Question and Answer about Android from Stack Exchange network.
This question is similar, but unrelated to this one answered two days ago.
I have been using WiFi EAP-TLS at home, for nearly a full year, with multiple desktop operating systems and Android 10 with zero problem. Android 11 is a different story, Google changed EAP requirements so CAs must be validated. I have always imported the CA and selected options to verify CA on all my devices, the trust chain is important to me. Unfortunately, it's not working on Android 11, the WiFi bugcheck logs say, "Certificate verification failed, error 19 (self signed certificate in certificate chain)," and points to the private CA. As far as I am aware, root trust Certificate Authorities, whether public or private, are always self-signed.
Herein lies the problem. CAs must be self-signed, yet Android 11 does not trust self-signed certificates. I have the CA supposedly imported properly into the "User" CA store, it is displayed there, and the per-device client certificate is imported into the WiFi store.
I've also asked this question in two places on Reddit, where a couple educational network admins also have the same CA problem, but no answers have been discovered yet. I'm hoping someone on this forum knows what's up. Any pointers will be much appreciated!
(I would have also added tags "eap-tls" and "certificate-authority" but I don't have enough reputation yet)
How to control the volume of an Android device from an iPhone?
I don't want to get any message when a contact starts to use telegram. In the notification settings switched off notifying me when a contact has joined telegram, but my telegram chat history is still full of messages such as "John Smith uses Telegram now!".
And the telegram icon also shows that there are new messages even if I got no real new messages but only some contacts joined Telegram.
This is really annoying, especially now when many people start using telegram.
For a Pixel 2 with Android 11, are the default alarms stored locally as audio files? If yes, can the files be accessed through a file browser?
I've been having this strange issue for a while where my keyboard overlaps in app text boxes. It happens with every kind of text box that sits on top of the keyboard. It seems like it aligns with the bottom of the selected text rather than the box. It's really annoying to type this way. Especially when trying to edit something higher up in the text. I then have to close the keyboard in order to be able to go back to the end and put my cursor there.
I attached a screen shot of the issue. It's showing SwiftKey but it also happens with the default keyboard.
I'm running lineage os 17.1.
I have, for example, downloaded an update from android 4.1 to 4.2. All it consisted of was 10 new system apps, 5 libraries, 3 fonts, and a new bootanimation.
What I would like to know is if an update from 4.2 to 4.4 could be done as simply, like by changing out some system apps and/or libraries?
I tried to root my samsung A7 yesterday, I flashed twrp with odin and when I try to install magisk it says "Zip file is corrupt",
I don't have any OS now and I'm left with only twrp.
I flashed twrp again different times with odin but same. I can't boot in fastboot and when I tried with adb sideload my device is not discoverable. I followed all the steps from this video Youtube Video when I tried to root my device.
Is there anyway to bring my samsung back or it's bricked?
Device Model: A750FN
Since a few days I have problems with Termux on my Android devices.
On a Lenovo TB-X304F running Android 8.1.0 I got:
CANNOT LINK EXECUTABLE "/data/data/com.termux/files/usr/bin/bash": library "libandroid-support.so" not found
[Process completed (signal 6) - press Enter]
I was able to recover from this using the procedure from the Termux wiki.
But on a Fairphone 3 running Android 10 and a Google Pixel running Android 11 the Termux window is immediately closed, even when I start it in a failsafe session. There is only a message saying "Termux keeps stopping".
I have removed Termux and reinstalled from F-Droid but to no avail. This is very unfortunate because I mostly use Termux on the Fairphone for quick webserver checks with openssl
and netcat
.
I checked the permissions (only Files and Media) and allowed them, but to no avail.
How can I get Termux running again on the newer devices?
Update:
According to this comment the issue is only with version 0.105 and should be gone with 0.106.
Every time I select the webcam option on the Genymotion player, the title of the webcam option comes up, but then the hole emulator crashes.
I'm using the free version of Genymotion. I get this problem, regardless of the Android type or screen size etc.
