![]() ![]() ![]() |
![]() |
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | [ Easy-JTAG ] | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
Easy-Jtag / Easy-Jtag Plus The official support section. You can ask here your question and get answer regarding using Easy-Jtag / Easy-Jtag Plus. |
![]() |
| LinkBack | Thread Tools | Display Modes |
![]() | #47 (permalink) | |
Insane Poster ![]() ![]() ![]() Join Date: Apr 2014 Location: India
Posts: 87
Member: 2170791 Status: Offline Thanks Meter: 50 | Quote:
| |
![]() |
![]() | #48 (permalink) |
Product Supporter ![]() ![]() ![]() Join Date: Jun 2002 Location: Belarus Age: 46
Posts: 3,142
Member: 13148 Status: Offline Thanks Meter: 2,836 | you can't extract data from encryption partition directly from eMMC/UFS partition is crypted with data from current CPU if you need data - you need put CPU + Flash IC at another PCB (if you dead) and run device |
![]() |
![]() | #49 (permalink) |
Freak Poster ![]() ![]() ![]() ![]() Join Date: Aug 2007
Posts: 201
Member: 575576 Status: Offline Thanks Meter: 25 | ![]() i have in my shop realme 6i own by a police... he wants to erase the password without erasing all the files on the phone.. if i will use easy jtag..using emmc filemanager..is it posible? is any one to guide me.... https://scontent.xx.fbcdn.net/v/t1.1...5c&oe=5FD2DDF6 |
![]() |
![]() | #50 (permalink) |
Product Supporter ![]() ![]() ![]() Join Date: Jun 2002 Location: Belarus Age: 46
Posts: 3,142
Member: 13148 Status: Offline Thanks Meter: 2,836 | such a procedure is almost impossible on all modern android devices with android version above 6, encryption of user data is enabled by default. The password on the device also participates in the cipher, and the decryption key itself is random and is stored in the processor of the device until the next wipe of the user partition, when it is accidentally created and saved in the processor again. you can only theoretically access this encryption key and decrypt user data if you find vulnerabilities for hackers in a specific model of the device processor |
![]() |
The Following 6 Users Say Thank You to layder For This Useful Post: |
![]() | #51 (permalink) | |
No Life Poster ![]() ![]() ![]() ![]() ![]() ![]() Join Date: Feb 2008 Location: Hell..... Bcoz i am devil_king Age: 36
Posts: 1,917
Member: 696623 Status: Offline Sonork: 100.1601050 Thanks Meter: 526 | Quote:
key can be founded by BRUTEFORCE Method ??? if it's possible then implant that method on upcoming updates | |
![]() |
![]() | #60 (permalink) |
Junior Member ![]() ![]() Join Date: Dec 2014
Posts: 33
Member: 2309778 Status: Offline Thanks Meter: 3 | Operation: File Explorer... Scan from: Q313BB Vendor: Samsung Searching GPT ... GPT header is found and is valid GPT header successfully parsed Scan done Mount [efs] successfully PartType: LINUX Mount [system] successfully PartType: LINUX Mount [cache] successfully PartType: LINUX Mount [preload] successfully PartType: LINUX Get firmware version Brand = samsung Manufacturer = samsung Device = on5xelte Model = SM-G570F Phone platform = exynos5 CPU Abi = armeabi-v7a Android release = 8.0.0 Firmware version = R16NW.G570FXXS3CTF2 Firmware date = Fri Jun 5 17:39:41 KST 2020 Path not found: /*/media/0/DCIM/ |
![]() |
![]() |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|