Attend XDA's Second Annual Developer Conference, XDA:DevCon 2014!
5,808,502 Members 41,946 Now Online
XDA Developers Android and Mobile Development Forum

[Discontinued-ROM][2013-06-16][Guhl] Andromadus Permission Spoofing Framw. AOSP 4.2.2

Tip us?
 
guhl99
Old
(Last edited by guhl99; 6th July 2014 at 02:25 PM.)
#1  
Senior Member - OP
Thanks Meter 361
Posts: 400
Join Date: Aug 2010
Default [Discontinued-ROM][2013-06-16][Guhl] Andromadus Permission Spoofing Framw. AOSP 4.2.2

[Closing message]
Hi,

I am discontinuing the work on the Android Permission Spoofing Framework as I am not using Android anymore.
If anybody is interested in taking over the development I would be very happy to help her or him getting started as much as possible.
Feel free to contact me if you would like to work on it.

Sorry and have fun - Guhl
[End closing message]


This ROM is based on the Andromadus 4.2.x AOSP build.

There is also a CM10.1 based version available here [ROM][21-01-13][Guhl] Andromadus Permission Spoofing Framework CM10.1

In addition to the original AOSP rom it includes the permission spoofing framework enhancement that was originally developed by Plamen K. Kosseff for Android 2.3. The functionality has been ported to Android 4.x and enhanced by me and is now available.

The source of the enhancement can be found on github in the repositories:
android_frameworks_base
android_frameworks_opt_telephony
android_packages_apps_Settings

The current work is done in the JB4.2 branch and the relevant commits are:
framework initial commit
framework bug fix 1
framework bug fix 2
frameworks telephony initial commit
app settings initial commit
framework permission spoofing - location
framework pff: infrastructure code cleanup
framework pff: permission spoofing - contacts and phone log
framework permission spoofing - calendar (Instances)
framework pff: permission revoking - initial commit
framework pff: add PFFInfoDatabase to make spoofed informations persistant and changeable
framework pff: bug fix for permission revoking

What is permission spoofing
Permission spoofing means that the framework will return spoofed informations to Apps instead of the original information based on permissions that the App requested during installation. The main motivation for the development of this functionality is the protection of the privacy of the phones owner.
Examples for spoofed information are:
  • Empty contact list instead of real contacts - READ_CONTACTS
  • False location instead of real location - ACCESS_COARSE_LOCATION / ACCESS_FINE_LOCATION
  • False Information for phone id and phone number - READ_PHONE_STATE
  • Empty log instead of real phone call log - READ_CALL_LOG
  • Empty calendar list instead of real calendar entries - READ_CONTACTS
  • ....

Current implementation
Currently the following permissions are available:
READ_PHONE_STATE
While this permission allows the App to read the state of the phone (in call, ...) it also allows the App to read information like the phone number or the IMEI of the phone. Instead of revoking the permission that has to be granted to an App, permission spoofing provides spoofed information for this sensitive data.
ACCESS_COARSE_LOCATION and ACCESS_FINE_LOCATION
Instead of the real location the top of Mount Everest will be reported. The implimentation is not perfect yet (Google maps and Latitude still seem to know the location - working on that)
READ_CONTACTS and READ_CALL_LOG
Instead of the contacts and the call log an empty list will be reported. The implementation sets the limit paramter of the query to 0 if the permission is spoofed.
READ_CALENDAR
The implementation changes the date for which the items will returned to the first week of 1970.

More permissions will be added in the near future.

Usage
Spoofing can be enabled on a per App basis. To enable spoofing go to Settings - Apps, choose the App for which you want to spoof the permission. Below the spoofable permission will be a switch that can be set to On to enable spoofing or Off to disable spoofing for this App.

Optional Apps
The source of these apps is also available at https://github.com/guhl

PFF-GPSPath
The PFF-GPSPath App can be used to set the spoofed location and in addition it can also be used to define a path the can then be simulated in the App (by effectively moveing the spoofed location)!
HowTo for PFF-GPSPath HowTo

PFF-Settings
The PFF-Settings app provides the same functionality as App - Settings but in a more comprehensive way.
It provides a list of all Apps (including system Apps) that have a spoofable permission and allows you to set spoofing On/Off for them

PFF-Test
If you spoof a spoofable permission for the app PFF-Test you can check the info that the framework provides to PFF-Test

Downloads
ROM AndromadusAOSP4.2-vision-pff-16062013.zip
Gapps are not included in the rom - they can be found at gapps-jb-20130301-signed.zip
PFF-GPSPath_1_2.apk (needs a ROM >= 20130526)
PFF-AppSettings_1_1.apk
PFF-Test

Communication
I do not want to start a flame war on spoofing on XDA. Whiile spoofing is important for me I do understand people opposing it.
If you want to talk to me, the best way to do this is to look for me (Guhl) at #G2ROOT or #andromadus on freenode IRC.

