[Q] Non-rooted S3 questions - AT&T, Rogers, Bell, Telus Samsung Galaxy S III

So I feel like I know my way around rooting and putting custom roms on android devices. I've done it multiple times and love the features doing those two bring to your device. I recently received a GS3 from my employer and this will be my main device for work and personal use. But the company I work for has an application that is installed on every phone with company information on it so that the app can do things like wipe the device remotely if the phone is lost/stolen for obvious security reasons. But this application also restricts side loading apks and root users on the devices as well.
The application is Maas360:
https://play.google.com/store/apps/details?id=com.fiberlink.maas360.android.control.samsung&hl=en
I actually work with the helpdesk of the company, and we have what Maas360 calls 'security policies' that include the settings restrictions for each of the devices with android or iOS... some of the restrictions set in place are like I said with not be able to side load apks, no root users, must have a screen lock with pattern or pin (depending of which security policy is applied), along with other little things.
1.) Is there a way to get the Samsung bloatware off the device by flashing a Stock, non-root custom rom?
2.) Is possible to side load apps with Maas360 installed? The usual setting of 'Allow the installation of non-Google market apps' is grayed out and unchangeable currently...
If there are any other suggestions, those would be great as well. I just want my device to have the flexibility and openness of what a true Android device should have. Thanks

Typically employers put software like that not just for security measures of lost or stolen, but also to prevent their employees from doing exactly what you are wanting to do. As such, you are essentially asking people here to potentially help break your company's policy and bypass security measures they have installed. As far as I am concerned, you are on your own.
Sent from my SAMSUNG-SGH-I747 using xda app-developers app

Related

EVO Security Questions

This is not troll baiting or OS Slamming...
Looking for knowledgeable and constructive feedback regarding device security. I'm thinking in terms of an Executive or VP or Network Admin or such loosing the device. a piece of software
1) to do more to control access than a squiggly line
2) to allow for remote GPS tracking and/or device data wiping
3) that is stealthy and/or hard to remove.
I know there are a few "security services" out there but that leads me into "how do i know whose who and who can be trusted in the android segment". I place a great deal of trust in the developer of my ROM. That he/she/they are benevolent and not including by intent or negligence loggers or other malware. then i have a companies like Wave and Norton and Good all angling to get installed on my device. i don't know Wave nor Good and I have no luv for Norton.
The EVO allows for RDC and VNC sessions. It allows for VPN access and has the pwd's to my personal and work email. meebo has me signed into all my chat networks. As a long time Windows person I guess it's just a lil disconcerting when i stop and think on it. this device can easily be configured to hold everything needed to access a secured network. Perhaps this is a reflection on my lack of understanding the system in depth. perhaps i'm not sure how well the opensource community will communicate "problem" apps and developers.
Also, and kinda sorta related. Applications in the marketplace. sometimes you get an application and the types of security access it is asking for seems a bit "off". occasionally in the comments the developer may comment that "i need to access X in order to provide Z". It usually makes sense (whether true or not i cannot say), but is there any nice cross-reference of what types of actions require what access level. or why so many apps need to know the phone state and identity or general location or full network access and what exactly that means to me as the end user. this second paragraph is proving difficult to put to paper..i may come back and edit for clarity.
and lastly, i guess is a question on how to protect from apps like this...
http://www.networkworld.com/news/2010/060210-android-rootkit-is-just-a.html?page=1
http://www.zdnet.com/blog/security/commercial-spying-app-for-android-devices-released/4900
looking for something kinda like this, but useful...
http://www.downloadsquad.com/2010/06/28/understanding-the-android-market-security-system/

EVO insecure?

