Sunday, April 29, 2018

Massive 18.4″ Samsung Galaxy View receives unofficial LineageOS 15.1

Although smartphones have gotten larger and larger, tablets have mostly been pretty consistent with display sizes ranging from 7-inches to 10-inches measured diagonally. The bezel-less trend hasn't caught on with tablets (as it doesn't really make much sense for them), though more devices have shifted to 4:3 displays to match the iPad. In late 2015, the Samsung Galaxy View was released with a massive 18.4″ 1080p display to buck the trend. It was an experiment that the company (nor anyone else) hasn't attempted since. Official software releases have long since ceased for the device, but now work has started on bringing Android 8.1 Oreo-based LineageOS 15.1 to the device.

Samsung Galaxy View LineageOS 15.1

Top: Samsung Galaxy View. Bottom left to right: Samsung Galaxy Tab S 8.4, iPad Pro 12.2, Samsung Galaxy S3, Jelly Pro

The device was launched with Android 5.1 Lollipop and has not even received a single major software upgrade. The last official release is dated March 7th, 2017 with a build date of October 11th, 2016. Fans of the massive media consumption tablet have yearned for a software update for some time. The only custom ROM available for the device for the longest time was Android Marshmallow-based CyanogenMod 13 created by XDA Recognized Contributor deadman96385. deadman96385 has announced that he recently started working on bringing LineageOS 15.1 to the Samsung Galaxy View, and he has published his first unofficial build for the device.

Since this is just a preliminary release for testing, there are a few major bugs. First of all, the light sensor doesn't work so there's no adaptive brightness. You can use an app like Underburn if you really want automatic brightness control, though. Next, since the build doesn't pass SafetyNet you'll have to sideload Netflix as it won't show up in the Play Store. Finally, the camera doesn't work so you can't use the device to do video calls just yet. There are also a few minor bugs, but we recommend you give the linked thread a thorough read to learn more (also because you should read any development thread regardless before you flash any custom software onto your device.)

Download unofficial LineageOS 15.1 for the Samsung Galaxy View



from xda-developers https://ift.tt/2KnHdLB
via IFTTT

Sprint and T-Mobile have agreed to merger, pending regulatory approval

We could soon see the number of major mobile carriers in the United States decrease from four to three if things go according to plan. T-Mobile and Sprint have finally agreed to merge, so long as the merger is approved by anti-trust regulators, that is. The companies were reportedly in talks to merge in September last year, and it was then later reported that discussions had been dropped – largely due to how much control Deutsche Telekom would have over Sprint (not to mention the valuation of the company's shares as well). The companies have valued their combined worth at $146 billion, with T-Mobile paying about $26 billion for Sprint's shares at $6.62 each. This is because T-Mobile is paying 9.75 Sprint shares for each T-Mobile U.S. share, which is about $6.62 to T-Mobile's Friday closing price of $64.52.

Originally, the companies planned to merge in 2014 but felt that under the Obama administration the merger would be shut down. Both companies feel that they have a better shot of pulling it off under the Trump administration. If both companies merge, then that will create a new contender better capable of taking on AT&T and Verizon. It is unknown how U.S. regulators will view the merger, as the mobile telecommunications market in the U.S. has little competition. Reducing the number of companies active in the sector only strengthens that oligopoly. The first plan for the companies, if they are to merge, is to roll-out the first 5G network in the US to what could potentially be 100 million customers.

As for the company's structure, current T-Mobile CEO John Legere will run the company, with current COO Mike Sievert becoming COO and company President. Sprint CEO Marcelo Claure and SoftBank CEO Masayoshi Son will both sit on the company's board. Deutsche Telekom will hold a 42% stake in the company, Sprint will hold 27%, and the rest is held by public shareholders. The combined company will have lower costs and greater economies of scale according to T-Mobile, and it will create thousands of American jobs. The company will be located in Bellevue, Washington.

While that's all well and good, the deal will need to be cleared by regulators first. It's unknown how exactly that will go down, but both companies are reasonably confident that it will go through.

What are your thoughts on the merger of T-Mobile and Sprint? Will this have negative consequences on the market, or will the merger lead to better plans in America? Let us know in the comments below!