Changelog
2013-10-21
  • Fix permission unspoofing bug in PFF-AppSettings -> Version 1.1 - see downloads
2013-06-16
  • PFF-GPSPath_1_2.apk added Altitude detection and routing!
  • Updated from Andromadus
  • Bugfix - Crash of PackageManager when installing apk from file.
2013-05-26
  • Framework change to make the spoofed information persistent and changeable
  • App PFF-GPSPath to set and simulate the spoofed location
  • permission revoking moved to Main-ROM and removed the Test-ROM
2013-04-28
  • Enabled permission revoking (in Test-ROM)
2013-04-20
  • Switched Wifi driver to WPA without p2p
2013-04-17
  • Fixed kernel config that broke Wifi
2013-04-09
  • Added the "Kill app back button" functionality to the AOSP rom
2013-04-07
  • Updated from Andromadus (no new spoofing)
  • Added buttons to PFF-AppSettings to spoof/unspoof all apps with one click
2013-03-26
  • Updated from Andromadus (no new spoofing)
2013-03-09
  • Updated from Andromadus (no new spoofing)
2013-02-27
  • Added spoofing for READ_CALENDAR
2013-02-21
  • Added spoofing for READ_CONTACTS and READ_CALL_LOG
  • Updated PFF-AppSettings to reflect the new permissions
2013-02-15
  • Updated from Andromadus (no new spoofing)
2013-01-21
  • Updated from Andromadus (no new spoofing)
2013-01-14
  • Added location spoofing
  • Added location testing to PFF-Test

Credits
  • Plamen K. Kosseff for the original framework changes
  • Flinny for his huge work on the Andromadus roms and supporting me
  • pierre_ja, Nipqer, Hymie and all the others at #G2ROOT for their endless help and entertainment
The Following 15 Users Say Thank You to guhl99 For This Useful Post: [ Click to Expand ]
 
guhl99
Old
#2  
Senior Member - OP
Thanks Meter 361
Posts: 400
Join Date: Aug 2010
reserved for future use
 
Vauvenal7
Old
#3  
Vauvenal7's Avatar
Senior Member
Thanks Meter 60
Posts: 1,399
Join Date: Nov 2012
Is this available for other 4.x ROMs?
Like any senseROM or the CM10.1 ROM by flinny?
Cus for me is spoofinge also important but i prefere CM or sense ROMs before AOSP (tweak thing^^)
Btw: thanks for porting it to newer android versions

Greets Vauvenal7

Sent from my HTC Vision
 
guhl99
Old
#4  
Senior Member - OP
Thanks Meter 361
Posts: 400
Join Date: Aug 2010
Quote:
Originally Posted by Vauvenal7 View Post
Is this available for other 4.x ROMs?
Like any senseROM or the CM10.1 ROM by flinny?
Cus for me is spoofinge also important but i prefere CM or sense ROMs before AOSP (tweak thing^^)
Btw: thanks for porting it to newer android versions

Greets Vauvenal7

Sent from my HTC Vision
Hi,

I will rebase it to the CM10.1 branch of Andromadus and support all Andromdus builds for sure.
I'll just wanted to give Flinny some head start to make CM10.1 kind of "stable".
Sense ROMS are not my thing so i don't think it will be availabel from me.

But I think that a CM10.1 version will be available in some days.

Have fun - Guhl
 
demkantor
Old
#5  
demkantor's Avatar
Recognized Contributor
Thanks Meter 2,757
Posts: 5,776
Join Date: Nov 2011
Location: mpls
Perfect! I have bee having lots of issues creating pdroid patches for many of these newer ROMs so this is exactly what I need! Setherio has helped me a great deal making them but there are still some that won't build.
Thanks and I'll test soon!

