The Accidental $70k Android Hack

  Рет қаралды 117,040

Seytonic

Seytonic

Күн бұрын

TuxCare 👉 bit.ly/3TmUxD4
0:00 Intro
0:16 The Accidental $70k Android Hack
5:43 Reading Reflections In Glasses
9:14 TuxCare
9:56 Outro
David’s Channel: / @xdavidhu
His full writeup: bugs.xdavidhu.me/google/2022/...
Sources:
securityaffairs.co/wordpress/...
• Pixel 6 Full Lockscree...
bugs.xdavidhu.me/google/2022/...
www.darkreading.com/mobile/5-...
• Hacker Conference | 34...
www.uswitch.com/mobiles/guide...
en.wikipedia.org/wiki/FBI-App...
www.theregister.com/2022/09/1...
arxiv.org/abs/2205.03971
www.bitdefender.co.uk/blog/ho...
tech.co/news/eyeglass-reflect...
• CSI Zoom Enhance
===============================================
My Website: www.seytonic.com/
Follow me on TWTR: / seytonic
Follow me on INSTA: / jhonti
===============================================

Пікірлер: 305
@Username-qx9gk
@Username-qx9gk Жыл бұрын
The way that was handled, almost sounds like he discovered a feature..
@nfg_fpv
@nfg_fpv Жыл бұрын
somehow that doesn't sound implausible 🤔
@ologhai8559
@ologhai8559 Жыл бұрын
putting on my tinfoil hat.... a govermemt glowie feature
@MM-24
@MM-24 Жыл бұрын
I'm sure it was actively being used by a 3 letter agency, likely in an active operation we'll hear about decades from now
@interstellarsurfer
@interstellarsurfer Жыл бұрын
@@MM-24 You won't hear about it.
@khazsilverstar
@khazsilverstar Жыл бұрын
Exactly my thoughts!
@byteragex
@byteragex Жыл бұрын
I guess lock screen bypass was google's backdoor otherwise who would not take such critical yet easy vulnerability seriously 😁
@dev-debug
@dev-debug Жыл бұрын
Yeah was wondering the same thing. Would not be the first software caught with a backdoor.
@TheSimoc
@TheSimoc Жыл бұрын
Nah, Google has just never given a shit about their shitty products full of bugs, bloat, horrible UIs, and constant API changes for sake of change and keeping devs busy.
@medea27
@medea27 Жыл бұрын
Ridiculous that David had to go to that extreme to get Google to move on it... can't say I'm entirely surprised though. And the reflection in someone's glasses is a big security problem if you consider that many people log into secure internal systems during video-conferences. The info on their screen could be all sorts of data... from login details to customer private data to confidential business info. Even worse if someone hacks into their webcam when they _aren't_ on a video call & can observe whatever they are working on.
@MM-24
@MM-24 Жыл бұрын
Yes, everyone knew that, the way google acted. Likely, this "vulnerability" was being used in the spy community, and this revelation was probably going to mess up some crucial active operation
@dealloc
@dealloc Жыл бұрын
Use a password manager and signed certificates for internal systems.
@DrDipsh1t
@DrDipsh1t Жыл бұрын
I've personally used people's glasses reflection for my own benefit in the past playing Yu-Gi-Oh as a kid lol. I could see their hand and use that info to play accordingly. Fun times 😂
@TheSimoc
@TheSimoc Жыл бұрын
Only thing I find surprising in the case was that Google finally received the customer feedback and even bothered to fix the issue. Usually, Google hasn't given a shit about customer feedback nor particularly cared about issues in their products.
@JohnDoe-sp3dc
@JohnDoe-sp3dc Жыл бұрын
Update your body's firmware and get lasik surgery: bug patched 👍
@Whatthellisthisthing
@Whatthellisthisthing Жыл бұрын
I remember this CS:GO streamer was using wall hacks and you could see it in the reflection of his sunglasses lol
@the-matrix-has-you
@the-matrix-has-you Жыл бұрын
It has nothing to do with it🤣🤣🤣 you saw someone using csgo hack thats all
@Gamer-ct6hb
@Gamer-ct6hb Жыл бұрын
@@the-matrix-has-you I mean it kinda does have to do with the video. This comment is pretty funny!
