A bug in Samsung terminals facilitates theft

A bug in Samsung terminals facilitates theftA bug in Samsung terminals facilitates the theft of smartphones by removing a protection system implemented by the company Google starting with Android 5.0.1 for your operating system.

More precisely, those from Google they implemented a similar system in Android iCloud Activation Lock, so Android terminals connected to a Google account require activation with a Google ID if a person deleted their data through a factory reset procedure done from the terminal.

This system should have protected Android terminals as well, but unfortunately a vulnerability in the version of Android in Samsung terminals, a Samsung Galaxy Note 5 being used for example, leaves users without this level of protection.

Everything is based on the ability to automatically read USB OTG storage media from Android terminals and an application that must be run in the terminals, removing security measures and facilitating the activation of a terminal even if it was blocked with a Google ID before deletion.

In the video clip above you will see how simple the procedure is that allows the removal of Android protection measures from Samsung terminals at the moment, so that a stolen terminal, even if it is blocked, can be deleted and activated by the thief.

In the morning I told you that Google has discovered numerous vulnerabilities in Samsung terminals, and this is a new proof of the fact that the manufacturers of Android terminals remove the security measures implemented by Google through their own changes made to the operating system.

Android has never been praised for its security, nor will it ever be, because by its nature it is an open operating system, and this exposes it to problems of this kind, which are exploited to the full by all kinds of people who have master all kinds of methods to circumvent security measures.