System Info:
System: Host: ALU Kernel: 5.10.7-3-MANJARO x86_64 bits: 64 compiler: gcc v: 10.2.1
parameters: BOOT_IMAGE=/boot/vmlinuz-5.10-x86_64 root=UUID=138895c2-cc5c-4591-bc68-fd58c682d6f3 rw quiet apparmor=1
security=apparmor resume=UUID=cbdc85f0-ae63-47be-89e8-038462fcc2f3 udev.log_priority=3
Desktop: KDE Plasma 5.20.5 tk: Qt 5.15.2 info: plank wm: kwin_x11 dm: SDDM Distro: Manjaro Linux
Machine: Type: Laptop System: LENOVO product: 80TU v: Lenovo ideapad 310-14IKB serial: <superuser required> Chassis:
type: 10 v: Lenovo ideapad 310-14IKB serial: <superuser required>
Mobo: LENOVO model: Torronto 4C2 v: NO DPK serial: <superuser required> UEFI: LENOVO v: 3JCN21WW date: 09/23/2016
Battery: ID-1: BAT0 charge: 23.6 Wh condition: 25.4/30.0 Wh (85%) volts: 8.6/7.4 model: SMP L15M2PB2 type: Li-poly
serial: 9238 status: Charging
CPU: Info: Dual Core model: Intel Core i7-7500U bits: 64 type: MT MCP arch: Amber/Kaby Lake note: check family: 6
model-id: 8E (142) stepping: 9 microcode: DE L2 cache: 4 MiB
flags: avx avx2 lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx bogomips: 23209
Speed: 1192 MHz min/max: 400/3500 MHz Core speeds (MHz): 1: 1192 2: 1200 3: 1200 4: 1200
Vulnerabilities: Type: itlb_multihit status: KVM: Split huge pages
Type: l1tf mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable
Type: mds mitigation: Clear CPU buffers; SMT vulnerable
Type: meltdown mitigation: PTI
Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl and seccomp
Type: spectre_v1 mitigation: usercopy/swapgs barriers and __user pointer sanitization
Type: spectre_v2 mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling
Type: srbds mitigation: Microcode
Type: tsx_async_abort status: Not affected
Graphics: Device-1: Intel HD Graphics 620 vendor: Lenovo driver: i915 v: kernel bus ID: 00:02.0 chip ID: 8086:5916
Device-2: NVIDIA GM108M [GeForce 920MX] vendor: Lenovo driver: nvidia v: 460.32.03 alternate: nouveau,nvidia_drm
bus ID: 03:00.0 chip ID: 10de:134f
Device-3: Chicony EasyCamera type: USB driver: uvcvideo bus ID: 1-4:2 chip ID: 04f2:b57d serial: 0001
Display: x11 server: X.Org 1.20.10 compositor: kwin_x11 driver: loaded: modesetting display ID: :0 screens: 1
Screen-1: 0 s-res: 1366x768 s-dpi: 96 s-size: 361x203mm (14.2x8.0") s-diag: 414mm (16.3")
Monitor-1: eDP-1 res: 1366x768 hz: 60 dpi: 112 size: 309x173mm (12.2x6.8") diag: 354mm (13.9")
OpenGL: renderer: Mesa Intel HD Graphics 620 (KBL GT2) v: 4.6 Mesa 20.3.3 direct render: Yes
Audio: Device-1: Intel Sunrise Point-LP HD Audio vendor: Lenovo driver: snd_hda_intel v: kernel alternate: snd_soc_skl
bus ID: 00:1f.3 chip ID: 8086:9d71
Sound Server: ALSA v: k5.10.7-3-MANJARO
Network: Device-1: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet vendor: Lenovo driver: r8169 v: kernel port: 4000
bus ID: 01:00.0 chip ID: 10ec:8168
IF: enp1s0 state: down mac: c8:5b:76:78:e3:cd
Device-2: Qualcomm Atheros QCA9377 802.11ac Wireless Network Adapter vendor: Lenovo driver: ath10k_pci v: kernel
port: 4000 bus ID: 02:00.0 chip ID: 168c:0042
IF: wlp2s0 state: up mac: 58:00:e3:41:87:99
Device-3: Qualcomm Atheros type: USB driver: btusb bus ID: 1-7:4 chip ID: 0cf3:e500
IF-ID-1: vboxnet0 state: up speed: 10 Mbps duplex: full mac: 0a:00:27:00:00:00
Drives: Local Storage: total: 372.62 GiB used: 275.8 GiB (74.0%)
SMART Message: Unable to run smartctl. Root privileges required.