@garneet
@garneet Жыл бұрын
@@the-matrix-has-you i mean its literally also reflection in sunglasses, so its somewhat related
@anteshell
@anteshell Жыл бұрын
@@the-matrix-has-you It has everything to do with it. The topic was literally recognizing what's on the screen through the reflection on the specs, which is exactly what happened in the situation OP describes. I mean how dumb you have to be to not understand it? *facepalm
@the-matrix-has-you
@the-matrix-has-you Жыл бұрын
@@garneet ok let me summarize what happened in video guy has input his pin code 3 times locks himself out of system and only way to gain Access again is a PUK code he put the PUK Code in but Android is hanging and not showing the security password area right so he tried the same procedure again to repeat the process after that he knew that he has found a bug in Android system so the videos Topic is a bug in Android System on Google Pixel Phones. Not about some CSGo lamer who is using wallhack and getting busted cause he was just dumb enough to wearing glasses while recording himself... I dont see a similarity between if you can see one you might be high Stop using it bro🤣🤣🤣
@key_gen
@key_gen Жыл бұрын
They could just reply to every bug reporter that their find was duplicate, nothing really stops it. Glad he got rewarded though
@ekremaslan8068
@ekremaslan8068 Жыл бұрын
Many people announcing that would just decrease their credibility. So they can't abuse that. There is nothing stopping them from using it occassionally though.
@MM-24
@MM-24 Жыл бұрын
I'm sure this was actually made by design, they were gently trying to communicate that it's likely being used actively by some 3 letter agency to defend the world or save Ukraine
@chri-k
@chri-k Жыл бұрын
@@MM-24 or likely neither of those
@mrkiky
@mrkiky Жыл бұрын
You should tell them you have the bug and then arrange the payment legally at a notary if they're interested before you demonstrating it.
@ro0b0
@ro0b0 Ай бұрын
Eventually people would just stop reporting bugs, it's much better for them to spend a tiny fraction of their yearly profits on paying out bug bounties. 70k is literally nothing to Google
@j00500hall
@j00500hall Жыл бұрын
I was reading about this yesterday, I hadn’t thought about PUK codes for over 10 or 15 years until then. I wonder what made him even think of trying it, I don’t even know my current PUK code tbh. Great explainer, especially happy you shared this as it exposes how much google dragged their feet with this.
@vgamesx1
@vgamesx1 Жыл бұрын
Yeah, it really shows how much any company actually cares whenever they talk about security or keeping users safe, then they proceed to give everyone an annoyed sigh saying they'll fix their problems.
@ezra1369
@ezra1369 Жыл бұрын
Might be intentional
@mineisstupid
@mineisstupid Жыл бұрын
tried it on my Pixel 4a 5G... even though it said that this bug was discovered on Pixel 6 & 5, apparently it does work for older phones as well
@fliporflop7119
@fliporflop7119 Жыл бұрын
bugs are backwards compatible
@oqocraft2661
@oqocraft2661 Жыл бұрын
just like modern phones can be destroyed with a tank, old phones can be destroyed too
@frankserafin9207
@frankserafin9207 Жыл бұрын
@@fliporflop7119 not all bugs are backwards compatible
@mateuszzimon8216
@mateuszzimon8216 Жыл бұрын
I tried this on my S10E Samsung and on October patch was still working, on November patch not. If u don't get patch u already screwed
@thethiny
@thethiny Жыл бұрын
It's worth mentioning that the sim attack does not "Decrypt" your phone, that's why the phone has to be on and not rebooted. Decryption happens on first entry after boot only. Afterwards it's just a password.
@QualityDoggo
@QualityDoggo Жыл бұрын
Thanks
@TheSimoc
@TheSimoc Жыл бұрын
I didn't get your point. In the video the phone *was* rebooted if I got it right?
@thethiny
@thethiny Жыл бұрын
@@TheSimoc he showed that when it rebooted it got stuck forever.
@TheSimoc
@TheSimoc Жыл бұрын
@@thethiny Yeah, had to rewatch the video.. actually there are severe gaps on the story.. Indeed the phone got "stuck forever" in first place when he needed to enter the PUK due to forgotten PIN. Then, there was never mentioned any of those very relevant things: - Why did that happen. It surely should have shown the lock screen. - How did he get the phone working then. Supposedly by rebooting, which leaves the aforementioned as a mystery occurence, and subsequent details untold.
