Jump to content

Top Posters

  • satman80Photo
    1. satman80

    1,109,584 posts

  • RSS FeedPhoto
    2. RSS Feed

    26,807 posts

  • SamuriHLPhoto
    3. SamuriHL

    26,011 posts

  • livinginkaosPhoto
    4. livinginkaos

    11,569 posts

  • soocoldPhoto
    5. soocold

    9,389 posts

  • comiskeybumPhoto
    6. comiskeybum

    7,668 posts

  • jayrodPhoto
    7. jayrod

    6,845 posts

  • transmissiontechPhoto
    8. transmissiontech

    6,206 posts

Newest Members

  • AesquivelPhoto
    1. Aesquivel

    Joined: Today, 01:49 PM

  • dcplayaPhoto
    2. dcplaya

    Joined: Today, 01:32 PM

  • wolfensteinPhoto
    3. wolfenstein

    Joined: Today, 12:38 PM

  • wdtiamatPhoto
    4. wdtiamat

    Joined: Today, 12:15 PM

  • hbangPhoto
    5. hbang

    Joined: Today, 12:03 PM


Parental Control App Ignore No More Lets Parents Remotely Lock Their Kid's Phones

22 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  ignore-no-more.png   77.2K   16 downloads
     Ignore No More is an app that has been featured by several news outlets as of late.  It allows parents to remotely lock their kid's phones is  preset number of calls or text messages go unanswered by their children.  Once the parent decides to lock down their kid's phone after getting no response, the kid's device will only be allowed to make phone calls to numbers that are saved in the "In Case of Emergency" contact list, which is where the parent's number must be stored.  Once the kid stops ignoring the parent, the parent can then remotely unlock the kid's phone.  Based on the reading I've done, the app doesn't sound perfect, but it does raise the question of how many of you out there are looking for and/or would use an app like this? Chime in below, and read more about this app HERE.

  204 Views · 4 Replies ( Last reply by mamawm )


Security Vulnerability That, For Once, May Affect More Than Android

22 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  bad droid.png   56.05K   8 downloads


     Hey, guess what? Security researchers have found yet another means of stealing your personal data from your phone.  For a change though, it is believed that this one may affect other mobile platforms as well as Android.  This one essentially boils down to a phishing type attack, in which a malicious app is able to access data from another app that is stored in shared memory.  Using this particular technique, the research team who discovered this vulnerability are reporting a success rate of between 80% - 90% at accessing data from apps such as Gmail, the Chase mobile banking app, and the H&R Block mobile app, among others.  Fortunately, in order for this attack to work, quite a few conditions have to be met, including the installation of a malicious app to monitor other apps on your device and user interaction with that app to allow it steal the data.  Unfortunately this is yet another scary proof of concept vulnerability that could cause serious heartache if not quickly addressed.  The moral of the story, as always, is be careful what apps you install on your devices.  More details are HERE.


Source: Redorbit.com (thanks cmh714!)

  161 Views · 0 Replies


New Root Method for All Carrier Versions of LG G3

18 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  stumproot.png   351.82K   16 downloads


     The guys of Team Codefire (IOMonster, jcase, autoprime, and PlayfulGod) have released a new root exploit that has been confirmed to work on all carrier versions of the LG G3, including the Sprint version, which up until now did not have a working root method.  Called Stump Root, its about as easy as rooting gets.  Simply download and install the Stump Root apk, run it, reboot when prompted, install SuperSU, uninstall the Stump Root apk, and profit.  Big thanks to the guys of Team Codefire for continuing to find and exploit the vulnerabilities that allow us to have root access on our devices!  Read more about Stump Root and grab the apk HERE.  Standard warnings about rooting your device apply.


Source: XDA

  234 Views · 4 Replies ( Last reply by SamuriHL )


Moto X+1 and Moto 360 "Event" set for Sept 4th

14 Aug 2014

Posted By KaChow in DroidRzr News and Reviews

Some good news is coming right around the corner and looks like we are finally going to see what these devices look like. 









  224 Views · 1 Replies ( Last reply by livinginkaos )


Qualcomm SOC Vulnerability Found, Affects Many Android Devices

07 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

UPDATE: Dan has gone on record and stated that neither LG nor Samsung devices can be bootloader unlocked with this method.  Period, dot, the end.


UPDATE 2: Qualcomm has now issued a statement that they are aware of this vulnerability, and that they have released a patch to device manufacturers.  