ID-1: /dev/sda maj-min: 8:0 vendor: Kingston model: SA400S37240G size: 223.57 GiB block size: physical: 512 B
logical: 512 B speed: 6.0 Gb/s serial: 50026B73801F8542 rev: 0102
ID-2: /dev/sdb maj-min: 8:16 vendor: Seagate model: ST9160412AS size: 149.05 GiB block size: physical: 512 B
logical: 512 B speed: 3.0 Gb/s serial: 5VGCALEC rev: HPM1
Partition: ID-1: / raw size: 214.47 GiB size: 210.11 GiB (97.96%) used: 171.58 GiB (81.7%) fs: ext4 dev: /dev/sda2
maj-min: 8:2
ID-2: /boot/efi raw size: 300 MiB size: 299.4 MiB (99.80%) used: 312 KiB (0.1%) fs: vfat dev: /dev/sda1
maj-min: 8:1
Swap: Kernel: swappiness: 60 (default) cache pressure: 100 (default)
ID-1: swap-1 type: partition size: 8.8 GiB used: 2.61 GiB (29.7%) priority: -2 dev: /dev/sda3 maj-min: 8:3
Sensors: System Temperatures: cpu: 43.0 C mobo: N/A
Fan Speeds (RPM): N/A
Info: Processes: 265 Uptime: 8h 55m wakeups: 7 Memory: 7.67 GiB used: 6.19 GiB (80.6%) Init: systemd v: 247 Compilers:
gcc: 10.2.0 Packages: 1676 apt: 3 pacman: 1660 lib: 464 flatpak: 0 snap: 13
Last 20 lines of genymotion-palyer.log:
2021-01-24T17:50:02+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress"" shell ("getprop", "dev.bootcomplete")
2021-01-24T17:50:02+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("getprop", "dev.bootcomplete") - exit code: 0
2021-01-24T17:50:03+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress"" shell ("getprop", "dev.bootcomplete")
2021-01-24T17:50:03+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("getprop", "dev.bootcomplete") - exit code: 0
2021-01-24T17:50:04+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress"" shell ("getprop", "dev.bootcomplete")
2021-01-24T17:50:04+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("getprop", "dev.bootcomplete") - exit code: 0
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress"" shell ("getprop", "dev.bootcomplete")
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("getprop", "dev.bootcomplete") - exit code: 0
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] Device booted in 7474 ms
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] "Notifying launchpad of status change: 8bb23482-88eb-41a1-b946-32593ca6654d ON"
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress":5555" shell ("pm list packages")
2021-01-24T17:50:06+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("pm list packages") - exit code: 0
2021-01-24T17:50:06+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress":5555" shell ("ls /data/.genymotion")
2021-01-24T17:50:06+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("ls /data/.genymotion") - exit code: 0
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] "Dummy camera" released by DeviceCameraPipe(0x1b42f30) count: 0
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] "Dummy camera" acquired by CameraView(0x1b0d2a0) count: 1
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] "Dummy camera" released by DeviceCameraPipe(0x1a35ff0) count: 1
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] "Dummy camera" acquired by CameraView(0x192d2d0) count: 2
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] Linux/Windows: media permissions are authorized by default
Thanks a lot.
I want to have a waterproof phone that I can realiably wear when I am windsurfing. During a session it might get wet and might sink for a few centimeters for a couple of seconds from time to time.
I bought a refurbished Huawei P20 Pro for the purpose, IP67 waterproof. I had watched videos on Youtube where it would be under 1.5 meters water for 15 minutes and still be working fine.
After a short session on the water with this phone, where it got wet but never sunk, the next day the phone was dead forever with water damage. I imagined that, being refurbished, it might have been hacked by the previous owner.
I got my money back and bought the same phone again, also refurbished. This one was really new, in the box with all the gadgets. I took it on a session, this time in a cheap "waterproof" pocket. At the end of the session, there was some moist in the pocket. Next day the phone was dead forever. Again. Was this hacked too? I don't think so.
I got my money back and bought a refurbished Samsung S9, which is waterproof IP68.
Now. I am not going to bring it with me on the water until I am sure it will survive.
I could buy a IP68 protection for it but wouldn't it be overkill and actually nonsense (IP68 + IP68 = IP68) and maybe still let water in?
Are these videos on Youtube realistic? Maybe 10 minutes after the video the phone becomes useless.
Are the IP67 and IP68 certifications reliable for general public phones? I am sure they are when it concerns professional equipment.
Thanks for your thoughts
I'm installing LineageOS 17.1 on my new phone. It works fine, but I can't get to data in TWRP.