This is not troll baiting or OS Slamming...
Looking for knowledgeable and constructive feedback regarding device security. I'm thinking in terms of an Executive or VP or Network Admin or such loosing the device. a piece of software
1) to do more to control access than a squiggly line
2) to allow for remote GPS tracking and/or device data wiping
3) that is stealthy and/or hard to remove.
I know there are a few "security services" out there but that leads me into "how do i know whose who and who can be trusted in the android segment". I place a great deal of trust in the developer of my ROM. That he/she/they are benevolent and not including by intent or negligence loggers or other malware. then i have a companies like Wave and Norton and Good all angling to get installed on my device. i don't know Wave nor Good and I have no luv for Norton.
The EVO allows for RDC and VNC sessions. It allows for VPN access and has the pwd's to my personal and work email. meebo has me signed into all my chat networks. As a long time Windows person I guess it's just a lil disconcerting when i stop and think on it. this device can easily be configured to hold everything needed to access a secured network. Perhaps this is a reflection on my lack of understanding the system in depth. perhaps i'm not sure how well the opensource community will communicate "problem" apps and developers.
Also, and kinda sorta related. Applications in the marketplace. sometimes you get an application and the types of security access it is asking for seems a bit "off". occasionally in the comments the developer may comment that "i need to access X in order to provide Z". It usually makes sense (whether true or not i cannot say), but is there any nice cross-reference of what types of actions require what access level. or why so many apps need to know the phone state and identity or general location or full network access and what exactly that means to me as the end user. this second paragraph is proving difficult to put to paper..i may come back and edit for clarity.
and lastly, i guess is a question on how to protect from apps like this...
http://www.networkworld.com/news/2010/060210-android-rootkit-is-just-a.html?page=1
http://www.zdnet.com/blog/security/commercial-spying-app-for-android-devices-released/4900
If the app seems fishy don't download it you can allways get lookout from the market it will pull your phone up on the gps and tell you exactly where it is I've tested you can also make it chirp real loud as for them accessing your phone put the pattern lock on in stead most thiefs are not hackers so they probably won't be able to access your phone even if you hard reset you still have to draw the pattern I mean unless they full root the phone and wipe it in petty sure you will be ok hope that helped
Sent from my PC36100 using XDA App
Lookout kinda falls into the same category at Good or Wave. (at least to me thus far). All appear to be fine and yet somehow free products. I'm looking for a corporate solution, not end user solution. a free solution would be swell, so long as trust can be established.
i am looking at this from a corporate IT security perspective. not a young person, a enthusiast nor regular end user. heck, if I could get all of my users to actually know what is meant by "if the app seems fishy don't use it", most of my job would be completed. but to be honest, i'm still trying to get a grasp on that myself in the android world, hence the question about access levels in last paragraph of original post.
the zigzag is nifty and should protect from casual access. Froyo will provide an interface that a secured Exchange server would prefer to have. that will help.
( BTW ... if anyone knows how to make the red line not appear when you mess up the pattern lock...you'd be my personal hero for the day)
its not thieves that I'm worried about...it's my own end users that have to be protected from themselves. if a device was left in a bar or cab and did end up in the wrong hands....data could be sold, deals could be lost, people could be embarrassed, with the type of data that 'can very easily' exist on these devices...network security itself can be compromised. and sadly, i must assume that a good many end users will disable security if they are able to. for the same reason they ***** at automatic screenlocks on their desktop/laptop computers.
would you rather your IT team "hope/pray/expect the device will be picked up by some incompetent/benign/lawabiding citizen" or the opposite?
i choose to prepare for the worst...hope for the best. not the other way around. hence, my questions.
Isn't remote wipe being built into froyo somehow? Thought I read that somewhere.
I have my exchange email set up on my device and it requires me to use a passcode. I cannot disable it.
Sent from my PC36100 using XDA App
As for wiping data remotely wave secure will do that it might be close to what you need or something for the time being hopefully this will help
Sent from my PC36100 using XDA App
This is kinda sorta what I'm lookn for.
http://www.downloadsquad.com/2010/06/28/understanding-the-android-market-security-system/

[Q] How to block IMEI ID tracking?

I am ok with paid/donate apps using it to ID your device, but a lot of the free apps share it so that they can track your usage and or with advertisers to push targeted ads to you. With location enabled, they can track where you are visiting, etc.. I feel they are allowed too much personal information.
Anyone know of a way to not allow access to this, other than disabling mobile networking?
Personally I would prefer to be anonymous, don't mind using something for free and having to see ads, that's fair..
-CC
I recently came under attack, and have determined that a hack tool used the IMEI and atiagent to gain information, that allowed them to connect remotely. persistently.
I was wondering how do i hide this info, or obtain a new valid number?
If i subscribe to a new service provider, will this help?
CM7 has a feature that allows you to revoke permissions. I haven't tried it, but it might do what you're after. I haven't tried it myself. Some apps may just crash though when it tries to get the IMEI. Since an app dev wouldn't expect a permission it was granted on install to be revoked, they may not have any exception handling around that.
Bottom line...if you don't trust an app with a permission it's asking for, I would generally just not install it and move on.
LBE Privacy guard, it's in the market

