Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Ask Lemmy
  3. What are the consequences of an unlocked bootloader on Android phones?

What are the consequences of an unlocked bootloader on Android phones?

Scheduled Pinned Locked Moved Ask Lemmy
asklemmy
18 Posts 9 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • gandalf_der_12te@discuss.tchncs.deG This user is from outside of this forum
    gandalf_der_12te@discuss.tchncs.deG This user is from outside of this forum
    [email protected]
    wrote last edited by [email protected]
    #1

    Consider i have a phone, and it's bootloader is unlocked. What is the worst that could happen?

    I'm interested in the security aspect of it. Consider you're detained by the police, and they want access to your phone. Can they get access if the bootloader is unlocked?

    What is the role of the password? I.e., i'm using a 4-digit PIN for my phone today. Can the phone's data be secured against police force if they get physical access to the phone?


    To further elaborate:

    I'm well aware of the XKCD:

    I'm wondering, apart from applying physical force, what are the surveillance aspects? Could somebody sneakily install spyware on my phone that can read all files on the phone's internal storage if they get a physical hold of it for (let's say) 15 minutes?

    30p87@feddit.org3 F Z N H 5 Replies Last reply
    5
    • gandalf_der_12te@discuss.tchncs.deG [email protected]

      Consider i have a phone, and it's bootloader is unlocked. What is the worst that could happen?

      I'm interested in the security aspect of it. Consider you're detained by the police, and they want access to your phone. Can they get access if the bootloader is unlocked?

      What is the role of the password? I.e., i'm using a 4-digit PIN for my phone today. Can the phone's data be secured against police force if they get physical access to the phone?


      To further elaborate:

      I'm well aware of the XKCD:

      I'm wondering, apart from applying physical force, what are the surveillance aspects? Could somebody sneakily install spyware on my phone that can read all files on the phone's internal storage if they get a physical hold of it for (let's say) 15 minutes?

      30p87@feddit.org3 This user is from outside of this forum
      30p87@feddit.org3 This user is from outside of this forum
      [email protected]
      wrote last edited by [email protected]
      #2

      While unlocking the bootloader [...] unleashes the full potential of the bootloader, it also poses a security risk. Even with your lockscreen protected with a pattern/PIN/password, not having flashed a custom recovery, having an anti-theft app installed (maybe even converted/installed as a system app) your phone's data is easily accessible for a knowledgeable thief.

      All the thief needs to do is reboot into the bootloader and boot or flash a custom recovery such as ClockWorkMod or TWRP. It's then possible to boot into recovery and use ADB commands to gain access to the phone's data on the internal memory (unless you have it encrypted) and copy/remove files at will.

      Granted, the risk seems low. The thief would not only require knowledge of fastboot, he would have to turn off the phone before you have issued a wipe command using an anti-theft app. You could of course flash back the stock recovery & relock the bootloader after being done with flashing stuff, but that would require you to unlock it again if needed which will erase your userdata.

      Of course, a thief can/is also the government.

      But, most phones can be unlocked by the pigs regardless, with eg. Cellebrite. The best bet is probably a pixel, as it can be relocked easily, with graphene. Or no phone at all.
      Also, I'd guess many Cellebrite tricks work with (weak?) pins/patterns. Use a password, and no fingerprint. And on eg. graphene, the emergency wipe after 10 wrong pws etc.

      gandalf_der_12te@discuss.tchncs.deG 1 Reply Last reply
      2
      • 30p87@feddit.org3 [email protected]

        While unlocking the bootloader [...] unleashes the full potential of the bootloader, it also poses a security risk. Even with your lockscreen protected with a pattern/PIN/password, not having flashed a custom recovery, having an anti-theft app installed (maybe even converted/installed as a system app) your phone's data is easily accessible for a knowledgeable thief.

        All the thief needs to do is reboot into the bootloader and boot or flash a custom recovery such as ClockWorkMod or TWRP. It's then possible to boot into recovery and use ADB commands to gain access to the phone's data on the internal memory (unless you have it encrypted) and copy/remove files at will.

        Granted, the risk seems low. The thief would not only require knowledge of fastboot, he would have to turn off the phone before you have issued a wipe command using an anti-theft app. You could of course flash back the stock recovery & relock the bootloader after being done with flashing stuff, but that would require you to unlock it again if needed which will erase your userdata.

        Of course, a thief can/is also the government.

