Question about encryption - Moto G5S Questions & Answers

I'd like to address these questions to people who have direct access to this phone.
I read that the Moto G5S is encrypted by default. So the questions are:
1) Can you set a custom encryption key?
Please, I'm not talking about the unlock screen sequence/PIN, but the real key used for encrypting the data.
2) Does it use "default_password" as the encryption key?
I saw this key being used in some Honor devices, and it cannot be changed because there is no option anywhere.
(see here https://forum.xda-developers.com/honor-8/help/internal-storage-encryption-t3452737)
Thanks in advance.

JackSlaterIV said:
I'd like to address these questions to people who have direct access to this phone.
I read that the Moto G5S is encrypted by default. So the questions are:
1) Can you set a custom encryption key?
Please, I'm not talking about the unlock screen sequence/PIN, but the real key used for encrypting the data.
2) Does it use "default_password" as the encryption key?
I saw this key being used in some Honor devices, and it cannot be changed because there is no option anywhere.
(see here https://forum.xda-developers.com/honor-8/help/internal-storage-encryption-t3452737)
Thanks in advance.
Click to expand...
Click to collapse
I have the Motorola G5s xt1974.
I have installed lineage 14.1 ROM.
Getprop | grep -i crypt
Output:
Persist.vold.ecryptfs_supported: true
Ro.crypto.state: unencrypted.
Is this your answer to your questions?
Otherwise more details how I can give you more information.

GoldeneyeS2 said:
I have the Motorola G5s xt1974.
I have installed lineage 14.1 ROM.
Getprop | grep -i crypt
Output:
Persist.vold.ecryptfs_supported: true
Ro.crypto.state: unencrypted.
Is this your answer to your questions?
Otherwise more details how I can give you more information.
Click to expand...
Click to collapse
Sorry for the delay. Thanks for your kind reply.
The question was if the encryption works as expected. I saw stange things happening in other devices, like Honor, as you can read on the post I linked.
I'm currently interested in the stock rom, to understand if it works as expected.
One thing that can be checked is if once you set your custom encryption key password (fingerprint) you are able to access the /data partition via TWRP without having to enter the password (TWRP tries to use "default_password"). This would mean that there is no real protection for the data.

JackSlaterIV said:
Sorry for the delay. Thanks for your kind reply.
The question was if the encryption works as expected. I saw stange things happening in other devices, like Honor, as you can read on the post I linked.
I'm currently interested in the stock rom, to understand if it works as expected.
One thing that can be checked is if once you set your custom encryption key password (fingerprint) you are able to access the /data partition via TWRP without having to enter the password (TWRP tries to use "default_password"). This would mean that there is no real protection for the data.
Click to expand...
Click to collapse
If I install the stock ROM and use no fingerprint I can access the DATA partition. When I configure with fingerprint I can't access the DATA partition.
That's means the encryption works.