     Beware, major geek speak lies ahead.  Security research extraordinaire Dan Rosenberg, aka djrbliss, made a presentation at the Black Hat security convention yesterday that, to put it mildly, is kind of a huge deal.  He showed that it is possible to exploit a vulnerability within the TrustZone of a device running a Qualcomm SOC to either unlock or circumvent a secure bootloader.  Then he proved the concept by unlocking the bootloader of a consumer version Moto X.  I'll let that sink in for a second...      


     Still with me?  Okay, I'm not going to get into a serious discussion of how this works, because frankly I don't completely understand it. But I'll attempt to break it down as simply as I can.  Any device that is powered by a Qualcomm SOC, including most every flagship Android device produced within the past year, utilizes what is referred to as the TrustZone, which acts as an intermediary between the kernel and hardware and regulates what are trusted apps and commands, and what are not.  Things are broken down even further into what is considered the secure and non-secure sides of the device.  The non-secure side includes the Linux kernel, the Android operating system, and most every app on your device.  On the secure side, you have what is called the Trusted Execution Environment, which in Qualcomm land is called the Qualcomm Secure Execution Environment.  This secure side of the house has access to absolutely everything on your device, both in terms of hardware and software, such as the Qfuses that dictate whether some of your devices' bootloaders are locked or unlocked.  What Dan was able to do was find a vulnerability that allows code to be executed from within that secure side, allowing him to bypass or unlock a secure bootloader.  What devices does this affect? The Moto X, HTC One, Samsung Galaxy S4, and LG G2 to name a few.          

     Now comes the part where I dash everyone's hopes for a Utopian land where locked bootloaders are a thing of the past.  First of all, Dan was able to exploit this onstage at Black Hat, but he has not released the details of exactly how he did it.  So there is currently no exploit in the wild to allow anyone to do this.  Secondly, if an exploit is ever released, there's a good chance it will be patched very, very soon.  So if you have a current Android phone running a Snapdragon SOC and are hoping to profit from this, avoid any OTA updates like the plague.  Finally, the Galaxy S5 and HTC One M8 have already had this vulnerability patched, so no love for owners of those devices.  Dan's paper explaining the details of the vulnerability can be found below.  


Source: XDA, (thanks SamuriHL, shane1, and cmh714!)

  482 Views · 9 Replies ( Last reply by KaChow )


Hashcode Gets a New Job

06 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  hashcode_400x400.png   182.68K   17 downloads


     Many, many of us have profited from this man's work.  Now Hashcode has taken a job with the Linaro Mobile Group, and has decided to take a step back from several of his Android development projects.  In his own words:


"Today is an exciting day in my very tiny corner of the universe! I formally accepted a job offer as Engineer with Linaro's Mobile Group (https://wiki.linaro.org/LMG). My first assignment will be working as part of a team to introduce needed changes in the Android OS to support Project Ara (http://www.projectara.com).
Obviously, this is a huge opportunity. But also a very challenging task.
Over the last 3+ years, I've been working 2 jobs. During the day, I work with clients to solve business related problems via custom software solutions and at night work on Android projects ranging from device support, kernel development, CyanogenMod maintainer duties and Safestrap recovery. It has been an incredible learning experience, but at times it can also be draining. This setup might work due to the flexibility of my job as a consultant where I can determine my own working hours. However, it's not fair to Linaro or my team if I continue this way.
This means that I will be stepping away from much of my community development efforts. Affected projects include: Kindle Fire device support, Safestrap recovery and my maintainer duties at CyanogenMod. I hope to find some replacement developers for many of these projects so they can continue to live on.
Please don't misunderstand the above to mean: I don't support open source development, or that "I've given in to the man." Linaro is a huge proponent of open source and upstream contributions, and hopefully much of the work I'll be doing will end up in public repos.
Lastly, I wanted to say thank you. Over the last few years, I have chatted, emailed, responded to you in forums and you treated me with respect and have shown me a lot of love over the years. It has been a pleasure.
TL;DR: I'm making a huge career change and I want to be 100% focused on it. To that end, I'm going to step away from many very time consuming community Android projects."
Please join me in wishing Hashcode well in his new career!  Any G+ users who want to say thanks to him directly can do so HERE
Source: Hashcode via G+ (thanks Kaos!)


  379 Views · 4 Replies ( Last reply by mrlolli )


PSA - Update Rolling Out for VZW Galaxy S5, Breaks Root Access

01 Aug 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  samsung-galaxy-s5-brilliant.png   282.27K   21 downloads


     Consider this your warning.  An update is rolling out for the VZW Galaxy S5, that along with a host of bug fixes, is apparently also breaking root access.  Reports are coming in that not even towelroot is able to restore root access after taking the latest update.  The update, which is designated KOT49H.G900VVRU1ANE9, also adds a few new features, such as the ability search for downloaded apps through the stock file manager.  The update does not upgrade the Android version, which remains at 4.4.2.  So to anyone who wants to keep root access on their device, steer clear of this one for the time being.  More details of what is contained in this update are HERE.

