secure folder - Samsung Galaxy A40 Questions & Answers

Secure folder is not working on rooted android 11, smali patcher no longer works. Any way to fix it? i have found this, but its for a50 and i don't know it it would work for my a40 and i don't want to brick my device

Related

Secure folder on S8 custom rom with root : still nothing?

There are update regarding the secure folder on rooted device? I tried to search something but it was old

How to bypass Knox check in Secure Folder?

I've searched XDA and Google but most of them saied NO. But that doesn't explain stock based ROM that can use Secure Folder like hadesROM or Alexis Rom so there IS a way to bypass Knox check in Secure Folder.
You may say 'Then why don't you just use their ROM?' but I use S8+(SM-G955N) and their work are based on Note 8 or S8. I don't like that part personally. Of course, I cannot just copy&paste their work(you know why).
I've tried this method but I couldn't find that smali file because services.jar was odexed i think.
I even tried to use Smali Patcher but it turned out worst method because after using that module, my camera app stuck at black screen and Secure Folder app unlocks without entering pattern. I won't use it again because it overwrites framework file so I can't undo it.
Does anyone know how to bypass Knox check when using Secure Folder?

Debloating/Deknoxing a Stock ROM and creating one

I assume that you already have TWRP setup on your phone so I will not go through that process here.
Android version and Phone model
My tests are based off the latest stock ROM of the Canadian SM-G920W8 SIM unlocked model. The latest supported version of Android for the Samsung Galaxy S6 is Nougat version 7.0. Versions higher than that have serious camera issues, and yes, I tried MANY ROMs. Activating API2, trying other camera apps. They all sum up to be pretty much all the same with their different sets of problems. This is why I chose the latest v7.0 stock ROM. I have not fell on any v7.1.1 ROMs and v7.1.2 have camera issues too. So, I took the latest that does not come with camera issues.
Hardware key combinations to remember
Urgent/Bootloop shutdown and reboot: Volume DOWN + Home + Power
Enter TWRP: Volume UP + Home + Power
Assayyed Kitchen: XDA Thread
This tool is the best and easiest one I have found for Windows. I just do not use the debloat and deknox options as I do it myself with a personal webserver in PHP I wrote for myself. Assayyed Kitchen uses 3 main folders for working. PLACE, WORK and READY.
PLACE: You put there a zipped ROM or any Stock files in there. Assayyed will do all the unzipping for you.
WORK: Once Assayyed has done it's magic, you should see your needed files there where "system" is the most important one we will focus on here.
READY: That's where your final zip file is created for you to copy on your phone and install.
You do not need to use the PLACE folder if you already have a full uncompressed "system" folder. Simply copy and paste the "system" folder inside the WORK folder and use Assayyed skipping the #1 step of creating a project.
I will answer these questions:
Which files do I need to delete to remove KNOX, also known as deknox the rom?
Which files and apps can I safely remove to boot my phone with a clean Android system also known as debloat?
Now, debloating is still in a work in progress on my side because I have a very ambitious debloating project, like many. The aim of this debloation is to:
Remove all Google apps,framework and libs
Remove all useless Samsung apps that do not interfere with proper working equipement.
Remove all other additional apps
All I want is to keep the barebones of a functionning Android system while maintaining some needed functionalities such as a photo gallery, calendar and the camera.
Many ROM creators have their very own definition of DEBLOAT. They not only debloat the ROM but REBLOAT them with their own personal bloatwares INCLUDING magisk and sql lite and other hacks and apps for advanced configs. The goal of my ROM is to be able to install ON MY OWN Magisk, Open GApps and other stuff if I want AND not limited to versions that are included in the ROM. ROMs with Magisk, for example, use Magisk version uploaded at the time but Magisk evolves with time and newer version become available. So I hated to have all that stuff to take care about. It's the very basic stock rom debloated with nothing more than what stock offered. No kernels, no additional software, just a pure debloated and deknoxed ROM.
