Is it bricked? Cannot flash stock Android to remove ArcaneOS

Search This thread
Oct 5, 2022
13
1
I just did a bulk search of possible firehorse pk_hash's and files and here is what i have: (note: /v/abcd/file.123 (where abcd is the random numbers and file.123 is the file) the /v/abcd/ was randomized into folders so that fhloaderparse could work.)

OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/6289/activity.so 386140
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:0000000000000025 SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/875/xbl_config 90112
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:00000020 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/12592/libdspCV_skel.so 33320
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:0000000000000015 SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/7338/hyp 397312
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:00000020 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/20251/libapps_mem_heap.so 50248
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/2850/libsns_low_lat_stream_skel.so 29628
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000E8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/13512/libhexagon_nn_skel.so 1081728
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:00000020 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/18412/capi_v2_aptX_Classic.so 37332
Duplicate: OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:000000000000001D SWSIZE: PK_HASH:bdaf51b59ba21d8a243792c0e183e88bddd369ccca58bc792a3e4c22eff329e8a8c72d449559cd5f09ebfa5c7bf398c0 /v/30535/ipa_fws.elf 28992
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:000000000000000C SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/4615/keymaster 241664
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:00000020 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/12570/libfastcvadsp.so 1493444
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/14639/libfastcvdsp_skel.so 520456
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/27927/sleep.so 41556
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000E8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/14050/libhexagon_nn_skel_secondary.so 1081728
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/26507/geofence.so 97292
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:00000020 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/27204/libcvpdsp_skel.so 270856
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:00000020 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/23021/capi_v2_aptX_HD.so 41428
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000E8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/16590/libcamera_nn_skel.so 698780
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/21184/smartbatching.so 37680
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/6902/chre_drv_modem.so 89896
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:0000000000000000 SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/30460/xbl 3346432
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/25393/chre_pal.so 16600
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/28541/drop.so 20828
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/15541/chre_drv_loc.so 163056
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:000000000000000C SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/27577/fpctzappfingerprint.mbn 829881
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000E8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/17246/imu_cal.so 45528
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/419/libVC1DecDsp_skel.so 54960
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/17283/libsns_device_mode_skel.so 20824
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/32351/lowi_client.so 165260
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:0000000000000021 SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/24246/aop 167936
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:0000000000000005 SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/4207/devcfg 45056
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/23694/motiondetector.so 20848
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:0000000000000000 SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/23237/bootloader.img 8517224
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000E8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/22057/libchre_slpi_skel.so 99032
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/2375/libhalide_hexagon_remote_skel.so 42908
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/20680/blue.so 297092
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000E8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/7651/gesture.so 20736
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:0000000000000012 SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/11398/wlanmdsp.mbn 3830500
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/8745/cc.so 59864
OEM:0066 MODEL:000A HWID:000E60E10066000A SWID:000000000000000C SWSIZE: PK_HASH:3ef72a02fb931be15408bb63603588faeafeb09f07d567c04a3fdc7e9fdd7e2faab10f954c89a682afe1cd46f8482c6c /v/21551/uefisecapp 126976
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/14468/chre_drv_wifi.so 74596
OEM:Qualcomm MODEL:0000 HWID:0000000000000000 SWID:0000000000000000 SWSIZE:000000C8 PK_HASH:b66f913fdca0bc2173b4fe73c1db04fc80adc2ca3c9ad0e91cd017bc2983892a /v/20691/libVC1Dec.so 218652
 

Top Liked Posts

  • There are no posts matching your filters.
  • 6
    Ok... sorry for the delay. Yes, I can confirm the speculation going around... I accidentally bought an AN0M phone. And yes, I was fortunate enough to sell it again (and got most of my money back)... to a reporter at vice.com. And, BTW, I have bought myself another Pixel 4a... this time it is working properly.

    Some background points before I finally figured out exactly what I had in my possession...
    - Being unable to unlock/reset this phone, I started looking at my firewall logs to see what activity this phone was generating. I noticed the following:
    - regular HTTPS requests to arcane.one. I couldn't find anything useful on or about that site.
    - occasional HTTPS requests to time.grapheneos.org. This leads me to believe that ArcaneOS might be forked from GrapheneOS.
    - intermittent HTTPS requests to anom.one. I couldn't find anything useful on or about that site, however the word anom led me to discover the joint FBI/AFP operation that had just hit the news a few days earlier.
    - Now suspecting I had an An0m phone, I checked the calculator app... and yes, it loaded straight into the AN0M logon screen.
    - At this point, I panicked and thought I could get into trouble if this device was being tracked... so I rang the police and described my situation. They said to take it to my local police station. I call my local station (being in a small rural town, it is usually unmanned) and was advised to contact the AFP (Australia Federal Police), since it was their operation to begin with.
    - I called the AFP, explained again what had happened. The nice lady I spoke to confirmed that their activity with Operation Ironside had just finished and that, yes, they had supplied such phones to some of their informants. I left them my contact details and the details of the Gumtree seller who I purchased this phone from. I was hoping that maybe he would be a person of interest to the AFP, and that I would get some measure of payback for him scamming me in the first place.
    - I waited a week, the AFP did not call back... so I sold the phone to vice.com, who had already contacted me about this thread.
    - It occurs to me now why "ArcaneOS" was practically unheard of in the googleverse (until a few weeks ago). This was a state sponsored development and, of course, it was in the best interest of law enforcement authorities to keep the normally open-source Android code hidden to prevent this phone being tinkered with and the true purpose of this OS and app being discovered.