        But, most phones can be unlocked by the pigs regardless, with eg. Cellebrite. The best bet is probably a pixel, as it can be relocked easily, with graphene. Or no phone at all.
        Also, I'd guess many Cellebrite tricks work with (weak?) pins/patterns. Use a password, and no fingerprint. And on eg. graphene, the emergency wipe after 10 wrong pws etc.

        gandalf_der_12te@discuss.tchncs.deG This user is from outside of this forum
        gandalf_der_12te@discuss.tchncs.deG This user is from outside of this forum
        [email protected]
        wrote last edited by
        #3

        Thank you for your comment.

        I assume using a password is better than using a PIN/pattern (as you said) because it has more entropy.

        IIRC Android actually encrypts all userdata by default nowadays but it only encrypts userdata and not the system partition.

        So if an attacker got access to the phone, they could install an update on the system partition that includes spyware and then spy on my password next time that i enter it. So once an attacker got a hold of my phone, i should assume they installed spyware on the system partition and the phone is no longer trustworthy. In that case, i'd have to flash and reformat the whole phone.

        (If i re-lock the bootloader, it has the advantage that i'd be notified if an attacker wrote updates to the system partition because all userdata would be wiped.)

        W 2 Replies Last reply
        0
        • gandalf_der_12te@discuss.tchncs.deG [email protected]

          Consider i have a phone, and it's bootloader is unlocked. What is the worst that could happen?

          I'm interested in the security aspect of it. Consider you're detained by the police, and they want access to your phone. Can they get access if the bootloader is unlocked?

          What is the role of the password? I.e., i'm using a 4-digit PIN for my phone today. Can the phone's data be secured against police force if they get physical access to the phone?


          To further elaborate:

          I'm well aware of the XKCD:

          I'm wondering, apart from applying physical force, what are the surveillance aspects? Could somebody sneakily install spyware on my phone that can read all files on the phone's internal storage if they get a physical hold of it for (let's say) 15 minutes?

          F This user is from outside of this forum
          F This user is from outside of this forum
          [email protected]
          wrote last edited by
          #4

          Someone can easily extract all of your data off the phone/install malware.

          C 1 Reply Last reply
          0
          • F [email protected]

            Someone can easily extract all of your data off the phone/install malware.

            C This user is from outside of this forum
            C This user is from outside of this forum
            [email protected]
            wrote last edited by
            #5

            With prolonged physical access, and a particular definition of "easily".

            F 1 Reply Last reply
            2
            • C [email protected]

              With prolonged physical access, and a particular definition of "easily".

              F This user is from outside of this forum
              F This user is from outside of this forum
              [email protected]
              wrote last edited by
              #6

              If the bootloader is unlocked then very easy. Just boot a custom recovery and backup the internal storage to your pc. Nobody's going to try to extract the entirety of your phones storage while you're taking a piss.

              W 1 Reply Last reply
              0
              • gandalf_der_12te@discuss.tchncs.deG [email protected]

                Consider i have a phone, and it's bootloader is unlocked. What is the worst that could happen?

                I'm interested in the security aspect of it. Consider you're detained by the police, and they want access to your phone. Can they get access if the bootloader is unlocked?

                What is the role of the password? I.e., i'm using a 4-digit PIN for my phone today. Can the phone's data be secured against police force if they get physical access to the phone?


                To further elaborate:

                I'm well aware of the XKCD:

                I'm wondering, apart from applying physical force, what are the surveillance aspects? Could somebody sneakily install spyware on my phone that can read all files on the phone's internal storage if they get a physical hold of it for (let's say) 15 minutes?

                Z This user is from outside of this forum
                Z This user is from outside of this forum
                [email protected]
                wrote last edited by
                #7

                consequences of an unlocked bootloader

                The Transport of London app refuses to start on your device (as well as several other apps from overly hypocritical idiots).

                1 Reply Last reply
                2
                • gandalf_der_12te@discuss.tchncs.deG [email protected]

                  Thank you for your comment.

                  I assume using a password is better than using a PIN/pattern (as you said) because it has more entropy.

                  IIRC Android actually encrypts all userdata by default nowadays but it only encrypts userdata and not the system partition.

                  So if an attacker got access to the phone, they could install an update on the system partition that includes spyware and then spy on my password next time that i enter it. So once an attacker got a hold of my phone, i should assume they installed spyware on the system partition and the phone is no longer trustworthy. In that case, i'd have to flash and reformat the whole phone.

                  (If i re-lock the bootloader, it has the advantage that i'd be notified if an attacker wrote updates to the system partition because all userdata would be wiped.)