Related

[TOOL][TWRP ZIP][MM] Lock screen fix for encrypted devices

About
If you encrypt your device and set a screen lock protection with a PIN or password some ROMs have a bug which prevents unlocking your screen again. This flashable ZIP will fix this by
disabling the gatekeeper libraries which are not working as expected
deleting the not working protection PIN/password so you can set a new one
See the full details and description in the "Technical details" post
This will not touch your device encryption password/PIN!
The presented ZIP here is a result of a long finding process I made in cyanogenmod forum
( wayback archive )
Requirements
This is for encrypted devices only!
This is for CM or CM based ROMs only. this may not apply to all CM based ROMs, e.g. exodus seems to be not affected.
You need to have TWRP installed. Therefore you need an unlocked device as well.
Guide
Download zip
Boot into twrp
Transfer the zip to your device
ensure you have decrypted data partition in twrp!!!!!!! If you skip this step it will not work.
Flash the zip
Reboot
Whenever asked for a password just press ENTER!!!!!
Goto settings and set a new PIN/password
Reboot
Enjoy
Known issues
This is just a workaround for a problem need to be solved in the ROM(s) and may be/is fixed in a future release of your favorite ROM.
Download
Open the download section
XDA:DevDB Information
Lock screen fix for encrypted devices, Tool/Utility for the LG G4
Contributors
steadfasterX
Source Code: https://github.com/steadfasterX/lge_h81x_screenlock_fixer_enc
Version Information
Status: Stable
Current Stable Version: 1.0
Stable Release Date: 2016-11-25
Created 2016-11-13
Last Updated 2017-12-18
Technical details
Q: What exactly happens when flashing this ZIP?
Answer:
moving: /system/vendor/lib/hw/gatekeeper.msm8992.so --to--> /system/vendor/lib/hw/gatekeeper.msm8992.so.disabled
moving: /system/vendor/lib64/hw/gatekeeper.msm8992.so --to--> /system/vendor/lib64/hw/gatekeeper.msm8992.so.disabled
creating dir: /data/system/gk_backup
moving:/data/system/gatekeeper.*.key --to--> /data/system/gk_backup/
moving: /data/system/locksettings.db* --to--> /data/system/gk_backup/
1 and 2 are required so you can setup a PIN/password without problems!
3 is just for having a local backup of the current settings
4 and 5 will reset your password/pin/pattern settings of your lock screen. This is required so you can unlock your device again.
After flashing you will reboot and you should have to swipe only to unlock your screen. If you still see a PIN/password lock just press ENTER to unlock.
Now when you set a new pin/password it will just work! The reason is that the gatekeeper libraries are disabled now. While trying to set a new pin/password and you gets asked for the current pin/password just press ENTER as well. Then set a new one and enjoy.
Btw: I highly recommend to use snooperstopper app! It allows you to setup different protection passwords for screen unlock and device unlock. Besides this you can setup there a maximum amount of unlock faults until the device just reboots! That means if a user tries to hack your screen lock and fails that amount of time you set the device will reboot and is encrypted so even harder to "break". I really like that
Again: This is just a workaround for a problem need to be solved in the ROM(s) and may be/is fixed in a future release of your favorite ROM.
Q: Is the setting permanent?
Yes and no.
Yes because it will still works after rebooting
No because you have to re-apply this after you upgrading your ROM
Again: This is just a workaround for a problem need to be solved in the ROM(s) and may be/is fixed in a future release of your favorite ROM.
.
Reserved
Support for rom stock or rom cook ?
langtudaik said:
Support for rom stock or rom cook ?
Click to expand...
Click to collapse
If you use an app to display this thread please open in a browser because somehow this thread is not displayed correctly in the XDA app
Announcement