Here are the lists of what I have successfully debloated with a successfull boot for now. Note that I did not add the ".apk" because those files are usually inside their respective folders BUT, should you have no folders inside the app or priv-app folder, then simply add ".apk" at the end of the name. Other thing to mention, the root directory is "system". SInce my server works with the "system" folder directly, I did not add the "system/" at the beginning of every line. The complete lists are files and folders contained inside the "system" folder. Note that some files have no extentions too and should not be mistaken for folders.
Remove KNOX or comonly said DEKNOX
// ====
// Knox
// ====
app/KNOXStub
app/KNOXStore
app/KnoxAttestationAgent
app/KNOXAgent
app/KLMSAgent
app/ContainerAgent
app/ContainerEventsRelayManager
app/KnoxFolderContainer2
app/KnoxRemoteContentsProvider
app/KnoxAppsUpdateAgent
app/KnoxFolderContainer
app/KnoxSetupWizardClient
app/KnoxSwitcher
app/MyKNOXSetupWizard
app/KnoxMigrationAgent
app/KnoxSetupWizardStub
app/SamsungDLPService
app/BBCAgent
app/SecurityLogAgent
priv-app/MyKNOXSetupWizard
priv-app/KLMSAgent
priv-app/SPDClient
priv-app/SKMSAgent
container
tima_measurement_info
framework/knoxsdk.jar
framework/knoxvpnuidtag.jar
etc/secure_storage/com.sec.knox.store
etc/secure_storage/com.sec.knox.store!dex
// ==========================================================
// Phone will FAIL to boot if the following files are deleted
// ==========================================================
//etc/permissions/knoxsdk_edm.xml
//etc/permissions/knoxsdk_mdm.xml
//lib/libknox_encryption.so
//lib/libknox_km.so
//lib/libknox_legacy_ode_km.so
//lib/libknox_migration.so
//lib/libknoxvpnfdsender.so
//lib64/libknox_encryption.so
//lib64/libknox_km.so
//lib64/libknox_legacy_ode_km.so
//lib64/libknox_migration.so
//lib64/libknoxvpnfdsender.so
//framework/arm64/boot-knoxsdk.art
//framework/arm64/boot-knoxsdk.oat
//framework/arm64/boot-knoxvpnuidtag.art
//framework/arm64/boot-knoxvpnuidtag.oat
//framework/arm/boot-knoxsdk.art
//framework/arm/boot-knoxsdk.oat
//framework/arm/boot-knoxvpnuidtag.art
//framework/arm/boot-knoxvpnuidtag.oat
Incomplete but functional Samsung apps safe to remove
// =======
// Samsung
// =======
app/SamsungSans
app/VirtualTour_N_OS
app/VideoTrimmer_Dream
app/VideoEditorLite_Dream_N
app/VideoCollage_Grace_N
app/SlowMotion_Dream_N
app/EasterEgg
app/EasyOneHand3
app/GameOptimizer
app/WallpaperBackup
app/Weather2017_SE
app/WeatherWidget2017_SE
app/SmartRemote_zero
app/SmartSwitchAgent
app/SmartcardService
app/SecFactoryPhoneTest
app/SecurityProviderSEC
app/STalkback
app/OneNote_Compact_Samsung
app/GearManagerStub
app/SecMemo3
app/AllshareFileShare
app/AllshareMediaShare
app/SBrowser_5.0
app/SPrintSpooler7
app/CloudGateway2017
priv-app/GalaxyAppsWidget_Phone
priv-app/SamsungPayStub
priv-app/SamsungBilling
priv-app/GalaxyApps_3xh
priv-app/GalaxyCare
priv-app/GalaxyThemes
priv-app/PowerPoint_SamsungStub
priv-app/SamsungAccount_Dream
priv-app/SamsungCloud
priv-app/HealthService
priv-app/LegacySmartManagerProvider
priv-app/SamsungPass_1.1
priv-app/VoiceNote_5.0
priv-app/Word_SamsungStub
priv-app/ThemeCenter
priv-app/SecLiveWallpapersPicker
priv-app/SHealth5
priv-app/SmartManager_v5
priv-app/SmartManager_v5_DeviceSecurity
priv-app/EasyLauncher2_Zero
priv-app/SVoicePLM
priv-app/SmartcardManager
priv-app/SVoiceLang_EnglishPack_US_1.0
priv-app/SVoiceLang_FrenchPack_1.0
priv-app/SamsungMagnifier3
priv-app/SecEmail_N
priv-app/SecureFolderStub
priv-app/EasySetup
priv-app/GameHome
priv-app/GameTools
priv-app/OneDrive_Samsung_v2
etc/sysconfig/samsungaccount.xml
etc/sysconfig/samsungauthframework.xml
etc/sysconfig/samsungemail.xml
etc/sysconfig/samsungfidouafasm.xml
etc/sysconfig/samsungfidouafclient.xml
etc/sysconfig/samsungpushservice.xml
framework/gamemanager.jar
// ================================================
// Phone will have an EmergencyModeService has stopped
// if only the Launcher is removed and bootloop if the other
// 2 are removed so might as well keep them all.
// ================================================
// app/EmergencyLauncher
// app/EmergencyModeService
// priv-app/EmergencyInfo
Audio files debloat
These are extra Audio files that are not necessary for the phone to boot and like most people, you will probably customize your own ringtones. I kept a few basic ringtons and sounds so the phone can have something to work with on startup, but these files, to me are extras and unecessary.
media\audio\ringtones\A_Rustling_in_the_Trees.ogg
media\audio\ringtones\Basic_Bell.ogg
media\audio\ringtones\Basic_Tone.ogg
media\audio\ringtones\Beep_Once.ogg
media\audio\ringtones\Beginning.ogg
media\audio\ringtones\Bunny_Hopping.ogg
media\audio\ringtones\Chimes.ogg
media\audio\ringtones\Crossing_a_River.ogg
media\audio\ringtones\Dance_Party.ogg
