Wednesday, 9 December 2015

Google Can Reset 75% of Android Phones Remotely


 
Reset

Google Can Reset Passcode of Older Versions of Android


The earlier operating software is at risk, namely codenamed Froyo, Ice Cream Sandwich, Gingerbread, Jelly Bean and KitKat. The older versions of Android devices could have their passcode reset by Google, remotely if the court order compels them to enable the authorities to look at the contents. According to a document by the New York District Attorney, it indicates that the phones and tablets running Android software which were released before Lollipop 5.0 seem to be vulnerable to resetting.

Latest software tend to use full disk encryption which means that Google is unable to comply with requests even if it is compelled to do so. Around 75% of Android devices still tend to use a software version which can be accessed remotely with a court order.

The document has mentioned that for some other types of Android devices, Google can reset the passcode when aided with search warrant as well as order instructing them to support law enforcement in removing data from the device. This procedure can be done remotely by Google and enables forensic examiners to view the contents of a device. The latest Android phones have encryption turned off by default, inspite of having the ability.

Automated System Enabling Complainants File


The process of turning it on differs by model though the same can usually be found in the settings menu somewhere. In the meanwhile, for copyright reasons, Google had mentioned that it receives 1,500 requests each minute for removal of specific results from its search engine. Under the Digital Millennium Copyright Act, Google provides an automated system enabling complainants file through an online form.

Every version of the Android operating system tends to have a numerical identifier and a name that has been historically the name of a dessert or candy such as Ice Cream sandwich. Unlike the devices of Apple, Android devices are manufactured by various different manufacturers which are referred to as Original Equipment Manufacturers or OEMs.

Android devices could set up a `pattern unlock’ passcode that is in line connecting at least 4 dots in a 9 dot grid in order to protect the data on their devices. Devices of specific operating systems provide the possibility of locking the device utilising numeric or alphanumeric passcode.

Fingerprint Readers Incorporated in Hardware


Some of the Android devices tend to have fingerprint readers, incorporated in the hardware of the device. However, the fingerprint reader is not assimilated in all Android devices due to the variety of OEMs developed Android devices. Google provide cloud storage in Google Drive as well as other locations and the data could be backed from an Android device, an iPhone, iPad or a computer, to Google’s cloud.

By default, Android devices do not tend to back up to Google cloud storage and hence a user must agree to choose to back up to the cloud where the choice is not a single but a series of choices, one for each kind of data.

Google had opposed the findings of the district attorney. Google’s security lead, Adrian Ludwig, had commented that `Google did not have the ability to facilitate unlocking any device that has been protected with a pin, fingerprint or password irrespective of the device being encrypted or not and for all the versions of Android’.