@thethiny
@thethiny Жыл бұрын
@@TheSimoc 1- this was the bug. When you enter sin pin code it takes you home and forgets to check lock screen, since lock screen is no longer needed after first unlock. 2- He said (original guy, not video) that it was his phone so he knew the password.
@nathnathn
@nathnathn Жыл бұрын
The reflections thing has been done if not with glasses before. I.e window reflections on security cam’s. Its not a generally reliable tactic beforehand but has popped up for finding identifying information before.
@forestcityfishing4749
@forestcityfishing4749 Жыл бұрын
Thats cute that you think police do any investigating.
@nathnathn
@nathnathn Жыл бұрын
@@forestcityfishing4749 you do know places other then the US exist?. Though we do have our own corruption issues here there nothing like in the US.
@anon_y_mousse
@anon_y_mousse Жыл бұрын
@@nathnathn It's cute that you think he was talking about the US. It's a universal fact amongst humans, they're lazy. I wouldn't call it corruption per se, but it's a select few that actually do their job and investigate crimes. The majority of good cops are beat cops who aren't even allowed to do the investigating and the actual detectives just halfass it. It's also cute that you think corruption is worse in the US than literally everywhere else.
@RandomCapeDude
@RandomCapeDude Жыл бұрын
this has been a persistent issue in android since like 7 or 8. People have been using it to bypass factory reset protection (referring to sim card pins in android in general)
@crispywings9066
@crispywings9066 Жыл бұрын
Thank you for the informative video
@lorenzcyber
@lorenzcyber Жыл бұрын
Nice video been loving them for a long time now!
@jaesen737
@jaesen737 Жыл бұрын
Woah im early
@OcteractSG
@OcteractSG Жыл бұрын
I kind of like the idea of having to wear polarizing glasses just to view what’s in the screen. I suppose that would be a mitigation to the reflection problem, though it’s still uncommon.
@adityachk2002
@adityachk2002 Жыл бұрын
Love the channel
@veritas-truth5851
@veritas-truth5851 Жыл бұрын
I think if companies did try to start checking glasses reflections to monitor what their users are doing it could potentially be seen as a form of discrimination based on someone's health and land companies in some legal troubles
@saviorvx1883
@saviorvx1883 9 ай бұрын
shix its not a thing yet , and ppl already label it a discrimination., companies don't gotta go this far to know wassup ,they'll just mandate software/keyloggers only staLKers would go this far and also measure the shadow of sunlight.etc..... we're fuxked as a species , when ppl are on crack all day to be this woke about everything
@jacksoncremean1664
@jacksoncremean1664 Жыл бұрын
A patch for this was already developed by the Graphene OS team on June 13 but google didn't accept the patch.
@DarklinkXXXX
@DarklinkXXXX Жыл бұрын
That's pretty cool. Do you know what codebase has the lock screen? Kinda wanna see it now.
@OfficialPooYT
@OfficialPooYT Жыл бұрын
This has been a back door for android for a few years now, there are videos going far back on how to bypass 🔒 with the same sim method
@SDogo
@SDogo Жыл бұрын
or the one with the speech assistant and the help links that open chrome XD
@OfficialPooYT
@OfficialPooYT Жыл бұрын
@@SDogo many have came and gone, rip exploits 😂
@mateuszzimon8216
@mateuszzimon8216 Жыл бұрын
@@SDogo yes but they need AFU mode to work. This work in BFU.
@roberteischen4170
@roberteischen4170 Жыл бұрын
"Let me know if your phone is vulnerable." Nice try glowie
@arili-eo7vw
@arili-eo7vw Жыл бұрын
YOU are awesome Seytonic
@Bashiroo
@Bashiroo Жыл бұрын
Geez, that bug was present on my first Android phone that was running on 4.0.4, though. Restart, sim code, and you didn't need a password to access the phone. I wish I knew that I could get 70k for that.
@lowwastehighmelanin
@lowwastehighmelanin Жыл бұрын
the irony of me getting a Google Pixel ad on this 😂
@20Rewind
@20Rewind Жыл бұрын
Hacker: Spends days of there time trying to find a vulnerability. Random researcher: oh nonono 🤣
@rp479
@rp479 Жыл бұрын
Get off TikTok bud
@20Rewind
@20Rewind Жыл бұрын
@@rp479 huh?
@ekremaslan8068
@ekremaslan8068 Жыл бұрын
"It is not a bug, it is a feature."
@streamerchair3674
@streamerchair3674 Жыл бұрын
so well deserved for david
@geroffmilan3328
@geroffmilan3328 Жыл бұрын
If Project Zero can do 90-day deadlines, so can we. Probably right call to accept their release date, but also the right move to inform a vendor that public interest means you will disclose if they do not respond.
@lilyydotdev
@lilyydotdev Жыл бұрын
i remember doing that to a samsung device about 8 years ago, at that time i was too naive to realise it was a security vuln, very funny seeing this pop back up
@bamgm14
@bamgm14 Жыл бұрын
Interestingly, my phone Realme X7 with it's Android splinter also had this bug however, the moment you got into the main page however, it would immediately kick you off the page and send you back to lockscreen
@mateuszzimon8216
@mateuszzimon8216 Жыл бұрын
And this is proper, on Samsung S10e also show u main but lock you up after any interaction even plugin USB device.
@DesertCookie
@DesertCookie Жыл бұрын
0:55 Your phone doesn't ask for the SIM pin code? Every phone I've ever owned in Germany has this as a feature I cannot turn off. TIL I guess.
@chri-k
@chri-k Жыл бұрын
you can remove the SIM PIN code, then the phone won’t ask for ot
@DesertCookie
@DesertCookie Жыл бұрын
@@chri-k Why would you though, I wonder.
@rakeshchowdhury202
@rakeshchowdhury202 Жыл бұрын
I read this on twitter, and well he should be thankful to that google employee for giving her hairpin 😂
@kirakirsch8991
@kirakirsch8991 Жыл бұрын
I tried the lock screen skip. It works.
@isaackingvideos
@isaackingvideos Жыл бұрын
Wow!!! "Google phone 7 has amazing security"
@Aura_Mancer
@Aura_Mancer Жыл бұрын
wait wait, why did you skip over a Google employee putting a bandaid on him??? That's hilarious xD
@infotruther
@infotruther Жыл бұрын
I think the way to get around peeking is to where contact lenses?
@Ethorbit
@Ethorbit Жыл бұрын
I've always disliked Android's lock screen security, it honestly seems like older models can do it better while newer ones are setup in a way that favors the gov in case they need to break into your device
@arcticcircle9178
@arcticcircle9178 Жыл бұрын
Why do you say that?
@IShowVelocity.
@IShowVelocity. Жыл бұрын
Theory: google actually put this as a backdoor access feature
@m4rt_
@m4rt_ Жыл бұрын
... you could also just take of your glasses if you are near sighted (can't see things that are far away)
@ChrisDeAnna
@ChrisDeAnna Жыл бұрын
David=Randal from Recess✍️
@jul13n
@jul13n Жыл бұрын
My oneplus 7 pro with android 11 and security patch from June 2022 is not vulnerable to the lockscreen bypass.
@GingerWritings
@GingerWritings Жыл бұрын
This is why I like Samsung secure folder. I can at least put another pin in the way of stuff. Not much, but I appreciate the feature.
@macktheripper7454
@macktheripper7454 Жыл бұрын
Same
@OramiIT
@OramiIT Жыл бұрын
So when you submit a report and an analyst says it is a best practices thing and not a vulnerability is that just dodging the situation?
@LaurentiusTriarius
@LaurentiusTriarius Жыл бұрын
There's probably a dozen Nigerian shop specializing in this exploit. (Glad your friend David got his bounty tho 👍)
@pingyong6940
@pingyong6940 Жыл бұрын
The $70k look almost like a bribe to shut up. The act doesn't seem to be doing the right thing. If it was, then what with the silence treatment, no actions to fix, and the so-called "duplication" report.
@GainingDespair
@GainingDespair Жыл бұрын
This doesn't seem like an bug, it bypasses encryption .....
@cid3384
@cid3384 Жыл бұрын
5:49 - isn't that FTX's Sam (SBF)?
@cedricvillani8502
@cedricvillani8502 Жыл бұрын
These bugs are worth a lot more than 100K and grabbing finger prints from vids has been done for years, the ten-printers use prisms and Unix to grab a finger print that was as of 1999. SenseTime in Taiwan knows a bit about grabbing pictures and info from sources you may not think to check 🎉
@isthatso1961
@isthatso1961 Жыл бұрын
What if Google intentionally left the backdoor for govt? That's why they didn't fix it in time.
@___DRIP___
@___DRIP___ Жыл бұрын
I remember similar exploits like this on the Galaxy S7.
