• Introducing XDA Computing: Discussion zones for Hardware, Software, and more!    Check it out!

[APP][v1.10] VD Infos (Package: com.vitaodoidao.vdinfos)

Search This thread

VD171

Senior Member
Jun 21, 2012
2,133
2
1,670
127.0.0.1
LG K10
Samsung Galaxy J7
Hi @VD171

1. May I know what these two files are? These also came up on my device after the scan. I cannot get rid of them.

/system/lib/libsigchain.so
/system/lib64/libsigchain.so

2. How to properly use xprivacylua?

You mentioned it's the best. However xprivacylua needs to hook LSposed into the app you wish to hide e.g bank app in order to work. But most app checks for the presence of exposed at runtime.

So the problem is if I hook LSposed to the app, I can hide whatever xprivacy designs to hide, e.g applist. But LSposed gets detected.

If I don't hook LSposed to the app, Xprivacy doesn't work at all.

Also Xprivacy creates a folder called xlua in /data/system which also gets detected by VD Infos.
The file libsigchain.so works on art modifications, so this file can appears with luckypatchers, xposed, custom recoveries or some other type of customization.

XprivacyLua does NOT work alone. You need to choose what to block.
Certainly, you need custom hooks made by other users.
I suggest you to try all hooks made by @Fif_ ♥️ 👏
You can find them on XprivacyLua repository:
https://lua.xprivacy.eu/repo/

Apparentely, XprivacyLua needs an auto self-hiding, because it can be detected easily too.
 
  • Like
Reactions: Fif_

Top Liked Posts

  • There are no posts matching your filters.
  • 25
    (Para quem fala PORTUGUÊS, o próximo post está totalmente traduzido !)

    VD Infos v1.10

    vdinfos-en-001.jpg
    vdinfos-en-002.jpg

    As we all know, Android is a super powerful and super versatile operating system.​
    What nobody tells you is that all your personal details and confidential information are available for all your installed applications.​
    Protect yourself against these types of invasions of privacy is an obligation.​
    The VD Infos app reads several of these details and information to show you an example of what can be captured from your device in use.​
    NO ONE INFORMATION IS STORED, SENT OR TRANSMITTED TO ANY FILE OR SERVER.
    If you want, you can disallow usage of internet with a firewall, or you can just turn off the internet.​



    Why use it ?
    • Just for curious.
    • See your device informations.
    • Test your hooks and spoofs.

    Languages:
    • English
    • Portuguese

    What it can read ?
    • ULTRA ROOT CHECKER/DETECTOR.
    • ULTRA MAGISK CHECKER/DETECTOR.
    • ULTRA XPOSED CHECKER/DETECTOR.
    • ULTRA RIRU CHECKER/DETECTOR.
    • Simple Root Check (Fast and Quickly).
    • Check many ways to detect android emulators.
    • Check many ways to detect busybox, whale framework, taichi frameworks, xposedbridge, lsposed, edxposed, virtualxposed, vaexposed, exposed, quickxposed, sandvxposed, zhihuxposed, xhook, supersu, suhide, luckypatcher, deviceemulator, rootcloak, xprivacy, xprivacylua, ebxprivacy, titaniumbackup, deviceidmasker and others.
    • Read Bluetooth MAC and VISIBLE NAME.
    • Read bounded bluetooth devices.
    • Read radio/modem/baseband version.
    • Read the state of the BOOTLOADER.
    • Read device name.
    • Read phone infos: Market Name, Device, Brand, Model, Product, Display ID, Manufacturer, Hardware.
    • Read Android infos: Host, Type, Build Date and Android Version.
    • Read phone system: KERNEL, MEMORY, Security Patch and System Version.
    • Read encryption infos.
    • Read build keys.
    • Read REGION.
    • Read Advertising ID.
    • Detects currently Selinux configuration.
    • Read build properties.
    • Read Android ID.
    • Read GSF ID (Google Services Framework).
    • Read IMEI (of all SIMs).
    • Read FINGERPRINT.
    • Check many ways to read SERIAL number.
    • List ACCOUNTS.
    • List CALL LOGS.
    • Read User-Agent (http.agent and getUserAgentString).
    • List SIM informations (of all SIMs).
    • List PHONE informations.
    • List WIFI informations (like MAC, IP, NAME, DNS, DHCP and previously connected WIFIs).
    • List NETWORK informations (each one).
    • List RUNNING PROCESSES.
    • List RUNNING SERVICES.
    • List INSTALLED PACKAGES.
    • List INSTALLED APPLICATIONS.

