Evaluation and Identification of Authentic Smartphone Data

Total Page:16

File Type:pdf, Size:1020Kb

Evaluation and Identification of Authentic Smartphone Data Evaluation and Identification of Authentic Smartphone Data by Helo¨ısePieterse Submitted in fulfilment of the requirements for the degree Philosophiae Doctor (Computer Science) in the Faculty of Engineering, Built Environment and Information Technology University of Pretoria, Pretoria July 2019 Publication data: Helo¨ısePieterse. Evaluation and Identification of Authentic Smartphone Data. Doctoral thesis, University of Pretoria, Department of Computer Science, Pretoria, South Africa, July 2019. Electronic, hyperlinked versions of this thesis are available online, as Adobe PDF files, at: http://repository.up.ac.za Evaluation and Identification of Authentic Smartphone Data by Helo¨ısePieterse E-mail: [email protected] Abstract Mobile technology continues to evolve in the 21st century, providing end-users with mo- bile devices that support improved capabilities and advance functionality. This ever- improving technology allows smartphone platforms, such as Google Android and Apple iOS, to become prominent and popular among end-users. The reliance on and ubiquitous use of smartphones render these devices rich sources of digital data. This data becomes increasingly important when smartphones form part of regulatory matters, security inci- dents, criminal or civil cases. Digital data is, however, susceptible to change and can be altered intentionally or accidentally by end-users or installed applications. It becomes, therefore, essential to evaluate the authenticity of data residing on smartphones before submitting the data as potential digital evidence. This thesis focuses on digital data found on smartphones that have been created by smartphone applications and the techniques that can be used to evaluate and identify authentic data. Identification of authentic smartphone data necessitates a better under- standing of the smartphone, the related smartphone applications and the environment in which the smartphone operates. Derived from the conducted research and gathered knowledge are the requirements for authentic smartphone data. These requirements are captured in the smartphone data evaluation model to assist digital forensic profession- als with the assessment of smartphone data. The smartphone data evaluation model, however, only stipulates how to evaluate the smartphone data and not what the out- come of the evaluation is. Therefore, a classification model is constructed using the identified requirements and the smartphone data evaluation model. The classification model presents a formal classification of the evaluated smartphone data, which is an ordered pair of values. The first value represents the grade of the authenticity of the data and the second value describes the completeness of the evaluation. Collectively, these models form the basis for the developed Smartphone Application Data Authentic- ity Classifier (SADAC) tool, a proof of concept digital forensic tool that assists with the evaluation and classification of smartphone data. To conclude, the evaluation and classification models are assessed to determine the effectiveness and efficiency of the models to evaluate and identify authentic smartphone data. The assessment involved two attack scenarios to manipulate smartphone data and the subsequent evaluation of the effects of these attack scenarios using the SADAC tool. The results produced by evaluating the smartphone data associated with each attack scenario confirmed the classification of the authenticity of smartphone data is feasible. Digital forensic professionals can use the provided models and developed SADAC tool to evaluate and identify authentic smartphone data. The outcome of this thesis provides a scientific and strategic approach for evaluating and identifying authentic smartphone data, offering needed assistance to digital forensic professionals. This research also adds to the field of digital forensics by providing insights into smartphone forensics, architectural components of smartphone applications and the nature of authentic smartphone data. Keywords: Digital forensics, Mobile forensics, Smartphones, Smartphone applications, Smartphone data, Authenticity, Evidence, Reference architecture, Android, iOS. Supervisor : Prof. M. S. Olivier Co-Supervisor : Dr. R. P. van Heerden Department : Department of Computer Science Degree : Philosophiae Doctor To My Mother For continuously being a guiding light in my life. \The grey rain curtain of this world rolls back, and all turns to silver glass...and then you see it. White shores. And beyond...a far green country under a swift sunrise." Gandalf the White - The Lord of the Rings: The Return of the King (2003) Acknowledgements My sincere gratitude to God, the Almighty, for providing me with the skills, opportunity and determination to complete this work. You carried me during times of great difficulty and I am forever grateful to You. I would also like to express my appreciation and gratitude to Professor Martin Olivier for his professional insight, guidance and support. Thank you for all your assistance and for helping me to complete this journey. I hope to continue collaborating in the near future. My thanks to Dr. Renier van Heerden for his continuous guidance and inspiring sugges- tions. All your contributions have been extremely valuable and improved the quality of the thesis. Words would not express my gratitude to my parents, Marius and Ria Pieterse, for their continued love and unwavering belief in my success. Thank you for all the words of encouragement and support when I needed it most. Thanks to all my friends and family for their love and support during many