    To everyone that helped and suggested ideas to restore this phone to normal... thankyou. Although nothing we tried worked in the end, I still appreciate the community assistance here.

    To everyone that has contacted me directly to ask how to fix their Pixel phone... sorry, I cannot help you.

    I suspect it would still be possible to restore this phone... you'd just need to know the right commands to do it. By that I mean, I assume the developers probably changed the normal fastboot commands to some other arbitrary words; something that would allow them to test, develop and repeatedly re-flash their phones, yet prevent us from doing likewise.

    EDIT: I've added a photo of the AN0M logon screen. I did not see this originally and the calculator app was not available when I took my original set of photos... at that time I had recently done a factory reset on the phone. However, after some time a message popped up saying that Calculator was "Updated by your admin"... which seemed strange to me at the time, as this was not supposed to be a managed device.
    4
    I recently purchased a used Pixel 4a, and I now understand why the seller was offering such good price for it and why he refused to respond to me now I have it. This phone has ArcanseOS 10 installed, which has only 3 apps installed... Setting, Clock and Calculator. There is no Play Store app, no Phone app, nothing.

    The only useful reference to ArcaneOS I can find in the Googleverse is this one... https://translate.google.com.au/tra...rueck-flashen.973774.html&prev=search&pto=aue where the OP describes his troubles with a Pixel 3. Through the rough translation, I see similar issues... can't enable developer mode, can't unlock bootloader, can't sideload apps.

    Some random observations about this phone/OS...
    - The phone is in good condition. I used the supplied pin code to unlock it and did a factory reset. Have done basic config with my Google Account, etc.
    - In Settings > About Phone - the build number is not shown. I cannot tap on the build number 7 times to enable Developer Mode. I have tried tapping everything in About Phone 7+ times, but I have not been able to enable Developer Mode.
    - When the phone powers on, the first thing shown is a message like "Your device is loading a differennt operating system".
    - The installed OS is ArcaneOS 10. The system updater says that ArcaneOS 11 is available for download (but I don't want to do that in case it makes this thing even harder to fix).
    - I tried sideloading open_gapps and a random developer shortcut app I found, but I can't seem to get them to load.

    I'm no expert at this, so I've tried various commands that I found and got some of these results...
    (note: some details, esp path names, have been edit for brevity)

    >adb devices List of devices attached 09241JEC228869 sideload >adb shell error: closed >adb sideload open_gapps-arm64-10.0-stock-20210518.zip adb: sideload connection failed: no devices/emulators found adb: trying pre-KitKat sideload method... adb: pre-KitKat sideload connection failed: no devices/emulators found >adb sideload "by4a.setedit22_2018.10.31-18_minAPI11(arm64-v8a,armeabi-v7a,x86,x86_64)(nodpi)_apkmirror.com.apk" serving: 'by4a.setedit22_2018.10.31-18_minAPI11(arm64-v8a,armeabi-v7a,x86,x86_64)(nodpi)_apkmirror.com.apk' (~47%) adb: failed to read command: No error >adb shell settings put global development_settings_enabled 1 error: closed >adb root adb: unable to connect for root: closed >adb shell error: closed

    >fastboot --version fastboot version 31.0.2-7242960 >fastboot devices 09241JEC228869 fastboot >fastboot flash bootloader sunfish-rq2a.210505.002\bootloader-sunfish-s5-0.3-7062598.img Sending 'bootloader' (8357 KB) FAILED (remote: 'Download is not allowed on locked devices') fastboot: error: Command failed >fastboot flashing unlock FAILED (remote: 'Unrecognized command flashing unlock') fastboot: error: Command failed

    Any suggestions on how to unlock this device? Then I can flash it and restore it back to stock.

    Thanks

    PS. Please do not say "tap build number 7 times to enable Developer Mode/options". If you believe this is the solution, please re-read this post, and the linked/German post, then describe a different way of doing that task that doesn't rely on the build number being visible.
    4
    Thankyou for everyone's help with the unusual phone. I am no longer in possession of it and, for the time being, am unable to provide further details. I do have an interesting update to share, however I have made a commitment to keep this quiet for the time being. Once I have approval to tell you what I have recently learnt, I will...
    4
    If anyone else gets a phone running ArcaneOS, send me a message :)

    Also, you're famous, OP: https://www.vice.com/en/article/n7b4gg/anom-phone-arcaneos-fbi-backdoor

    2
    It would be super cool if someone with one of these phones could share the ArcaneOS image.