com.qualcomm.qcom_qmi - AT&T Samsung Galaxy Note 4

What does com.qualcomm.qcom_qmi do?
Application Settings gives me the option to disable it, but I have no clue what it does. I've disabled it before with no crashes of any kind, but because it has "Qualcomm" in the name, I wonder if it has something to do with CPU power management or something CPU related.
Can anyone shed some light on this?

I tried Googling it and didn't see anything other than some post about users disabling without even knowing what it is. I saw one link that looked like it started out saying it was a cellular protocol... so I clicked it to see the rest of the info and find out the page no longer exist.
qcom_qmi.xml used to be in system/etc/permissions but is no longer there on this device. I don't know if it's been moved, renamed, or removed altogether. That would've shed a little light on what it is.
Edit: saw a post that said it is not recommended that you disable it. I would leave that alone because I do think it is some sort of cellular protocol. I'm still looking around for full info.
Edit 2: this is what I'm thinking it is. It matches up to some other small info I found. Interesting read.
https://blogs.gnome.org/dcbw/2010/04/15/mobile-broadband-and-qualcomm-proprietary-protocols/

Related

TomTom home setting..

I managed to get a "free" copy of TT6, but everytime I start the program I have to re-input my home location. It does not save it.
Anyone know how to get it to keep my setting?
Thanks
Brad
First, I don't see much point in you pointing out to us that you illegally downloaded the software; just keep that to yourself. Granted that could always be part of the problem, but if it is, then it's your problem. If you illegally download something, you can't always expect it to work right.
However, to answer you, my first guess would be to look where the application (and it's configuration file, not sure what it is off the top of my head) is located, and see if it's in an area where the application has no permission to write to. If it doesn't have permission then it will fail to save it's settings whenever you close the application. Do any other settings not stick, or is it just that one? I've had no problem with it on my device (Titan).
Free wasn't meant to imply illegal, sorry for the confusion. Was a hand-me-down, hence I didn't have to pay for it.
I've looked amd there is a config, but it's loaded with www addresses, nothing in there about a location or any other data.

[Q] Need urgent help - I believe I have a virus that clones your phone

Hey, well yesterday I got a notification saying "supercharge UR battery". I was pretty sceptical but I clicked on it not realising it would go to a website and apparently that website then downloads and installs something automatically that allows them to clone your contact etc, even your IMEI and they can put your number to go through premium calls to get money out of you.
Either way I need to know how to get rid of this. It's just come up again so I'm presuming it didn't install properly for them or something. It came just after I updated all my apps yesterday but I don't know which one would have caused it.
Do we think a full wipe and reinstall might do it?
:EDIT:
shocker that AVG antivirus didn't find anything. I've been looking through my apps, deleted some I don't use but none of them stand out as being dodgy, I don't even have many.
What makes you think it's cloning your device?
Are you sure it's not just a push notification advert, from something like airpush?
Remove all recent apps that you've installed since you started getting them, and when they stop install them one by one, seeing if they cause the notifications. Check all permissions very carefully.
If you are seriously worried, full wipe and start again but there shouldn't be a need for that.
That sounds slightly unlikely; not that there's malware out there that can do that sort of thing (there is), but that you can acquire it simply by visiting a site and somehow bypassing all the usual application access authorisations. All the instances I've heard of require an app to be installed (and access granted) which then runs off and does all this in the background. So if you could post your source for that it would be a great help.
(As to the "supercharge your battery" ad, I've definitely seen that somewhere recently as well, but I can't think where. In an app, but I'm struggling to think what it could have been. I just ignored it as per any other ad that sneaks past the hosts file).
If you're really worried then a full wipe would get rid of anything actually on your phone, but I'm not yet convinced that's necessary.
Edit: just noticed you said "notification" not "ad". Try downloading something like Airpush Detector from the market; sounds like you've got an app using Airpush to show ads in your notification area. Again, that's not necessarily something to be particularly concerned about (irritating though it is).
Edit2: curses, beaten to it while I was writing all this on my phone. Must learn to be more concise.
//sent from my Desire HD using Tapatalk; all errors entirely intentional.
Well I've been going through my apps and there isn't a single one in there that you would ever consider to be dodgy as I just stick to the main ones. I don't bother downloading games or anything like that.
Surely if it's just an ad I'd be able to find said app on the market place, but I can't. In fact google finds nothing for "supercharge UR battery".
I'll try airpush detector. Cheers.
Ok so airpush detector says:
Mysettings
jqsoft.apps.mysettings
Checked out the app on the market and turns out the update added airpush to it. Way to kill your market. I guess they want people to go "pro".
Cheers guys!