media\audio\ringtones\Day_by_Day.ogg
media\audio\ringtones\Drifting_Downstream.ogg
media\audio\ringtones\Ecliptic.ogg
media\audio\ringtones\First_Light.ogg
media\audio\ringtones\Fresh_Morning.ogg
media\audio\ringtones\Mystic_Tone.ogg
media\audio\ringtones\Ocean_Voyage.ogg
media\audio\ringtones\One_Step_Forward.ogg
media\audio\ringtones\Prelude.ogg
media\audio\ringtones\Scampering_Tone.ogg
media\audio\ringtones\Somewhere.ogg
media\audio\ringtones\Ticktac.ogg
media\audio\ringtones\Warm_Greetings.ogg
media\audio\notifications\Beep_Once.ogg
media\audio\notifications\Good_Time.ogg
media\audio\notifications\Run.ogg
media\audio\notifications\S_Harmonics.ogg
media\audio\notifications\S_Opener.ogg
media\audio\notifications\S_Temple_Bell.ogg
media\audio\notifications\Sweet_Favour.ogg
media\audio\notifications\Whisper.ogg
media\audio\notifications\Hello.ogg
media\audio\notifications\Peanut.ogg
media\audio\notifications\S_Bubbles.ogg
media\audio\notifications\S_Charming_Bell.ogg
media\audio\notifications\S_Dew_drops.ogg
media\audio\notifications\S_Knock.ogg
media\audio\notifications\S_Tickety_Tock.ogg
WIP - Revove all Google framework and apps
I went through the entire apk, framework and lib folders from a full Open GApps zip file and tried to remove all of what it installs and I get a Bootloop, So working on trying to figure out what causes this.
I found some answers at these links concerning files that makes the phone fail to boot and other usefull information.
Project-Deep-Clean
Remove all Google apps from an android phone
Other lists to come soon when I am able to get my phone to boot with my removed apps...
In the mean time...
ROOTED phones: Removing unwanted apps WITHOUT using TWRP
So, I came upon a few things for the brave amongst you who wish to debloat their phones with root access but without using scripts in TWRP. Here is what you need to know.
Paths at the root of the phone, NOT sdcard...ROOT
/data/user/0 : This is where your installed apps are BUT they are saved under their package name and not their APK names. If you delete anything in this folder, you need to reboot after you are done cleaning in here.
/system/app : These apps re-install on phone reboot if not present
/system/priv-app : Same as above, these apps re-install on reboot if not present
File browser with ROOT access
I use Total Commander which can be downloaded from the Google Play Store. Once you open it, you need to enable root access by going into the app's settings using the "Configure..." option in it's menu. The scroll down to the bottom and check the box "Root functions everywhere". If you installed Magisk, the root permissions granting popup should appear for you to grant forever. Now, you can explore the entirety of your phone to delete those pesky apps.
Great guide! I've been meaning to get into making my own ROMs, particularly now that development for the S6 has all but stopped.
However, when I unpacked Assayyed my AV scanner Immunet (which uses CISCO's AV database) pinged up that there were 4 instances of "Andr.Dropper.Slocker::apk.agent.talos". These were in Superuser.apk, CLASSIC.zip, ASSAYYED.exe and FAST.zip.
Now, maybe this trojan is part of how the software operates - I could certainly see that as a possibility with things related to MicroG - but really a tool meant to remove things from a ROM, a tool you run in Windows oustide of Android, shouldn't be adding stuff like that back in.
TWeaKoR said:
Great guide! I've been meaning to get into making my own ROMs, particularly now that development for the S6 has all but stopped.
However, when I unpacked Assayyed my AV scanner Immunet (which uses CISCO's AV database) pinged up that there were 4 instances of "Andr.Dropper.Slocker::apk.agent.talos". These were in Superuser.apk, CLASSIC.zip, ASSAYYED.exe and FAST.zip.
Now, maybe this trojan is part of how the software operates - I could certainly see that as a possibility with things related to MicroG - but really a tool meant to remove things from a ROM, a tool you run in Windows oustide of Android, shouldn't be adding stuff like that back in.
Click to expand...
Click to collapse
Finding a WINDOWS tool to create a ROM is already not easy. On my side, I have not had any issues in running Assayyed. But I agree that the devs should AT LEAST try to make their apps AV detection free or at least warn people as to why they've incorporated those codes inside their app. BUT, that left asside, all the scripts used to do the work are available and one can simply make their own scripts or bat files and never use Assayyed as they simply launch commands from their scripts. Thank you for this information though!!!

