LightBlog

vendredi 2 septembre 2016

Samsung is Recalling the Note 7 Over Battery Issues, Sales of the Device Paused

In what will possibly the worst setback to Samsung in recent years, the company has decided to recall all Samsung Galaxy Note 7 devices sold worldwide till now, along with halting the sales of the flagship device until the issue is resolved.

Earlier reports mentioned that Note 7 shipments in certain regions were delayed due to quality testing. And today, in a statement published at Samsung’s official Press Room, the company has mentioned that it has found an issue during the quality testing. Specifically, 35 incidents of faulty phones were reported worldwide, and according to CNN, Samsung’s investigation has given them a figure of 24 devices with problems for every million sold.

Samsung is committed to producing the highest quality products and we take every incident report from our valued customers very seriously. In response to recently reported cases of the new Galaxy Note7, we conducted a thorough investigation and found a battery cell issue.

To date (as of September 1) there have been 35 cases that have been reported globally and we are currently conducting a thorough inspection with our suppliers to identify possible affected batteries in the market. However, because our customers’ safety is an absolute priority at Samsung, we have stopped sales of the Galaxy Note7.

For customers who already have Galaxy Note7 devices, we will voluntarily replace their current device with a new one over the coming weeks.

We acknowledge the inconvenience this may cause in the market but this is to ensure that Samsung continues to deliver the highest quality products to our customers. We are working closely with our partners to ensure the replacement experience is as convenient and efficient as possible.

Samsung has voluntarily promised to replace all Galaxy Note 7 device’s sold so far for free, the sales figure of which CNN reports to be pegged around 2.5 Million units sold worldwide. CNN’s report also mentions that the recall procedure will take two weeks to prepare and the date of availability of the new product will vary by country. At a news conference, company executives declined to comment on exactly how much replacing all the devices would cost the company, but with each phone retailing upwards of $850, the math does not look pretty.

While speaking in percentages, the number of affected devices is very low. But this was high enough for Samsung to initiate a total recall. Customers who are worried about the battery should contact the nearest Samsung service center. It is our personal request to users to not panic as the numbers are low, but still exercise caution as the issue is grave.

We respect Samsung taking a proactive approach to an issue which could have lethal repercussions. With the new iPhone release just around the corner and the Note 7 going on strong in sales, we realize this decision would not have been an easy one, and we appreciate them taking their responsibility seriously.



from xda-developers http://ift.tt/2bJGepy
via IFTTT

jeudi 1 septembre 2016

TWRP Developers Warn that Restoring EFS on TWRP v3.0.2-1 for the Nexus 6P may Brick your Phone

The developers of TWRP have put out an announcement via their IRC channel that restoring the EFS partition while using TWRP v3.0.2-1 may brick your Nexus 6P.



from xda-developers http://ift.tt/2bICzs1
via IFTTT

SnappzMarket’s Scott Walton Receives a 46-Month Prison Sentence

Four years ago, the FBI targeted multiple Android application pirating marketplaces. They seized their domains, arrested the people who were running it, and today we’re seeing the first conviction of the operation. Scott Walton was SnappzMarket’s “PR manager”, and has now been sentenced to 46 months in prison for conspiracy to commit copyright infringement.



from xda-developers http://ift.tt/2bU6POB
via IFTTT

OnePlus: “We’re Looking for Ways to Improve Camera on non-Oxygen OS ROMs”

How Tapjacking Made a Return with Android Marshmallow — and Nobody Noticed

While many of us salivate over the newly released Android Nougat for Nexus devices, the vast majority of users are still on Android Marshmallow. An exploit the existence of which has been documented since at least the middle of 2015 is still affecting many modern Android devices.

Malicious applications are able to tapjack your actions into granting them a permission you never explicitly granted. Here is how the exploit works.


The Return of Tapjacking

Imagine that you open up Instagram and try to share a picture you recently took while you were on vacation. When you select to  browse your gallery for a picture, Instagram asks you to grant it permission to access your storage. But when you tap “yes” you are met with an error message.

screen overlay detected

You are unable to grant the storage permission for Instagram because you have an active screen overlay enabled – in this case, one of the many applications that tint your screen so can use your phone at night without blinding yourself. This is a case of the Android permissions system working as intended: in order to grant an application a sensitive permission, you are required to disable any screen overlays you have on your device.