Sent from my Nexus 7 using xda premium
 
guhl99
Old
#6  
Senior Member - OP
Thanks Meter 361
Posts: 400
Join Date: Aug 2010
Quote:
Originally Posted by Vauvenal7 View Post
Is this available for other 4.x ROMs?
Like any senseROM or the CM10.1 ROM by flinny?
Hi, the CM10.1 based version is now available here [ROM][08-01-13][Guhl] Andromadus Permission Spoofing Framework CM10.1

Have fun, Guhl
The Following User Says Thank You to guhl99 For This Useful Post: [ Click to Expand ]
 
guhl99
Old
#7  
Senior Member - OP
Thanks Meter 361
Posts: 400
Join Date: Aug 2010
Default Location spoofing

Hi,
I added location spoofing - The CM version will be updated soon.
Have fun - Guhl
The Following 2 Users Say Thank You to guhl99 For This Useful Post: [ Click to Expand ]
 
Authorita
Old
#8  
Account currently disabled
Thanks Meter 24
Posts: 60
Join Date: Nov 2012
Something I never understood about the implementation of Android, is that there was never any provision for DENYING requested permissions. End users should have the right to deny access to sensitive information, and application developers should be forced to verify the correct functionality of their software in the event that they encounter permission denials.

Spoofing permissions does, of course, go one step further and make sure that the software will continue to function correctly despite access denials. It will be really nice once this expands to cover the full set of permission requests.

Now for google services not being properly controlled by this, I thought that google services were treated separately from other applications? It may also be possible that google is considering the probability that you're actually standing on the top of mt everest, concluding that you're full of sh*t, and handing back your location based on your IP address.

Imagine it like this; google maps is a network service, tied in with their location services. Why would their server ask your phone to ask their server for your location? It would just add unnecessary complexity. If you authorize a coarse location, it is probably smart enough to just bypass your phone altogether for that information. Perhaps, rather than going to the extreme of mt everest, simply handing back a "fine" location with a massive error would be a more slick solution. For example, some random coordinates within 50 miles of your real location.

Without employing a proxy server, you can never keep your geographical location a complete secret when network communications are enabled. As far as privacy goes, network communications is one of the most sensitive permissions. Blocking that one would basically block the risk associated with the other permissions. Now implementing a fake network may be extreme, but telling that application that the data network is disconnected may be an option... Most applications that don't depend on network for their function, should be able to gracefully handle a "there is no network" situation.
 
guhl99
Old
#9  
Senior Member - OP
Thanks Meter 361
Posts: 400
Join Date: Aug 2010
Quote:
Originally Posted by Authorita View Post
...
Now for google services not being properly controlled by this, I thought that google services were treated separately from other applications? It may also be possible that google is considering the probability that you're actually standing on the top of mt everest, concluding that you're full of sh*t, and handing back your location based on your IP address.

Imagine it like this; google maps is a network service, tied in with their location services. Why would their server ask your phone to ask their server for your location? It would just add unnecessary complexity. If you authorize a coarse location, it is probably smart enough to just bypass your phone altogether for that information. Perhaps, rather than going to the extreme of mt everest, simply handing back a "fine" location with a massive error would be a more slick solution. For example, some random coordinates within 50 miles of your real location.

Without employing a proxy server, you can never keep your geographical location a complete secret when network communications are enabled. As far as privacy goes, network communications is one of the most sensitive permissions. Blocking that one would basically block the risk associated with the other permissions. Now implementing a fake network may be extreme, but telling that application that the data network is disconnected may be an option... Most applications that don't depend on network for their function, should be able to gracefully handle a "there is no network" situation.

Hi,

I will still try to find out how Goggle Maps gets the coarse (network) location but at the moment i do not focus on it as you can turn of the access of the Google Apps to the location in the Settings anyway. But sometime i'll find and spoof it and if i have to go down to the C-libraries.

Of course you can not hide your location completely as you can not hide your IMEI from your network carrier. Spoofing on the framework level will not help here. But the main purpose of the spoofing framework extension at them moment is to deal with all those apps that ask for endless permissions. i.e. Angrybirds has access to all your phone id's (and is activly reading them) and to your fine location. Not that i'd like that game but it is just an hilarious example.
Same thing for example with the time schedule app for the Austrian railway. Of course in some situations it might make sense that this app can read my location but in general it does not need to as it's primary purpose is to tell me the next connection from place A to B.
As I can never know when the App really reads my location and what they use it for (and i can not even check it as the App is not open source) i want to be able to spoof that info.

Anyway, i will try to focus on releasing the CM10.1 version and then adding the contacts and phone log.

If you (or anybody else) have additional suggestions of permissions that you would like to see spoofed and how that spoofing should work please come forward.

Have fun - Guhl
The Following User Says Thank You to guhl99 For This Useful Post: [ Click to Expand ]
 
guhl99
Old
#10  
Senior Member - OP
Thanks Meter 361
Posts: 400
Join Date: Aug 2010
Hi,
Updated the rom from the Andromadus sources.
No new spoofing yet
Have fun Guhl

Tags
4.2, permission, rom, spoof, vision
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes