手機都中毒
android 機有幾出奇
我fd Ios都試過
手機都中毒
有無人依家長用hdr+影相
用hdr+真係靚過原生camera app
又有portrait mode (用緊1+3,無雙鏡)
https://www.xda-developers.com/oneplus-root-access-backdoor/
OnePlus Accidentally Pre-Installed an App that acts as a Backdoor to Root Access
It has been a little over a month since OnePlus was found to be collecting personally identifiable information for analytics. The company quickly reversed course, and in an update the company promised to be more transparent by clearly giving users the option to opt out of OxygenOS analytics. Though that debacle has since resolved, another is rearing its ugly head tonight. A user on Twitter who goes by the name “Elliot Anderson” (named after the main character of the popular Mr. Robot television series) has discovered that OnePlus accidentally left in place a diagnostic testing application made by Qualcomm. After decompiling this application, he discovered that it can be exploited to grant root access—effectively acting as a backdoor.
The application is called “EngineerMode” and it’s essentially a system application made by Qualcomm and provided to OEMs like OnePlus in order for OEMs to easily test all hardware components of the device. The application is pre-installed on all OnePlus 3, OnePlus 3T, and OnePlus 5 devices and can be easily accessible through any activity launcher as all of the app’s activities are exported.
https://www.xda-developers.com/oneplus-root-access-backdoor/
OnePlus Accidentally Pre-Installed an App that acts as a Backdoor to Root Access
It has been a little over a month since OnePlus was found to be collecting personally identifiable information for analytics. The company quickly reversed course, and in an update the company promised to be more transparent by clearly giving users the option to opt out of OxygenOS analytics. Though that debacle has since resolved, another is rearing its ugly head tonight. A user on Twitter who goes by the name “Elliot Anderson” (named after the main character of the popular Mr. Robot television series) has discovered that OnePlus accidentally left in place a diagnostic testing application made by Qualcomm. After decompiling this application, he discovered that it can be exploited to grant root access—effectively acting as a backdoor.
The application is called “EngineerMode” and it’s essentially a system application made by Qualcomm and provided to OEMs like OnePlus in order for OEMs to easily test all hardware components of the device. The application is pre-installed on all OnePlus 3, OnePlus 3T, and OnePlus 5 devices and can be easily accessible through any activity launcher as all of the app’s activities are exported.
仲有2日解釋
有無人部op5 講緊電話個時連唔到wifi? 定其實default係咁
https://www.xda-developers.com/oneplus-root-access-backdoor/
OnePlus Accidentally Pre-Installed an App that acts as a Backdoor to Root Access
It has been a little over a month since OnePlus was found to be collecting personally identifiable information for analytics. The company quickly reversed course, and in an update the company promised to be more transparent by clearly giving users the option to opt out of OxygenOS analytics. Though that debacle has since resolved, another is rearing its ugly head tonight. A user on Twitter who goes by the name “Elliot Anderson” (named after the main character of the popular Mr. Robot television series) has discovered that OnePlus accidentally left in place a diagnostic testing application made by Qualcomm. After decompiling this application, he discovered that it can be exploited to grant root access—effectively acting as a backdoor.
The application is called “EngineerMode” and it’s essentially a system application made by Qualcomm and provided to OEMs like OnePlus in order for OEMs to easily test all hardware components of the device. The application is pre-installed on all OnePlus 3, OnePlus 3T, and OnePlus 5 devices and can be easily accessible through any activity launcher as all of the app’s activities are exported.
仲有2日解釋
有咩好解釋
https://www.xda-developers.com/oneplus-root-access-backdoor/
OnePlus Accidentally Pre-Installed an App that acts as a Backdoor to Root Access
It has been a little over a month since OnePlus was found to be collecting personally identifiable information for analytics. The company quickly reversed course, and in an update the company promised to be more transparent by clearly giving users the option to opt out of OxygenOS analytics. Though that debacle has since resolved, another is rearing its ugly head tonight. A user on Twitter who goes by the name “Elliot Anderson” (named after the main character of the popular Mr. Robot television series) has discovered that OnePlus accidentally left in place a diagnostic testing application made by Qualcomm. After decompiling this application, he discovered that it can be exploited to grant root access—effectively acting as a backdoor.
The application is called “EngineerMode” and it’s essentially a system application made by Qualcomm and provided to OEMs like OnePlus in order for OEMs to easily test all hardware components of the device. The application is pre-installed on all OnePlus 3, OnePlus 3T, and OnePlus 5 devices and can be easily accessible through any activity launcher as all of the app’s activities are exported.
仲有2日解釋
有咩好解釋
其實個“backdoor”唔係好基本既development tools黎咩
雖然唔明點解會裝比一般user
其實個“backdoor”唔係好基本既development tools黎咩
雖然唔明點解會裝比一般user
華碩zenfone 同樣都有,唔知華碩個版本有咩功能
on9 成個後門禁個*#800#就搵到
我話之華碩有冇 唔合理之唔合理 唔好淡化件事
其實個“backdoor”唔係好基本既development tools黎咩
雖然唔明點解會裝比一般user
華碩zenfone 同樣都有,唔知華碩個版本有咩功能
on9 成個後門禁個*#800#就搵到
我話之華碩有冇 唔合理之唔合理 唔好淡化件事
on9 係*#808#呀
要淡化件事我洗撚推post?
其實個“backdoor”唔係好基本既development tools黎咩
雖然唔明點解會裝比一般user
華碩zenfone 同樣都有,唔知華碩個版本有咩功能
on9 成個後門禁個*#800#就搵到
我話之華碩有冇 唔合理之唔合理 唔好淡化件事
on9 係*#808#呀
要淡化件事我洗撚推post?
*#800# 係OnePlus 既event log tool
可以話係play store 既alogcat 既進階版
又或者windows 既event viewer
*#808# 係OnePlus 既系統測試程式, 可以測試啲硬件功能係咪正常運作
自然會用到WiFi Bluetooth GPS NFC 等等既功能
基本上又係類似Samsung 既*#0*#
或者Sony 既*#*#4636#*#*
又或者iPhone 既Diagnostic Tool