@user-28qhfk65
@user-28qhfk65 Жыл бұрын
Im using s7 edge right now, can you tell me how you did it?
@timothy-9995
@timothy-9995 Жыл бұрын
I got a google pixel ad on this video.
@midimusicforever
@midimusicforever Жыл бұрын
Big L for Google that they didn't handle it better.
@amir3515
@amir3515 Жыл бұрын
No one is perfect
@FriedTendi
@FriedTendi Жыл бұрын
If Google patches it like that does that mean that it will go out to all other Android systems too how far back does this bug go can you do it with old cell phones
@MsMiDC
@MsMiDC Жыл бұрын
The glasses reflection does have an easy fix though. Just dont put them on if you are that paranoid. Put in some lenses.
@Hootie811
@Hootie811 Жыл бұрын
I always giggle at the way you say depreciated , it sounds like it's head is getting chopped off! Is that how it's normally pronounced? We say it very different in Australia
@willstikken5619
@willstikken5619 Жыл бұрын
This pixel guy used Googles tactics on bug disclosures against them.
@DaHaiZhu
@DaHaiZhu Жыл бұрын
Astrophotographers use that same technique of overlaying hundreds of images to produce a single sharp image of a planet or nebula. Its not that far fetched (pun intended)
@anteshell
@anteshell Жыл бұрын
Actually, no. The process is significantly different both on what the source material is and how to get to the final result. The idea is the same, but the practical application is nothing alike.
@MMOStars
@MMOStars Жыл бұрын
My phone has like 10 Chinese malwares running on it, so this has to be the least of my worries at this point 😅
@christopherleadholm6677
@christopherleadholm6677 Жыл бұрын
7:39 looks fun!!!
@napent
@napent Жыл бұрын
There is also another unpached bug that's allows to suppress lockscreen. I also reported it and get similar answer.
@NeverTilt96
@NeverTilt96 Жыл бұрын
a small price for what could have cost google way more in stock prices decreasing if he went and made the bug public :)
@shoalstone7831
@shoalstone7831 Жыл бұрын
new market for low-res webcams
@Aura_Mancer
@Aura_Mancer Жыл бұрын
Actually, the SIM PIN is still popular in some countries, like Spain and Ireland
@SayAhh
@SayAhh Жыл бұрын
I thought about setting one for mine, but was afraid that I would forget it.
@atpray
@atpray Жыл бұрын
Might have to start using non reflective glasses or contact lens
@akingevo3930
@akingevo3930 Жыл бұрын
use white and black camera and very cheap one for best privacy or just don't use camera
@Jaob994
@Jaob994 Жыл бұрын
After trying on my Nokia X20. Well.... I tried it 5 times and I only got it to work once I guess. I think it works a little bit different on all phones and I messed up once and did it by accident.
@sebastian05000
@sebastian05000 Жыл бұрын
Samsung phones aren't affected as for other OEMs not sure
@ecodev15
@ecodev15 Жыл бұрын
this doesnt seem to be an "encryption bypass" the device has to be in AFU to be unlocked (aka, after it has been decrypted in ram) as seen, when the device is in BFU (right after booting) it is not vulnrable to this, and just glitches out since it doesnt know how to decrypt the phone.
@mateuszzimon8216
@mateuszzimon8216 Жыл бұрын
U don't need AFU, if u hear this after battery was depleted.
@JohnSmith-lc1ml
@JohnSmith-lc1ml Жыл бұрын
70k is way to low of a reward
@MTS_IT
@MTS_IT Жыл бұрын
i have potatovision 480p camera from 2000-2010 era (more or less) - i'm safe :)
@TimothyJ519
@TimothyJ519 Жыл бұрын
using a pin locked sim to bypass lock screen and frp has been around for a little while now
@bokexd3173
@bokexd3173 Жыл бұрын
I just tried it on Redmi Note 7 Global on Lineage OS 18.1, doesn't work, just gets stuck on the lock screen
@dheerajr8246
@dheerajr8246 Жыл бұрын
That looks like what was shown in the movie Eagle eye
@iPeaked
@iPeaked Жыл бұрын
I was able to recreate this on 2 different Samsung devices sooo....