Airwatch & Root

My company will be requiring Airwatch to be installed on any mobile device that accesses company email, on the 15th of this month. There is only a little information on XDA related to this, most of it being >7 months old & not very informative; however I've learned the following:
-AW can detect root
-AW allows the admin to encrypt device & SD storage, track the device via GPS, & view installed apps
-I suspect, but don't know for sure, they can also perform a full wipe - should the device security be compromised.
What I'd like to know is if any XDA users are familiar with this app/IT security measure. Is there a way to bypass root detection, or have a source in IT create a custom profile, on the server end, that would not flag my device?
I own my SGS3, & pay for my service, as my company initiated a BYOD policy a few months ago. Now they say I have to install this if I want to continue to access my email, calendar, contacts, etc. The choice is mine, but I'd prefer to have my cake & eat it to, if possible.
So, I'm putting it to the brilliant collective minds, thoughts, experience, & expertise of the XDA community! Any thoughts, accounts of direct experience (admin or end-user), solutions, suggestions - anything would be appreciated.
Thanks!
Samsung Galaxy S3
OdexedBlue ROM
Trinity Kernel
XDA Premium - Support our developers!
Bump....
Samsung Galaxy S3
OdexedBlue ROM
LI3 Stock Kernel
LIF Baseband
XDA Premium - Support our developers, modders, & themers!
Bump... Still nothing! What a bummer!
Samsung Galaxy S3
OdexedBlue ROM
LI3 Stock Kernel
LIF Baseband
XDA Premium - Support our developers, modders, & themers!
Honestly I wouldn't want to give my company access to my personal phone like that... You never know what they can look at that they aren't telling you. Plus tracking the GPS, that's pretty much the same as getting the ankle monitor when you on house arrest. Total invasion of privacy.
I'd pay the $20 for another line on my family share plan And use that for a business phone. That way unless I'm at work or do a on call shift I can turn the phone off and not have to worry abut being tracked.
Sent from Pluto.
Do you really need email access on your phone that badly? Seems like you are giving up a lot...
Sent from my SPH-L710 using xda premium
Well they used to pay for my old blackberry, then initiated the BYOD for everyone. I get approximately 250 emails per day, have all off my contacts on outlook (I had backed up my BlackBerry contacts that way), and I typically have my days packed with one meeting after the other. So, being able to use my phone, instead of carrying around my laptop, to access emails, contacts, & my calendar is extremely useful and convenient.
I'd read on a thread for a similar security product that you can have a custom profile built that will disable the check for root functionality on that. That's why I began looking for possible solutions for Airwatch by posting this thread.
Bottom line though, I will not install it if there's not a work around, or solution of some kind.
Samsung Galaxy S3
OdexedBlue ROM
LI3 Stock Kernel
LIF Baseband
XDA Premium - Support our developers, modders, & themers!
Your place of employment sucks... that's like saying "hey if you want to use your phone for work, well then we own it but you will pay for it."
I mean I get why they have the safeguards in place, just a sucky situation.
I'd still go with my idea, get another line galaxy note 2 would be perfect.
Sent from Pluto.
atm there is no way u can bypass the root check from AW.
but u can disable AW frm "Device Administrator" @ Security when u are off from work.
And install it back when you are back to office.
(click the enrollment link from your email to activate AW)
I actually work for Airwatch, If you own your phone and the company didnt supply it it doesnt matter if your phone is rooted or has a custom rom. its YOUR phone. Yea every week on the AW client it'll report compromised device but its your phone so your company cant say anything to you unless they provide you a phone.
just turn turn off a lot of access and tracking stuff with in the AW app as well
The other thing would be, perhaps a 3G tablet? Unless you absolutely need to make phone calls, that way you can check e-mails and all that jazz, and turn off GPS. Just my two cents. Either way, good luck!
Airwatch user here, member of work IT, with an iPhone, iPad, and Fascinate. Mine reports as compromised devices, and I already told them to wipe my device if it's really out of compliance and they have a problem with it. So far, jail broke and root happy still
My employer is cancelling the BES server (and devices) and switching to a BYOD policy, including Airwatch. The i* device users are ready to be assimilated, but right now there challenges getting the agent on the Droids.
Our policy is that certain employee positions (including mine) are required to have access to a smartphone for e-mail access and/or on-call, and we are in a right to work state. So that means we either comply or risk losing our job. The employee is responsible for purchasing the phone, service & replacing damaged phones, and can turn in the billing summary page each month for up to $100 reimbursement.
The BB was the only smartphone I've had, and my Droid should arrive today. I can understand they want to secure devices which attach to the internal network but that doesn't make me feel any better about how the product integrates with the devices.
Will the agent install on the Droid if it's rooted? Can they prevent me from resetting the phone to remove the agent? And if I do that, will it just re-install if the device is configured in the Airwatch console?
airwatch on S4 blocking USB Debugging
Guys,
I just received a new company Samsung Galaxy S4 and have Airwatch disabling the USB Debugging option, it's greyed out:crying:. Can't even root it now if I wanted to.
Such a shame, I have now two Galaxy S4s, what a b*&(9it to carry around.
Any ideas would be much appreciated.
Cheers!
Airwatch and other email/calendar client
trmixing said:
I actually work for Airwatch, If you own your phone and the company didnt supply it it doesnt matter if your phone is rooted or has a custom rom. its YOUR phone. Yea every week on the AW client it'll report compromised device but its your phone so your company cant say anything to you unless they provide you a phone.
just turn turn off a lot of access and tracking stuff with in the AW app as well
Click to expand...
Click to collapse
Hi,
recently also my company has adopted airwatch MDM to give us the access to email by phone.
I would like to know if there is a way to use a different email/calendar client instead the Airwatch Inbox client... I would like to have a client that offer the possibility top have a calendar with a widget.
cheers,
Luigi
Any updates on this?
I've tried:
RootCloak - downloaded from playstore, didn't work.
Also tried installing it from xposed, but there's an issue with galaxy phones, almost bricked mine.
There's also a thread someplace talking about editing the scripts of AW, but not all scripts are visible any longer.
Bottom line - doesn't work. Using SM-G925F. Any ideas?