Marshmallow_Tapjacking_NextbitRobin

Marshmallow Permission Tapjacking. Tapping “Allow” will show all of my contacts.

Applications that have the ability to draw over your screen could potentially trick you into feeding it sensitive data. For instance, a screen overlay could place a fake password input on top of a real login screen in order to collect your passwords. An exploit like this is called ‘tapjacking’ and has popped and been patched on various Android versions throughout the years, with one of the worst examples lasting until Android 4.0.3. But recently, the exploit made a return with Android Marshmallow’s run-time permission model.

A developer by the name of Iwo Banaś created an application demonstrating the exploit. The way it works is fairly simple – when an application displays a permission dialog, the malicious application you installed will display use a system overlay to cover up the permission dialog’s text with whatever it wants. An unwitting user who clicks “allow” on the dialog will be tricked into granting a permission that they were asked for – but for which the request was hidden was the user’s view. Such an exploit utterly defeats the purpose of Android Marshmallow’s permission system, since the introduction of the new model was supposed to ensure that users would only permissions that they explicitly consented to.

Now, I know what you’re thinking of. If Android detected a system overlay and prevented me from granting Instagram storage permissions, wouldn’t it prevent this exploit from happening? The answer is no, in my testing it appears that on certain devices displaying a text overlay on top of a permission dialog does not trigger the safety mechanism. The developer of the proof-of-concept tapjacking application states that the exploit is effective because it relies on the user installing a secondary malicious application that targets API level 22 and below (pre-Marshmallow). This is due to the fact that before Android Marshmallow, all applications are granted permissions during installation.

Okay, so if you’re on Marshmallow all you would need to do is avoid installing any apps you don’t trust that request the permission to draw an overlay, right? If Android’s permission model was working as originally laid out, you would be right. But since the discovery of this exploit, even apps targeting API level 23 (Marshmallow) that request the overlay permission are a potential risk.


A Gap in the Permission Model?

Typical Apps using Overlays. Via: Medium

Typical Apps using Overlays. Via: Medium

If you’re one of the many millions of people who use Facebook Messenger for chatting with your friends, then you’ve come across one of Android’s best features – the ability for apps to draw on top of other screens. How cool is it that you can have a bubble with your favorite Facebook group chat follow the user on top of any application they open? Although Facebook’s Messenger brought the “floating apps” idea into the mainstream, the concept has existed for some time in Android. Applications have been able to create overlays on top of your apps for some time, thanks to the existence of TYPE_SYSTEM_OVERLAY in Android’s WindowManager.

overlay permission screen

“Draw over other apps” Permission Menu

Before Android Marshmallow, applications would need to request for a permission called SYSTEM_ALERT_WINDOW during installation before it could display overlays on top of your screen. But this changed with the introduction of 6.0’s granular run-time permission model. Users would now have to grant permissions to applications when actually running the app, which would hopefully spur the average user into safeguarding their own private data from applications that suspiciously request seemingly functionally unrelated permissions.

SYSTEM_ALERT_WINDOW is not like other permissions, however. Developers cannot display a dialog to programmatically request the permission be granted by the end-user, like most other permissions on any app targeting Marshmallow. Instead, you have to manually navigate to the settings screen and enable the permission yourself. Of course, some apps such as Facebook Messenger will help you along the process.

messenger overlay permission 1 messenger overlay permission 2

Google requires this of developers because they have deemed the permission to be “particularly sensitive.

Special Permissions

There are a couple of permissions that don’t behave like normal and dangerous permissions. SYSTEM_ALERT_WINDOW and WRITE_SETTINGS are particularly sensitive, so most apps should not use them. If an app needs one of these permissions, it must declare the permission in the manifest, and send an intent requesting the user’s authorization. The system responds to the intent by showing a detailed management screen to the user.