    How to protect yourself ?

    Based on:

    Tested on:
    • Android 4.4.2: SDK 19
    • Android 4.4.4: SDK 19
    • Android 5.0.2: SDK 21
    • Android 5.1.1: SDK 22
    • Android 6.0: SDK 23
    • Android 7.0: SDK 24
    • Android 7.1.1: SDK 25
    • Android 7.1.2: SDK 25
    • Android 8.0.0: SDK 26
    • Android 8.1.0: SDK 27
    • Android 9.0: SDK 28
    • Android 10.0: SDK 29
    • Android 11.0: SDK 30

    Contacts:

    Disclaimer:
    • Use and distribute as you want and as you wish.

    Thanks to:

    Download and support:
    Version Information
    Current Version:
    1.10
    Release Date: 2021-July-29

    Created: 2019-October-29
    Last Updated: 2021-July-29
    8
    (For who speak PORTUGUESE ! Keep attention, reply in ENGLISH only !)
    (Para quem fala PORTUGUÊS ! Fique atento, responda apenas em INGLÊS !)



    VD Infos v1.10

    vdinfos-pt-001.jpg
    vdinfos-pt-002.jpg

    Como todos já sabemos, o Android é um sistema operacional super potente e super versátil.​
    O que ninguém conta para você, é que todos os seus detalhes pessoais e informações confidenciais, estão disponíveis para todos os seus aplicativos instalados.​
    Se proteger destes tipos de invasões de privacidade, é uma obrigação.​
    O app VD Informações lê vários destes detalhes e informações para expor para você um exemplo do que pode ser capturado do seu aparelho em uso.​
    NENHUMA INFORMAÇÃO É ARMAZENADA, ENVIADA OU TRANSMITIDA PARA NENHUM ARQUIVO OU SERVIDOR
    Se quiser, você pode desautorizar o uso da internet com um firewall, ou você pode simplesmente desligar a internet.​



    Por que usar?
    • Apenas por curiosidade.
    • Ver as informações do dispositivo.
    • Testar seus hooks e camuflagens.

    Línguas:
    • Inglês
    • Português

    O que ele pode ler ?
    • ULTRA ROOT DETECTOR (superusuário).
    • ULTRA MAGISK DETECTOR.
    • ULTRA XPOSED DETECTOR.
    • ULTRA RIRU DETECTOR.
    • Root Check simples (rápido e prático).
    • Checa várias maneiras para detectar emuladores android.
    • Checa várias maneiras para detectar o busybox, whale framework, taichi frameworks, xposedbridge, edxposed, virtualxposed, vaexposed, lsposed, exposed, quickxposed, sandvxposed, zhihuxposed, xhook, supersu, suhide, luckypatcher, deviceemulator, rootcloak, xprivacy, xprivacylua, ebxprivacy, titaniumbackup, deviceidmasker e outros.
    • Lê o Bluetooth MAC e NOME VISÍVEL.
    • Lê dispositivos bluetooth pareados.
    • Lê a versão do rádio/modem/baseband.
    • Lê o estado do BOOTLOADER.
    • Lê o nome do aparelho.
    • Lê os dados do aparelho: Nome de Mercado, Dispositivo, Marca, Modelo, Produto, Display ID, Fabricante, Hardware.
    • Lê os dados do Android: Host, Tipo, Data do Sistema e Versão do Android.
    • Lê os dados do Sistema: KERNEL, MEMÓRIA, Atualização de Segurança e Versão do Sistema.
    • Lê os dados da encriptação.
    • Lê as chaves da build.
    • Lê a REGIÃO.
    • Lê o Advertising ID.
    • Detecta a configuração atual do Selinux.
    • Lê as propriedades da build.
    • Lê o Android ID.
    • Lê o GSF ID (Google Sevices Framework).
    • Lê o IMEI (de todos os chips).
    • Lê a IMPRESSÃO DIGITAL de vários métodos.
    • Checa várias maneiras para ler o número SERIAL.
    • Lista as CONTAS.
    • Lista o HISTÓRICO DE LIGAÇÕES.
    • Lê o User-Agent (http.agent e getUserAgentString).
    • Lista as informações do CHIP (de todos os chips).
    • Lista as informações do TELEFONE.
    • Lista as informações do WIFI (como MAC, IP, NOME, DNS, DHCP e redes WIFI conectadas anteriormente).
    • Lista as informações das REDES (cada uma).
    • Lista os PROCESSOS EM EXECUÇÃO.
    • Lista os SERVIÇOS EM EXECUÇÃO.
    • Lista os PACOTES INSTALADOS.
    • Lista os APLICATIVOS INSTALADOS.

