I didn’t keep the .XPI file, unfortunately. Is it possible from a phone’s file structure to export or even build this from(/out of?) a currently installed add-on that can no longer be (easily) downloaded?
Root is not impossible
What android version? Can you unlock the bootloader?
All you need is a release zip for the OS with boot.img and init_boot.img
Patch them in the magisk, app, flash them with fastboot, and you are rooted
But you might be able to access the internal app storage over USB (MTP)
I’ve got an S25 and I’d really like to keep the incredible security of Knox; rooting it would irreversibly trigger and disable it. I guess I could poke around with MTP…
Rooting irreversibly disables the secure element? Or what is knox?
Also I doubt that its security is incredible lol. It is just a secure element that can be used to generate keys and store a few secrets, at least if it is a secure element and not some software thing. Probably both.
I’m surprised you’re looking down on Samsung… Samsung Knox is military-grade, right up with IOS:
“Hevesi cited the Knox Warranty Fuse, a one-time programmable fuse that gets triggered if a Knox device is ever booted into an unapproved state. Once the fuse has fired, the device can no longer run Knox, and there’s no IT reset switch.” - https://www.informationweek.com/cyber-resilience/samsung-knox-security-beats-ios-android-gartner-finds
Hahaha check your sources mate. Those arent real competitors and it is a long time ago.
https://discuss.grapheneos.org/d/14344-cellebrite-premium-july-2024-documentation
Wrong comment? I don’t understand the connection.
No, right comment XD your sources are outdated and misleading. I gave you a relevant one to evaluate how secure a device is against physical attackers with government-level access to exploits and funding.
I would call that planned obsolescence… no normal user needs this.
Additionally, Samsung phones are FULL of spyware. More than google, xiaomi, huawei and others, way more. Which makes this more than ironic.
Do samsung phones allow to use LTE-only mode? Block the usb port? Prevent apps from loading code from the internet?
Are Samsung phones resistant to Cellebrite? Pixels running GrapheneOS (a free and open source OS, no spyware, no “breaking your device if you root it”)
But the fuse thing is interesting and concerning, thanks for the info.
While it seems to be unfortunately true that Samsung did ship AppCloud on budget devices, at least it’s not on the Galaxy S# series. As far as I know, Knox is incredibly difficult for hackers to crack if they steal your phone, especially if it was powered down at the time of theft. I’m unsure of why LTE-only matters (I’ve never heard of such a need before), and I don’t know about its USB port-blocking ability, but you can always get something like Rethink to block apps’ Internet access. I will need to read up on Cellebrite; I haven’t heard of that name in a while…
Rethink is okay but buggy and thus leaky. GrapheneOS also has a network permission which is tremendously useful, also from a security perspective.
E.g. your keyboard shouldnt have internet access, or it might likely send all your input to their servers for “necessary analysis” lol
I have tested an S9 and it was full of preinstalled malware. No recent one but there is no reason to believe things have changed.
The USB port is disabled if water gets in. GrapheneOS used the feature to allow users to turn it off, always or while locked. That is actual security and it doesnt break the device it users want to use other (open source) operating systems on them.
LTE-only is relevant because 2G and 3G are insecure. They were part of the attack chain used by governments to install the Pegasus Spyware on phones, along with browsers allowing HTTP traffic and more things that are dealt with by GrapheneOS.
Google has implemented very few of their features to work on regular Android, riddled with proprietary spyware.
Dont forget
- your sources are really old
- they are very vague
- Samsungs mechanism is a middle finger for user freedom, that is well known and a reason why GrapheneOS cant support their devices
- if your phone has Meta spyware, samsung spyware, microsoft spyware and google spyware preinstalled, “military grade” (which translates to “good enough and cheap”) is not relevant at all
It should still be in your ff profile folder under extensions/
If there is only the $extensionName.zip just rename to .xpi
Edit: I missed the keyword “Android” in your post. Without root there shouldn’t be a way to recover the extension, afaik.
Darn, I was about to ask lol. Well, now I know what else to yet keep another backup of from now on…
Does Android give you access to this?
Total Commander didn’t show any extensoion file in none of:
Android -> data [ -> org.mozilla.firefox ] -> media -> obbthese (and I have several: uBlock, clearURLs, Canvas, …)
With root, I was able to find my extension in the /data/data folder.
I’m on rooted PixelOS and only thing I have under data that’s related to firefox are:
Android -> data -> org.mozilla.firefox -> files -> Downloadsand there is 0 files
You’re looking in the wrong place. You need to be looking in /data/data, not /sdcard/Android/data.
located it under:
/data_mirror/data_ce/null/0/org.mozilla.firefox/files/mozilla/5476rl0j.default/extensions