Given what we know above about tapjacking, this makes sense. But here’s the thing. Google doesn’t even follow its own rules. The screenshots of Facebook Messenger guiding you through the process of granting it the SYSTEM_ALERT_WINDOW permission that I showed you above? That only happens if you install the APK from outside of the Google Play Store. If you install an application from the Google Play Store, the SYSTEM_ALERT_WINDOW permission is automatically granted.

Facebook Messenger's Manifest File. The app is automatically granted the overlay permission despite targeting API level 23.

Facebook Messenger’s Manifest File. The app is automatically granted the overlay permission despite targeting API level 23.


Google has Sacrificed Safety for Convenience

For a long time before Android Marshmallow, SYSTEM_ALERT_WINDOW was considered a “dangerous” permission. With Android Marshmallow 6.0, the permission was changed to signature|system|appop which is what initially required developers to lead the user to the settings screen to grant the permission. But with Android version 6.0.1, SYSTEM_ALERT_WINDOW was modified so that the Google Play Store could grant automatically the permission without notifying the user. Why Google made this change is unclear to us. Google themselves have not come out and stated why they made this change, which is especially odd considering the language about SYSTEM_ALERT_WINDOW that still exists on their webpages.

It’s possible that enough developers were angered by the initial changes to SYSTEM_ALERT_WINDOW that required users to manually grant the permission that Google silently caved and just granted it to any application that requested it. But in doing so, Google has sacrificed safety for convenience. There is a reason why Google themselves considered the permission to be dangerous for the longest time, because it is. And the existence of the Marshmallow permission tapjacking exploit is enough evidence of the inherent dangers in automatically granting this permission to any app.

This tapjacking exploit has only recently been brought to our attention although it has existed for many months now. In our internal testing of devices among the XDA Portal team, we have confirmed that the exploit works on many modern devices running Android Marshmallow. Here is a quick run-down of the devices we tested on the latest available software versions for each respective device and whether or not the tapjacking exploit works. The devices marked “Vulnerable” are susceptible to a tapjacking exploit, while the devices marked “Not Vulnerable” are able to detect an app displaying the overlay and request that you disable it before continuing.

  • Nextbit Robin – Android 6.0.1 with June security patches – Vulnerable
  • Moto X Pure – Android 6.0 with May security patches – Vulnerable
  • Honor 8 – Android 6.0.1 with July security patches – Vulnerable
  • Motorola G4 – Android 6.0.1 with May security patches – Vulnerable
  • OnePlus 2 – Android 6.0.1 with June security patches – Not Vulnerable
  • Samsung Galaxy Note 7 – Android 6.0.1 with July security patches – Not Vulnerable
  • Google Nexus 6 – Android 6.0.1 with August security patches – Not Vulnerable
  • Google Nexus 6P – Android 7.0 with August security patches – Not Vulnerable

So far, those are all of the devices I was able to get the team to test. I could not find any correlation between security patch version and the exploit. As you can tell from our latest discussion regarding Android security updates, many people are not running on the latest security patches anyway, and are thus possible vulnerable to this exploit and others that are outlined on the Android Security Bulletin.


Moving Forward

tapjacking_service_overlay

Tapjacking Service Granted the Overlay Permission

We urge you to test this exploit on your device for yourself to see if you are vulnerable. We have compiled the APKs from the source code linked above (you can do it yourself, too) and have uploaded them to AndroidFileHost. In order to test the exploit, you need to install both the main tapjacking application as well as its helper service. Then, simply run the main application and click on the “test” button. If a text box floats on top of the permission dialog and when you click “allow” a list of your device’s contacts shows up, then your device is vulnerable to tapjacking. Don’t worry about the floating text box not entirely covering the permission dialog, this proof-of-concept app is not intended to perfectly demonstrate how to neatly hijack a permissions dialog, but rather to prove that it is indeed possible.