                  W This user is from outside of this forum
                  W This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #8

                  In that case, i'd have to flash and reformat the whole phone.

                  you could try restoring partition images. needs testing though, maybe it doesn't work for some reason

                  1 Reply Last reply
                  0
                  • gandalf_der_12te@discuss.tchncs.deG [email protected]

                    Thank you for your comment.

                    I assume using a password is better than using a PIN/pattern (as you said) because it has more entropy.

                    IIRC Android actually encrypts all userdata by default nowadays but it only encrypts userdata and not the system partition.

                    So if an attacker got access to the phone, they could install an update on the system partition that includes spyware and then spy on my password next time that i enter it. So once an attacker got a hold of my phone, i should assume they installed spyware on the system partition and the phone is no longer trustworthy. In that case, i'd have to flash and reformat the whole phone.

                    (If i re-lock the bootloader, it has the advantage that i'd be notified if an attacker wrote updates to the system partition because all userdata would be wiped.)

                    W This user is from outside of this forum
                    W This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #9

                    (If i re-lock the bootloader, it has the advantage that i'd be notified if an attacker wrote updates to the system partition because all userdata would be wiped.)

                    are you sure that makes the data wiped? as I know, locking itself wipes, but it is not possible to write partitions anymore with standard tools, and the bootloader will check signatures with dm-verity (a linux tool) and if it doesn't match it'll just refuse to boot

                    gandalf_der_12te@discuss.tchncs.deG 1 Reply Last reply
                    0
                    • F [email protected]

                      If the bootloader is unlocked then very easy. Just boot a custom recovery and backup the internal storage to your pc. Nobody's going to try to extract the entirety of your phones storage while you're taking a piss.

                      W This user is from outside of this forum
                      W This user is from outside of this forum
                      [email protected]
                      wrote last edited by [email protected]
                      #10

                      that's not how it works at least for half a decade now. unless a manufacturer has gone way out of their way to disable it, android phones need to support some kind of data encryption to be certified by google

                      gandalf_der_12te@discuss.tchncs.deG F 2 Replies Last reply
                      0
                      • W [email protected]

                        that's not how it works at least for half a decade now. unless a manufacturer has gone way out of their way to disable it, android phones need to support some kind of data encryption to be certified by google

                        gandalf_der_12te@discuss.tchncs.deG This user is from outside of this forum
                        gandalf_der_12te@discuss.tchncs.deG This user is from outside of this forum
                        [email protected]
                        wrote last edited by [email protected]
                        #11

                        yeah Android actually encrypts all userdata by default nowadays

                        the PIN/pattern/password is used as the encryption/decryption key. That's why i guess choosing a 4-letter PIN as lock protection is weak and could be broken.

                        It would be nice if you could use a password for encryption (that means you'd have to enter it once after every re-boot), and then use a PIN while the device is running. Sadly i haven't found a way to do that yet.

                        S W 2 Replies Last reply
                        1
                        • gandalf_der_12te@discuss.tchncs.deG [email protected]

                          yeah Android actually encrypts all userdata by default nowadays

                          the PIN/pattern/password is used as the encryption/decryption key. That's why i guess choosing a 4-letter PIN as lock protection is weak and could be broken.

                          It would be nice if you could use a password for encryption (that means you'd have to enter it once after every re-boot), and then use a PIN while the device is running. Sadly i haven't found a way to do that yet.

                          S This user is from outside of this forum
                          S This user is from outside of this forum
                          [email protected]
                          wrote last edited by
                          #12

                          It would be nice if you could use a password for encryption (that means you'd have to enter it once after every re-boot)

                          some custom roms work exactly like this or really you can set it up how you would like.

                          1 Reply Last reply
                          0
                          • gandalf_der_12te@discuss.tchncs.deG [email protected]

                            Consider i have a phone, and it's bootloader is unlocked. What is the worst that could happen?

                            I'm interested in the security aspect of it. Consider you're detained by the police, and they want access to your phone. Can they get access if the bootloader is unlocked?

                            What is the role of the password? I.e., i'm using a 4-digit PIN for my phone today. Can the phone's data be secured against police force if they get physical access to the phone?


                            To further elaborate:

                            I'm well aware of the XKCD:

                            I'm wondering, apart from applying physical force, what are the surveillance aspects? Could somebody sneakily install spyware on my phone that can read all files on the phone's internal storage if they get a physical hold of it for (let's say) 15 minutes?