Source: T-Mobile



from xda-developers https://ift.tt/2I1RuOY
via IFTTT

Magisk v16.4 Released with Improved MagiskHide & Android P Support, and More

When it comes to rooting solutions on Android, there's not a lot that can beat Magisk. Capable of bypassing SafetyNet detection while being lightweight and open source, it's the root solution of choice for most users on our forums. It even has frequent updates which bring better support and more features—despite the fact that XDA Recognised Developer/Recognized Contributor topjohnwu is currently serving mandatory military service in Taiwan. Magisk v16.4 has launched, and with it brings a number of improvements such as greater Android P support and MagiskHide improvements.

In recent times it seemed that application developers had learned to circumvent MagiskHide simply by running their root detection under another service. With Magisk v16.4, MagiskHide now correctly handles these cases and will also hide the current root status of the device to these services. Applications such As Pokemon Go employed this technique with the Pokemon Go+, the physical companion for the game. Users found that their Go+ would disconnect from their phone as the Go+ Bluetooth service would close when it detected root. It ran under the Pokemon Go package name, but was its own service that also detected root.

Another major addition is the inclusion of a more complete Android P support. Previously, you could use Magisk on Android P, but there were still a number of issues that needed to be ironed out. The main fix here is in the Magisk Manager installation on Android P, along with generic fixes in MagiskPolicy for AOSP which will prevent some system conflicts. In terms of updates to Magisk Manager, really there's just a few crash fixes and Android 7.1+ app shortcuts.

If you want to read the full changelog, simply go to the link down below. You can also download the update from the same thread, or if you have Magisk already installed you can update it through the Magisk Manager application.


Read Magisk v16.4 Announcement



from xda-developers https://ift.tt/2JB9Rr9
via IFTTT

Xiaomi Mi Mix 2S Android P OTA leaks early

With the first Android P Developer Preview announced in March, it brought a number of changes which you can test out now on the Google Pixel/XL and Google Pixel 2/2 XL. Surprisingly, Xiaomi has just announced that the Xiaomi Mi Mix 2s will also be receiving the Android P Developer Preview in the coming days, complete with all the features of Android P included. A tentative date of May 8th has been put forward as a release date, assuming all internal testing goes well.

This would be the first official public release of Android P for a non-Google device, though it's unclear whether this will be closer to AOSP Android and not MIUI. It's also unknown if the factory images will come directly from Google or from Xiaomi. The announcement post only states that the release will bring Android P's features to the device, which you can read about here and here.

The post, however, has been taken down from the MIUI forums. Initially, we hesitated to publish this post because we thought it might have been based on false information. However, our friends over at FunkyHuawei.club and XiaomiGeeks.com found that there was indeed Android 9.0 firmware in the works for the Mi Mix 2S. You can download it at the link below.

Download Xiaomi Mi Mix 2S Android P OTA

I am not sure how one can go about installing the leaked Android P Developer Preview OTA on your Xiaomi Mi Mix 2s. It might be possible to sideload it, but I doubt it since this will likely need to be approved for your device before it can be updated via the updater app. It may be possible to install by extracting the images and flashing over the partitions manually, but I would advise against that if you're using the device as a daily driver.

Regardless, it's surprising to see Xiaomi offer a preview release of the next version of Android; this is the kind of thing we would expect from Sony. Hopefully, other devices from Xiaomi will receive the P release and not just their flagship line.



from xda-developers https://ift.tt/2JBsKu4
via IFTTT

Saturday, April 28, 2018

Google Inbox spoofing vulnerability lets attackers fake email recipients

Be careful what you click on. Eli Grey is a security researcher who has found a vulnerability in Google Inbox allowing for an attacker to create a mailto link that spoofs the recipient of an email. He found this vulnerability on May 4th, 2017, almost a year ago, and reported it to Google privately. After following up on March 16th of this year and the bug still being unresolved, he decided to publicly disclose this vulnerability.

What happens is that generally, mailto links are used to automatically populate the content of an email to save users some time. We use a mailto link on our tip page to make it easier for users to send us a tip. Email clients such as Gmail or Google Inbox are supposed to parse these links and pre-compose the email draft with whatever information is present in the mailto link. For example, you could click a link to send PayPal customer support an email and it would show support@paypal.com in the outgoing recipient box.

What Eli Grey discovered is that you can construct a mailto link to spoof the email recipient in Google Inbox. This means that even though the draft email might say you are sending an email to support@paypal.com, it could be sending it to an entirely different address. The only way you would know is if you inspected the mailto link or expanded the "to" field before sending the email.

As an example, this mailto link will place support@paypal.com in the "to" box but if you actually send an email here it will instead go to scammer@phishing.fakewebsite (obviously not a real email address.) Fortunately, this vulnerability doesn't seem to affect Gmail or Outlook, so if you use those services you don't have to worry.