@samshntrash
@samshntrash Жыл бұрын
Lol I loved how he essentially did what project zero does. If you don't fix the issue will expose the solution that causes the issue
@NithinJune
@NithinJune Жыл бұрын
8:10 This could apply today to livestreamers and content creators
@wombatdk
@wombatdk Жыл бұрын
There is no device that is secure, unless it is disconnected, powered off and hidden in a vault miles underground.
@mrkiky
@mrkiky Жыл бұрын
What if someone digs a tunnel underground and then drills through the vault?
@swaggamesph3342
@swaggamesph3342 Жыл бұрын
This bypass even if release without a patch, will still need a working puk code though, which only telecom providers have access to.
@seraphina985
@seraphina985 Жыл бұрын
It is also included on the plastic card you have to punch the sim out of when you get it, also bear in mind the sim card lock and the PUK is tied to the SIM. Thus you do not need access to their SIM's PUK code, you simply need to be in possession of both the phone and a SIM with a sim lock set that you have the PUK code for, simply swap that in and bingo. Granted this doesn't let you bypass any SIM lock on their card so no sending or receiving future calls or texts to their number. But it does give you access to all data stored on the phone including any and all stored credentials with that information a social engineering attack on the mobile network to request a sim swap is likely to succeed in getting you the former too. Those credentials are likely to include sites that contain all of the customers personal information which could be used to trick customer service into believing you are them. You would likely be able to provide full name, address, phone numbers, email addresses, and likely answer detailed specific questions about their billing history with the phone company if they have their app installed etc, also last 4 digits of payment cards and bank accounts is likely to be available too. Suffice to say that is exactly the sort of information you need to get around phone based identity verification pretty much.
@foxtailedcritter
@foxtailedcritter Жыл бұрын
To be fair though iPhone still has a way to bypass the lockscreen, bad IME and the find My iPhone. Least now they're both on the same field. Kinda iPhone vulnerability spans across several generations to this day.
@plwl03
@plwl03 Жыл бұрын
I found one of such lockscreen bugs when I was like 12... Wish I knew the potential. It was on a Galaxy Tab S3 with a samsung case. When you have a guest account without a password, you log into that, change the user to someone else in the menu, quickly close the case so it goes into standby, wait a few seconds until it is on the other user, open the case. You will be logged onto the other user.
@Nocommentsuwu
@Nocommentsuwu Жыл бұрын
No one cares about it old phone or tablet can be hard moded
@plwl03
@plwl03 Жыл бұрын
@@Nocommentsuwu It was about 4 years ago
@morning5tarr
@morning5tarr Жыл бұрын
@@plwl03 thank you for disclosing your age , not your name and past device.
@plwl03
@plwl03 Жыл бұрын
@@morning5tarr no problem mate, the device wasnt mine
@johanngambolputty5351
@johanngambolputty5351 Жыл бұрын
Why is the CIS bad guy Paul Chuckle?
@pa3ckp7
@pa3ckp7 Жыл бұрын
Wait you guys don't have to enter pin after every restart?
@m4rt_
@m4rt_ Жыл бұрын
8:10 ..... they used a laptop similar to mine... oh no
@rajeshnayak8492
@rajeshnayak8492 Жыл бұрын
What about pattern lock, there is no way to put puk code in there.
@uhZeny
@uhZeny Жыл бұрын
I use a dslr daily as my webcam, but I don’t wear glasses 😊
@cameronmoore136
@cameronmoore136 Жыл бұрын
Severe vulnerability found? Reluctance to fix it? Kinda sounds like it was a well-kept secret feature, rather than a bug...
@Cartiisthegoat29
@Cartiisthegoat29 Жыл бұрын
8:58 Amogus!!!
@redslashed
@redslashed Жыл бұрын
Does this also work on other androids?
@xpower7125
@xpower7125 Жыл бұрын
The bug doesnt work on my tealme
@BTRSJ
@BTRSJ Жыл бұрын
I have tried in most Xiaomi device with A12 Thankfully its not working
@n00n1n
@n00n1n Жыл бұрын
$70,000? Holy shit, I mean it's Google, they basically print money.He had to be losing his mind once he got that email $70,000 babay
@xxxx-ey7rp
@xxxx-ey7rp Жыл бұрын
😂😂😂
@pineapplepizza5733
@pineapplepizza5733 Жыл бұрын
As someone that doesn't have glasses i see this as a very big problem
@ElonTusk.