As usual, to install, I wipe everything, drop into TWRP, format (not just wipe) data, wipe cache/davlik/system, and flash the LineageOS installer file. When the system starts first time, it gives a message "encrypting data", which doesn't have a "skip" option.
When I drop back into TWRP it asks for a decryption password to access data, but I don't have one because I haven't entered one in the first place.
How do I get LOS to not encrypt data, or alternatively, what decryption password should I use in TWRP?
Note: this isn't a duplicate question. Other questions about decrypting data involve corrupt data or system issues that prevent data being accessed because of encryption, or trying to recover files from data. In my case, it's a clean install with no prior data content, but I can't figure how to access data in TWRP because it seem to encrypt it automatically but there's no hint what key to enter in TWRP.
I wish to use a USB stick with both my Android device and my Windows 10 PC.
My requirements are:
- No file size limitation
- No root required on the Android device
- The filesystem should be natively supported by the Android device
My Android device is a Samsung Galaxy S10. I would like a solution that would work with all modern Android devices, but I don't mind if I'm limited to the Samsung.
Which filesystem should I use?
Phone: Samsung S9 Plus, 256Gb
OS: Lineage OS 17.1 (Android 10)
ROOT: TWRP 3.5
I installed Lineage OS 17.1 on a Samsung S9+. It's been working fine so far. However, when I encrypt the OS from the security menu, right after the screen goes black with the green android-like logo, the phone quickly reboots back to the non encrypted OS. Going again through the process does not help.
logcat shows:
--------- beginning of main
01-20 19:17:52.959 4019 4129 D vold : fdeEnable(3, *, 0)
01-20 19:17:52.960 4019 4129 D vold : !fscrypt_is_native, spawning fdeEnableInternal
01-20 19:17:52.960 4019 403 E Cryptfs : Unexpected value for crypto key location
01-20 19:17:52.961 4019 403 E Cryptfs : Cannot get size of block device
01-20 19:17:53.067 4019 403 W vold : Found symlink /proc/29802/cwd referencing /data/misc/keystore
01-20 19:17:53.067 4019 403 W vold : Found symlink /proc/29803/fd/7 referencing /data/vendor/gps/.lhd.lock
01-20 19:17:53.068 4019 403 W vold : Found symlink /proc/29803/fd/12 referencing /data/vendor/gps/.pipe.gpsd_to_lhd.to_server
01-20 19:17:53.068 4019 403 W vold : Found symlink /proc/29803/fd/14 referencing /data/vendor/gps/.pipe.gpsd_to_lhd.to_client
01-20 19:17:53.069 4019 403 W vold : Found symlink /proc/29804/fd/7 referencing /data/vendor/gps/.gpsd.lock
...
...
01-20 19:17:53.217 4019 403 W vold : Sending Killed to 32740
01-20 19:17:53.218 4019 403 W vold : Sending Killed to 32509
01-20 19:17:53.218 4019 403 W vold : Sending Killed to 32383
...
...
01-20 19:17:53.221 4019 403 E Cryptfs : Unexpected value for crypto key location
01-20 19:17:53.221 4019 403 E Cryptfs : Cannot get size of block device
--------- beginning of crash
I tried the steps given here on /data (/dev/block/sda25), but it did not do it for me either.
- Any idea on how I can debug further
Cryptfs : Unexpected value for crypto key location
? - Is there a way to encrypt /data via the command line if this keeps failing?
Android ROMs and also Android custom ROMs are typically cryptographically signed.
Most users will only recognize this if they try to install a ROM and the signature verification on-device fails.
For verifying authenticity of a ROM it can makes sense to verify the signature offline, before installing the ROM and e.g. compare the used signature certificate if it is the one expected, e.g. if the ROM is a genuine ROM build by LineageOS.
What command do you have to execute for verifying the signature of a ROM (e.g. if you have the ZIP file) on a PC?
I installed an app for custom notifications from the Playstore. The app requires sensitive permissions (camera, contacts, and storage), but has no network access. When I selected a setting the app said I needed to install another app and then my phone displayed a window prompt asking if I will install an app from an untrusted source. My concern is if this app could be spyware with internet access to steal my data. Is this possible if the main app has no network access and no downloading permissions?
I contacted the developer and they told me that particular setting requires an "older API level" that is not possible for main apps to have. I am not knowledgeable enough to know if this is a valid reason.
i was trying to emulate Android 5.0 (LRX21T) in linux, i downloaded the rom but i didn't find any good emulator, there is anyone that supports any version of android ? is that possible ?