Google Inbox Spoofing Google Inbox Spoofing

Regardless, this is a prime example of why you should always inspect the links to anything you are about to click. Last year, a very clever Google Docs phishing scheme rocked the world because of how convincing it was to even most observant technologically savvy users. Avoiding a repeat of these schemes requires being vigilant, and never becoming too comfortable when it comes to your own personal security.



from xda-developers https://ift.tt/2HyQJ0t
via IFTTT

500 Firepaper will stop working on June 15th as 500px closes down API

Those of you who love having a random, but always great wallpaper, have surely heard about 500 Firepaper. It's an application that was created by XDA Senior Recognized Developer Chainfire and it has been changing the look of many Android home screens since late 2013. Unfortunately, according to the developer, 500 Firepaper will stop working this June as the 500px is shutting down its API.

500px is a place where professional photographers share their work. Artists create their portfolios and upload their work to gain recognition for themselves. The site offers a few plans, including a free one that allows uploading seven photos a week. Photos are sorted by categories so that everyone can find some quality shots. The Canadian startup has been offering public API access since 2011 which is how 500 Firepaper has been able to operate. While the 500px API closure has yet to be confirmed on the company's official blog, Chainfire announced that the API closes down on June 15th and henceforth his app will no longer work.

Unfortunately, this means that you can no longer use the 500 Firepaper app will to retrieve any photos from 500px. Without a proper source of getting images, the application will likely be deprecated. So far the app has been installed over 500 thousand times, so we can assume that it generated significant traffic on the site. The news that 500px's API will be shut down is a big blow to all photography lovers.

Those of you who would like to enjoy the application for the last few weeks of its existence can head over to its forum thread or go to the Play Store to get the latest version.

500 Firepaper (Free+, Google Play) →



from xda-developers https://ift.tt/2jfDqDq
via IFTTT

It is Time for Google to Fix its Android Security Update Problem

If the largest, richest OEM does a terrible job and gets away with it, how can we expect any better of the rest of them?

Samsung makes pretty good phones–great ones, even. They are also one of the few OEMs that actually profit on their device sales, and one of only two to make a sizable profit. People like their phones, in part because are reliable, have features users enjoy, and lately they have vastly improved their software. To our surprise, they've even killed off some of their annoying duplicate services and bloatware… anyone else remember Milk Music? In my eyes, they've come a long way, which should be exciting for all Android users too as they are one of the platform's standard-bearers. But despite all of this, Samsung still cannot get their act together when it comes to security updates in particular, highlighting an industry-wide problem. If Samsung can't do so, despite their tremendous investment in enterprise and software security, it's not unexpected to see others will have an even tougher time. This is why it's time for Google to finally step in on the situation.


Android Security, a Never-Ending Controversy

When I bought my Galaxy S9+ I was excited for many reasons. After testing the Note8 Oreo update for months, I could without a doubt say that Samsung had improved their software offerings quite a bit. It felt faster, smoother, more performant over the weeks (and not just right after flashing) than prior Nougat based builds, which was quite refreshing. They also were very quick on their security updates. Samsung would regularly have their Oreo beta builds running the most current security patches usually pushed within a week of Google announcing the bulletin. OEMs are often notified and ready to act a month ahead of the announcement, to give them time to have day one updates ready something most do not achieve. Samsung had also just finished changing their flagships to a more unified model and SKU scheme. Instead of the G965T, G965A, G965V, and so-on for every individual carrier, Samsung produces a singular base model G965U for the Snapdragon variant and G965F for Exynos. There still are other models like the N and FD variants and each carrier does get its own specific software revision, but the important thing is that generally speaking, I can install the unlock carrier variant software to my T-Mobile phone with no issues (Knox failing, or otherwise). Back in the old days, your options were more limited (T-mobile Note 4 users might recall having to flash the Canadian variant images for access to faster updates). Streamlining models is actually something many OEMs have done over the past few years, as seeing devices with specific hardware for a single carrier or market is less common.