(SOLVED) Over protective Tablet S6 lite LTE 2022 version

I have a S6 lite 2022 LTE version SM-P619. It's rooted and works great but I tried to change to boot screen qmg and shut down qmg's with ones that have a bit more animation. They work once but next reboot or shut down the original boring qmg's are back and the ones I inserted into the media folder have gone poof. Start up ones are that important but my shutdown one is of a tv shutting down that look really nice on the tablet. once...
edit: after doing a few things on this tablen I begin to wonder, is there some sort of security on the root partion? When I delete a file from the system/app it comes back after rebooting. When I rename that file, it comes back to original after rebooting.
Most puzzled... never seen this happen before.
*Bump* because I would really like to know how to really delete an app without it returning after a reboot. Rooted and using Root Explorer. I go to Root/system/app and delete a file such as DailyBoard. When I reboot the tablet it is back in the app folder like it was never deleted. As well, the issue of overwriting the shutdown.qmg is same, reboot and original is back. Am I only one with this or is anyone else seeing this?
Okay, I finally found out why this happens. Samsung has made all dynamic partitions (odm, product, system, vendor) READ ONLY! So even if you are rooted, you won't be able to debloat or change files on anything in the tablet (S6 Lite LTE 2022 P619)
So after searching around for an answer, I stumble upon a solution that worked for me. But you have to be able re-build the AP-P619XXXXX.tar file. Reason is that you will have a new super.img that is Read Write and allows you to delete files and push files to your tablet without the changes being undone. And rebuilding the ap-tar file is because the tablet doesn't have a working fastboot in it.
Go to: https://forum.xda-developers.com/t/...system-partitions-to-read-write-mode.4521131/ and follow all instructions carefully. You DO need to be rooted and do need Magisk install to be able to use this method. Good Luck

nvram folder is missing

hi there! i was trying to restore the imei on my s7 edge and i found a way by editing the mp0b_001 file, the path being: /data/nvram/md/NVRAM/NVD_IMEI/mp0b_001, but no matter where i searched i couldnt see it, like it disappeared totally. does anyone know how can i find it it? or maybe it is in another directory?(the phone is rooted and the file manager has su)
Try folder :
root/efs/imei/ <--
no, it isnt there either

Categories

Resources