In March of this year, the first time it was reported the discovery of vulnerabilities in the devices security Nexus, running on neobnovlёnnoy version of Android 6.0 Marshmallow, and beta -version Android N. Videobloger under the name RootJunky published a video that shows how the user can bypass the system Factory Reset Protection, taking advantage of vulnerabilities in the dialer, messaging application, and the keyboard-the Nexus devices.
Google company rather He responded quickly to a message, releasing the security update that eliminated the vulnerability. However, it turned out the other day that all the same videobloger found a new workaround that allows you to “hack” Nexus-devices running Android Marshmallow or Android N, including the Nexus 6P, Nexus 5X and Nexus 6 (patch for them was released only on this week).
As shown in the video, a new way of hacking, unlike the previous one, includes several additional steps, including the download and installation of special applications. Nevertheless, almost every Android user can easily bypass the Factory Reset Protection in just a few minutes. Another disturbing aspect is the fact that she, Google, wasting power to eliminate vulnerabilities, does not seek to fundamentally solve the problem, despite the fact that since the introduction of FRP function was held for a year.
Source: 4pda.ru
No comments:
Post a Comment