Virus Alert from GNex Toolkit 5.3

Much to my surprise, I got a virus alert this morning on my laptop. There appears to be a virus coming from the Galaxy Nexus Toolkit 5.3
Unfortunately, XDA wont let me post to the actual thread of the toolkit so I have to post here.
Anyone else getting this virus ?
If you want a screenshot of the virus alert then let me know as I am not allowed to post "external links" even pics because of some rule on XDA.
I'm sure it's a false positive, what AV are you using?
There's no virus in it if you downloaded it here.
It's either a false positive or you downloaded the file from somewhere else and that website/file contains virus.
Well, I downloaded it from the link in the forum HERE.
It most likely is a false positive so I am trying to find out if anyone else has received this notice.
I am using McAfee (yes i know but its a work computer).
Thanks for the help!!
It would help if you told us what file it thinks is a virus.
I use Norton and when I've downloaded the toolkit it would pop up with some stuff, more or less just asking to verify if I felt the file was safe, since it pretty new and has a small user base there isn't much to go by for the virus scanners. I approved everything on my PC with it.
adrynalyne said:
It would help if you told us what file it thinks is a virus.
Click to expand...
Click to collapse
It would help even more if I could post the pic but since XDA won't let me...
First, it came up with Toolkit.exe was tagged as a Trojan and deleted.
Then it came up with another alert that modssection.exe was tagged a Trojan and deleted.
It does not tell me what Virus it could be only that their engine Artemis! has tagged it as a known trojan.
Malwarebytes is still running so far found 3 objects but can't tell what they are until the scan is complete.
Well if it concerns you, root manually. I don't like rooting toolkits anyway.
adrynalyne said:
Well if it concerns you, root manually. I don't like rooting toolkits anyway.
Click to expand...
Click to collapse
Well, I am sure if it really is a virus it would concern more than just me. I do agree that manually rooting is probably best. I had used it because it was a quick and easy way to install the drivers on a touchy machine.
I will post the results of Malwarebytes when it completes.
Not a virus ...
It's not a virus!
Anti-virus programs work primarily in two ways.
1) They know a potential threat directly, and block that program from causing problems.
2) They "think" they know a threat, and block a program based on historical information.
Your situation falls into number 2. Many programs could be completely innocent, yet be flagged by an anti-virus program. All the program is doing in case 2 is attempting to recognize a piece of code that it knows has also been used in real virus programs. When it sees this piece of code, it "thinks" the program is a virus, flags it accordingly, and let's you decide what to do.
Unfortunately, as I said earlier, innocent programs could contain this piece of code purely as part of their program, without any malicious intent.
Anti-virus programs are regularly up-dated with tens-of-thousands of these pieces of code, which are designed to help identify a virus. The operative word is "help." They don't actually determine it to be a virus, in the case of #2, they simply flag it as having information that was previously used by an actual virus program.
I hope I was clear enough.
Peter
Addendum: Here's an analogy ...
1) John has a history of criminal activity
2) John goes to a store
3) John robs the store.
Now let's look at these three points ...
Item "1" is method "1" in my previous explanation. The AV program knows that when it sees John, flag his actions as a virus.
Item "3" is also method "1" because the act of robbing a store is bad, so the AV program flags that action as a virus.
Item "2" is different. It falls under method "2" in my previous explanation. All three pieces of information are "fed" into the anti-virus program. One day the virus program sees the action of someone going to a store. It flags that action because the last time someone went to a store, there was a robbery. However, we all know that people go to stores every day without robbing them. It only flagged that particular person because their behaviour was similar to another person's behaviour who robbed a store.
You then have the option of allowing that person to continue with their daily activities because, in reality, you know they won't rob the store.
Better?
I had something similar but for the Viewsonic GTab. I don't know if it applies here, too, but when you're using exploits to root, the AV program picks it up as malicious, which is a true positive since it IS an exploit, but one that you're aware of and authorized.
Of course it shows as a virus. The toolkit is designed to hack your phone. Your AV has no way of telling if you plan on doing it yourself, or it's malicious...
Try installing a key stroke logger. Your AV will no doubt warn you about that also...
Uh...
Nexus devices don't have to rely on hacks or exploits and if a toolkit is using one, it should not be used. Tolkits for it are just holding your hand and doing he steps for you.
True, but the toolkit contains batch files and scripts which push files, which is exactly what AVs look for...
I wrote a toolkit for the N1 and my PC started to flag it as a virus pretty much as soon as I had saved it...
Only started happening today (had this on my pc for months if not a year) but yeah, AVG is calling the following files a Trojan. See pic.
SolidHelix said:
Only started happening today (had this on my pc for months if not a year) but yeah, AVG is calling the following files a Trojan. See pic.
Click to expand...
Click to collapse
this is normal, just ignore it dont tell it to clean it. If you read this thread youll see others see it too and there are explanations
I thought the instructions say something about disabling your anti-virus to make sure it functions properly? Or am i smoking? Or did i just assume that?
Edit: just checked, and yes, there is in fact a NOTE in which it states to turn off your antivirus because its an unsigned and unrecognized by microsoft...
Dude...L2Read.

