[08:11pm] * Now talking in #zteblade [08:11pm] * Topic is 'Room For ZTE Blade/Orange San Francisco ROM and App Development, please feel free to give any input you think relevent' [08:11pm] * Set by Stephen_H on Fri Oct 22 15:44:10 [08:15pm] * tocixxx (d58f78dc@gateway/web/freenode/ip.213.143.120.220) Quit (Ping timeout: 265 seconds) [08:18pm] * tocixxx (d58f78dc@gateway/web/freenode/ip.213.143.120.220) has joined #zteblade [08:18pm] mkay.. done with the libs anything else i missed ? [08:19pm] shouldn bv - reboot is required [08:19pm] already done [08:20pm] check logcat as you wont get signel without removing all the apps and copying froyo aosp ones in due to some securitysms.apk app [08:20pm] i. c. [08:21pm] what is that securitysms.apk app anyway? [08:21pm] i dont know from the error i posted on modaco earlier it seems to try and send a sms but fails [08:21pm] aha [08:21pm] at which point ril seems to die/be killed [08:22pm] wouldn't surprise me if it's trying to contact ZTE [08:22pm] hmm. [08:22pm] I noticed that there is a telephone number listed in the Settings app too. I guess ZTE have locked down the ROM to prevent leaks [08:23pm] anyone fancy extracting the apk and examinign it [08:23pm] I know that the two people who offered to give us the system had engineering phones. One of them they claimed to have bought so was possibly stolen [08:23pm] I'll do it now [08:24pm] ok decompiled [08:24pm] asee whats in the phone apk aswell as it strts force closing as soon as sms one is removed [08:25pm] seems like a built in security feature against leaks. [08:25pm] hmm interesting. having a look at the manifest first. declares itself as com.android.securitysmsservice and I've just googled and found two threads about it.. both about other ZTE devices. [08:26pm] ah no, same thread lol [08:26pm] LOL [08:26pm] [08:26pm] [08:26pm] [08:26pm] [08:26pm] [08:26pm] yup i thought that when i spotted the exception in log toci [08:27pm] I dont like those permissions. [08:27pm] me neither.. [08:28pm] especially the sms one [08:28pm] Ok seems to be using the number 15982822749 [08:28pm] definitely a Chinese number [08:29pm] yup [08:29pm] 860172000010000 [08:29pm] ? [08:30pm] 86 is the country code for China, so it's another number [08:30pm] not sure if it's valid though [08:31pm] I'm not 100% sure here but the code seems to be checking IMEI [08:31pm] hmm [08:31pm] can we force it to just return valid [08:32pm] it's definitely grabbing phone data and sending it via SMS [08:32pm] wonder if theirs a way to intercept and fake the req [08:32pm] must be a way to just nuke it completely [08:33pm] it's being launched after boot so whats launching it [08:33pm] well it seems highly suspect that i see a 3g signal and orage network for about 5secs on boot then it disappears [08:33pm] bootstate [08:33pm] yes. I suspect this app loads, can't send the SMS so it blocks radio [08:33pm] phone/launcher [08:34pm] right [08:34pm] bingo [08:34pm] I'll see what I can do with the phone apk [08:35pm] hmm,. i somehow don`t see a 3G signal even at boot time [08:35pm] still missing some bits and pieces here [08:35pm] i do briefly (as i say in guesing its until this msg app loads [08:35pm] what is this app even for [08:35pm] some kind of debugging left there by zte? [08:35pm] if it's there to purposely discourage use by the community then zte are Doing It Wrong [08:36pm] hopefully it won't be too hard to disable [08:36pm] I think it's just to trace a phone if it's stolen more than anything [08:36pm] and i really hope this is the only problem [08:36pm] aha. [08:36pm] as the dump we are using is from a dev phone [08:36pm] i see [08:36pm] ideally we need a retail dump [08:36pm] yeah. the phone isn't out there yet though right? [08:36pm] hopefully this can be bypassed anyway [08:36pm] yeh it's not out yet [08:36pm] anything can be bypassed [08:37pm] as long as it's not hooking into kernel methods it shouldn't be too difficult [08:37pm] well, if it's in-kernel security then it's a bastard