• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Bandwidth-limit Android's HotSpot ???

I know phones usually have a settings option to limit the total amount of data used by tethered devices, but not to limit their bandwidth. This is the first time I've seen this been asked for. Certain carriers might have a bandwidth throttling on their networks, for like if one exceeds their fair usage policies.

This app according to the description is supposed to limit tethering bandwidth, amongst other things. However many of the user reviews are saying things like it doesn't work.
https://play.google.com/store/apps/details?id=com.bwr.free

Good luck.

Is bypassing FRP illegal?

Bypassing FRP is not illegal, at least not in my jurisdiction (which may not be the same as yours). But it's not something we generally advise on here, since recipes for bypassing anti-theft measures would also be valuable to any thieves who were to search for them (and I'm saying "also" because I believe you, but a thief looking to unlock a stolen phone would obviously not tell us that was what they were doing. At least you'd think it was obvious, but we've actually had people ask how to bypass security for phones they admitted were not theirs, as if they expected everyone to be fine with that...) .

What I will say is that whether it's actually possible depends on phone and what software it is running. Methods for doing so depend on exploiting bugs, and these tend to be patched when discovered, so there is no general method for doing this. For many devices there will be no way.

Maybe contact Google and see whether there is any way of recovering your Dad's account? That's a long shot, but it's all I can think of. You will need to use that account to log in.

Nokia WT240 Battery

Thank you. I was wrong about what I need. I need to know what the test points are from the battery to the motherboard because something is wrong with the ribbon. This pic is of a Nokia 3V. I colored it & put the numbers so it's easier to see. I need to know which one each is from left to right. I know they're pos. neg. & then 2 for the thermol sensors but I need to know which is which.

Attachments

  • Nokia Battery Points 2 (No Words).jpg
    Nokia Battery Points 2 (No Words).jpg
    98.9 KB · Views: 124

Fingerprint not working..

I did a hard reset first and suddenly it was working alright the finger print scanner, even though there was some extra crud on it from just playing with it after dinner time, and had BBQ sauce on the cell phone, so I cleaned it off, it worked alright after the second time around with the hard reset... Now to do a phone test soon, maybe dial voice mail and see if that eliminate my problem with the cached app

How to separate Phone's and Gmail's contacts?

...................................
The problem .......... is that I hardly ever use my phone for email, and if I do want to, I just use the email addresses from within the gmail app. I just want contacts with phone numbers on my phone. Starting a few phones ago, I have been managing my own contacts list and diligently exporting (and importing) and backing it up and making sure not to sync contacts ever.
If anyone has heard of a more elegant solution since 2018, I would love to hear it.
thanks........................

This is the solution that I have found and used. I found it by simply stabbing around without fully understanding the result in advance, and totally ignoring the almost universal advice to turn sync ON.
I now have sync turned OFF and it will stay that way.
I now appear to have a fully stable and reliable set of phone numbers in my Contact application.
I will report back if by chance it does not turn out this way.
Many thanks for this thread and the replies.

Jim.

Connections

I reread your last post and realize that your aids are connected. If you are seeing the option to change volume in the left and right aid in the phone settings... they are connected. My only other suggestion would be to disconnect that pairing which you should see that option also in the phone settings we were discussing. Once disconnected, once again pair them with your phone. I can't begin to know why all marriages aren't created equal and can't promise a second connection will be better than the first. However, I have been cheated out of BT features on ear buds only to have them work with a new pairing. It's worthy of a try. I would be in contact with your audiologist if all fails. I do not think that your S21 is the problem. Good luck.

Apps Native crashes in Google Play Console

Hi guys,

I have an Android app, which includes WebView component and some native libraries, such as PDFium.

It is published in Google Play store and while checking the list of reported crashes from users in Google Play Console, I found various crashes/aborts in native code, without any of my classes or bundled libraries mentioned in the stacktrace.