Strange "RootPA" app on my HTC 10. Is it a potential security issue?

Im using a HTC 10 (EU variant). Today i was scrolling through "Netguard" (if you dont know it, its an app to prevent other apps from internet access), since i configured it to show system apps it displays way more apps than the normal app overview in the settings. In there i found an app called "RootPA" and one called "root", which seems strange since i didnt unlock the bootloader or root on my own. The details in the RootPA entry say "com.gd.mobicore.pa", no idea if thats helpfull to determine the origin of this mysterious app.
Can you help me with this?
Did you Google it?
I did, but the results were not realy usefull. I found someone with a modded Galaxy S3 who deleted a RootPA on accident and broke stuff, but that ssems unrelated. Are there any things i could do to find out more about the app installed on my phone without root?
I cant say its something I've ever seen. If this person in the past removed it, and it broke stuff, that would suggest that it may have been a system app and he was rooted. From what I managed to find on google, it is part of a security suite (mobicore) used by networks to monitor what the state of the phone is, presumably incase something happens, and it was the user fault, and they know for a fact because they have logs of what the phone has done.
[ACCESS_NETWORK_STATE] Allows applications to access information about networks
[INTERNET] Allows applications to open network sockets. (i.e send information)
[READ_EXTERNAL_STORAGE] Allows an application to read from external storage.
[READ_PHONE_STATE] Allows read only access to phone state.
A friend of mine got his HTC 10 2 days ago, ill ask him to look for this app. Its unlikely we would have the same virus/whatever installed.
Edit: He just reseted his 10 (due to missing language options, but thats another topic), but still found "root" and "rootPA" on his phone, so its preinstalled (although i still dont understand whats its purpose).
RootPA is provides service for provisioning secure applications that run on ARM trustzone and t-base OS (formerly mobicore). It is preinstalled in some vendors Android devices (search for this string on the internet: htc-devices-to-incorporate-trustonic-t-base-tee), but mostly unused as far as I know. The source code of some versions is available on the Internet (e.g. on github /Faryaab/android_hardware_samsung_slsi_exynos5410/tree/master/mobicore/rootpa).
It has nothing to to with rooting or unrooting the device.
PA route is very dangerous I had some I have somebody who has hacked into my phone through this particular program so to speak I have a lot of issues right now with my phone trying to get them off of my phone and this seems to be the root cause or the start of it have anybody knows how I can clear my phone and my Ram from the Vicious hacker I appreciate it I'm tired of being watched and recorded everything I do
Illfidusoon12 said:
PA route is very dangerous I had some I have somebody who has hacked into my phone through this particular program so to speak I have a lot of issues right now with my phone trying to get them off of my phone and this seems to be the root cause or the start of it have anybody knows how I can clear my phone and my Ram from the Vicious hacker I appreciate it I'm tired of being watched and recorded everything I do
Click to expand...
Click to collapse
PA route..... .rootPA ......2 different things. Hacked ? Unlikely, I think some OCD is kicking in. Want to be clean? RUU the device and do not restore anything

Find my device on Galaxy Watch 4?

It seems the find my device functionality isn't fully baked yet. I'm able to remotely ring, erase, and lock my device, but I'm not able to locate it. The device indicates that location is turned off. Play services and maps are set to always allow on my watch, but I can't find anything else to enable the location tracking ability. Any thoughts?
Sorry no help on this other than a quick reply to say I get the exact same problem. Can ring/lock etc. as you say, but for some odd reason the find my device on the watch can't retrieve the location. I've checked all location permissions, even temporarily tuned to always allow for basically everything on the watch, but no joy.
If you find a solution let me know / post here.
shaune said:
Sorry no help on this other than a quick reply to say I get the exact same problem. Can ring/lock etc. as you say, but for some odd reason the find my device on the watch can't retrieve the location. I've checked all location permissions, even temporarily tuned to always allow for basically everything on the watch, but no joy.
If you find a solution let me know / post here.
Click to expand...
Click to collapse
At least I know I'm not the only one! I will defininitely follow up if I find something out.
I'm late to the party but have the same issue.

Categories

Resources