Question and Answer about Android from Stack Exchange network.


This question is similar, but unrelated to this one answered two days ago.

I have been using WiFi EAP-TLS at home, for nearly a full year, with multiple desktop operating systems and Android 10 with zero problem. Android 11 is a different story, Google changed EAP requirements so CAs must be validated. I have always imported the CA and selected options to verify CA on all my devices, the trust chain is important to me. Unfortunately, it's not working on Android 11, the WiFi bugcheck logs say, "Certificate verification failed, error 19 (self signed certificate in certificate chain)," and points to the private CA. As far as I am aware, root trust Certificate Authorities, whether public or private, are always self-signed.

Herein lies the problem. CAs must be self-signed, yet Android 11 does not trust self-signed certificates. I have the CA supposedly imported properly into the "User" CA store, it is displayed there, and the per-device client certificate is imported into the WiFi store.

I've also asked this question in two places on Reddit, where a couple educational network admins also have the same CA problem, but no answers have been discovered yet. I'm hoping someone on this forum knows what's up. Any pointers will be much appreciated!

(I would have also added tags "eap-tls" and "certificate-authority" but I don't have enough reputation yet)

How to control the volume of an Android device from an iPhone?

I don't want to get any message when a contact starts to use telegram. In the notification settings switched off notifying me when a contact has joined telegram, but my telegram chat history is still full of messages such as "John Smith uses Telegram now!".

And the telegram icon also shows that there are new messages even if I got no real new messages but only some contacts joined Telegram.

This is really annoying, especially now when many people start using telegram.

For a Pixel 2 with Android 11, are the default alarms stored locally as audio files? If yes, can the files be accessed through a file browser?

I've been having this strange issue for a while where my keyboard overlaps in app text boxes. It happens with every kind of text box that sits on top of the keyboard. It seems like it aligns with the bottom of the selected text rather than the box. It's really annoying to type this way. Especially when trying to edit something higher up in the text. I then have to close the keyboard in order to be able to go back to the end and put my cursor there.

I attached a screen shot of the issue. It's showing SwiftKey but it also happens with the default keyboard.

I'm running lineage os 17.1.

enter image description here

I have, for example, downloaded an update from android 4.1 to 4.2. All it consisted of was 10 new system apps, 5 libraries, 3 fonts, and a new bootanimation.

What I would like to know is if an update from 4.2 to 4.4 could be done as simply, like by changing out some system apps and/or libraries?

I tried to root my samsung A7 yesterday, I flashed twrp with odin and when I try to install magisk it says "Zip file is corrupt",

I don't have any OS now and I'm left with only twrp.

I flashed twrp again different times with odin but same. I can't boot in fastboot and when I tried with adb sideload my device is not discoverable. I followed all the steps from this video Youtube Video when I tried to root my device.

Is there anyway to bring my samsung back or it's bricked?

Device Model: A750FN

Since a few days I have problems with Termux on my Android devices.

On a Lenovo TB-X304F running Android 8.1.0 I got:

CANNOT LINK EXECUTABLE "/data/data/com.termux/files/usr/bin/bash": library "libandroid-support.so" not found

[Process completed (signal 6) - press Enter]

I was able to recover from this using the procedure from the Termux wiki.

But on a Fairphone 3 running Android 10 and a Google Pixel running Android 11 the Termux window is immediately closed, even when I start it in a failsafe session. There is only a message saying "Termux keeps stopping".

I have removed Termux and reinstalled from F-Droid but to no avail. This is very unfortunate because I mostly use Termux on the Fairphone for quick webserver checks with openssl and netcat.

I checked the permissions (only Files and Media) and allowed them, but to no avail.

How can I get Termux running again on the newer devices?

Update:

According to this comment the issue is only with version 0.105 and should be gone with 0.106.

Every time I select the webcam option on the Genymotion player, the title of the webcam option comes up, but then the hole emulator crashes.

I'm using the free version of Genymotion. I get this problem, regardless of the Android type or screen size etc.