years of hard work. A special word of thanks to Tielman Meyer and Mari Pieterse. I would also like to take this opportunity to say a big thank you to all my colleagues at the Cyber Warfare Research Group, Defence and Security, CSIR, for their advice and ideas. A special word of thanks to Dr Jabu Mtsweni, for providing me with valuable time to complete my thesis and to Ivan Burke, for his mathematical support. I am grateful for the financial support that I received from the Council for Scientific and Industrial Research and the University of Pretoria. To everyone else that has played a part in the success of this research, thank you very much. Contents List of Figures vi List of Tables viii 1 Introduction1 1.1 Motivation...................................2 1.2 Problem Statement..............................4 1.3 Scope of the Research.............................5 1.4 Objectives...................................6 1.5 Research Methodology............................7 1.6 Terminology..................................8 1.7 Thesis Layout................................. 10 1.8 Summary................................... 12 2 Mobile Device Forensics 13 2.1 Mobile Device Classification......................... 14 2.2 Mobile Operating Systems.......................... 17 2.2.1 Active Mobile Operating Systems.................. 17 2.2.2 Discontinued Mobile Operating Systems.............. 19 2.3 Need for Mobile Device Forensics...................... 20 2.4 Purpose of Mobile Device Forensics..................... 22 2.5 Forensic Examination of Mobile Devices.................. 22 2.5.1 Sources of Mobile Device Data.................... 23 2.5.2 Classification of Acquisition Tools.................. 24 i 2.5.3 Mobile Forensic Toolkits....................... 28 2.5.4 Forensic Investigation Process Models for Mobile Devices..... 30 2.6 Mobile Device Forensic Challenges...................... 33 2.6.1 Diversity of Mobile Devices..................... 33 2.6.2 Mobile Device Design......................... 34 2.6.3 Improving Mobile Device Technology................ 34 2.7 Summary................................... 35 3 Smartphone Forensics 36 3.1 Smartphone Operating Systems....................... 37 3.1.1 Google Android............................ 37 3.1.2 Apple iOS............................... 41 3.2 Forensic Examination of Smartphones.................... 43 3.2.1 Android Forensics........................... 44 3.2.2 iOS Forensics............................. 51 3.3 Challenges for Smartphone Forensics.................... 57 3.3.1 Acquisition Challenges........................ 57 3.3.2 Malicious Applications........................ 58 3.3.3 Anti-Forensics............................. 59 3.4 Summary................................... 61 4 Smartphone Data 62 4.1 What is Smartphone Data?......................... 63 4.2 Sources of Smartphone Data......................... 63 4.2.1 SIM Card Data............................ 64 4.2.2 Device-specific Data......................... 64 4.2.3 User-created Data........................... 65 4.2.4 Sensor Data.............................. 66 4.2.5 Application-related Data....................... 66 4.3 Storage Structures for Smartphone Data.................. 67 4.3.1 Plain Text Files............................ 67 4.3.2 Extensible Markup Language (XML)................ 68 ii 4.3.3 Property Lists............................. 68 4.3.4 SQLite Databases........................... 70 4.4 Value of Analysed Smartphone Data.................... 72 4.5 Measures to Ascertain the Authenticity of Smartphone Data....... 74 4.6 Limitations of Authenticity Measures.................... 76 4.7 Summary................................... 77 5 Reference Architecture for Smartphone Applications 78 5.1 Existing Reference Architectures....................... 79 5.2 Reference Architecture Derivation Process................. 81 5.2.1 Conceptual Architecture of Android Applications......... 82 5.2.2 Conceptual Architecture of
Recommended publications
  • Mara Phones New Deck
    Introduction Private and Confidential Disclaimer The material in this presentation has been prepared by Mara Corporation Limited and contains general background information about the Company’s current activities as at the date of this presentation. This information is given in summary form and does not purport to be complete. The document is being made available for information purposes only. No reliance may be placed for any purpose whatsoever on the completeness, accuracy or fairness of the information contained in this document. No representation or warranty, expressed or implied, is given by or on behalf of the Company or any of its affiliates or any of their respective directors, officers or employees or any other person as to the accuracy or completeness of the information or opinions contained in this document and, save in the case of fraud, no liability whatsoever is accepted by the Company or any of its affiliates or their respective directors, officers or employees or any other person for any loss howsoever arising, directly or indirectly, from any use of such information or opinions or otherwise arising in connection therewith. This document (and its contents) are confidential and is being made available on the basis that the recipients keep confidential any information contained herein or otherwise made available, whether orally or in writing, in connection with the Company. Such information may not be reproduced, disclosed, redistributed or passed on, directly or indirectly, to any other person (unless he or she is affiliated with or is a paid advisor to the recipient and has agreed to comply with these restrictions on redistribution) or published, in whole or in part, for any purpose without the prior written consent of Mara.
