I didn’t keep the .XPI file, unfortunately. Is it possible from a phone’s file structure to export or even build this from(/out of?) a currently installed add-on that can no longer be (easily) downloaded?

  • boredsquirrel (he)@slrpnk.net
    link
    fedilink
    arrow-up
    2
    ·
    4 days ago

    Root is not impossible

    What android version? Can you unlock the bootloader?

    All you need is a release zip for the OS with boot.img and init_boot.img

    Patch them in the magisk, app, flash them with fastboot, and you are rooted

    But you might be able to access the internal app storage over USB (MTP)

    • Flagstaff@programming.devOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 days ago

      I’ve got an S25 and I’d really like to keep the incredible security of Knox; rooting it would irreversibly trigger and disable it. I guess I could poke around with MTP…

      • boredsquirrel (he)@slrpnk.net
        link
        fedilink
        arrow-up
        1
        ·
        2 days ago

        Rooting irreversibly disables the secure element? Or what is knox?

        Also I doubt that its security is incredible lol. It is just a secure element that can be used to generate keys and store a few secrets, at least if it is a secure element and not some software thing. Probably both.

        • Flagstaff@programming.devOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          I’m surprised you’re looking down on Samsung… Samsung Knox is military-grade, right up with IOS:

          “Hevesi cited the Knox Warranty Fuse, a one-time programmable fuse that gets triggered if a Knox device is ever booted into an unapproved state. Once the fuse has fired, the device can no longer run Knox, and there’s no IT reset switch.” - https://www.informationweek.com/cyber-resilience/samsung-knox-security-beats-ios-android-gartner-finds

          https://community.spiceworks.com/t/a-military-grade-phone-how-dod-standards-helped-hone-the-samsung-knox-platform/514009

              • boredsquirrel (he)@slrpnk.net
                link
                fedilink
                arrow-up
                1
                ·
                19 hours ago

                No, right comment XD your sources are outdated and misleading. I gave you a relevant one to evaluate how secure a device is against physical attackers with government-level access to exploits and funding.

          • boredsquirrel (he)@slrpnk.net
            link
            fedilink
            arrow-up
            1
            ·
            1 day ago

            I would call that planned obsolescence… no normal user needs this.

            Additionally, Samsung phones are FULL of spyware. More than google, xiaomi, huawei and others, way more. Which makes this more than ironic.

            Do samsung phones allow to use LTE-only mode? Block the usb port? Prevent apps from loading code from the internet?

            Are Samsung phones resistant to Cellebrite? Pixels running GrapheneOS (a free and open source OS, no spyware, no “breaking your device if you root it”)

            But the fuse thing is interesting and concerning, thanks for the info.

            • Flagstaff@programming.devOP
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              1 day ago

              While it seems to be unfortunately true that Samsung did ship AppCloud on budget devices, at least it’s not on the Galaxy S# series. As far as I know, Knox is incredibly difficult for hackers to crack if they steal your phone, especially if it was powered down at the time of theft. I’m unsure of why LTE-only matters (I’ve never heard of such a need before), and I don’t know about its USB port-blocking ability, but you can always get something like Rethink to block apps’ Internet access. I will need to read up on Cellebrite; I haven’t heard of that name in a while…

              • boredsquirrel (he)@slrpnk.net
                link
                fedilink
                arrow-up
                1
                ·
                19 hours ago

                Rethink is okay but buggy and thus leaky. GrapheneOS also has a network permission which is tremendously useful, also from a security perspective.

                E.g. your keyboard shouldnt have internet access, or it might likely send all your input to their servers for “necessary analysis” lol

              • boredsquirrel (he)@slrpnk.net
                link
                fedilink
                arrow-up
                1
                ·
                19 hours ago

                I have tested an S9 and it was full of preinstalled malware. No recent one but there is no reason to believe things have changed.

                The USB port is disabled if water gets in. GrapheneOS used the feature to allow users to turn it off, always or while locked. That is actual security and it doesnt break the device it users want to use other (open source) operating systems on them.

                LTE-only is relevant because 2G and 3G are insecure. They were part of the attack chain used by governments to install the Pegasus Spyware on phones, along with browsers allowing HTTP traffic and more things that are dealt with by GrapheneOS.

                Google has implemented very few of their features to work on regular Android, riddled with proprietary spyware.

                Dont forget

                • your sources are really old
                • they are very vague
                • Samsungs mechanism is a middle finger for user freedom, that is well known and a reason why GrapheneOS cant support their devices
                • if your phone has Meta spyware, samsung spyware, microsoft spyware and google spyware preinstalled, “military grade” (which translates to “good enough and cheap”) is not relevant at all
  • HairyHarry@lemmy.world
    link
    fedilink
    arrow-up
    4
    arrow-down
    1
    ·
    edit-2
    5 days ago

    It should still be in your ff profile folder under extensions/

    If there is only the $extensionName.zip just rename to .xpi

    Edit: I missed the keyword “Android” in your post. Without root there shouldn’t be a way to recover the extension, afaik.