Finally and thanks to @androidJoeLi I can release the tool to the public.
See OP for the download link.
Have fun
.
The SnooperStopper functionality was added to the CM-14.1 branch:
[1/2] base: support separate encryption/lockscreen passwords This adds the necessary infrastructure for allowing users to opt-in to a distinct device encryption passphrase. The passwords are still tied together by default. This makes it possible to use a complex encryption passphrase without losing the convenience of a very simple lockscreen pin. This feature can be combined with a forced reboot after a chosen number of failed unlocking attempts to prevent brute-forcing by requiring the entry of the encryption password instead.
Click to expand...
Click to collapse
Sources: [1/2] base: support separate encryption/lockscreen passwords, [2/2] settings: support setting a separate encryption password.
Does anybody know if the encryption already works on the CM-14.1 branch for the G4 device?
deep_attention said:
The SnooperStopper functionality was added to the CM-14.1 branch:
Sources: [1/2] base: support separate encryption/lockscreen passwords, [2/2] settings: support setting a separate encryption password.
Does anybody know if the encryption already works on the CM-14.1 branch for the G4 device?
Click to expand...
Click to collapse
Afaik nobody cares about encryption so I was surprised to see that change. Maybe it's worth to give 14.1 anoyher try but I see so many other issues with N which prevents me on doing so..
Sent from my LG-H815 using XDA Labs
Hey @steadfasterX I think I have a small problem with your tool.
Today I experienced the PIN problem when restoring a backup so I tried flashing your tool but it failed because it couldn't mount /system and /data... Can this be caused by the fact that I am using F2FS?
Thanks in advance
marn3us said:
Hey @steadfasterX I think I have a small problem with your tool.
Today I experienced the PIN problem when restoring a backup so I tried flashing your tool but it failed because it couldn't mount /system and /data... Can this be caused by the fact that I am using F2FS?
Thanks in advance
Click to expand...
Click to collapse
well:
which TWRP version?
can you mount /system and /data manually in TWRP?
pls upload the recovery.log after flashing this (howto is in FAQ #4-A of the TWRP thread)
Don't know if I'm in the right thread...
Since the first time I flashed cm14.1 I got a softbrick when I used a lockscreen pattern.
So I use an alternative lockscreen app...
My device/h815 is not encrypted selinux is strikt...
Is this bug fixed?
(Please deleted the post if wrong or too noobish...)
sejmand said:
Don't know if I'm in the right thread...
Since the first time I flashed cm14.1 I got a softbrick when I used a lockscreen pattern.
So I use an alternative lockscreen app...
My device/h815 is not encrypted selinux is strikt...
Is this bug fixed?
(Please deleted the post if wrong or too noobish...)
Click to expand...
Click to collapse
I can't help you with this. It is a cm problem so the only option getting support is in the cm thread.
Sent from my LG-H815 using XDA Labs
It's mentioned several times that this is for encrypted devices only, but might it help nevertheless to solve my problem, too?
- I was on latest official Lineage (no encryption)
- I've updated to latest TWRP (twrp-3.2.0-PREVIEW-38_g4_custom-n).
- Made backup.
- Wipe Data
- Flashed A.O.S.C.P+ + Gapps + Magisk
- Normal boot and everything was fine.
- Update Magisk Manager (not via TWRP, within the Magiks App)
- Reboot to recovery and flashed hal3 enabler from https://forum.xda-developers.com/oneplus-3/how-to/modded-google-camera-hdr-60fps-video-t3658552 see fix 4 of "App crashing just after being opened"
- Bootloop
- Wipe Date and Cache
- Restore Lineage OS
- Now Lockscreeen pattern is not recognized anymore.
Please help. Thanks.
Edit: or better try this? https://forum.xda-developers.com/android/software-hacking/remove-lockscreen-recovery-t3530008
Edit2: Tried this and solved my problem.

