01-06-2016, 10:59 PM
I'd like to know y’alls view on the "theft protection". This was introduced long ago with the new releases of Lolipop from OEMs.
The reason I'd like to bring it up is that recently I found a HTC Desire 626s on the streets. (Mind you, it was already deactivated from the start, with the device remote wiped). It had the "theft protection" on like this:
You could practically do nothing, it was a lightweight paper holder. The reason why is that I have seemed to found a loophole/bypass unintentionally. For something, to be considered as simple as I did it, how secure do you think this system is (at least pertaining to the OEM) while others can simply bypass with simple On-The-Go Card Reader Methods? Would you have other software (if any) than the native's to help prevent this?
Quote:http://www.androidpolice.com/2015/03/12/...-i-use-it/
http://www.greenbot.com/article/2904397/...id-51.html
The reason I'd like to bring it up is that recently I found a HTC Desire 626s on the streets. (Mind you, it was already deactivated from the start, with the device remote wiped). It had the "theft protection" on like this:
Quote:
Apart from stealing this picture, lol.
You could practically do nothing, it was a lightweight paper holder. The reason why is that I have seemed to found a loophole/bypass unintentionally. For something, to be considered as simple as I did it, how secure do you think this system is (at least pertaining to the OEM) while others can simply bypass with simple On-The-Go Card Reader Methods? Would you have other software (if any) than the native's to help prevent this?
Quote:I did this by using the HTC software update's ability to make the device turn on Developer Mode. From there I was able to ADB into the device, and force the screen to go into any of the System Menus. After killing all of the Setup programs, I was able to wipe the device within the menu therefore removing the software lock it had before hand. All in 3 mins, and possibly could be animated/scripted. A lot harder than those OTG methods.