Samsung always keeps security as a priority when it comes to Galaxy devices. Meanwhile, there are still some issues from the Android side, which are still compromising security. In a recent development, our team member found a YouTube video, showing that you can destroy any Samsung device’s security in just a minute, is it an issue?
A YouTube channel posted plenty of videos guiding users on how they can factory reset their Galaxy device in case of forgetting the password, pin, or pattern. Since a manual reset stops you to use your device without logging in with the same Google account the phone had before, the YouTuber even bypassed FRP.
The video begins with a short introduction on breaking any form of security lock on all Galaxy devices. Seeing this video, we followed the same steps and found that the method is accurately working and we were able to factory reset Galaxy devices, including:
- Galaxy Z Fold 4
- Galaxy Z Flip 4
- Galaxy S22 Ultra
- Galaxy Z Fold 3
- Galaxy S21 and S21 FE
- Galaxy M31 and A30s
As shown in the video, you can break any Galaxy device’s lock (password, PIN or pattern) by resetting manually. To do so, just plug in the USB and connect it to a PC, and press all three physical buttons simultaneously. As soon as your device turns off, leave the volume down button, followed by the power button a few seconds later.
Within seconds, you will be able to access the recovery mode of Android, letting you install the firmware manually, and wipe system data as well as cache. Using the Wipe data/factory reset option, you can hard reset any Galaxy device, while the FRP can also be bypassed with a handful of head-scratching steps.
I shocked seeing Samsung Knox also validated installation of a third-party root access apps!
While this method would not leave any kind of personal data or account logged in in the Galaxy device, but, you won’t be able to trace it through services like Find My Mobile. In case of misplacement or theft incidents, anyone can get access to use your Galaxy device as a first-hand user.
Users’ personal data won’t be accessible by gaining access to factory reset and FRP bypass methods. Still, we are disappointed to see that the user eventually used Samsung’s setup wizard as concluding the method of getting complete access to the Galaxy device.
Samsung should look into the matter and fix the issue/bugs that provide unauthorized access, destroying security promises. The company should also work with Google to make the FRP and factory reset more reliable as some are still compromising users’ privacy.
Android 15 may speed up webpages loading for apps
Android 15 is the upcoming major update, which will bring new features and some significant improvements over the current version. One of the changes that Android 15 could introduce is the ability to pin Android System WebView into memory, which could speed up the browsing experience.
Android System WebView is a part that allows apps to display web content without opening a separate browser app. Many apps use WebView to access various features, such as showing login screens, help pages, or full articles.
WebView is based on the same code as Google Chrome, but it is updated separately. To save space on the device, Google created a shared library called Trichrome.
According to information (via AndroidPolice), Google may pin the base APK of the trichrome library to memory with Android 15, which means it will not be removed from memory when the user opens a big-size app. This could reduce the loading time of web pages and make the browsing experience smoother.
The feature is currently enabled in Android 15 Developer Preview 1, but it may change or be removed in future versions. Android 15 is expected to be released later this year, with new features and improvements for Android users.
Google temporarily stops Android 15 DP1 downloads amid device corruption bug
Last week, Google rolled out the first developer preview of its next version operating system – Android 15, and the firm now temporarily stopped DP1 downloads amid a device corruption bug. However, this news may disappoint users who were all set to try the new offerings.
According to the details, Google states on its Android Developers page that we’ve temporarily disabled downloads for Android 15 DP1 OTA images. The reason for this abrupt pause happens to be a known issue that shows a Device is corrupted message, which occurs when sideloading OTA images.
However, an issue with sideloading the Developer Preview 1 build can sometimes cause users in trouble, so to maintain reliability, Google pauses the downloads of Android 15 first developer preview until the firm can further troubleshoot the issue.
To work around this issue, Google recommends developers flash a factory image to test devices instead. Simultaneously, this news primarily impacts developers, as this is an early build, and probably not even that much since developers would probably end up flashing their devices anyway.
However, currently, there’s no information available on when the issue will be resolved and downloads will resume, so all you can do is wait, because it’s better to be late than corrupted.
Android 15 might stop some apps from reading notifications with OTP
The countdown for the next iteration of the operating system has begun, as Google already dispatched the first Developer Preview of Android 15. Therefore, the code within Android 15 suggests that Google might stop untrusted apps from reading notifications with OTP.
The QPR3 Beta 1 update of Android 14 shows a new option named RECEIVE_SENSITIVE_NOTIFICATIONS. This permission has a protection level of role signature, which means it can only be granted to applications with the requisite role or to applications that the OEM signs.
While the exact role that grants this permission hasn’t been detailed yet, likely, that Google doesn’t intend to open this permission up to third-party apps. Hence, Google might be planning to crack down on a known Android security attack method with the upcoming OS – Android 15.
Various apps use passkey or enable two-factor authentication. While some forms of two-factor authentication are more secure than others, some platforms only support the most basic methods, wherein your one-time passwords (OTPs) are sent via email or text.
These methods are convenient since they don’t require additional setup, but they are also less secure since they’re easier to intercept. So, to reduce the risk of data loss, Android 15 might add a new feature that will stop untrusted apps from reading notifications with OTP.
However, currently, it’s hard to describe which apps will count as an untrusted app but we can say that Android will have many ways to protect users from leaking their 2FA codes to third parties. Like the OTP_REDACTION, which suggests that Google will stop users from leaking their 2FA codes on the lock screen.
While the RECEIVE_SENSITIVE_NOTIFICATIONS permission suggests that Android will stop untrusted apps from reading notifications with 2FA codes.