This should have been a solid move in the right direction in terms of software updates seeing that they would no longer have to support individual SKUs but instead differentiate the phones in software for each carrier, and this software could actually be kept separate from the updated system files. Solid system on paper, but it has fallen flat on its face in real world application. While having the latest and greatest Android version is good, it is not what I consider truly important. What I feel is truly important is staying current in terms of security updates–many IT departments who require these updates for BOYD feel the same way, and Samsung just has not delivered. Neither has LG, neither has Motorola, neither has HTC, and neither have most others. I mainly focus on Samsung because they are the largest player, with the most resources to set a solid example for the rest of the market, but nearly every OEM partner has failed to maintain continuous security updates for the life of their devices. Further, pushing from lazy software support to outright deceit, just a few weeks ago a large investigation showed that even when Android OEM's did update their devices, they sometimes would not actually contain the updates they claimed to deliver. Sadly though, Android security breaches are nearly an every week occurrence resulting in a huge list of devices that go unpatched even if Google had already been notified, pushed updates to partners, updated their Pixel devices, and notified the public. It is important to recall as well why we even have security patches in the first place: Stagefright.

The Stagefright vulnerability was one of the largest ever discovered, spanning nearly all Android devices at the time. This became public at the end of July 2015 and within a month Google announced their Android Security Bulletin program and has done so every month since that time. Through the nearly three years of bulletins security vulnerabilities have been handled ahead of time, and before they became massive embarrassing news pieces highlighting the millions of exposed Android devices, so Google with their partners deserve some credit for maintaining this system. But simply having the system in place is not enough when partners are taking multiple months to push patches out, giving malicious individuals time to develop, implement, and attack even brand-new devices through these security flaws. My Galaxy S9+ is missing dozens of security patches and while most of them may not apply to my device, and may be for older SOCs or hardware, there is not a single month that goes by that does not have a patch my phone could benefit from. Many times we like to blame carriers, especially in the US, for slow or absent updates, but Samsung is not keeping carrier unlocked versions of their phones up to date either. This is a major problem Samsung… This is a solvable problem, Google.

This is the part of the story where we put blame where it belongs, and for as bad as Samsung is, Google holds the ultimate reigns of responsibility here, because frankly, they aren't being responsible in how they let other companies manage their brand. There are good partners out there like Essential, and even Razer who have done a solid job supporting their few thousand users and single model structure… Now before you throw Pixel Pixel Pixel in my face, hear this: Google has an obligation to ensure that their Android brand is well-represented, and brand new flagship devices running nearly three months of updates behind are not doing so properly. Why hasn't Google stepped up and forced partners' hands is anyone's guess, especially given that Android has suffered one disastrous security issue after another. It could be that they are afraid of the Samsung's and Huawei's moving to their own forks, with their own App Stores, but I don't think that is a valid concern. While these partners could do their own deal, the Google Play Store has more recognition, applications, and the ultimate user base splitting up would be detrimental to the end user and then these partners. There is a more sinister motive that could be at play though, one where Google simply doesn't care, and their behavior of letting Android OEMs do their own thing with weakly or unenforced standards does lend itself to this argument. Their end goal could be to simply have more users, field and harness more data, and making the bar of entry nearly non-existent gets partners on board, especially those who have no plans for supporting the trash they sell. Ultimately, it gets Google the data they desire. Regardless of the reasons, Google has to hold their partners to acceptable levels of standards and one of which should be security updates go out on time, every month for all currently maintained devices. There should be a standard all OEM partners to maintain current security patches or risk losing their CTS validation for future devices.

The Pixel 2 XL is a solid device, but its hardware under-delivers compared to other flagships

The Pixel brand is good and is Google's way of establishing a benchmark for partners in regards to timely updates, but the Pixel brand is still quite niche, and Samsung is unlikely to relinquish their control of the Android market share any time soon. However, putting software aside for a moment, the Pixel phones have been relatively inferior to similarly priced devices on the market. Be it a late adoption of 18:9 or water resistance last year, or LG being a terrible hardware partner this year, the Pixel phones are, in at least some ways, a step down in terms of the hardware offered for the price compared to other flagships that can be bought. Samsung sells more flagship phones in the first month than Google hopes to sell altogether–brand recognition, marketing and hardware or software features all play a role, but the result is what ultimately counts. The Pixel brand's impact on the market and mind-share is small and ultimately, when people think of Android, they think of the Samsung, LG, and Huawei devices of the world: all of which fail to properly maintain even their flagship devices.


The Android brand has been lambasted time and time again for its security flaws and slow updates, in great part thanks to these OEM partners.  It is finally time for Google to take control and hold these partners responsible for their behavior ,and establish requirements and rules to ensure all Android devices are as secure as they should be. Google has left it to manufacturers to manage the level of software support themselves for years no,w and all Google has been left with is a harsh tarnishing of their brand and image, resulting in damage that may never be undone.



from xda-developers https://ift.tt/2Jzcda2
via IFTTT