                            N This user is from outside of this forum
                            N This user is from outside of this forum
                            [email protected]
                            wrote last edited by
                            #13

                            No banking apps

                            1 Reply Last reply
                            1
                            • gandalf_der_12te@discuss.tchncs.deG [email protected]

                              Consider i have a phone, and it's bootloader is unlocked. What is the worst that could happen?

                              I'm interested in the security aspect of it. Consider you're detained by the police, and they want access to your phone. Can they get access if the bootloader is unlocked?

                              What is the role of the password? I.e., i'm using a 4-digit PIN for my phone today. Can the phone's data be secured against police force if they get physical access to the phone?


                              To further elaborate:

                              I'm well aware of the XKCD:

                              I'm wondering, apart from applying physical force, what are the surveillance aspects? Could somebody sneakily install spyware on my phone that can read all files on the phone's internal storage if they get a physical hold of it for (let's say) 15 minutes?

                              H This user is from outside of this forum
                              H This user is from outside of this forum
                              [email protected]
                              wrote last edited by
                              #14

                              Someone who stole it can flash their own modified OS. And dump the phone's data, probably in an encrypted state.

                              1 Reply Last reply
                              2
                              • W [email protected]

                                that's not how it works at least for half a decade now. unless a manufacturer has gone way out of their way to disable it, android phones need to support some kind of data encryption to be certified by google

                                F This user is from outside of this forum
                                F This user is from outside of this forum
                                [email protected]
                                wrote last edited by
                                #15

                                I never said it wouldn't be encrypted. But if they extract it and they're willing (or there's an exploit) they could de encrypt it.

                                Or it could be like the Android 7(?) days where you flash a quick zip and your data is unencrypted.

                                S 1 Reply Last reply
                                0
                                • gandalf_der_12te@discuss.tchncs.deG [email protected]

                                  yeah Android actually encrypts all userdata by default nowadays

                                  the PIN/pattern/password is used as the encryption/decryption key. That's why i guess choosing a 4-letter PIN as lock protection is weak and could be broken.

                                  It would be nice if you could use a password for encryption (that means you'd have to enter it once after every re-boot), and then use a PIN while the device is running. Sadly i haven't found a way to do that yet.

                                  W This user is from outside of this forum
                                  W This user is from outside of this forum
                                  [email protected]
                                  wrote last edited by
                                  #16

                                  It would be nice if you could use a password for encryption (that means you'd have to enter it once after every re-boot), and then use a PIN while the device is running. Sadly i haven't found a way to do that yet.

                                  also if we could set up multiple authentication methods, such that both biometric and pin is required. it would help against shoulder- and camera surfing, and legally against forcing your hand to the sensor to get it unlocked.

                                  1 Reply Last reply
                                  0
                                  • F [email protected]

                                    I never said it wouldn't be encrypted. But if they extract it and they're willing (or there's an exploit) they could de encrypt it.

                                    Or it could be like the Android 7(?) days where you flash a quick zip and your data is unencrypted.

                                    S This user is from outside of this forum
                                    S This user is from outside of this forum
                                    [email protected]
                                    wrote last edited by
                                    #17

                                    they could de encrypt it.

                                    this would depend on a password's strength tho?

                                    1 Reply Last reply
                                    0
                                    • W [email protected]

                                      (If i re-lock the bootloader, it has the advantage that i'd be notified if an attacker wrote updates to the system partition because all userdata would be wiped.)

                                      are you sure that makes the data wiped? as I know, locking itself wipes, but it is not possible to write partitions anymore with standard tools, and the bootloader will check signatures with dm-verity (a linux tool) and if it doesn't match it'll just refuse to boot

                                      gandalf_der_12te@discuss.tchncs.deG This user is from outside of this forum
                                      gandalf_der_12te@discuss.tchncs.deG This user is from outside of this forum
                                      [email protected]
                                      wrote last edited by
                                      #18

                                      no, locking itself doesn't wipe. unlocking wipes. at least on most devices.

                                      1 Reply Last reply
                                      0
                                      Reply
                                      • Reply as topic
                                      Log in to reply
                                      • Oldest to Newest
                                      • Newest to Oldest
                                      • Most Votes


                                      • Login

                                      • Login or register to search.
                                      • First post
                                        Last post
                                      0
                                      • Categories
                                      • Recent
                                      • Tags
                                      • Popular
                                      • World
                                      • Users
                                      • Groups