Source: Android Authority





  553 Views · 18 Replies ( Last reply by SamuriHL )


Another Ugly Android Security Vulnerability

29 Jul 2014

Posted By mjs27541 in DroidRzr News and Reviews

Attached File  bad-android-420x215.jpg   13.99K   23 downloads


You really didn't think that my first story in over a month would be good news did you?!?  Researchers at Bluebox have discovered a security vulnerability within Android that could allow malicious code to infect nearly any app on your device.  In a nutshell, Android allows for a variety of security certificates that verify the authenticity of an app, including self-signed certificates that aren't issued by a digital certificate authority.  However, there is another type of certificate, referred to as a hard-coded certificate, that gives the associated app elevated permissions, such as the ability to inject code into other apps.  The main three that have been referenced that use this type of certificate are Adobe, which most likely uses this to allow Flash to act as a plug in for other apps; 3LM, which is a service used on Motorola, Sony, HTC, Samsung, and LG devices among others that can install apps and control system settings; and Google Wallet, which uses the hard-coded certificate to provide secure access to NFC.  The problem is that Android does not verify the authenticity of the security certificates that act as intermediaries between the apps in which code is injected and the original hard-coded certificate that allowed the code to be injected in the first place.  So essentially, an attacker can sign a malicious app with a security certificate that appears to be signed by the original hard-coded certificate but actually isn't, and this will never be cross-checked by Android.  The bottom line is that this is yet another way in which an attacker can gain full access to your device and steal your personal stuff.  Google says they have released a patch to address this, with Motorola being the only manufacturer that has begun to push the patch out so far.  More details about the vulnerability, as well as a link to an app that can determine if your device is vulnerable, can be found HERE.  


Source: PCWorld.com  

  514 Views · 8 Replies ( Last reply by RikRong )

Latest Discussions

Site Navigation

Website Poll

Poll: RAZR HD/M KitKat Unlock (109 member(s) have cast votes)

Since root and unlock were found for KitKat on the HD/M, have you unlocked?

  1. Yes (74 votes [65.49%])

    Percentage of vote: 65.49%

  2. No (5 votes [4.42%])

    Percentage of vote: 4.42%

  3. Considering it...i.e. living dangerously waiting for the exploit to be closed again :) (3 votes [2.65%])

    Percentage of vote: 2.65%

  4. I was unlocked previously with motopocalypse (27 votes [23.89%])

    Percentage of vote: 23.89%

  5. i have a developer edition so I've been unlocked (4 votes [3.54%])

    Percentage of vote: 3.54%

Vote Guests cannot vote

  • 420,514 Total Posts
  • 104,269 Total Members
  • Aesquivel Newest Member
  • 5,690 Most Online

1265 users are online

407 members, 858 guests, 0 anonymous users   (See full list)

