Unfortunately there was a memory leak in Android 5.0.x Lollipop. Thankfully it was fixed in Android 5.1. However, at the time of this video Xposed Framework doesn’t have Android 5.1 support. So you are faced with a choice of fixing the memory leak or running your Xposed Modules. Or are you? In this episode of XDA Xposed Tuesday, XDA TV Producer TK reviews an Xposed Module that adds the Android 5.1 memory fix to pre 5.1 Lollipop devices. The module...
Backup And Restore Your EFS Folder On Samsung Devices
The wonderful world of NV, EFS, and all the inherent dangers that come from messing with this. For those of you who have no clue as to what I am talking about, there is a dark, really deep and well protected section of your device that is virtually immune to any kind of flashing and manipulation (unless of course you know how to access it). This part of the device contains information such as IMEI (or MEID and ESN in the case of CDMA devices), programming parameters for the device such as your account information (phone number, etc), data provisioning parameters, and a whole bunch of other things that, when not handled properly, can render a device completely useless. All of these are contained in the infamous \EFS folder. XDA Recognized Developer lyriquidperfection just updated an app that he started working on not too long ago, which basically allows you to back up and restore the contents of this folder, just in case. It seems to be rather simple to corrupt this by trying to unlock or change certain “numbers” in it, which is why being able to back up the original thing is rather important. HTC devices are normally associated with tweaking this due to the ease of getting the device in Diag mode via EPST. However, Samsung devices (and really most devices out there) can indeed be put in Diag mode to access this special section.
Before you go digging around for ways to mess with your EFS folder, you need to understand that, unlike flashing a device (which could potentially lead to bricks as well) could render your device completely useless as it will no longer be recognized by your carrier. From this point, there is no tool to allow you to recover from a mistake done in here, so proceed with extreme caution. Have fun and happy (and safe) hacking!
This is a very sensitive system folder that contains Phone-specific information such as the IMEI (encrypted in the nv_data.bin), wireless devices MAC addresses, product code (also in the nv_data.bin), and much more. Often users trying to change product codes or trying to unlock the mobile will end up corrupting data in this location.
You can find more information in the original thread.
Want something published in the Portal? Contact any News Writer.
Thanks lyriquidperfection for the tip!
Want something on the XDA Portal? Send us a tip!
The LG G4 has a lot to prove, given that last year’s LG G3 was among the best smartphones of 2014. The Global Mobile Awards given out during the time of MWC 2015 named it the Smartphone of The Year (SOTY?) alongside the iPhone 6, and at the time of its release it packed the very best in Android specifications, from the powerful Snapdragon 801 to the class-leading 1440p display. The camera, battery life and feature set were also deemed...
You've probably seen or installed modified applications, be it a patched dialer for your resolution or a custom WhatsApp version with added features. How do developers do that, though? A lot of the time, the applications' source code isn't even available, so how does it all work? We'll see that first, then take a look at a new tool that aims to make the process much easier, and finally compare it to the popular Xposed framework to see how they...