@ElonTusk. Жыл бұрын
xioami phones dont ask for sim pass, youll need to manually need put put a password on sim i think. never happened to me
@xxxx-ey7rp
@xxxx-ey7rp Жыл бұрын
Yes it’s a extra option you have to put on
@schemata303
@schemata303 Жыл бұрын
70k damn
@KooLaidStudios
@KooLaidStudios Жыл бұрын
That was actually a famous FRP bypass or lock screen bypass technique that I been using on phones for a couple years now.
@ban-ey5mi
@ban-ey5mi Жыл бұрын
Damn 70k
@eddiemetriumzone3583
@eddiemetriumzone3583 25 күн бұрын
Nokia has this bug?
@iHazMuffinz
@iHazMuffinz Жыл бұрын
his simcode is 0000. lets be realistic , no1 changes sim pin.
@btuard
@btuard Жыл бұрын
Google are terrible at patching their phones, I got my grandma a 6a because her old phone wasn't working anymore, only for the phone to stop making and receiving calls and they haven't fixed it since.
@P0LAR07
@P0LAR07 Жыл бұрын
Ayo the pixel one is crazy wtf
@28Corner
@28Corner Жыл бұрын
What if a phone doesn't have biometrics lock?
@chri-k
@chri-k Жыл бұрын
then skip that step
@28Corner
@28Corner Жыл бұрын
@@chri-k aight
@mythakreep
@mythakreep Жыл бұрын
i got locked out of my phone today pls tell me a working way for the pin code
@marius.1337
@marius.1337 Жыл бұрын
How is this even possible? The phone should be encrypted after reboot, right?
@vaisakhkm783
@vaisakhkm783 Жыл бұрын
🤔 you are right
@ramirsn
@ramirsn Жыл бұрын
i think that's why it hanged on the phone starting screen
@ClassifiedPerson
@ClassifiedPerson Жыл бұрын
No it's not break the encryption On 1:11 it's not work because phone is rebooted and the phone is trying to load things without decryption key and it's loading in loop If you change simcard without rebooting will pop up the Sim lock on lockscreen But this time the decryption key is already in operation and therefore bug exploited
Police Just Hacked This App
8:05
Seytonic
Рет қаралды 85 М.
Hiding Malware in Space Pictures
9:12
Seytonic
Рет қаралды 115 М.
HAPPY BIRTHDAY @mozabrick 🎉 #cat #funny
00:36
SOFIADELMONSTRO
Рет қаралды 7 МЛН
Heartwarming: Stranger Saves Puppy from Hot Car #shorts
00:22
Fabiosa Best Lifehacks
Рет қаралды 21 МЛН
ОСКАР ИСПОРТИЛ ДЖОНИ ЖИЗНЬ 😢 @lenta_com
01:01
Жайдарман | Туған күн 2024 | Алматы
2:22:55
Jaidarman OFFICIAL / JCI
Рет қаралды 1,8 МЛН
How Google FIXED Android's BROKEN Security
14:52
XDA
Рет қаралды 75 М.
I Was Scammed With 800 MicroSD cards
10:56
Seytonic
Рет қаралды 207 М.
The Weirdest Hoax on the Internet
9:46
fern
Рет қаралды 51 М.
How One Line of Code Almost Blew Up the Internet
13:47
Kevin Fang
Рет қаралды 2 МЛН
All Apple Products are Vulnerable to New Password Stealing Hack
10:42
Hacking a SATA Cable to Transmit Files
10:11
Seytonic
Рет қаралды 92 М.
Fake WinRAR Hacks are Targeting Hackers
10:10
Seytonic
Рет қаралды 92 М.
Hacker Drones are Finally Here...
9:42
Seytonic
Рет қаралды 196 М.
Phone Surveillance Exposed
9:11
Seytonic
Рет қаралды 106 М.
GIANT alligator was caught in line while eating a smaller gator 😯 || Jacob Landry
0:10
Jacob Landry (swamp People)
Рет қаралды 11 МЛН
当小孩上学后,路飞太开心了#海贼王#路飞
0:25
路飞与唐舞桐
Рет қаралды 22 МЛН
GIANT alligator was caught in line while eating a smaller gator 😯 || Jacob Landry
0:10
Jacob Landry (swamp People)
Рет қаралды 11 МЛН
POR QUEEE DIVERTIDA MENTE 2 !!! #SHORTS
0:15
Figuritalo
Рет қаралды 42 МЛН