{Help} Adding Dual boot patcher support

Being an avid user of Multirom with TWRP on my now dead LG Optimus G, I couldn't deal with the fact there is no multi boot option for my Honor 8 pro. So, I did some research and came to know that "Dual boot patcher" is the preferred solution to boot multiple roms at the moment. Thankfully, the project turned out to be open source and the developer has a well documented Git with information required to add support for new devices. I tried following the dev's guide found here https://github.com/chenxiaolong/DualBootPatcher/wiki/How-to-add-new-Devices-to-DualBootPatcher%3F by flashing the provided zip file. But it did not create any log files in the internal storage. So, if any of you happen to be in stock rom and are willing to help, kindly flash the file found in the above URL and upload the results. I'll proceed with the further steps. Thanks.
Will be glad to help. Can you explain in step-wise format on what to do. Any prerequisites other than a twrp recovery.
NIKHIL JOHN said:
Will be glad to help. Can you explain in step-wise format on what to do. Any prerequisites other than a twrp recovery.
Click to expand...
Click to collapse
Thanks for taking interest in this. To test it out, you will need a device with unlocked bootloader with twrp recovery installed. Also, I believe (not sure though) that file encryption needs to be disabled for this to work. To check file encryption state, go to
Settings → Security & Location → Encryption & Credentials & it shows phone encrypted
or
Use adb command
Code:
adb shell getprop ro.crypto.state
( works on unrooted devices also) returns encrypted or unencrypted
As far as flashing is concerned, it is pretty straight forward. Just download the zip file mentioned in the above post and transfer it to either internal storage or SD card. Boot into TWRP recovery and flash the zip file. If you need any help during the process, feel free to ask.
Andromann said:
Thanks for taking interest in this. To test it out, you will need a device with unlocked bootloader with twrp recovery installed. Also, I believe (not sure though) that file encryption needs to be disabled for this to work. To check file encryption state, go to
Settings → Security & Location → Encryption & Credentials & it shows phone encrypted
or
Use adb command
Code:
adb shell getprop ro.crypto.state
( works on unrooted devices also) returns encrypted or unencrypted
As far as flashing is concerned, it is pretty straight forward. Just download the zip file mentioned in the above post and transfer it to either internal storage or SD card. Boot into TWRP recovery and flash the zip file. If you need any help during the process, feel free to ask.
Click to expand...
Click to collapse
Hey buddy sorry for the late reply. My phone was bricked so had to get it fixed. Now my phone is updated to Andriod Oreo. Will try to root again and Follow the procedure. It would be helpful if you can give me your whatsapp number because i kind of mess things up and it takes a long time for me to get my phone back up and going. It would be helpful if you can assist on the way.

