
> i like the idea of information being available if phone imaged > > maybe that's a separate concern from being able to reflash the image > onto another phone for now :s
obviously part of that is just disabling any normal basic encryption the phone has
maybe then an image could be taken, and one could just look at the image to see if user files are plaintext!
it's a little confusing cause android can have a custom logical partition format, maybe that could be added to a tool somewhere
there maybe is a mainstream android mod called "disable force encryption" that disables a normal android encryption of /data so i could in theory possibly, tar a running /data, disable encrypted /data, and untar my backup .... ?
i'd likely need root
this phone is mediatek :s
maybe stepping back from project. happy i added links.
i might try to make small steps on an appish thing to identify if another phone is mediatek, from a given phone. some kind of standalone script.
i think mediatek phones can be identified by the serial device they expose briefly on boot .. i think there were two of them, one when it is using the ROM bootloader, and a different one when it is using a firmware bootloader
or more robustly it can be communicated with.
but i think there is a general way to identify these serial devices because i think there is device code in the linux kernel that used to be patched in order to engage them
might not be happening have a fruit