I haven't been able to reproduce any of the crashes (I am not even sure how to emulate them, as I didn't find any hints in the stacktraces). Are those crashes something I should be concerned about? If yes, are there any hints for reproducing / debugging / fixing these crashes?

Some examples from the Google Play Console are below, I appreciate any help/

Code:
backtrace:
  #00  pc 000000000006d5d4  /system/lib64/libc.so (tgkill+8)
  #00  pc 000000000006a9f4  /system/lib64/libc.so (pthread_kill+64)
  #00  pc 0000000000024018  /system/lib64/libc.so (raise+24)
  #00  pc 000000000001c8bc  /system/lib64/libc.so (abort+52)
  #00  pc 0000000000010aa8  /system/lib64/libcutils.so (__android_log_assert+224)
  #00  pc 000000000018ae8c  /system/lib64/libstagefright.so (android::MuxOMX::freeNode(unsigned int)+304)
  #00  pc 0000000000120a6c  /system/lib64/libstagefright.so (android::ACodec::LoadedState::onShutdown(bool)+68)
  #00  pc 0000000000120a0c  /system/lib64/libstagefright.so (android::ACodec::LoadedState::stateEntered()+224)
  #00  pc 00000000000132b4  /system/lib64/libstagefright_foundation.so (android::AHierarchicalStateMachine::changeState(android::sp<android::AState> const&)+540)
  #00  pc 00000000001246f4  /system/lib64/libstagefright.so (android::ACodec::IdleToLoadedState::onOMXEvent(OMX_EVENTTYPE, unsigned int, unsigned int)+140)
  #00  pc 000000000011c5dc  /system/lib64/libstagefright.so (android::ACodec::BaseState::onOMXMessage(android::sp<android::AMessage> const&)+756)
  #00  pc 0000000000012f98  /system/lib64/libstagefright_foundation.so (android::AHierarchicalStateMachine::handleMessage(android::sp<android::AMessage> const&)+136)
  #00  pc 000000000011c1f4  /system/lib64/libstagefright.so (android::ACodec::BaseState::onOMXMessageList(android::sp<android::AMessage> const&)+184)
  #00  pc 000000000011be20  /system/lib64/libstagefright.so (android::ACodec::BaseState::onMessageReceived(android::sp<android::AMessage> const&)+592)
  #00  pc 0000000000012f98  /system/lib64/libstagefright_foundation.so (android::AHierarchicalStateMachine::handleMessage(android::sp<android::AMessage> const&)+136)
  #00  pc 0000000000012d04  /system/lib64/libstagefright_foundation.so (android::AHandler::deliverMessage(android::sp<android::AMessage> const&)+52)
  #00  pc 0000000000016aa0  /system/lib64/libstagefright_foundation.so (android::AMessage::deliver()+112)
  #00  pc 0000000000013e3c  /system/lib64/libstagefright_foundation.so (android::ALooper::loop()+480)
  #00  pc 0000000000014694  /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+272)
  #00  pc 000000000006a1dc  /system/lib64/libc.so (__pthread_start(void*)+208)
  #00  pc 000000000001db28  /system/lib64/libc.so (__start_thread+16)