Brother Passed Away - In Need of Help Bypassing PIN/Encrypted Partition

Hello dev's! Unfortunately, in January, my brother passed away, and I have been tasked with trying to get into his phone and recover any important images really to pass along to his wife and daughter. Needless to say, I don't know his PIN code - and I am down to 2 guesses before the phone is wiped. So here I am.
Pardon my lack of technical language here but my brother did install Team Win Recovery Project 3.1.1-0 so I have been able to get to "recovery mode". Unfortunately, his partition is encrypted and I have been unable to guess that password either.
Because his drive is encrypted, I can't get into /data to remove any .key files. I have successfully been able to figure out how to sideload zip files via ADB that are supposed to bypass the PIN screen but I have had no luck. The google "find my phone" method is not working probably because the phone isn't connecting to a network.
I have read through an alpha security post about a malicious charger hack but I don't see where to download that tool.
So - does anyone know of any possible application or ZIP file I can sideload that will either help remove the decryption password or completely and successfully bypass the PIN?
Can I update TWRP to a newer version in hopes that the encryption is removed?
Any help is appreciated!
FWIW, my brother was on these forms as Colomonster - and I know that he loved tinkering with his phone daily.
There's no efficient way of breaking the data partition if it's encrypted, sorry.
Any old version of twrp might do the trick and then in /data/system folder delete these files ( if they are there )
password.key
pattern.key
locksettings.db
locksettings.db-shm
locksettings.db-wal
@catsruul I figured this would be the case but it does look like I get inifinite guesses, so there’s always that
@cpt.macp thanks for this tip! Can I downgrade via sideloading? I’ll have to look up a tutorial.. thanks!
You said any important photos correct?
https://support.google.com/accounts/troubleshooter/6357590?hl=en
I assume that your brother used Google Photos and any photos he took were most likely backed up to that. You can talk to Google about retrieving said data, you will need to prove things of course though. You will need to get a court order issued, that is if it is even approved, and everything else required should be on that page. Best of luck! Sorry to say but if the /data is encrypted you are pretty much screwed, although TWRP should decrypt in when it enters recovery so idk. That webpage is your best shot imo.
thanks @ZVNexus for the tip. I do have access to his Google account but because my brother was a super sleuth, he didn't have his images automatically upload to his photo drive. the photos that are there are few and from 2015
With access to his account, I do see his "activity", which I am not even sure he knew was being tracked (oh Google!) and I see that he used things like
Code:
Used com.android.gallery3d
and
Code:
Used org.cyanogenmod.snap
both of which look like photo apps.
you mentioned that TWRP should decrypt when I enter recovery.. what do you mean by that? if it is encrypted then it should always ask for a password right?
I wonder if this app is available anywhere for download and use.
HTML:
https://alephsecurity.com/2017/03/26/oneplus3t-adb-charger/
Lonoshea said:
thanks @ZVNexus for the tip. I do have access to his Google account but because my brother was a super sleuth, he didn't have his images automatically upload to his photo drive. the photos that are there are few and from 2015
With access to his account, I do see his "activity", which I am not even sure he knew was being tracked (oh Google!) and I see that he used things like
Code:
Used com.android.gallery3d
and
Code:
Used org.cyanogenmod.snap
both of which look like photo apps.
you mentioned that TWRP should decrypt when I enter recovery.. what do you mean by that? if it is encrypted then it should always ask for a password right?
I wonder if this app is available anywhere for download and use.
HTML:
https://alephsecurity.com/2017/03/26/oneplus3t-adb-charger/
Click to expand...
Click to collapse
I meant that even if the chip was encrypted TWRP should have let you touch the data partition. My phone is also encrypted but TWRP allows me to touch those partitions. Strange. Hopefully others can help.
Lonoshea said:
Hello dev's! Unfortunately, in January, my brother passed away, and I have been tasked with trying to get into his phone and recover any important images really to pass along to his wife and daughter. Needless to say, I don't know his PIN code - and I am down to 2 guesses before the phone is wiped. So here I am.
Pardon my lack of technical language here but my brother did install Team Win Recovery Project 3.1.1-0 so I have been able to get to "recovery mode". Unfortunately, his partition is encrypted and I have been unable to guess that password either.
Because his drive is encrypted, I can't get into /data to remove any .key files. I have successfully been able to figure out how to sideload zip files via ADB that are supposed to bypass the PIN screen but I have had no luck. The google "find my phone" method is not working probably because the phone isn't connecting to a network.
I have read through an alpha security post about a malicious charger hack but I don't see where to download that tool.
So - does anyone know of any possible application or ZIP file I can sideload that will either help remove the decryption password or completely and successfully bypass the PIN?
Can I update TWRP to a newer version in hopes that the encryption is removed?
Any help is appreciated!
Click to expand...
Click to collapse
I'm confused: if the partition is encrypted, you will generally be asked for a password during the boot process. If you're unable to enter the correct password (which AFAIK has unlimited tries), the phone simply won't boot. So you will never arrive at the lockscreen where you're supposed to enter the PIN (which offers a number of tries before wiping). With an encrypted partition, entering the recovery will prompt you for the same password you're supposed to enter during the boot process. Again, unlimited tries. As long as you're unable to do that the partitions will be 'invisible'. You can still wipe/partition them and that will remove the encryption as well as all of your data. But it seems the device you're working on works differently?
Either way: in order to gain access, you will need to either know the PIN directly (if the phone boots without a boot password) or gain access to the encrypted partition through TWRP, allowing you to remove the files responsible for the PIN lock. I'm sorry for your loss, but if it would work in any other way it simply wouldn't be secure for any Android user out there who is using encryption. Even google shouldn't be able to decrypt the phone, though it's theoretically possible they do have some kind of backdoor.
At this point, your best bet is probably trying to brute force the partition password. That would probably take a very long time, but I'm sure there's tools and organizations specializing in that sort of work.

