安卓機型玩機搞機刷寫第三方twrp存儲出現(xiàn)亂碼 存儲不顯示等情況都是沒有解密data分區(qū)的原因。用戶需要在twrp里格式化data分區(qū)重啟后存儲顯示正常。那么這個操作后你的數(shù)據(jù)分區(qū)就會唄徹底清除。
?今天主要解析下如何操作可以永久解密data分區(qū)。其實data分區(qū)加密原則上也是廠商為了用戶安全。簡單來說。如果你設(shè)置了開機密碼。但手機系統(tǒng)沒有加密data分區(qū)。其他有能力者很輕松就可以獲取到你data分區(qū)里面設(shè)置保存的密碼。此操作后原則上任何第三方twrp都可以正常掛載data分區(qū).讀取data分區(qū)所有數(shù)據(jù).步驟如下;
??????1---首先要進行開頭名為fstab的類似fstab.qcom文件的修改操作。fstab開頭的文件都需要按此方法進行修改
目錄
??????1---首先要進行開頭名為fstab的類似fstab.qcom文件的修改操作。fstab開頭的文件都需要按此方法進行修改
???????機型不同。略有不同
?
??????在這個文件用?Notepad++打開或者搜索類似fileencryption=ice,wrappedkey,keydirectory=/metadata/vold/metadata_encryption代碼
/dev/block/bootdevice/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,reserve_root=32768,resgid=1065,fsync_mode=nobarrier,inlinecrypt latemount,wait,check,formattable,encryptable=aes-256-xts:aes-256-cts:v2+inlinecrypt_optimized+wrappedkey_v0,metadata_encryption=aes-256-xts:wrappedkey_v0,keydirectory=/metadata/vold/metadata_encryption,quota,reservedsize=128M,sysfs_path=/sys/devices/platform/soc/1d84000.ufshc,checkpoint=fs
??????fstab.emmc這個文件里也有類似
# 1 "vendor/mediatek/proprietary/hardware/fstab/mt6877/fstab.in.emmc"
# 1 "<built-in>" 1
# 1 "<built-in>" 3
# 341 "<built-in>" 3
# 1 "<command line>" 1
# 1 "<built-in>" 2
# 1 "vendor/mediatek/proprietary/hardware/fstab/mt6877/fstab.in.emmc" 2
# 141 "vendor/mediatek/proprietary/hardware/fstab/mt6877/fstab.in.emmc"
system /system ext4 ro wait,slotselect,avb=vbmeta_system,logical,first_stage_mount,avb_keys=/avb/q-gsi.avbpubkey:/avb/r-gsi.avbpubkey:/avb/s-gsi.avbpubkey
vendor /vendor ext4 ro wait,slotselect,avb,logical,first_stage_mount
product /product ext4 ro wait,slotselect,avb,logical,first_stage_mount
/dev/block/by-name/metadata /metadata ext4 noatime,nosuid,nodev,discard wait,check,formattable,first_stage_mount
/dev/block/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,noflush_merge,fsync_mode=nobarrier,reserve_root=134217,resgid=1065,inlinecrypt wait,check,formattable,quota,reservedsize=128m,latemount,resize,checkpoint=fs,fileencryption=aes-256-xts:aes-256-cts:v2,keydirectory=/metadata/vold/metadata_encryption,fsverity
/dev/block/by-name/protect1 /mnt/vendor/protect_f ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/by-name/protect2 /mnt/vendor/protect_s ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/by-name/nvdata /mnt/vendor/nvdata ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/by-name/nvcfg /mnt/vendor/nvcfg ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
??????mtk芯片中fstab.68**中也有類似代碼
# 1 "vendor/mediatek/proprietary/hardware/fstab/mt6877/fstab.in.mt6877"
# 1 "<built-in>" 1
# 1 "<built-in>" 3
# 341 "<built-in>" 3
# 1 "<command line>" 1
# 1 "<built-in>" 2
# 1 "vendor/mediatek/proprietary/hardware/fstab/mt6877/fstab.in.mt6877" 2
# 143 "vendor/mediatek/proprietary/hardware/fstab/mt6877/fstab.in.mt6877"
system /system ext4 ro wait,slotselect,avb=vbmeta_system,logical,first_stage_mount,avb_keys=/avb/q-gsi.avbpubkey:/avb/r-gsi.avbpubkey:/avb/s-gsi.avbpubkey
