount=4
Click to expand...
Click to collapse
OMG!! He was kidding:cyclops:
I’m sorry you feel that way. Did you install the rom at all?
Click to expand...
Click to collapse
I'm dl'ed the rom and see what whas changed because a friend asked me to make a statement if this rom really secure anything. Btw no need to quote all stuff over and over again and again.
All what i did was to change google's DNS in Tor's code, period.
Click to expand...
Click to collapse
You can't change something you don't have access to or something that is important if we talking about DNS, you can't change the exit nodes. And as mentioned changing a DNS server is no guarantee since they also can log your stuff - it's all about trust, sure - but an OpenNIC without logging (that's proofed) would more help. For more security related stuff about DNS please first read this and this. DNS is not secure anymore, no matter which provider and according to the NSA they have some techniques to identify and infiltrate some servers.
Nobody needs to trust me.
As I wrote in OP (did you read it?):
Click to expand...
Click to collapse
Sure, nobody force anyone to install and use your stuff, that's what I'm not saying - but to say x and y was removed or changed is very hard to trust without anything except your words. It's no offensive at all.
Another thing is that all the installed apps in the ROM are open source, apart from 2 that I have reverse engineered, inspected and restricted (Greenify and Quick Pic), and as I said in OP people are fee to uninstall them.
Click to expand...
Click to collapse
I simply not care about the apps, no matter if it contains malware or not, as long they not have any root access or internet connection is simply has no effect. Most apps today do not want to destroy the hardware, they just want to collect and grap your private data and send them back if you turn wifi on (which makes t harder, because without deep package inspection you won't ever notice that there are some wired behaviors with app xy.
... people like you would have criticized me.
Click to expand...
Click to collapse
If you just one of the people that can't handle valid arguments or is unable to accept any other arguments we can just stop the whole discussion. - What I've learned from xda is that some people are unable to discuss and calling the moderator instead (for no reasons). It's not against your work, it's to inform and to show others if it's really offers that what you promise here or not. I really hope you understand it.
But that s the same in an AOSP or CM ROM,..
Click to expand...
Click to collapse
No it's not some roms use (outdated) open source modem sources, like CM which is always a big discussion because people "always" complaining about signal related stuff and possible battery drains. Or in other words some people say that with a stock modem/radio they have a better signal compared to CM.
I have removed over 100 system apps, dozens of jars, some xmls and libs, then I have cleaned the remaining apps and jars, then I have set very carefully and very restrictivey the firewall, App Settings and Xprivacy, then I have applied other security related tweaks and yes, Una is secure.
Click to expand...
Click to collapse
Installing security apps is the last line of defense, not the first. Read more about here. I guess you not touched the network code (because it's closed) so that won't change anything at all.
Install the ROM, open Network Log, look at the Task Manager etc., and see what happens.
Click to expand...
Click to collapse
Same again that won't change something on application layer, tor is also affected.
.. so why would such an expert like you benefit from it?
Click to expand...
Click to collapse
I not use it, as said a friend asked me because he usually like your work.
.. I have blocked adds in the host files and I never get any spam.
Click to expand...
Click to collapse
Blocking ads via hosts file not works if you change your mobile connection from e.g. 2G/3G/wifi/lan since on most roms the hosts never gets a re-apply. If you not getting any ads you are a lucky boy but it's very decency on which www your are or which addon you use. If you use Firefox/Plae Moon just use uBlock and configurate the filter list (so no ads at all too) but that not works for apps (but there are also minminguard or adaway [hosts] for it. Sad think about the hosts seems that it coasts more battery and usually takes longer to boot - but okay, anyway matter of taste which stuff you prefer.
Text Secure
Click to expand...
Click to collapse
Better link or integrate the SMSSecure it's based on Text Secure but encrypts SMS (since Text Secure removed that for some reasons).
.. security related tweaks
Click to expand...
Click to collapse
Which one? TCP/IP stack hardening, protocol changes like only forcing to use latest TLS or what? You see some important details are missing.
I expected that kind of reply, from you or from one of the forum's security experts, the same people that ignored me when I offered to share knowledge and to give advices/opinions on the security thread.
Click to expand...
Click to collapse
Yes, I reply'ed to this thread but my answer was way to long so I got a loading problem (the reasons I asked a mod to remove my post). I'm working on something but it's not fully done yet. The problem is that it will be the longest post here on XDA ever (if I release it here - I'm not really a xda fan) and it's very complicated so there will be a lot of people that may possible will never understand all stuff.
So, sorry if you feel that I "ignored" your post. But feel free to visit my Github stuff or just visit infosec institute to read my other stuff.
So the main question is here if you show us your mods or not? Or if you plan to release a "hardening package" or not? That's all I want to talk about.
@CHEF-KOCH
You came out of the blue on this thread, basically saying that I'm a moron that doesn't know what he's talking about and implying that this ROM is garbage, then you said you will download the rom and make a statement about whether it's secure or not.
And...?
Nothing, but you edited your post with the following:
So the main question is here if you show us your mods or not? Or if you plan to release a "hardening package" or not? That's all I want to talk about.
Click to expand...
Click to collapse
Is that fair?
Seriously, what would you think and what would you do if you were me?
If this ROM is garbage, prove it.
Otherwise, go polluting another thread...
unclefab said:
@CHEF-KOCH
You came out of the blue on this thread, basically saying that I'm a moron that doesn't know what he's talking about and implying that this ROM is garbage, then you said you will download the rom and make a statement about whether it's secure or not.
And...?
Nothing, but you edited your post with the following:
Is that fair?
Seriously, what would you think and what would you do if you were me?
Click to expand...
Click to collapse
Don't bother with @CHEF-KOCH. He just want you to share your knowledge with him, so he can "use" it and make you look like an idiot! Also, he is a liar, he didn't come here because of a "friend" but because of my post on your security thread. When he had some strange "loading issues" I also asked him very politely where was the problem....he never bother to reply, and he deleted the post, so what kind of person he is? He is a hater, and a spitter and "no constructive help" from him, so don't lose your time with him!
I'm giving up, useless to talk here.
CHEF-KOCH said:
I'm giving up, useless to talk here.
Click to expand...
Click to collapse
Thank you mister know it all, and please don t come back, there are plenty of other threads to pollute...
Too bad that you couldn t prove that this rom is garbage
And too bad that you are too arrogant to admit that you were wrong when you implied that I m an idiot and that this rom is garbage...
i can only post one :thumbup: per post , but if i could then ........... :thumbup::thumbup::thumbup: , at least some knowledgeable people are trying.
"all I can really do , is stay out of my own way and let the will of heaven be done"
Awesome thread
I do not have Grand but my brother has it. I was searching a rom for him and found your thread. I must say I did not find any thread like you in at least Samsung area. You people did a great work. Security is a great concern and if you secure the system then it itself become light weight because you take out spyware craps out of it. I appreciate your work. Good job man. Pleas e develop something in Note 3 LTE section as well.