Need a little help, please ....

I rebooted in to recovery (B partition) from custom ROM , ran Migrator Magisk module twice (as directions say-second run does FDR), booted into A partition of my Pixel XLto flash new ROM and for some reason EVERYTHING is encrpyted (do not have screen lock or pin applied) ..... I remember seeing something like this when I first got the device but cant recall how to deal with it.
Every attempt to adb sideload, adb push , etc not working ....
C.Hatfield said:
I rebooted in to recovery (B partition) from custom ROM , ran Migrator Magisk module twice (as directions say-second run does FDR), booted into A partition of my Pixel XLto flash new ROM and for some reason EVERYTHING is encrpyted (do not have screen lock or pin applied) ..... I remember seeing something like this when I first got the device but cant recall how to deal with it.
Every attempt to adb sideload, adb push , etc not working ....
Click to expand...
Click to collapse
So, I take it you were trying to 'migrate' to another ROM?
My suggestion is this, use this guide: https://forum.xda-developers.com/pixel-xl/how-to/guide-pixel-xl-android-9-0-pie-unlock-t3825866/
- Start fresh
- Do #4 'wipe data'
was just using the magisk migrator module - it backed up all my files on 1st run, then 2nd run it did FDR .... I would REALLY prefer not wiping my internal/sdcard ..... everything is still there but encrypted, unusable for the moment - hoping there is a workaround bc Ihave sooo much data that I havent backed up externally/cloud for a month or 3 .... got nothing I can boot from as well as no access to ALL the tons of stuff stored on my phone to flash .... was thinking to use Factory image but removing the [-w] from the bat file ..... would that work to keep my data integrity ?
Honestly, im wondering how things got encrypted when the process (xc for what im unsure the mod did extra besides FDR) is practically, if not identical, to the normal protocol for wiping>flashing for PIXEL XL
C.Hatfield said:
was just using the magisk migrator module - it backed up all my files on 1st run, then 2nd run it did FDR .... I would REALLY prefer not wiping my internal/sdcard ..... everything is still there but encrypted, unusable for the moment - hoping there is a workaround bc Ihave sooo much data that I havent backed up externally/cloud for a month or 3 .... got nothing I can boot from as well as no access to ALL the tons of stuff stored on my phone to flash .... was thinking to use Factory image but removing the [-w] from the bat file ..... would that work to keep my data integrity ?
Click to expand...
Click to collapse
...would that work to keep my data integrity ? Yes
will the modded flash-all.bat actually work with all the contents of the internal drive being encrypted?
I only ask bc of all the research Ive been doing for the last 4 hours, I had no idea that the current TWRP [3.2.3.1] made decryption on PIe possible .... I not ref to the PIN/lockscreen/Fingerprint decrypt either > more like decrypting the System partition like with Shamu/N6
**Also** found this during my harried research:
Encrypting does not completely delete the files, but the factory reset process gets rid of the encryption key. As a result, the device has no way it can decrypt the files and, therefore, makes data recovery extremely difficult.
C.Hatfield said:
will the modded flash-all.bat actually work with all the contents of the internal drive being encrypted?
I only ask bc of all the research Ive been doing for the last 4 hours, I had no idea that the current TWRP [3.2.3.1] made decryption on PIe possible .... I not ref to the PIN/lockscreen/Fingerprint decrypt either > more like decrypting the System partition like with Shamu/N6
**Also** found this during my harried research:
Encrypting does not completely delete the files, but the factory reset process gets rid of the encryption key. As a result, the device has no way it can decrypt the files and, therefore, makes data recovery extremely difficult.
Click to expand...
Click to collapse
Yes!
Yes, twrp-3.2.3-1 decrypts.
"**Also** found this during my harried research:
Encrypting does not completely delete the files, but the factory reset process gets rid of the encryption key. As a result, the device has no way it can decrypt the files and, therefore, makes data recovery extremely difficult."
Where did you find that? Link please.
Homeboy76 -
Very much appreciate the feedback !! This is the longest downtime I've experienced, likely-ever but I just couldn't make another move until I was certain it was the correct one.
Here is the link where I found the above info you asked about:
https://android.stackexchange.com/questions/149219/android-decrypt-sd-card-after-factory-reset?rq=1
C.Hatfield said:
Homeboy76 -
Very much appreciate the feedback !! This is the longest downtime I've experienced, likely-ever but I just couldn't make another move until I was certain it was the correct one.
Here is the link where I found the above info you asked about:
https://android.stackexchange.com/questions/149219/android-decrypt-sd-card-after-factory-reset?rq=1
Click to expand...
Click to collapse
Edit: Wrong link, it happens.
this is what it shows me:
It is in the default factory reset state ( like a new device ). You can't decrypt the device even if you wish to as the encryption password (generated from a combination of user lock screen PIN and encryption algorithm ) is lost
From Android's Factory Reset Does Not Wipe Your Data: Here's The Solution
Encrypting does not completely delete the files, but the factory reset process gets rid of the encryption key. As a result, the device has no way it can decrypt the files and, therefore, makes data recovery extremely difficult.