    Como se proteger ?

    Baseado em:

    Testado em:
    • Android 4.4.2: SDK 19
    • Android 4.4.4: SDK 19
    • Android 5.0.2: SDK 21
    • Android 5.1.1: SDK 22
    • Android 6.0: SDK 23
    • Android 7.0: SDK 24
    • Android 7.1.1: SDK 25
    • Android 7.1.2: SDK 25
    • Android 8.0.0: SDK 26
    • Android 8.1.0: SDK 27
    • Android 9.0: SDK 28
    • Android 10.0: SDK 29
    • Android 11.0: SDK 30

    Contatos:

    Licença:
    • Use e distribua da maneira que quiser e como você bem entender.

    Agradecimentos:

    Download e suporte:
    Informação da Versão
    Versão Atual:
    1.10
    Data de Lançamento: 2021-Julho-29

    Criação: 2019-Outubro-29
    Última Atualização: 2021-Julho-29
    4
    For now:

    - 2020-May-10: Reserve new Thread on XDA-Developers.
    - 2020-May-10: Post about in english.
    - 2020-May-10: Post about in portuguese.
    - 2020-May-11: Finish english translation.
    - 2020-May-11: Release version 1.04.
    - 2020-June-11: Improve root detection methods with counter of time, counter of tries to detect root and counter of root possibilities found.
    - 2020-June-12: Add loading message with details of actual action.
    - 2020-June-13: Implement function to read Advertising ID, Device, Brand, Model, Product, Hardware, Manufacturer and Keys. And other ways to read Fingerprint.
    - 2020-June-14: Implement background functions for to keep app responsive. And shown of actual running task.
    - 2020-June-15: Full handling of errors and exceptions with details of last action.
    - 2020-June-16: Improve system properties detections.
    - 2020-June-17: Improve functions to detect emulators.
    - 2020-June-18: Splitted buttons to read informtions of the device and to detect root.
    - 2020-June-18: Added button to copy results in text style and another button to save results to a file.
    - 2020-June-19: Implement function to read Build properties by many ways.
    - 2020-June-20: Implement function to detect xposed classes.
    - 2020-June-21: Reduce and compress APK size to less than 1MB.
    - 2020-June-22: Improve selinux detections.
    - 2020-June-23: Improve functions to detect root precisely.
    - 2020-June-24: Fully translated to english.
    - 2020-June-25: Improve functions to read Build properties precisely.
    - 2020-June-26: Splitted root detection into three methods: Basic, Advanced and Agressive.
    - 2020-June-27: Arrangement of variables and methods.
    - 2020-June-28: Tests on 4.4.4, 5.1.1 and 7.1.2.
    - 2020-June-29: Tests on 5.0.2, 7.1.1 and 8.1.0.
    - 2020-June-30: Unhappy toybox is not preinstalled on SDK 21 (5.0.2) and lowers. So, toybox binaries were included on apk. APK size is now 2.6MB. :(
    - 2020-July-01: Unhappy executables are not allowed on SDK 29 (Android 10). So, toybox binaries were included as shared object libraries.
    - 2020-July-02: Tests on SDK 19, SDK 21, SDK 22, SDK 23, SDK 24, SDK 25, SDK 26, SDK 27, SDK 28, SDK 29 and SDK 30. And on archs (abi's): x86, x86_64, armeabi-v7a and arm64-v8a.
    - 2020-July-03: Filtered some false positives and some unwanted results.
    - 2020-July-04: I hate 4th of july.
    - 2020-July-05: Release signed version 1.05.
    - 2020-July-10: Added all xposed classes names for detection.
    - 2020-July-11: Implemented function to detect xposed on stack trace of exceptions.
    - 2020-July-12: Implemented function to detect root on /dev.
    - 2020-July-13: Implemented function to detect xposed using dex class loader.
    - 2020-July-14: Implemented function to detect apps from sources of installed packages.
    - 2020-July-15: Supressed unwanted details of detected infos.
    - 2020-July-16: Heavily increased lists for detection of classes, applications/packages and files/binaries.
    - 2020-July-24: Added button to stop actual action.
    - 2020-July-25: Added action to expand and unexpand each content.
    - 2020-September-04: Added confirmation dialog before to stop actual action.
    - 2020-September-05: Splitted methods for root detection.
    - 2020-September-06: Release signed version 1.06.
    4
    New Release: Version 1.09