Code:
backtrace:
  #00  pc 00000000024ce0fa  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/lib/arm/libwebviewchromium.so
  #00  pc 00000000021f96c7  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/lib/arm/libwebviewchromium.so
  #00  pc 00000000019e7cdb  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/lib/arm/libwebviewchromium.so
  #00  pc 00000000021f967b  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/lib/arm/libwebviewchromium.so
  #00  pc 00000000019e7cdb  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/lib/arm/libwebviewchromium.so
  #00  pc 00000000019e76ad  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/lib/arm/libwebviewchromium.so
  #00  pc 00000000019e7693  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/lib/arm/libwebviewchromium.so (Java_J_N_MLlibBXh+10)
  #00  pc 00000000001f746d  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/oat/arm/base.odex (offset 0x1a3000) (J.N.M6H_IiaF [DEDUPED]+116)
  #00  pc 000000000034c54b  /data/app/com.google.android.webview-5npkyBQBV5C7Xv_FBRwiKA==/oat/arm/base.odex (offset 0x1a3000) (org.chromium.base.JavaExceptionReporter.uncaughtException+66)
  #00  pc 0000000000418375  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
  #00  pc 00000000003f1957  /system/lib/libart.so (art_quick_invoke_stub+226)
  #00  pc 00000000000a1031  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
  #00  pc 00000000001e8835  /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232)
  #00  pc 00000000001e3511  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776)
  #00  pc 00000000003ed14d  /system/lib/libart.so (MterpInvokeInterface+1020)
  #00  pc 000000000040b294  /system/lib/libart.so (ExecuteMterpImpl+14740)
  #00  pc 0000000000172f00  /system/framework/boot.vdex (java.lang.ThreadGroup.uncaughtException+32)
  #00  pc 00000000001c7e89  /system/lib/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool) (.llvm.1571629081)+352)
  #00  pc 00000000001cc757  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
  #00  pc 00000000001e34fb  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
  #00  pc 00000000003ee9c3  /system/lib/libart.so (MterpInvokeVirtualQuick+422)
  #00  pc 000000000040ee14  /system/lib/libart.so (ExecuteMterpImpl+29972)
  #00  pc 0000000000172eec  /system/framework/boot.vdex (java.lang.ThreadGroup.uncaughtException+12)
  #00  pc 00000000001c7e89  /system/lib/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool) (.llvm.1571629081)+352)
  #00  pc 00000000001cc757  /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
  #00  pc 00000000001e34fb  /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
  #00  pc 00000000003ed14d  /system/lib/libart.so (MterpInvokeInterface+1020)
  #00  pc 000000000040b294  /system/lib/libart.so (ExecuteMterpImpl+14740)
  #00  pc 00000000001731ea  /system/framework/boot.vdex (java.lang.Thread.dispatchUncaughtException+30)
  #00  pc 00000000001c7e89  /system/lib/libart.so (art::interpreter::Execute(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame&, art::JValue, bool) (.llvm.1571629081)+352)
  #00  pc 00000000001cc6a3  /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
  #00  pc 00000000003dfdc3  /system/lib/libart.so (artQuickToInterpreterBridge+890)
  #00  pc 000000000041c8ff  /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
  #00  pc 0000000000418375  /system/lib/libart.so (art_quick_invoke_stub_internal+68)
  #00  pc 00000000003f1957  /system/lib/libart.so (art_quick_invoke_stub+226)
  #00  pc 00000000000a1031  /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
  #00  pc 00000000003510dd  /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
  #00  pc 0000000000352085  /system/lib/libart.so (art::InvokeVirtualOrInterfaceWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+316)
  #00  pc 000000000027872f  /system/lib/libart.so (art::JNI::CallVoidMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+482)
  #00  pc 00000000001b16cb  /system/lib/libart.so (_JNIEnv::CallVoidMethod(_jobject*, _jmethodID*, ...)+38)
  #00  pc 000000000037ec3f  /system/lib/libart.so (art::Thread::HandleUncaughtExceptions(art::ScopedObjectAccessAlreadyRunnable&)+278)
  #00  pc 000000000037e277  /system/lib/libart.so (art::Thread::Destroy()+1142)
  #00  pc 000000000038db1d  /system/lib/libart.so (art::ThreadList::Unregister(art::Thread*)+100)
  #00  pc 0000000000373cb1  /system/lib/libart.so (art::Thread::CreateCallback(void*)+1628)
  #00  pc 0000000000063c15  /system/lib/libc.so (__pthread_start(void*)+22)
  #00  pc 000000000001e065  /system/lib/libc.so (__start_thread+22)

