How unsecure is to stay unencrypted?

Search This thread

blackhawk_LA

Senior Member
Dec 27, 2010
1,547
651
HTC One (m7)
Sony Xperia XZ1 Compact
Hello! Yesterday my S22 Ultra was stolen. Everyone knows how does it feels when you lose something that is not only worth nearly 1000$, but also has tons of private information and personal data.
I had a custom ROM installed, and thanks to Samsung firmware, that means having to leave your data unencrypted. I know that most thieves only want the phone for selling it, but of course I'm a bit worried about my data.
My question is: how much more unsecure really is to stay unencrypted? I've read about samsung Knox security being hacked in minutes, so I wonder if in the end there's really a difference (if the thieves want to acces your data, they will do?)
I've just bought an S23U and for the first time, I have doubts about rooting.
I appreciate your answers and opinions.
 

OldNoobOne

Senior Member
Greetings Friends,
So whats the solution? All I can think of is to not use expensive phones at all so that the thieves aren't interested in the phones OR to keep a dummy phone of the same make in the other pocket OR to custom-fit our pockets with Titanium streachable thread/cord leashed to the phone OR hypothetically, somehow linkup the screen-unlock process with a 3rd-party company that verifies the users fingerprint + Face etc. biometrics then if failed remote wipe & share geolocation data with the local police :p
I think TWRP.me should be requested to build recoveries with password protection & usb debugging / dev options should be kept off by the user if not using those features.
 
Last edited:

WoKoschekk

Senior Member
Feb 25, 2019
1,575
1
488
Cologne
Moto G6
Moto G6 Plus
  • Like
Reactions: OldNoobOne

jwoegerbauer

Senior Member
Dec 11, 2022
1,657
5
322
Freestate of Bavaria, Germany
Moto G10
Upon the initial boot of a modern Android phone your data gets encrypted and keeps encrypted. Even in recovery. What do you think why TWRP has all the trouble with encryption?? In stock recovery you can only use minimal ADB. See source code: https://android.googlesource.com/platform/bootable/recovery/

That means you can only access adb sideload. No data is accessible in recovery since /data gets not mounted!
ROFL

1.
AFAIK stock Recovery knows of command --set_encrypted_filesystem
1685955332529.png

hence you via ADB can disable encryption

Code:
adb devices
adb root
adb shell
su
echo -e "--set_encrypted_filesystem=off" > /cache/recovery/command
exit

2.
You either can't properly read or you must be struck with blindness: that's what can be performed via ADB when in recovery mode
1685952089749.png


Using adb shell allows you to run all Android shell commands as those are provided by Toybox and / or Toolbox as also invoke binaries, such as recovery
 
Last edited:

OldNoobOne

Senior Member
see here https://twrp.me/faq/securetwrp.html



not needed in recovery, enabled by default. only for adb while in system.
Hi Friend,
Thats nice piece of info there , that article was published on june 4th 23 so its latest info too from twrp.me.
So jtag seems like some universal oem internal tool to access the hardware of a device. But I slept over it and as a solution to Thief-Encryption-Custom Recovery dilema thing I think The OEMs should ship their devices (high-end ones atleast) with unique NFC tags which could have option to set password-pin protection on them and if the device is geofenced with its unique NFC tag then if the device is away from its tag outside a certain pre-determined radial distance of say 15 meters then a OEM app hiding inside /system/priv-app or any other partition like recovery etc. would initiate a (hypothetical) command like Destroy Data Partition or maybe simply auto wipe the phone & send SOS SMS to local police. The Thief would not only need to steal the phone but also have to steal the Unique OEM-NFC Tag which the device owner can safely hide within for example their undergarments or socks or a pendant etc. I think this would be a better idea to keep a 1000$ phone secure from thieves, It surely looks next-gen idea to me :D
 

WoKoschekk

Senior Member
Feb 25, 2019
1,575
1
488
Cologne
Moto G6
Moto G6 Plus
ROFL

1.
AFAIK stock Recovery knows of command --set_encrypted_filesystem
View attachment 5926127
hence you via ADB can disable encryption

Code:
adb devices
adb shell
su
echo -e "--set_encrypted_filesystem=off" > /cache/recovery/command
exit

2.
You either can't properly read or you must be struck with blindness: that's what can be performed via ADB when in recovery mode
View attachment 5926085

Using adb shell allows you to run all Android shell commands as those are provided by Toybox and / or Toolbox as also invoke binaries, such as recovery
ROFL, lol, haha, uh uh, yeah, yeah, bla, bla, bla... debuggable builds!!
 

