> > > > > > i like the idea of information being available if phone imaged
> > > > > >
> > > > > > maybe that's a separate concern from being able to reflash the image
> > > > > > onto another phone for now :s
> > > > >
> > > > > obviously part of that is just disabling any normal basic encryption
> > > > > the phone has
> > > > >
> > > > > maybe then an image could be taken, and one could just look at the
> > > > > image to see if user files are plaintext!
> > > > >
> > > > > it's a little confusing cause android can have a custom logical
> > > > > partition format, maybe that could be added to a tool somewhere
> > > >
> > > > there maybe is a mainstream android mod called "disable force
> > > > encryption" that disables a normal android encryption of /data
> > > > so i could in theory possibly, tar a running /data, disable encrypted
> > > > /data, and untar my backup .... ?
> > >
> > > i'd likely need root
> >
> > this phone is mediatek :s
> >
> > maybe stepping back from project. happy i added links.
> >
> > i might try to make small steps on an appish thing to identify if
> > another phone is mediatek, from a given phone. some kind of standalone
> > script.
>
> i think mediatek phones can be identified by the serial device they
> expose briefly on boot .. i think there were two of them, one when it
> is using the ROM bootloader, and a different one when it is using a
> firmware bootloader

or more robustly it can be communicated with.

but i think there is a general way to identify these serial devices
because i think there is device code in the linux kernel that used to
be patched in order to engage them

Reply via email to