Code:
backtrace:
  #00  pc 000000000001ce72  /system/lib/libc.so (abort+62)
  #00  pc 00000000003574ef  /system/lib/libart.so (art::Runtime::Abort(char const*)+798)
  #00  pc 00000000000071c7  /system/lib/libbase.so (android::base::LogMessage::~LogMessage()+502)
  #00  pc 000000000037d1ab  /system/lib/libart.so (art::Thread::AssertNoPendingException() const+854)
  #00  pc 00000000000dd3b9  /system/lib/libart.so (art::ClassLinker::FindClass(art::Thread*, char const*, art::Handle<art::mirror::ClassLoader>)+28)
  #00  pc 00000000000f189f  /system/lib/libart.so (art::ClassLinker::DoResolveType(art::dex::TypeIndex, art::Handle<art::mirror::DexCache>, art::Handle<art::mirror::ClassLoader>)+122)
  #00  pc 000000000039ecef  /system/lib/libart.so (art::verifier::MethodVerifier::ScanTryCatchBlocks()+382)
  #00  pc 000000000039c0c7  /system/lib/libart.so (art::verifier::MethodVerifier::Verify()+522)
  #00  pc 000000000039e8ad  /system/lib/libart.so (art::verifier::MethodVerifier::FindLocksAtDexPc()+88)
  #00  pc 000000000039e7eb  /system/lib/libart.so (art::verifier::MethodVerifier::FindLocksAtDexPc(art::ArtMethod*, unsigned int, std::__1::vector<art::verifier::MethodVerifier::DexLockInfo, std::__1::allocator<art::verifier::MethodVerifier::DexLockInfo>>*)+378)
  #00  pc 00000000002df58b  /system/lib/libart.so (art::Monitor::VisitLocks(art::StackVisitor*, void (*)(art::mirror::Object*, void*), void*, bool)+286)
  #00  pc 000000000038586f  /system/lib/libart.so (art::MonitorObjectsStackVisitor::VisitFrame()+98)
  #00  pc 000000000036b087  /system/lib/libart.so (void art::StackVisitor::WalkStack<(art::StackVisitor::CountTransitions)0>(bool)+506)
  #00  pc 000000000037c327  /system/lib/libart.so (art::Thread::DumpJavaStack(std::__1::basic_ostream<char, std::__1::char_traits<char>>&, bool, bool) const+226)
  #00  pc 0000000000378dd1  /system/lib/libart.so (art::Thread::DumpStack(std::__1::basic_ostream<char, std::__1::char_traits<char>>&, bool, BacktraceMap*, bool) const+224)
  #00  pc 00000000003753df  /system/lib/libart.so (art::Thread::Dump(std::__1::basic_ostream<char, std::__1::char_traits<char>>&, bool, BacktraceMap*, bool) const+34)
  #00  pc 000000000038e6eb  /system/lib/libart.so (art::DumpCheckpoint::Run(art::Thread*)+674)
  #00  pc 0000000000388c21  /system/lib/libart.so (art::ThreadList::RunCheckpoint(art::Closure*, art::Closure*)+1136)
  #00  pc 0000000000387fd1  /system/lib/libart.so (art::ThreadList::Dump(std::__1::basic_ostream<char, std::__1::char_traits<char>>&, bool)+792)
  #00  pc 000000000035732b  /system/lib/libart.so (art::Runtime::Abort(char const*)+346)
  #00  pc 00000000000071c7  /system/lib/libbase.so (android::base::LogMessage::~LogMessage()+502)
  #00  pc 0000000000269fb7  /system/lib/libart.so (art::JNI::FatalError(_JNIEnv*, char const*)+126)
  #00  pc 00000000000c373d  /system/lib/libandroid_runtime.so (report_exception(_JNIEnv*, _jthrowable*, char const*)+500)
  #00  pc 00000000000c334b  /system/lib/libandroid_runtime.so (JavaBBinder::onTransact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+134)
  #00  pc 00000000000361cf  /system/lib/libbinder.so (android::BBinder::transact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+70)
  #00  pc 000000000003da17  /system/lib/libbinder.so (android::IPCThreadState::executeCommand(int)+410)
  #00  pc 000000000003d7a3  /system/lib/libbinder.so (android::IPCThreadState::getAndExecuteCommand()+106)
  #00  pc 000000000003dccb  /system/lib/libbinder.so (android::IPCThreadState::joinThreadPool(bool)+38)
  #00  pc 000000000005470d  /system/lib/libbinder.so (android::PoolThread::threadLoop()+12)
  #00  pc 000000000000c197  /system/lib/libutils.so (android::Thread::_threadLoop(void*)+166)
  #00  pc 000000000006f1ef  /system/lib/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+82)
  #00  pc 0000000000063c15  /system/lib/libc.so (__pthread_start(void*)+22)
  #00  pc 000000000001e065  /system/lib/libc.so (__start_thread+22)

