20-04-2025 05:09 PM - last edited 20-04-2025 05:10 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
20-04-2025 07:01 PM - last edited 20-04-2025 07:05 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
I'm not saying we should ignore security, but in over 16 years of Android, it's worth noting Google and Samsung have always kept the majority of users safe and secure with their devices, inspite of even slower security updates, historically.
20-04-2025 07:02 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
20-04-2025 07:07 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
20-04-2025 07:13 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
Here you go https://youtu.be/BBIaZqQCx34?si=WalN_58FZy_2LyJT
20-04-2025 07:18 PM - last edited 20-04-2025 07:20 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
That exploit will also not work if you encrypt your secure folder. Instead of closing or locking it, press the 3 dots and press encrypt. Thats actually fully locks the secure folder instead of just putting it behind a lock screen.
So that exploit would need the owner to decrypt the secure folder, the device not be rebooted and auto blocker being off. If the owner never initially unlocked it or encrypted it after using it, nothing would appear
20-04-2025 07:27 PM - last edited 20-04-2025 07:28 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
Yes, and when you click on the monthly update link at the very bottom of the page in the software version, you can read what both Samsung and Google have patched. And some YouTube channels describe these monthly updates in detail.
Samsung is also full of holes, don't idealize it, even its first version of Nice Catch Good Lock's module was left in the Galaxy Store for months after Apkmirror raised the alarm when it discovered that the application was signed by others with Samsung keys. The compromised version of Nice Catch was still in the Galaxy Store for months, so Apkmirror and Sammobile put big warnings that the app is unsafe
20-04-2025 07:33 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
20-04-2025 07:51 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
Yes you do idealize it, you and OP
You were bragging that it was Google Messages, not Samsung, and Samsung left Samsung Messages deep in the system and I can even tell it was using RAM.
And OP wrote this
(There has been no reports of samsung devices ever being vulnerable, this started with iphones).......AND THIS IS ABSOLUTELY ISN'T TRUE.
20-04-2025 08:04 PM - last edited 20-04-2025 08:07 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
3 weeks ago
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Highlight
- Report Inappropriate Content
Although they are normally targeted at ordinary people.
Interesting post though, it's not often hackers , north Korea often try theses attacks. Trouble is everything co.es from China, often the vulnerabilities are in the hardware backdoor so cannot be detected by software protection against viruses. Trouble is western countries want / demand backdoor access to phones. Normally this is done through hardware that simply cannot be picked up by antivirus programs. All phones are vulnerable to these attacks even iphones, I'm pretty sure there are many out there we don't know about as they are used by government security agency's they say iphones can't be hacked. Bet the CIA can hack any phone
