Strict Standards: Non-static method utf_normalizer::nfc() should not be called statically in /www/htdocs/w006661d/anddev/includes/utf/utf_tools.php on line 1781
[phpBB Debug] PHP Notice: in file /includes/session.php on line 1007: Cannot modify header information - headers already sent by (output started at /includes/utf/utf_tools.php:1781)
[phpBB Debug] PHP Notice: in file /includes/session.php on line 1007: Cannot modify header information - headers already sent by (output started at /includes/utf/utf_tools.php:1781)
[phpBB Debug] PHP Notice: in file /includes/session.php on line 1007: Cannot modify header information - headers already sent by (output started at /includes/utf/utf_tools.php:1781)

Strict Standards: Non-static method utf_normalizer::nfc() should not be called statically in /www/htdocs/w006661d/anddev/includes/utf/utf_tools.php on line 1781
[phpBB Debug] PHP Notice: in file /includes/functions.php on line 4362: Cannot modify header information - headers already sent by (output started at /includes/utf/utf_tools.php:1781)
[phpBB Debug] PHP Notice: in file /includes/functions.php on line 4364: Cannot modify header information - headers already sent by (output started at /includes/utf/utf_tools.php:1781)
[phpBB Debug] PHP Notice: in file /includes/functions.php on line 4365: Cannot modify header information - headers already sent by (output started at /includes/utf/utf_tools.php:1781)
[phpBB Debug] PHP Notice: in file /includes/functions.php on line 4366: Cannot modify header information - headers already sent by (output started at /includes/utf/utf_tools.php:1781)
anddev.org • View topic - Android Security Flaw - Owners Beware

Android Security Flaw - Owners Beware

News, information, contests and special event announcements from members of the anddev.org community.

Android Security Flaw - Owners Beware

Postby dchanson » Sat Feb 13, 2010 6:05 pm

Hey everyone,
Just wanted to give my good friends on anddev.org a heads up, apparently there's a loophole in the 'dot-pattern' unlock function in which you can bypass it. If you enter the wrong pattern too many times and then select ' forgot pattern?' and enter your e-mail address and 'null' for the password, it will unlock the device. My friend tipped me off to it, he said he confirmed it on a nexus one and a hero. I have a magic (mytouch3g) and it didn't work on mine, but you may want to try it and be aware. I've also attached an article that discusses the fact that the flaw is apprently present on the droids as well. More just for fun than anything but thought you all might like to know.

http://techcrunch.com/2010/01/11/verizo ... urity-bug/

Note: I DID receive an OTA update for my phone about 8 hours before I was told of this loophole, so it could be they're already rolling out the patches.
dchanson
Freshman
Freshman
 
Posts: 9
Joined: Fri Feb 12, 2010 4:28 pm

Top

Return to Open News

Who is online

Users browsing this forum: No registered users and 1 guest