WoKoschekk

Senior Member
Feb 25, 2019
1,575
1
488
Cologne
Moto G6
Moto G6 Plus
ROFL

1.
AFAIK stock Recovery knows of command --set_encrypted_filesystem
View attachment 5926127
hence you via ADB can disable encryption

Code:
adb devices
adb shell
su
echo -e "--set_encrypted_filesystem=off" > /cache/recovery/command
exit
Did you also install some Magisk modules for your stock recovery or where does the su binary comes from? the default user of your recovery that switches to root is called...? idk... can't follow you.
 

jons99

Senior Member
Nov 5, 2019
347
382
ROFL

1.
AFAIK stock Recovery knows of command --set_encrypted_filesystem
View attachment 5926127
hence you via ADB can disable encryption

Code:
adb devices
adb shell
su
echo -e "--set_encrypted_filesystem=off" > /cache/recovery/command
exit

2.
You either can't properly read or you must be struck with blindness: that's what can be performed via ADB when in recovery mode
View attachment 5926085

Using adb shell allows you to run all Android shell commands as those are provided by Toybox and / or Toolbox as also invoke binaries, such as recovery
but how can you figure out the lock screen password in order to get into twrp and execute your adb command
twrp won't decrypt the data without a password
 
  • Like
Reactions: WoKoschekk

WoKoschekk

Senior Member
Feb 25, 2019
1,575
1
488
Cologne
Moto G6
Moto G6 Plus
To get straight to the point: the encryption for Android devices is based on a master key stored encrypted (default_password) in TEE. Setting a display pattern will then encrypt the already encrypted key again with the use of the pattern. That is the reason why some builds of TWRP require to enter the display pattern and others require to deactivate the display pattern.

I just want to mention it to avoid any future discussions about some confusing encrypting theories...
 
  • Like
Reactions: blackhawk_LA

jwoegerbauer

Senior Member
Dec 11, 2022
1,657
5
322
Freestate of Bavaria, Germany
Moto G10
ROFL, lol, haha, uh uh, yeah, yeah, bla, bla, bla... debuggable builds!!

what-is-your-problem.gif



Yes, ADB is enabled by default in both the eng ( the default flavor ) and the userdebug builds of Android.


BTW:

In general adbd is started by the debugable Android system itself with root permissions. Up to a certain point, it uses these root permissions (open port and so on), and then adbd drops the root permissions.
On an Android userdebug build, it comes with adb root access, means adbd does not drop the root permissions, hence every command executed via adb inside the shell (adb shell) is also executed with root permissions - thus running su basically isn't needed at all.
 
Last edited:

jons99

Senior Member
Nov 5, 2019
347
382
No clues, because I never made use of TWRP, and never will do so. :)
why not use twrp it's the best recovery ever also if anyone could bypass encryption with an adb command phone encryption wouldn't be a thing lastly you can try it on your own phone reboot to your stock? recovery enter that adb command and see if you can grab any personal information without entering the lock screen password I don't think you'll be able to but you might surprise me
 
  • Like
Reactions: WoKoschekk

TheMystic

Senior Member
Mar 18, 2017
1,796
802
OnePlus 8T
Samsung Galaxy S22 Ultra
Hello! Yesterday my S22 Ultra was stolen. Everyone knows how does it feels when you lose something that is not only worth nearly 1000$, but also has tons of private information and personal data.
I had a custom ROM installed, and thanks to Samsung firmware, that means having to leave your data unencrypted. I know that most thieves only want the phone for selling it, but of course I'm a bit worried about my data.
My question is: how much more unsecure really is to stay unencrypted? I've read about samsung Knox security being hacked in minutes, so I wonder if in the end there's really a difference (if the thieves want to acces your data, they will do?)
I've just bought an S23U and for the first time, I have doubts about rooting.
I appreciate your answers and opinions.
I suggest everyone who tinkers with their phones to keep two of them: one which would have sensitive information (like banking apps) should be completely stock (bootloader locked) and the other one can be used for modding. Personally I don't use banking apps on my Android phones (because they require access to SMS and other unnecessary permissions).

Pretty much all accounts provide an option to view all devices where you have logged in (under the account security section) and you'd be able to sign-out of devices you no longer use or lost. For Google accounts, you'll find it here.

And you can remotely erase your device using the Find my Device app from Google.
 

blackhawk_LA

Senior Member
Dec 27, 2010
1,547
651
HTC One (m7)
Sony Xperia XZ1 Compact
I suggest everyone who tinkers with their phones to keep two of them: one which would have sensitive information (like banking apps) should be completely stock (bootloader locked) and the other one can be used for modding. Personally I don't use banking apps on my Android phones (because they require access to SMS and other unnecessary permissions).

Pretty much all accounts provide an option to view all devices where you have logged in (under the account security section) and you'd be able to sign-out of devices you no longer use or lost. For Google accounts, you'll find it here.

And you can remotely erase your device using the Find my Device app from Google.
Having two phones is too much trouble for me. I've decided that having stock rooted ROM with encrypted data is the best compromise for me. Theoretically no one could access my data, despite being easy to erase the phone and sell if is it's robbed (that's what I understand)
I'm learning a lot with this discussion.
 

TheMystic

Senior Member
Mar 18, 2017
1,796
802
OnePlus 8T
Samsung Galaxy S22 Ultra
having stock rooted ROM with encrypted data is the best compromise for me.
Why do you want to make that compromise?

How often do you do banking work on your phone? I'm asking this to see if a compromise here would be the better option.