C.Hatfield said:
this is what it shows me:
It is in the default factory reset state ( like a new device ). You can't decrypt the device even if you wish to as the encryption password (generated from a combination of user lock screen PIN and encryption algorithm ) is lost
From Android's Factory Reset Does Not Wipe Your Data: Here's The Solution
Encrypting does not completely delete the files, but the factory reset process gets rid of the encryption key. As a result, the device has no way it can decrypt the files and, therefore, makes data recovery extremely difficult.
Click to expand...
Click to collapse
Yes, if you use this url: https://www.techtimes.com/amp/artic...oes-not-wipe-your-data-heres-the-solution.htm but that is not the url that was in your previous post. This is, https://android.stackexchange.com/questions/149219/android-decrypt-sd-card-after-factory-reset?rq=1
I think it is out dated: Android's Factory Reset Does Not Wipe Your Data: Here's The Solution By Anu Passary | May 27, 2015 11:07 PM EDT
hey homeboy76 tried the flash-all bat [-w removed] and the process went through w/o any issues but it immediately rebooted itself and within 30 seconds landed on the stock recovery & it said file may be corrrupt, TRY AGAIN or FDR ....
Do I have any other recourse to save my 100 GBs of data ??? or do I onlly have the unmoddded flash-all -w to do at this point ?
C.Hatfield said:
hey homeboy76 tried the flash-all bat [-w removed] and the process went through w/o any issues but it immediately rebooted itself and within 30 seconds landed on the stock recovery & it said file may be corrrupt, TRY AGAIN or FDR ....
Do I have any other recourse to save my 100 GBs of data ??? or do I onlly have the unmoddded flash-all -w to do at this point ?
Click to expand...
Click to collapse
Did you check the SHA256 of the March 2019 factory image?
I don't think it would hurt to try again. If it doesn't work you can try FDR or flash-all with [ -w] both will erase your internal storage.
Homeboy76 said:
Did you check the SHA256 of the March 2019 factory image?
I don't think it would hurt to try again. If it doesn't work you can try FDR or flash-all with [ -w] both will erase your internal storage.
Click to expand...
Click to collapse
Soooo, check this out .... I finally got a flash-all {no -w] to work and my phone booted - buuuuut it is STILL ENCRYPTED .... opening the root//file explorer I was horrified to see that everything is still encrypted .... it's soooo bizarre. apps from PS are restoring but I cannot get screenshots to save nor can I move any files from my laptop to my Pixel Xl. I wanted screeenshots so bad to show/post this bizarreness but -no- ....
I havent tried to boot into recovery yet or anything else .... so I dont even have root to look any deeper into the partitions. I was wondering if Titanium Backup would run and populate with proper app names, etc
Any more ideas from this unprecedented point bro >? BTW, the SHA256 was good/clean/proper.
BTW, when you flash a factory image, which facking partition (A or B) -should it- be flashed to or flashed "from" - I've let myself get quite confused >???? I have researched & read sooo much, my brain hurts (& is literally fried) .... I figured I would ask you so I could possibly get some firsthand clarification.
C.Hatfield said:
Soooo, check this out .... I finally got a flash-all {no -w] to work and my phone booted - buuuuut it is STILL ENCRYPTED .... opening the root//file explorer I was horrified to see that everything is still encrypted .... it's soooo bizarre. apps from PS are restoring but I cannot get screenshots to save nor can I move any files from my laptop to my Pixel Xl. I wanted screeenshots so bad to show/post this bizarreness but -no- ....
I havent tried to boot into recovery yet or anything else .... so I dont even have root to look any deeper into the partitions. I was wondering if Titanium Backup would run and populate with proper app names, etc
Any more ideas from this unprecedented point bro >? BTW, the SHA256 was good/clean/proper.
BTW, when you flash a factory image, which facking partition (A or B) -should it- be flashed to or flashed "from" - I've let myself get quite confused >???? I have researched & read sooo much, my brain hurts (& is literally fried) .... I figured I would ask you so I could possibly get some firsthand clarification.
Click to expand...
Click to collapse
I can't help you with the file encrypted problem. I've never read about anything like the problem you're having with encryption. TB might work. If your files are backed up on your computer, FDR.
https://forum.xda-developers.com/showpost.php?p=79273902&postcount=481
@C.Hatfield, continuing the discussion...
Topics
1) Forced encryption
2) Output of ls /data/misc/vold/*
3) Advanced approach
VR25-
First, I'll start with a sincere Thank You - I know you're busy with school & life, so I appreciate that you take the time to create such beneficial tools like Migrator. Having used Android OS since it's inception, I've learned a whole lot & seen a whole lot buuut not this craziness. I was unable to get any actionable help within the 2 weeks that I held out doing a full FDR ....
alas, I finally relented & did a full FDR with a full on flash-all.bat & ironically, it was only a couple hours before your response. I didn't read the response until now because I was afraid you'd posted an A, B, C unencryption method for me - in a small way, I'm glad it isn't that lol ....
As for the "did you..." questions you asked in Migrator thread, I followed my usual protocol & did not vary at all, except running the Migrator script 2x's before trying to install new ROM.