Can I Safely Disable IPSec Service?

I'm still seeing Android System using the lion's share of my battery life and I've started looking at the services running within it. The IPSec service is always near the top of the Android System pile and I was wondering if it's safe to disable it.
Some light Googling is turning up the service is related to VPN networking but there's not much more available (at least at an entry level of understanding). This link provides a decent understanding. I don't use remote access or corporate VPNs. My only real question is if I disable it using the App manager, are there routine functions that might be disabled? Should I be weary about Samsung Pay?
Thanks!
Finaly have you find a solution ? i'm reseaching on google and i can't find how disable ipsec on android , if you have know how do this , please let me know
Root your phone to enable super user abilities, and search for ipsec in rom manager, then disable it.
Realizing Im going back in time.. Or if you have a device like the Samsung S6 Active, an AT&T branded, close to perfect device which I have yet to find a way to Unlock the bootloader and root ..? Try AdHell-2. The link(s) are here at XDA. You must... 1.) Create a Samsung Account, 2.) Apply for a Developers Account SEAP, 3.) Request a License Key, 4.) Toggle On Unknown Sources in Settings/Lockscreen & Security/Unknown Sources, 5.) Install the AdHell-2 .apk, 6.) Then Activate the App by Copying your License Key. * This is a great App which not only serves as a highly-efficient Ad Block, but also allows for the Disabling of System and User Apps. Anyone reading this know of a way to root the S6 Active?

[Q] What is everyone doing for privacy?

I'm running Chroma Lollipop with Xposed. I've considered privacy with app permissions but every time I try to implement it I get overwhelmed and give up. I see that Chroma comes with Privacy Guard built in, which looks farily simple, and I've also purchased XPrivacy Pro and tried that but current don't have it. I'm looking for a little feedback on what everyone else is using (or nothing if that's the case), and which route I should go.
A. Turn on Privacy Guard by default. This seems like a simple option.
B. Use XPrivacy crowd sourcing. XPrivacy seems like the more powerful option, but the crowd sourcing doesn't catch everything, and I really don't want to go though all my apps and think about every permission. That seems like a really daunting task (maybe I've overestimating). A balance between privacy and simplicity is important to me.
I'm just using built in 6.0 permissions things where it just asks for permission to do anything for the first time
StykerB said:
I'm just using built in 6.0 permissions things where it just asks for permission to do anything for the first time
Click to expand...
Click to collapse
THAT is the proper way ^^^
HOWEVER, just be aware that there are some significant limitations to the... limitations... that aosp permissions are able to impose. For example, you can't deny INTERNET to any application, since google has deemed that one to be universally required (for distribution of advertisements). BUT, at least it allows you to prevent access to your contact list to applications that use the internet, which means that it can't just automatically send your contact list to spammers without your consent.

Categories

Resources