I use GPay to make payments using my phone (which is completely stock). For all other work, I use a web browser on my laptop. There are two distinct advantages of GPay:

1. It doesn't work if your registered SIM isn't inserted. So if you lose your phone and you block your SIM, person having your phone won't be able to use the app.

2. GPay doesn't need SMS permission to work, which most banking apps do (reason why I don't install banking apps on Android phone).

3. If you install GPay on another phone and login with your registered mobile number, GPay on the previous phone would automatically stop working (and all data would be erased).

Considering that it is only very rarely do I use my phone for any banking transaction outside of GPay (I use GPay quite frequently), I would rather make this compromise than use a phone that is modded.

What exactly do you need root for today? Non-rooted phones are quite capable today.
 

OldNoobOne

Senior Member
What exactly do you need root for today? Non-rooted phones are quite capable today.
Sorry i keep barging in :D
When we insatll System Disabler app with root permissions it shows us all that the so-called trusted apps are doing behind the scenes, we need root to disable those specific serrvices of the apps for sanity. Every app is loaded with trackers & unsolicited services that users didnt ask for. Gugle Pley Services app has the biggest load of services running inside the app (over 300+) and we have to disable minimum approx 30+ services in it which are outright spy services.
If you use Aurora Store instead of Pley Store, it shows you the number of trackers each app has, we can then choose a similar app that has no trackers in it for example Seegnal Messenger has no trackers while Wotsapp has many.
When I use banking apps I dont get any sms notifications but when i use my cards at merchant locations & net-banking I get sms notifs stating where i transacted and whats my current balance in the bank account, so if not rooted then all the apps installed (regardless of what permissions the user has allowed to those apps) do obviously snoop on sms notifs too.
 

Top Liked Posts

  • There are no posts matching your filters.
  • 2
    I suggest everyone who tinkers with their phones to keep two of them: one which would have sensitive information (like banking apps) should be completely stock (bootloader locked) and the other one can be used for modding. Personally I don't use banking apps on my Android phones (because they require access to SMS and other unnecessary permissions).

    Pretty much all accounts provide an option to view all devices where you have logged in (under the account security section) and you'd be able to sign-out of devices you no longer use or lost. For Google accounts, you'll find it here.

    And you can remotely erase your device using the Find my Device app from Google.
    Having two phones is too much trouble for me. I've decided that having stock rooted ROM with encrypted data is the best compromise for me. Theoretically no one could access my data, despite being easy to erase the phone and sell if is it's robbed (that's what I understand)
    I'm learning a lot with this discussion.
    2
    If a phone gets booted into Recovery mode then encryption doesn't take place, means a hacker can steal your data at any time if ADB got successfully enabled on phone.
    Upon the initial boot of a modern Android phone your data gets encrypted and keeps encrypted. Even in recovery. What do you think why TWRP has all the trouble with encryption?? In stock recovery you can only use minimal ADB. See source code: https://android.googlesource.com/platform/bootable/recovery/

    That means you can only access adb sideload. No data is accessible in recovery since /data gets not mounted!
    1
    Hello! Yesterday my S22 Ultra was stolen. Everyone knows how does it feels when you lose something that is not only worth nearly 1000$, but also has tons of private information and personal data.
    I had a custom ROM installed, and thanks to Samsung firmware, that means having to leave your data unencrypted. I know that most thieves only want the phone for selling it, but of course I'm a bit worried about my data.
    My question is: how much more unsecure really is to stay unencrypted? I've read about samsung Knox security being hacked in minutes, so I wonder if in the end there's really a difference (if the thieves want to acces your data, they will do?)
    I've just bought an S23U and for the first time, I have doubts about rooting.
    I appreciate your answers and opinions.
    the difference between encrypted and unencrypted data is when you're data is encrypted if someone tries to look at it he'll only see weird letters and numbers and the only way to decrypt it is with your lockscreen password but if your data isn't encrypted then anyone has access to it no need for password or anything that means credit cards photos contacts everything is right there for the taking you can use the find my phone app to delete your data but I think you need to set it up as an admin app before it can do it I guess what I'm trying to say is stay encrypted if you can
    1
    Hello! Yesterday my S22 Ultra was stolen. Everyone knows how does it feels when you lose something that is not only worth nearly 1000$, but also has tons of private information and personal data.
    I had a custom ROM installed, and thanks to Samsung firmware, that means having to leave your data unencrypted. I know that most thieves only want the phone for selling it, but of course I'm a bit worried about my data.
    My question is: how much more unsecure really is to stay unencrypted? I've read about samsung Knox security being hacked in minutes, so I wonder if in the end there's really a difference (if the thieves want to acces your data, they will do?)
    I've just bought an S23U and for the first time, I have doubts about rooting.
    I appreciate your answers and opinions.
    encrypted data => no chance to get any data stored on the user partition. nothing left to say about it.

    not encrypted => all data is accessible!! you are able to restore all apps and you are able to open and to use them. to be honest, that's the worst scenario that could happen to you! you could get into serious trouble.
    1
    If a phone gets booted into Recovery mode then encryption doesn't take place, means a hacker can steal your data at any time if ADB got successfully enabled on phone.