Optus X Smart 4G smartphone

After purchasing several Optus X Smart 4G smartphones outright that are currently being sold in Australian stores I felt the need to make others aware.
Despite being branded as an Optus mobile phone it is actually an Alcatel mobile phone that comes shipped with some nasty packages, one being "Files" that after several days of enjoying your new purchase is upgraded to "File Manager" an application which now runs a boost application (Hawk Super Cleaner/ antivirus).
This boost application runs 24/7 and nags the user to click an icon then displays advertising. When you remove this application it defaults back to the factory installed version that does not contain "File Manager" stuffed with the boost aplication.
Being installed as an Android System App "File Manager" stuffed with Hawk Super Cleaner/ antivirus is granted with higher Android Operating System App permissions than the end user has limited controll over which brings privacy and security concerns to the device IMHO.
To stop automatic updates that will reinstall the boost aplication a user needs to log onto the Google Playstore and go into settings, then check do not automatically update applications to stop ALL playstore automatic app upgrades. Doing this in the phones bundled "Updates" aplication has no affect in stopping the automatic reinstall. Caveat being that Playstore app upgrades now ALL need manually input from the user who needs to remain mindfully to not update "File Manager".
The other option is to run "File Manager", go into settings and turn off the on screen alerts, this will allow "File Manager" stuffed with Hawk Super Cleaner/ antivirus to run 24/7 on the device and be granted with the many permissions you (like myself) may not want to (and never did) accept upon uograde / install,. However, the on screen displays will be gone from the phone.
Don't bother trying to stop it on the Android operating system level via options like disable app, do not allow peeking and rely on uninstall to the factory shipped version of the app as Android and Included bloatware settings do not act as expected and it will automatically install itself again, also displaying on screen despite the end users wishes and Android settings being checked.
Never being advertised that the phone would have on screen advertising to the end user or forced third party apps as part of the Android operating system I have made a complaint to Optus, the communications ombudsman, the "File Manager" developer, Playstore, Play Protect, XDA forum and anywhere else that I felt relevant.
My unconfirmed fear is that this device may allow the manufacturer to controll bloatware updates in the future via a command and control server rather than exclusively at the Playstore, hopefully this is an unjustified fear and one day the Playstore can clamp down on this type of unwanted and non authorised Android System App behaviour and put security fears to rest.
Currently awaiting an outcome
UPDATE: The Telecommunications Industry Ombudsman has forwarded my complaint to Optus for a resolve.
My argument was that Optus sold a product and forcefully allowed a third party aplication (Hawk Super Cleaner/ antivirus) to be side loaded and included as an Android system App, which in my opinion is outside the scope of Optus being simply a supply conduit to internet services as Optus now dictates what third party app the customer of this product must use 24/7 and without a reasonable opt out.
I have also suggested that Play Protect offer the end user the option to force a single Android System App from updating and add a detection flag for Android System Apps that stuff a third party aplication and byspass the new app install agreement methods used by the Playstore, AI is needed to detect mass user bases being unfairly exploited for the means of profit at the flick of a switch.
Hopefully the 4 devices purchased are given an easy Android System App uninstall option for bloatware that advetises on this phone by default, or get side loaded onto the phone without end user authorisation and after the purchase of the product has been made.
Otherwise replacement phones of similar specs that have Android as expected and advertised on the product box, and without forced Android System App advertising will be preferred for complaint resolution.
Now awaiting complaint communications from Optus.
Hi have you tried 'rooting' the phone to control the system better and remove that type of application? I have heard it may be the only way to stop such apps when standard obvious methods fail. (You will have to Google that as I know nothing more than what I have read). I would be pleased to know how you go with that as I have thought about doing it with my own phone but I haven't had as much of a problem as you are experiencing. ([email protected])
Put a custom recovery on it if there isnt one available im more than happy to build one for it if you would like and then flash magisk root
Install es file explorer, grant system root permissions and remove the file manager completely by deleting it then replace with another stock one in which you know has nothing being forced on you,
I was in the same boat have the optus x spirit next up from smart and the amount of 3rd party applications is to be quite honest shocking in my opinion i developed a TWRP for the X spirit and did exactly what i mentioned above no problems now
Rom for 5056i
Hello just wondering if possible to build a twrp or some rom to root this mobile of mine. Thanking you chaschas

Categories

Resources