without the source :p [08:37pm] nah, this isn't that good.. it's pretty amateur to be honest [08:37pm] good news [08:38pm] the securitysms is being called by another app.. just need to find this and the part of the code calling securitysms and nuke it [08:38pm] sounds like the work of zte to me :) [08:38pm] try phone as it immediatly complained here [08:38pm] it's Chinese code. Nothing else you can say [08:38pm] yeh I'm checking phone out.. lot of files [08:39pm] could you just replace securitysms with a program that just does nothing? [08:39pm] then again it might communicate info with the service that calls it [08:40pm] id say securitysms is a trojan [08:40pm] though from what it sounds like the software is probably crappy, so i guess it is self contained. ie it runs [08:40pm] if it doesnt find what it is looking for, switches stuff off. end. [08:41pm] in which case it may be enough to just replace it with something that does nothing successfully *shrug* [08:41pm] and it does a bloody good job of it too vl4d [08:41pm] indeedy [08:41pm] yep, trojan. [08:41pm] hah, christ [08:42pm] hm ok.. not finding any reference to securitysms in phone [08:42pm] lol sounds like the chinese in general then, probly some form of censoring stuff to [08:42pm] launcher [08:42pm] ok [08:43pm] im not sure mind just guessing [08:44pm] * DJ_Steve goes to decompile security sms myself i gotta see this litle piecce of junk [08:45pm] * John_M (~john@78-105-231-25.zone3.bethere.co.uk) has joined #zteblade [08:47pm] I'm using apk manager to decompile. easy :) [08:48pm] baksmali [08:49pm] phone.apk strings.xml has these: SMS security [08:49pm] SMS Registration Status [08:49pm] hmm [08:49pm] is phone.apk device-specific? [08:50pm] usually yes [08:50pm] * blank_YuRi (~YoKo@92.81.177.22) has joined #zteblade [08:50pm] salutare [08:50pm] maybe ttry dropping phone.apk from a aosp build in [08:50pm] ill try that in a mo [08:50pm] ceeeeeeeee [08:50pm] just gonna wipe device and extract tar from scratch [08:51pm] sup black_TuRi [08:51pm] yuri* [08:51pm] no comprendo [08:51pm] hello [08:51pm] helo [08:51pm] hey [08:51pm] anything exciting :P? [08:51pm] Hey [08:51pm] hi [08:51pm] we're examining ztes little tojan at mo [08:52pm] :O [08:52pm] Nu spiking [08:52pm] :) [08:52pm] englis [08:52pm] are they listening to my phone calls :P? [08:52pm] LOL [08:52pm] no [08:52pm] haha ^^ [08:52pm] no, but this securitysms service seemsto do some 'interesting' things [08:52pm] maybe that is why they havent released the source [08:53pm] too scared :3 [08:53pm] lol [08:53pm] hidding something they don't want you to see [08:53pm] collecting information on the UK [08:53pm] xD [08:53pm] Ökay ! [08:53pm] ßÿë`ßÿé ßÿë`ßÿé [08:54pm] bye :) [08:56pm] I'm not doing very well trying to find whats calling this [08:56pm] thomas where esty [08:56pm] flibblesan try the qc* jar files in framework [08:56pm] those would make sense [08:56pm] ah yes, good idea [08:57pm] if cant find it can we fake a ok status [08:58pm] quite likely [08:58pm] but it's probably easier to just hunt what is asking for it [08:58pm] though really does it even RETURN anything? [08:59pm] i suppose it does since phone checks for it [08:59pm] * blank_YuRi (~YoKo@92.81.177.22) has left #zteblade [09:02pm] silly question but have you tried using the two qualcom files from 2.1 in the 2.2 rom? [09:02pm] yup [09:02pm] ok [09:02pm] their exactly the same neway [09:03pm] one is [09:03pm] lol [09:03pm] * Somebodyhere (~Somebodyh@78-56-215-205.static.zebra.lt) has joined #zteblade [09:03pm] qcrilhook is the same in both. qcnvitems is larger in the 2.2 rom [09:04pm] question is thats the difference [09:04pm] I don't know enough to see what I'm supposed to see [09:05pm] hmm, ztesmsinfo or similar [09:05pm] * dmzda (~DMzda@host86-128-250-148.range86-128.btcentralplus.com) has joined #zteblade [09:06pm] thats what I'm thinking but so far I dont see it [09:06pm] hmm [09:06pm] unless it's hidden [09:09pm] has to be in here somewhere surely jhmm