Help Root, bootloader and data

Rooting an Android device years ago, say KitKat (2013 ver. 4.4.x) was an easier task and there are a lot less 'friction' involved using a rooted device. Flash forward to now and it's a different scenario -- Google, the phone manufacturers, and cellular service carriers are more 'root' averse, and using a rooted device can be a problem with a lot of banking services and some apps will be a problem (i.e. you cannot load the Netflix app from the Play Store on a rooted device, you have to manually sideload the APK). Plus it's important to keep in mind that simply because rooting can allow you to do more things on your device, it does not necessarily give the knowledge. There's a much better chance you will kill some important function on your phone when it's rooted something you may or may not be able to figure out how to restore. (re-flashing the appropriate ROM is the last resort) It's also easier to just brick your device when it's rooted, and never, never forget that running a rooted device also increases the likelihood of being compromised -- rooting it allows both you and some online idiot easier access to things that were previously restricted and protected.
So be aware rooting isn't the magic fix that a lot of people claim it is -- if you're technically savvy root it but don't forget there are drawbacks, If you're just a typical user than be more cognizant about what you're doing.

Post Software Update Changes

The display settings, and/or screen lock settings, along with maybe the accessibility settings.

Also check your security settings inside device administrators, because Google recently put some crapware in there that allows apps to do something with your phone lock and/or password (I removed it, so don't remember what it was).

This is exactly why I do not allow updates to my device.

In my experience, 'security updates' and the like are only Google and providers reclaiming devices that we think that we control.

Settings
Developers options
Automatic system updates
(off)

Also, if you had been running a firewall, you might have been able to discover exactly what app(s) were responsible for the update.

Then you could go about disabling, denying permissions, clearing all data, and/or whatever else can be done with such intrusive crAPPS.

Help Recording phone calls on android 11

Recording of calls was nixxed a few Android versions ago, and Google is in no hurry to make it easy again.

You can, however, use an app like Dingtone that has the ability to record calls.

https://dingtone.en.uptodown.com/android

This will basically work as an extra phone number on your device, but it will use wi-fi or cellular data to make and receive phone calls.

Two Older Android Phones I've been asked to recover

Encryption of the storage media didn't become a default until Marshmallow (vers. 6) was released in 2015. Prior to that it was a matter where we would have to go into the Settings menu and intentionally enable it. But at that time, Android hardware specs were a lot more resource-starved so depending on the phone model there could be a significant performance hit involved if you did enable it (Android was late to the game and used a software-based encryption for the internal storage media. Apple has always used encrypted media in its phones, and having control over both hardware and software development has also used a more efficient hardware/firmware encryption.)

Single command shut down?

OK, Thanks all. The assistance menu does work, but it just replaces the button push and hold with two taps, so it looks like there is no simple solution. I guess because it's designed primarily for phones, they haven't included a convenient shut off, or the ability to turn off redundant confirmations of actions like a computer os has.

Filter

Back
Top Bottom