brianmagicr, Gersh, JustAGuy, Jedd, rickybogo, Google, B.E.McAllister, RyogoNA, Bing, Captain Crypto, wedgey14, RoWilJr, kyanil, Yahoo, zeeryan, LaurelRaven, arikr, wdtiamat, gadjetman, BloomBoy, cyrixleong, Thach, DVDDave, jamminjon82, Gblake13, razr-totin-Jim, N1smo, SamuriHL, skeetch79, Derail, hootowlserenade, Playb3yond, jtelander, RikRong, kijoko, semiconformist, johnthehillbilly, dreamjaeil, RangeRat125, Eco_Minded, lpspecial7, maddog0331, Dreams_of_CEH, TJH0188, thewraith420, droidxpert, jlstark1, toddbecker, magikx21, CptSashimi, MyStro023, slogar25, smokewagon47, deduct, eye__dea, nine5raptor, meabrams, wbmanx, jackr, fflint, mamawm, Memnoch73, nobe1976, Sergy82, DeJaVu74, godofthunder, kamaromike, BadAzzBionic, brkelley, zamik, oneman84, Obsidian, meat-rack, parawood, BrknScrn, smileythom, Fasty, jdjbmedina, chakuza, Staf_in_Wah, Aesquivel, rjh2196, jobhax, mkarps, smokestace, dres, silver02, thaijunk, SQTierhog, s.dubs, jtapczynski, billy0319, perceval, nsaechao, artymyst, dandreat, wellsasw, linuxgator, MeatLoafT, King Howie, sevenseal, corrsfan99, Digital Cha0s, vdubdan87, khanusma, paulsilvan, dbm2321, big0013, dex741, chpalmer, ToolsCake, niolas5, kiwicanoeboy, bingo6104, jtakers, dwhisent, NTwoO, Shinare, GTIM2L8, Tom in Bristol, alk195, iceeyes, Facebook, shadowboxer, jhax, topshot17, MariuszO, OldBaldy, cmac93hatch, SnydersWeb, Dave12308, nohllywd, Ernietum, bigdasmith69, HighBar, NAKAMONIEL, lovemyram4x4, eknight22, daikatana_, lewwill, AAAAAAAAAAAAAAA, hodgewdm, Xenofx, Nagaro, dcplaya, rwired, huff825, Pur3vil, Twintiggrz, livinginkaos, pattonsj, drueter, Einsteindks, pmbarrontx, retromad, Mat, RedVR6, amnesia, Mayver, migzbionic, lash444, BlackBoots, masterc333, natestang1, TjNaps27, FareakyGeek, JCD1964, ndtemple417, Atomicdsm, NWKENT, useltonm, picturepatti, VingInMedina, geekabilly, dduncan55330, lgoptimusv5, yungzoe0624, alansho, twinkyz1979, droidfan2011, morrisr3nd, jayrod, comiskeybum, Android_michael, Jamo319, notbitter, clydei, txkssnapper, terminator1983, chrisp6825, chasr, Z32CM, 9jay2, Devilalwayscries, Sabres032, rcb0499, mjs27541, thetoolbox, yaahoo741, selland74, dvgb131, iamhugger, Darkchilde, fadeds, trebills, ruiz24, BubbleSort, zepman_us, hedwig34, grunt344, MDXer, Cavemanofmo, drewrivera, Pinnacle, beyedup, montesn, soocold, iviarc0, chdwrk, creyen, Z28nck33, wolfenstein, ol`DXer, darkavenger64, scottgti, AndroidSoldier, drizzzzzz, jbr, BBB, Kdaddy187, remi_ad, Narffran, cbrady1981, nprevette420, vze3dh95, kellym, Ahowe125, sk8ingdroid, m1215, extirpate, sfg, DroidFox, NoClue48, ej1911, gdisher, Boarder277, chengmania, dinger4u, silvrbullt1, justchiln, Ethan82691, jfarkas, onewire, altspeed, RzrMike, mdcowby, abuttino, almondman, trojanbrutha, jdcrae, johndickey1, Vicious1, viper8u2, dwh2o13, Baby Duck, chiahead52, parson, hidakachi, hbang, Seaxulf, Mange, eleven, drn96, dolfns99, Scooterman7, puterdad1, Bulto, lovesea3333, cl72421, GeekyDad, Rapitharian, EmericanX, cdiamond, Beanerman, omahamatt, KaChow, Clegs, Mountain8x, jco23, ddaydroid, nme1, systemx, dstearle, sdrams, sherri, sparky697, cdrice15, tlj000, gtg420i, giant25, james, reuelkeiser, cmh714, tommyz, kr8os71, barkleyfan, bad73mav, MattCHowell, skebner, Fireward71, johnnyn5, moroshek, matjmonk, xKroniK13x, raymondrbowman, The_Chupacabra, dhamm2121, kpsullzz, danifunker, Y-Man, looneybin, rbrill177, dravendeejay, Diem2000, ryan8r, moonwolf, onemotodroid, BoulderStu, onthewhole, wyld, shane1, bb0222, lcas26, ordiesep88, bchiodini, clphoton, jibroney, slaffoon, mandragora, jmaher1023, esothan, dautley, foxkat, themrgoats, moejoe88, seaner5, jorgestrada, bpl0477, bolikk, jtj121, trink746, vwgirlz, fisheo, tucstwo, blankdep, tcrews, chriskan, zomb, marleyinoc, rjsolkan, larkfield1, unchoney, 7eregrine, powrful1, Board373, Grudge, ibolski, ipwn69, lectrman, AnotherBum, thehappycannibal, scbison, wakeboredb, Byakko, laber42, Kitsune, barbas, sspartan, muscledroid, rhunter81005, bdpb2k, standroid61, gt6061t6, razr87, aksaunders, rjames, Konrat, Coolloser, VapeApe, dschuett, garywojdan81, eclipse00, nyteowl, iambecoming, Jdeere1971, pothole, mike-f, anjustice1, sirmdrakem, ankis225, neckchop, BigEdd, Joseberga, Bratster2, ridgeking989, Exactly, watson387, XE_Nerd, smithfolk4, catbutt, kuntrykracka

Portal v1.4.0 by DevFuse | Based on IP.Board Portal by IPS