system /system erofs ro wait,slotselect,avb=vbmeta_system,logical,first_stage_mount,avb_keys=/avb/q-gsi.avbpubkey:/avb/r-gsi.avbpubkey:/avb/s-gsi.avbpubkey
vendor /vendor ext4 ro wait,slotselect,avb,logical,first_stage_mount
vendor /vendor erofs ro wait,slotselect,avb,logical,first_stage_mount
product /product ext4 ro wait,slotselect,avb,logical,first_stage_mount
product /product erofs ro wait,slotselect,avb,logical,first_stage_mount
/dev/block/by-name/metadata /metadata ext4 noatime,nosuid,nodev,discard wait,check,formattable,first_stage_mount
/dev/block/by-name/userdata /data f2fs noatime,nosuid,nodev,discard,noflush_merge,fsync_mode=nobarrier,reserve_root=134217,resgid=1065,inlinecrypt wait,check,formattable,quota,reservedsize=128m,latemount,resize,checkpoint=fs,fileencryption=aes-256-xts:aes-256-cts:v2+inlinecrypt_optimized,keydirectory=/metadata/vold/metadata_encryption,fsverity
/dev/block/by-name/rescue /cache ext4 noatime,nosuid,nodev,noauto_da_alloc,discard wait,check,formattable
/dev/block/by-name/protect1 /mnt/vendor/protect_f ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/by-name/protect2 /mnt/vendor/protect_s ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/by-name/nvdata /mnt/vendor/nvdata ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/by-name/nvcfg /mnt/vendor/nvcfg ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
/dev/block/by-name/persist /mnt/vendor/persist ext4 noatime,nosuid,nodev,noauto_da_alloc,commit=1,nodelalloc wait,check,formattable
刪掉這段代碼然后保存。重啟系統(tǒng)即可.data加密的判斷方式:格式化data后,第一次開機時,讀取【/vendor/etc/fstab.qcom】文件,該文件是否存在上面我們刪除的代碼,如果存在,則對data進行加密操作,若不存在,則不對data進行data操作。
??????在一些早期mtk芯片中。在fstab.xx文件中可以搜索/dev/block/platform/mtk-msdc.0/by-name/userdata /data ext4
noatime,nosuid,nodev,noauto_da_alloc,discard wait,check,resiz
e,forceencrypt=footer
將 "forceencrypt=footer" 改成"encryptable=footer".
在/dev/block/platform/mtk-msdc.0/by-name/userdata /data ext4
noatime,nosuid,nodev,noauto_da_alloc,discard wait,check,resiz
e,forceencrypt=/dev/block/platform/mtk-msdc.0/by-name/metadata
將: "forceencrypt=/dev/block/platform/mtk-msdc.0/by-name/metadata" 改成
"encryptable=/dev/block/platform/mtk-msdc.0/by-name/metadata"
此時將默認加密改成默認不加密
機型和版本不同??赡懿僮魍晷Ч灿胁煌?。具體實測。有的機型還有fstab.開頭好幾個文件,都需要按此方法修改。此種方法可以直接在第三方包里進行修改。修改完寫入手機data分區(qū)就是解密狀態(tài)。也可以開機狀態(tài)root下手機端使用工具進行修改。
最后說下一個小技巧文章來源:http://www.zghlxwxcb.cn/news/detail-674098.html
小米系列機型如果未登錄賬號且要安裝軟件時會提示未通過小米安全審核讓你登陸賬號。否則不讓你安裝??梢栽诎惭b軟件時斷網(wǎng)。斷開數(shù)據(jù)和wifi鏈接或者飛行模式。此時在安裝軟件就不會有提示,可以正常安裝。文章來源地址http://www.zghlxwxcb.cn/news/detail-674098.html
到了這里,關(guān)于安卓系列機型永久去除data分區(qū)加密 詳細步驟解析的文章就介紹完了。如果您還想了解更多內(nèi)容,請在右上角搜索TOY模板網(wǎng)以前的文章或繼續(xù)瀏覽下面的相關(guān)文章,希望大家以后多多支持TOY模板網(wǎng)!