    Download: https://forum.xda-developers.com/attachments/vd_infos-v1-09-apk.5350409/

    Changelog:

    - Fixed target to Android 11 (SDK 30). Apk size is now 3,84 MB.
    - Fixed Save to File on Android 11 (SDK 30).
    - Supressed warning for permission MANAGE_EXTERNAL_STORAGE.
    - Updated Toybox to v0.8.5.
    - Set "Simple Root Check" as default.
    - Fixed DEVICE section.
    - Increased PRODUCT section.
    - Added DISPLAY ID section.
    - Increased BUILDs section.
    - Increased search inside /sdcard/Android/media.
    - Increased search for Magisk, Riru, EdXposed and LSPosed.
    - Heavily increased search for LSPosed.
    - Heavily increased search inside /data/adb.


    Enjoy !
    3
    New Release: Version 1.08

    Download: https://forum.xda-developers.com/attachments/vd_infos-v1-08-apk.5223217/

    Changelog:

    - Fully renamed from "VD Informations" to "VD Infos".
    - Fully renamed from "com.vitaodoidao.vdinformacoes" to "com.vitaodoidao.vdinfos".
    - Fully compatible with Android 11 (SDK 30). (Thanks to @doggydog2 and @batlayo)
    - Removed the app name from the home title.
    - Change the expression "Radio" to "Radio/Modem/Baseband".
    - Updated links to XDA.
    - Removed all string values from xml files.
    - Fixed open link in the menu list.
    - Result content reorganized.
    - Changed all long toasts to short.
    - Fixed exceptions for reading calls.
    - Fixed exceptions for reading WiFi.
    - Fixed exceptions for reading Radio/Modem/Baseband.
    - Supressed unwanted result for Android 9+ (SDK 29+): unknown SERIAL.
    - Unhappy app size increased to 3,12 MB due to the latest SDK and build tools.
    - Added option to do a SIMPLE Root Check (fast and quickly).
    - Fixed Save to File for Android 9 and Android 10.
    - Disabled button for Save to File if is on Android 11+ (SDK 30+).
    - Improved method of detection of Magisk TMPFS.
    - Improved try and catch for each method and parsing of fails or nulled results.
    - Added all LSposed classes names for detection.
    - Added all VirtualXposed classes names for detection.
    - Added search for /data/magisk_backup.
    - Improved search for folders, binaries and files inside /data/adb.
    - Improved search for folders, binaries and files inside /data/local.
    - Improved search for folders, binaries and files inside /sdcard/Android.
    - Improved search for folders, binaries and files inside /sbin/.magisk.
    - Improved functions of Riru detection.
    - Improved searching of folders, binaries and files.