System Info:

System:    Host: ALU Kernel: 5.10.7-3-MANJARO x86_64 bits: 64 compiler: gcc v: 10.2.1 
           parameters: BOOT_IMAGE=/boot/vmlinuz-5.10-x86_64 root=UUID=138895c2-cc5c-4591-bc68-fd58c682d6f3 rw quiet apparmor=1 
           security=apparmor resume=UUID=cbdc85f0-ae63-47be-89e8-038462fcc2f3 udev.log_priority=3 
           Desktop: KDE Plasma 5.20.5 tk: Qt 5.15.2 info: plank wm: kwin_x11 dm: SDDM Distro: Manjaro Linux 
Machine:   Type: Laptop System: LENOVO product: 80TU v: Lenovo ideapad 310-14IKB serial: <superuser required> Chassis: 
           type: 10 v: Lenovo ideapad 310-14IKB serial: <superuser required> 
           Mobo: LENOVO model: Torronto 4C2 v: NO DPK serial: <superuser required> UEFI: LENOVO v: 3JCN21WW date: 09/23/2016 
Battery:   ID-1: BAT0 charge: 23.6 Wh condition: 25.4/30.0 Wh (85%) volts: 8.6/7.4 model: SMP L15M2PB2 type: Li-poly 
           serial: 9238 status: Charging 
CPU:       Info: Dual Core model: Intel Core i7-7500U bits: 64 type: MT MCP arch: Amber/Kaby Lake note: check family: 6 
           model-id: 8E (142) stepping: 9 microcode: DE L2 cache: 4 MiB 
           flags: avx avx2 lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx bogomips: 23209 
           Speed: 1192 MHz min/max: 400/3500 MHz Core speeds (MHz): 1: 1192 2: 1200 3: 1200 4: 1200 
           Vulnerabilities: Type: itlb_multihit status: KVM: Split huge pages 
           Type: l1tf mitigation: PTE Inversion; VMX: conditional cache flushes, SMT vulnerable 
           Type: mds mitigation: Clear CPU buffers; SMT vulnerable 
           Type: meltdown mitigation: PTI 
           Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl and seccomp 
           Type: spectre_v1 mitigation: usercopy/swapgs barriers and __user pointer sanitization 
           Type: spectre_v2 mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling 
           Type: srbds mitigation: Microcode 
           Type: tsx_async_abort status: Not affected 
Graphics:  Device-1: Intel HD Graphics 620 vendor: Lenovo driver: i915 v: kernel bus ID: 00:02.0 chip ID: 8086:5916 
           Device-2: NVIDIA GM108M [GeForce 920MX] vendor: Lenovo driver: nvidia v: 460.32.03 alternate: nouveau,nvidia_drm 
           bus ID: 03:00.0 chip ID: 10de:134f 
           Device-3: Chicony EasyCamera type: USB driver: uvcvideo bus ID: 1-4:2 chip ID: 04f2:b57d serial: 0001 
           Display: x11 server: X.Org 1.20.10 compositor: kwin_x11 driver: loaded: modesetting display ID: :0 screens: 1 
           Screen-1: 0 s-res: 1366x768 s-dpi: 96 s-size: 361x203mm (14.2x8.0") s-diag: 414mm (16.3") 
           Monitor-1: eDP-1 res: 1366x768 hz: 60 dpi: 112 size: 309x173mm (12.2x6.8") diag: 354mm (13.9") 
           OpenGL: renderer: Mesa Intel HD Graphics 620 (KBL GT2) v: 4.6 Mesa 20.3.3 direct render: Yes 
Audio:     Device-1: Intel Sunrise Point-LP HD Audio vendor: Lenovo driver: snd_hda_intel v: kernel alternate: snd_soc_skl 
           bus ID: 00:1f.3 chip ID: 8086:9d71 
           Sound Server: ALSA v: k5.10.7-3-MANJARO 
Network:   Device-1: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet vendor: Lenovo driver: r8169 v: kernel port: 4000 
           bus ID: 01:00.0 chip ID: 10ec:8168 
           IF: enp1s0 state: down mac: c8:5b:76:78:e3:cd 
           Device-2: Qualcomm Atheros QCA9377 802.11ac Wireless Network Adapter vendor: Lenovo driver: ath10k_pci v: kernel 
           port: 4000 bus ID: 02:00.0 chip ID: 168c:0042 
           IF: wlp2s0 state: up mac: 58:00:e3:41:87:99 
           Device-3: Qualcomm Atheros type: USB driver: btusb bus ID: 1-7:4 chip ID: 0cf3:e500 
           IF-ID-1: vboxnet0 state: up speed: 10 Mbps duplex: full mac: 0a:00:27:00:00:00 
Drives:    Local Storage: total: 372.62 GiB used: 275.8 GiB (74.0%) 
           SMART Message: Unable to run smartctl. Root privileges required. 
           ID-1: /dev/sda maj-min: 8:0 vendor: Kingston model: SA400S37240G size: 223.57 GiB block size: physical: 512 B 
           logical: 512 B speed: 6.0 Gb/s serial: 50026B73801F8542 rev: 0102 
           ID-2: /dev/sdb maj-min: 8:16 vendor: Seagate model: ST9160412AS size: 149.05 GiB block size: physical: 512 B 
           logical: 512 B speed: 3.0 Gb/s serial: 5VGCALEC rev: HPM1 
Partition: ID-1: / raw size: 214.47 GiB size: 210.11 GiB (97.96%) used: 171.58 GiB (81.7%) fs: ext4 dev: /dev/sda2 
           maj-min: 8:2 
           ID-2: /boot/efi raw size: 300 MiB size: 299.4 MiB (99.80%) used: 312 KiB (0.1%) fs: vfat dev: /dev/sda1 
           maj-min: 8:1 
Swap:      Kernel: swappiness: 60 (default) cache pressure: 100 (default) 
           ID-1: swap-1 type: partition size: 8.8 GiB used: 2.61 GiB (29.7%) priority: -2 dev: /dev/sda3 maj-min: 8:3 
Sensors:   System Temperatures: cpu: 43.0 C mobo: N/A 
           Fan Speeds (RPM): N/A 
Info:      Processes: 265 Uptime: 8h 55m wakeups: 7 Memory: 7.67 GiB used: 6.19 GiB (80.6%) Init: systemd v: 247 Compilers: 
           gcc: 10.2.0 Packages: 1676 apt: 3 pacman: 1660 lib: 464 flatpak: 0 snap: 13

Last 20 lines of genymotion-palyer.log:

2021-01-24T17:50:02+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress"" shell ("getprop", "dev.bootcomplete")
2021-01-24T17:50:02+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("getprop", "dev.bootcomplete")  - exit code: 0
2021-01-24T17:50:03+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress"" shell ("getprop", "dev.bootcomplete")
2021-01-24T17:50:03+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("getprop", "dev.bootcomplete")  - exit code: 0
2021-01-24T17:50:04+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress"" shell ("getprop", "dev.bootcomplete")
2021-01-24T17:50:04+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("getprop", "dev.bootcomplete")  - exit code: 0
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress"" shell ("getprop", "dev.bootcomplete")
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("getprop", "dev.bootcomplete")  - exit code: 0
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] Device booted in 7474 ms
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] "Notifying launchpad of status change: 8bb23482-88eb-41a1-b946-32593ca6654d ON"
2021-01-24T17:50:05+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress":5555" shell ("pm list packages")
2021-01-24T17:50:06+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("pm list packages")  - exit code: 0
2021-01-24T17:50:06+05:00 [Genymotion Player:135865] [debug] [Adb][shell] command: "/home/UserName/Software/genymotion/tools/adb" -s "ipaddress":5555" shell ("ls /data/.genymotion")
2021-01-24T17:50:06+05:00 [Genymotion Player:135865] [debug] [Adb][shell] ("ls /data/.genymotion")  - exit code: 0
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] "Dummy camera" released by DeviceCameraPipe(0x1b42f30) count: 0
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] "Dummy camera" acquired by CameraView(0x1b0d2a0) count: 1
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] "Dummy camera" released by DeviceCameraPipe(0x1a35ff0) count: 1
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] "Dummy camera" acquired by CameraView(0x192d2d0) count: 2
2021-01-24T17:52:07+05:00 [Genymotion Player:135865] [debug] Linux/Windows: media permissions are authorized by default

Thanks a lot.

I want to have a waterproof phone that I can realiably wear when I am windsurfing. During a session it might get wet and might sink for a few centimeters for a couple of seconds from time to time.

I bought a refurbished Huawei P20 Pro for the purpose, IP67 waterproof. I had watched videos on Youtube where it would be under 1.5 meters water for 15 minutes and still be working fine.

After a short session on the water with this phone, where it got wet but never sunk, the next day the phone was dead forever with water damage. I imagined that, being refurbished, it might have been hacked by the previous owner.

I got my money back and bought the same phone again, also refurbished. This one was really new, in the box with all the gadgets. I took it on a session, this time in a cheap "waterproof" pocket. At the end of the session, there was some moist in the pocket. Next day the phone was dead forever. Again. Was this hacked too? I don't think so.

I got my money back and bought a refurbished Samsung S9, which is waterproof IP68.

Now. I am not going to bring it with me on the water until I am sure it will survive.

I could buy a IP68 protection for it but wouldn't it be overkill and actually nonsense (IP68 + IP68 = IP68) and maybe still let water in?

Are these videos on Youtube realistic? Maybe 10 minutes after the video the phone becomes useless.

Are the IP67 and IP68 certifications reliable for general public phones? I am sure they are when it concerns professional equipment.

Thanks for your thoughts

I'm installing LineageOS 17.1 on my new phone. It works fine, but I can't get to data in TWRP.

As usual, to install, I wipe everything, drop into TWRP, format (not just wipe) data, wipe cache/davlik/system, and flash the LineageOS installer file. When the system starts first time, it gives a message "encrypting data", which doesn't have a "skip" option.

When I drop back into TWRP it asks for a decryption password to access data, but I don't have one because I haven't entered one in the first place.

How do I get LOS to not encrypt data, or alternatively, what decryption password should I use in TWRP?

Note: this isn't a duplicate question. Other questions about decrypting data involve corrupt data or system issues that prevent data being accessed because of encryption, or trying to recover files from data. In my case, it's a clean install with no prior data content, but I can't figure how to access data in TWRP because it seem to encrypt it automatically but there's no hint what key to enter in TWRP.

I wish to use a USB stick with both my Android device and my Windows 10 PC.

My requirements are:

  • No file size limitation
  • No root required on the Android device
  • The filesystem should be natively supported by the Android device

My Android device is a Samsung Galaxy S10. I would like a solution that would work with all modern Android devices, but I don't mind if I'm limited to the Samsung.

Which filesystem should I use?

Phone: Samsung S9 Plus, 256Gb
OS: Lineage OS 17.1 (Android 10)
ROOT: TWRP 3.5

I installed Lineage OS 17.1 on a Samsung S9+. It's been working fine so far. However, when I encrypt the OS from the security menu, right after the screen goes black with the green android-like logo, the phone quickly reboots back to the non encrypted OS. Going again through the process does not help.

logcat shows:

--------- beginning of main
01-20 19:17:52.959 4019 4129 D vold : fdeEnable(3, *, 0)
01-20 19:17:52.960 4019 4129 D vold : !fscrypt_is_native, spawning fdeEnableInternal
01-20 19:17:52.960 4019 403 E Cryptfs : Unexpected value for crypto key location
01-20 19:17:52.961 4019 403 E Cryptfs : Cannot get size of block device
01-20 19:17:53.067 4019 403 W vold : Found symlink /proc/29802/cwd referencing /data/misc/keystore
01-20 19:17:53.067 4019 403 W vold : Found symlink /proc/29803/fd/7 referencing /data/vendor/gps/.lhd.lock
01-20 19:17:53.068 4019 403 W vold : Found symlink /proc/29803/fd/12 referencing /data/vendor/gps/.pipe.gpsd_to_lhd.to_server
01-20 19:17:53.068 4019 403 W vold : Found symlink /proc/29803/fd/14 referencing /data/vendor/gps/.pipe.gpsd_to_lhd.to_client
01-20 19:17:53.069 4019 403 W vold : Found symlink /proc/29804/fd/7 referencing /data/vendor/gps/.gpsd.lock
...
...
01-20 19:17:53.217 4019 403 W vold : Sending Killed to 32740
01-20 19:17:53.218 4019 403 W vold : Sending Killed to 32509
01-20 19:17:53.218 4019 403 W vold : Sending Killed to 32383
...
...
01-20 19:17:53.221 4019 403 E Cryptfs : Unexpected value for crypto key location
01-20 19:17:53.221 4019 403 E Cryptfs : Cannot get size of block device
--------- beginning of crash

I tried the steps given here on /data (/dev/block/sda25), but it did not do it for me either.

  1. Any idea on how I can debug further Cryptfs : Unexpected value for crypto key location?
  2. Is there a way to encrypt /data via the command line if this keeps failing?

Android ROMs and also Android custom ROMs are typically cryptographically signed.

Most users will only recognize this if they try to install a ROM and the signature verification on-device fails.

For verifying authenticity of a ROM it can makes sense to verify the signature offline, before installing the ROM and e.g. compare the used signature certificate if it is the one expected, e.g. if the ROM is a genuine ROM build by LineageOS.

What command do you have to execute for verifying the signature of a ROM (e.g. if you have the ZIP file) on a PC?

I installed an app for custom notifications from the Playstore. The app requires sensitive permissions (camera, contacts, and storage), but has no network access. When I selected a setting the app said I needed to install another app and then my phone displayed a window prompt asking if I will install an app from an untrusted source. My concern is if this app could be spyware with internet access to steal my data. Is this possible if the main app has no network access and no downloading permissions?

I contacted the developer and they told me that particular setting requires an "older API level" that is not possible for main apps to have. I am not knowledgeable enough to know if this is a valid reason.

i was trying to emulate Android 5.0 (LRX21T) in linux, i downloaded the rom but i didn't find any good emulator, there is anyone that supports any version of android ? is that possible ?

I have a LineageOS 17.1 system on Pocophone F1, unrooted. When I install an apk through USB using adb, adb not run as root, the app is installed both on my main admin user and on a secondary user on my phone. How do I force adb to only install the app for my main user only?

I have done many reinstalls of my OS on my Android phone in the last few months for various reasons. Every time, the biggest hassle is manually searching, downloading and installing all the apps I had in my previous installation.

I use a degoogled custom rom, downloading apps from F-Droid and Aurora Store, so no Google solutions are acceptable.

What I want, is to have a way to keep on my computer a copy of all the apks of the installed apps of my phone, and have it automatically updated too, so that when the time comes to reformat my phone and install everything all over, I will be able to simply adb install all of the apks in no time, instead of doing it all manually and waiting for them to also be downloaded. Any suggestions for how I can make that happen with existing programs, preferably open source?

I am trying to delete my /data/app/com.google.android.youtube-DVUYe6iX9r5J1nYk8PlC2w== folder to fix the bug described here; however, I keep getting a "Device or resource busy" message. I tried using this command

adb pull /data/adb/service.d/vanced.sh > %UserProfile%\Desktop\vanced.sh

and also Total Commander file manager but received the same error. How can I delete the folder?

After I say "hey Google", Google voice access is letting me say a few voice commands. However, after a few ones, I have to say "hey Google" again to be allowed to give further voice commands.

How can I configure Google voice access so that I only have to say "hey Google" once?

I did disable "time out after the speech":

enter image description here

Topics


2D Engines   3D Engines   9-Patch   Action Bars   Activities   ADB   Advertisements   Analytics   Animations   ANR   AOP   API   APK   APT   Architecture   Audio   Autocomplete   Background Processing   Backward Compatibility   Badges   Bar Codes   Benchmarking   Bitmaps   Bluetooth   Blur Effects   Bread Crumbs   BRMS   Browser Extensions   Build Systems   Bundles   Buttons   Caching   Camera   Canvas   Cards   Carousels   Changelog   Checkboxes   Cloud Storages   Color Analysis   Color Pickers   Colors   Comet/Push   Compass Sensors   Conferences   Content Providers   Continuous Integration   Crash Reports   Credit Cards   Credits   CSV   Curl/Flip   Data Binding   Data Generators   Data Structures   Database   Database Browsers   Date &   Debugging   Decompilers   Deep Links   Dependency Injections   Design   Design Patterns   Dex   Dialogs   Distributed Computing   Distribution Platforms   Download Managers   Drawables   Emoji   Emulators   EPUB   Equalizers &   Event Buses   Exception Handling   Face Recognition   Feedback &   File System   File/Directory   Fingerprint   Floating Action   Fonts   Forms   Fragments   FRP   FSM   Functional Programming   Gamepads   Games   Geocaching   Gestures   GIF   Glow Pad   Gradle Plugins   Graphics   Grid Views   Highlighting   HTML   HTTP Mocking   Icons   IDE   IDE Plugins   Image Croppers   Image Loaders   Image Pickers   Image Processing   Image Views   Instrumentation   Intents   Job Schedulers   JSON   Keyboard   Kotlin   Layouts   Library Demos   List View   List Views   Localization   Location   Lock Patterns   Logcat   Logging   Mails   Maps   Markdown   Mathematics   Maven Plugins   MBaaS   Media   Menus   Messaging   MIME   Mobile Web   Native Image   Navigation   NDK   Networking   NFC   NoSQL   Number Pickers   OAuth   Object Mocking   OCR Engines   OpenGL   ORM   Other Pickers   Parallax List   Parcelables   Particle Systems   Password Inputs   PDF   Permissions   Physics Engines   Platforms   Plugin Frameworks   Preferences   Progress Indicators   ProGuard   Properties   Protocol Buffer   Pull To   Purchases   Push/Pull   QR Codes   Quick Return   Radio Buttons   Range Bars   Ratings   Recycler Views   Resources   REST   Ripple Effects   RSS   Screenshots   Scripting   Scroll Views   SDK   Search Inputs   Security   Sensors   Services   Showcase Views   Signatures   Sliding Panels   Snackbars   SOAP   Social Networks   Spannable   Spinners   Splash Screens   SSH   Static Analysis   Status Bars   Styling   SVG   System   Tags   Task Managers   TDD &   Template Engines   Testing   Testing Tools   Text Formatting   Text Views   Text Watchers   Text-to   Toasts   Toolkits For   Tools   Tooltips   Trainings   TV   Twitter   Updaters   USB   User Stories   Utils   Validation   Video   View Adapters   View Pagers   Views   Watch Face   Wearable Data   Wearables   Weather   Web Tools   Web Views   WebRTC   WebSockets   Wheel Widgets   Wi-Fi   Widgets   Windows   Wizards   XML   XMPP   YAML   ZIP Codes