Encryption unsuccessful

I wake up today and saw my phone screen showing multiple horizontal lines scrolling up to down (something like that picture but horizontal not vertical lines : https://i.ibb.co/fv31J1J/gg.png). Immediately thought that my screen was broken and removed battery, restarted phone to verify. And then I was shocked with that message "encryption unsuccessful" (https://www.androiddata-recovery.com/blog/wp-content/uploads/2017/10/hqdefault.jpg). To my knowledge, I know that phone encryption had triggered and was somehow aborted, thus cannot access my phone data again. But, my big question how phone encryption had triggered automatically ??
Hint : the internet was OFF during night. My phone is rooted, and I use Lineage OS (Android 7), my device is Samsung galaxy j3 2016 I'm pretty sure it's not malware.
So I've searched and find that https://android.stackexchange.com/q...nsuccessful-and-bootloop-issue-on-andriod-8-1
It increased my confidence that it's not malware and something like hardware.
And, I noticed When I try to make a backup using TWRP that I got "could not mount /data and unable to find crypto footer". Also, /data partition became 0Mb in size (checked with twrp)
So, please do you have any ideas for what happened ?
kolisani7 said:
I wake up today and saw my phone screen showing multiple horizontal lines scrolling up to down (something like that picture but horizontal not vertical lines : https://i.ibb.co/fv31J1J/gg.png). Immediately thought that my screen was broken and removed battery, restarted phone to verify. And then I was shocked with that message "encryption unsuccessful" (https://www.androiddata-recovery.com/blog/wp-content/uploads/2017/10/hqdefault.jpg). To my knowledge, I know that phone encryption had triggered and was somehow aborted, thus cannot access my phone data again. But, my big question how phone encryption had triggered automatically ??
Hint : the internet was OFF during night. My phone is rooted, and I use Lineage OS (Android 7), my device is Samsung galaxy j3 2016 I'm pretty sure it's not malware.
So I've searched and find that https://android.stackexchange.com/q...nsuccessful-and-bootloop-issue-on-andriod-8-1
It increased my confidence that it's not malware and something like hardware.
And, I noticed When I try to make a backup using TWRP that I got "could not mount /data and unable to find crypto footer". Also, /data partition became 0Mb in size (checked with twrp)
So, please do you have any ideas for what happened ?
Click to expand...
Click to collapse
I'm not sure, what happened. But in your case I would format data and install a fresh lineageOS. I would not set a lock screen password or code. So I avoid unwanted encryption.
kurtn said:
I'm not sure, what happened. But in your case I would format data and install a fresh lineageOS. I would not set a lock screen password or code. So I avoid unwanted encryption.
Click to expand...
Click to collapse
Isn't the phone always encrypted if it's in the keylock state?
The user doesn't have to enter a password and the encrpytion should be weak, but still it should be encrypted (unless encryption hasn't been (automatically) applied. If the phone is working, you can check that in the settings).
User699 said:
Isn't the phone always encrypted if it's in the keylock state?
The user doesn't have to enter a password and the encrpytion should be weak, but still it should be encrypted (unless encryption hasn't been (automatically) applied. If the phone is working, you can check that in the settings).
Click to expand...
Click to collapse
charter/device-support-requirements.md at master · LineageOS/charter
Contribute to LineageOS/charter development by creating an account on GitHub.
github.com
kurtn said:
charter/device-support-requirements.md at master · LineageOS/charter
Contribute to LineageOS/charter development by creating an account on GitHub.
github.com
Click to expand...
Click to collapse
All devices that supported hardware-backed encryption on their stock OS MUST support hardware-backed encryption.
All devices that shipped stock as forceencrypt SHOULD default to forceencrypt enabled.
All devices MUST support software encryption.
Click to expand...
Click to collapse
Okay but that doesn't answer my question, does it?
Would you please elaborate a bit on this one?
User699 said:
Okay but that doesn't answer my question, does it?
Would you please elaborate a bit on this one?
Click to expand...
Click to collapse
Answer is: it's device dependent. Try yourself.
kurtn said:
Answer is: it's device dependent. Try yourself.
Click to expand...
Click to collapse
Well, but how would I try to check its encryption without actually unlocking the keylock?
On Android 11 as well as 11 I can easily access every data via adb if I decrypted my device for the first time (first password after reboot) even tough it is encrypted.
User699 said:
Well, but how would I try to check its encryption without actually unlocking the keylock?
On Android 11 as well as 11 I can easily access every data via adb if I decrypted my device for the first time (first password after reboot) even tough it is encrypted.
Click to expand...
Click to collapse
Can you boot recovery without entering unlock code?
kurtn said:
Can you boot recovery without entering unlock code?
Click to expand...
Click to collapse
Yes, I can (password is set set, device is encrypted).
Code:
adb reboot recovery
OR
Code:
adb shell
reboot recovery
User699 said:
Yes, I can (password is set set, device is encrypted).
Code:
adb reboot recovery
OR
Code:
adb shell
reboot recovery
Click to expand...
Click to collapse
So in recovery you see either clear name or encrypted filenames.
kurtn said:
So in recovery you see either clear name or encrypted filenames.
Click to expand...
Click to collapse
Yes I know.
It's encrypted until I insert my password.

Categories

Resources