We hope that a fix is introduced that patches this exploit on all Marshmallow devices, and that OEMs update all of their devices to the latest security patch. Because the reality is that it will take many months for most pledged devices to get Nougat, so the only way for most users to stay out of harm’s way is to either install the latest security patches or to take monitor app permissions themselves. But with Google’s decision to automatically grant the potentially dangerous SYSTEM_ALERT_WINDOW permission, many users are unknowingly running apps that could potentially hijack their phones to grant more and more dangerous permissions.



from xda-developers http://ift.tt/2bMXdpM
via IFTTT

Sony Launches the Xperia XZ and the X Compact

It’s raining releases at IFA 2016, and Sony just gave us two new ones at the event. Meet the Sony Xperia XZ and the Sony Xperia X Compact.

Sony Xperia XZ

The Sony Xperia XZ is the successor to the Xperia X, and it aims to change a few things around, especially with the design. With the XZ, we now get a refresh on the design that feels more like the Lumia phones of the past. The phone is metallic, with a flat back and smooth-beveled sides. The top and bottom sides are flat, so the phone can stand flat on a desk, in case you ever wanted a phone that can do that. The display is a 5.2″ FHD IPS display, which should be comfortable and adequate for a lot of people. The fingerprint sensor is present on the side mounted power button, and you also get a dedicated shutter button.

Inside of the Xperia XZ, you get the Snapdragon 820 SoC, along with 3GB RAM. For internal storage, the dual-SIM variant comes with 64GB of internal storage and the single SIM variant comes with 32GB of storage. Sony does mention that 12GB of this storage is marked off for the phone’s firmware, but you also get microSD expandability, so that is not a very severe issue. The Xperia XZ also comes with a USB Type-C port, and the battery is marked for 2,900 mAh capacity with Quick Charge 3.0 capabilities. Water resistance does make a comeback, with the XZ sporting a IP65/68 rating.

The camera is where a lot of the action is, as the Sony Xperia XZ features an IMX300 23MP rear camera with f/2.0 aperture. The camera utilizes “Triple Image Sensing”, making use of color detection, phase detection and laser autofocus combined to make sure you are rarely ever out of focus. There is no OIS on the camera however, but there is a SteadyShot mode which utilizes the 5-axis gyro to stabilize shots. The rear camera supports 4K video recording. The front camera is a 13MP sensor with f/2.0 aperture.

xperia-xz

The Xperia XZ launches with Android 6.0 but a Nougat upgrade should be on the books. The device will be available in early October in Mineral Black, Forest Blue and Platinum colors. Sony has not mentioned a price, but as the product is positioned above the Xperia X Performance, do not expect it to be cheap.

Sony Xperia X Compact

The Sony Xperia X Compact builds up (builds down?) on the Xperia XZ design language. So you get the same feel, but this time in plastic, giving you a nice Lumia déjà-vu. The screen is a 4.6″ 720p IPS LCD display.

xperia-x-compact-hero-slideshow-02-desktop-bcd2cfe0452c73b929c817cd5edc1c25

Inside, the Xperia X Compact shows its Xperia X roots as it features a Snapdragon 650 SoC. The phone comes with 3GB of RAM and 32GB of internal storage. You also get a USB Type-C port, a substantial-for-its-size 2,900 mAh battery and Quick Charge 2.0. However, there is no waterproofing on the device.

The Sony Xperia X Compact uses the same rear camera setup from the Xperia XZ along with all of its new tech. The only thing missing is the 4K video recording. The front camera has been replaced with a 5MP snapper.

The Sony Xperia X Compact also comes with Android 6.0, but an update should be on the cards. The phone will be available in Universe Black, Mist Blue and White colors from next week. Pricing is not available yet, but we should be privy to more soon.

What are your thoughts on the Sony Xperia XZ and the Sony Xperia X Compact? Let us know in the comments down below!



from xda-developers http://ift.tt/2ctBPd9
via IFTTT

LeEco’s Le 2S Gets Certified in China by TENAA

We saw our first leaked images of the Le 2S from LeEco back in June of this year, and now the company has received certification for it in China. The documentation reveals it will have a 5.5″ 1080p IPS LCD display, MediaTek Helio X25 SoC, two 13MP rear cameras, an 8MP front camera, Android 6.0 Marshmallow and a 3,900mAh capacity battery.



from xda-developers http://ift.tt/2bGynce
via IFTTT