I have a LineageOS 17.1 system on Pocophone F1, unrooted. When I install an apk through USB using adb, adb not run as root, the app is installed both on my main admin user and on a secondary user on my phone. How do I force adb to only install the app for my main user only?
I have done many reinstalls of my OS on my Android phone in the last few months for various reasons. Every time, the biggest hassle is manually searching, downloading and installing all the apps I had in my previous installation.
I use a degoogled custom rom, downloading apps from F-Droid and Aurora Store, so no Google solutions are acceptable.
What I want, is to have a way to keep on my computer a copy of all the apks of the installed apps of my phone, and have it automatically updated too, so that when the time comes to reformat my phone and install everything all over, I will be able to simply adb install
all of the apks in no time, instead of doing it all manually and waiting for them to also be downloaded. Any suggestions for how I can make that happen with existing programs, preferably open source?
I am trying to delete my /data/app/com.google.android.youtube-DVUYe6iX9r5J1nYk8PlC2w== folder to fix the bug described here; however, I keep getting a "Device or resource busy" message. I tried using this command
adb pull /data/adb/service.d/vanced.sh > %UserProfile%\Desktop\vanced.sh
and also Total Commander file manager but received the same error. How can I delete the folder?
After I say "hey Google", Google voice access is letting me say a few voice commands. However, after a few ones, I have to say "hey Google" again to be allowed to give further voice commands.
How can I configure Google voice access so that I only have to say "hey Google" once?
I did disable "time out after the speech":
Topics
2D Engines 3D Engines 9-Patch Action Bars Activities ADB Advertisements Analytics Animations ANR AOP API APK APT Architecture Audio Autocomplete Background Processing Backward Compatibility Badges Bar Codes Benchmarking Bitmaps Bluetooth Blur Effects Bread Crumbs BRMS Browser Extensions Build Systems Bundles Buttons Caching Camera Canvas Cards Carousels Changelog Checkboxes Cloud Storages Color Analysis Color Pickers Colors Comet/Push Compass Sensors Conferences Content Providers Continuous Integration Crash Reports Credit Cards Credits CSV Curl/Flip Data Binding Data Generators Data Structures Database Database Browsers Date & Debugging Decompilers Deep Links Dependency Injections Design Design Patterns Dex Dialogs Distributed Computing Distribution Platforms Download Managers Drawables Emoji Emulators EPUB Equalizers & Event Buses Exception Handling Face Recognition Feedback & File System File/Directory Fingerprint Floating Action Fonts Forms Fragments FRP FSM Functional Programming Gamepads Games Geocaching Gestures GIF Glow Pad Gradle Plugins Graphics Grid Views Highlighting HTML HTTP Mocking Icons IDE IDE Plugins Image Croppers Image Loaders Image Pickers Image Processing Image Views Instrumentation Intents Job Schedulers JSON Keyboard Kotlin Layouts Library Demos List View List Views Localization Location Lock Patterns Logcat Logging Mails Maps Markdown Mathematics Maven Plugins MBaaS Media Menus Messaging MIME Mobile Web Native Image Navigation NDK Networking NFC NoSQL Number Pickers OAuth Object Mocking OCR Engines OpenGL ORM Other Pickers Parallax List Parcelables Particle Systems Password Inputs PDF Permissions Physics Engines Platforms Plugin Frameworks Preferences Progress Indicators ProGuard Properties Protocol Buffer Pull To Purchases Push/Pull QR Codes Quick Return Radio Buttons Range Bars Ratings Recycler Views Resources REST Ripple Effects RSS Screenshots Scripting Scroll Views SDK Search Inputs Security Sensors Services Showcase Views Signatures Sliding Panels Snackbars SOAP Social Networks Spannable Spinners Splash Screens SSH Static Analysis Status Bars Styling SVG System Tags Task Managers TDD & Template Engines Testing Testing Tools Text Formatting Text Views Text Watchers Text-to Toasts Toolkits For Tools Tooltips Trainings TV Twitter Updaters USB User Stories Utils Validation Video View Adapters View Pagers Views Watch Face Wearable Data Wearables Weather Web Tools Web Views WebRTC WebSockets Wheel Widgets Wi-Fi Widgets Windows Wizards XML XMPP YAML ZIP Codes