    [Show full text]
  • 1 an Activist's Guide to Informati- on Security
    1 / 34 1 An Activist's Guide to Informati- on Security This guide aims to be a concise overview on information se- curity for anyone in emancipatory struggles against struc- tures of power. It represents assembled knowledge and best practices from personal experience, conversations with hackers and fellow activists, hacker conferences, and university cour- ses on computer security and cryptography. Nonetheless, the best security is sharing skills with trusted people. If you have any corrections, questions or additions, please contact us 1 (email: activist-security riseup net). Our perspec- tive is mostly from western countries, we especially welcome additions about repression and tactics in other places of the world. 2 Table of Contents 3 Introduction 4 Security Culture 5 Physical Security 6 Traditional Communication 6.1 Face to Face Communication 6.2 Letters 6.3 (Mobile) Phones ◦ Mobile phones themselves are identifiable! ◦ Location Tracking 2 / 34 ◦ Room Surveillance / “Silent Calls” 7 Digital Base Security 7.1 Encryption and Passwords 7.2 Choose Your Computing Device (Integrity) ◦ Smartphones ◦ Laptops and Desktop Computers 7.3 Storage Encryption (Confidentiality) ◦ Encrypt Your Home Folder ◦ Encrypt The Whole System ◦ Use an Encrypted Container ◦ Android and iOS ◦ Limitations 7.4 Backup your Data (Availability) 8 Internet Services 8.1 A Word about Web Browsers 8.2 Anonymity 8.3 Email 8.4 Mailing Lists 8.5 Messengers / Chat 8.6 Jabber / XMPP 8.6 Voice / Video Chat 8.7 Blogs, Websites and Social Media 9 Wrapping it Up 9.1 TL;DR: 9.2 Example Setups 3 / 34 3 Introduction Technological progress has made it next to impossible to de- fend against a sufficiently powerful attacker (a scary exam- ple 2).
    [Show full text]
  • Test Coverage Guide
    TEST COVERAGE GUIDE Test Coverage Guide A Blueprint for Strategic Mobile & Web Testing SUMMER 2021 1 www.perfecto.io TEST COVERAGE GUIDE ‘WHAT SHOULD I BE TESTING RIGHT NOW?’ Our customers often come to Perfecto testing experts with a few crucial questions: What combination of devices, browsers, and operating systems should we be testing against right now? What updates should we be planning for in the future? This guide provides data to help you answer those questions. Because no single data source tells the full story, we’ve combined exclusive Perfecto data and global mobile market usage data to provide a benchmark of devices, web browsers, and user conditions to test on — so you can make strategic decisions about test coverage across mobile and web applications. CONTENTS 3 Putting Coverage Data Into Practice MOBILE RECOMMENDATIONS 6 Market Share by Country 8 Device Index by Country 18 Mobile Release Calendar WEB & OS RECOMMENDATIONS 20 Market Share by Country 21 Browser Index by Desktop OS 22 Web Release Calendar 23 About Perfecto 2 www.perfecto.io TEST COVERAGE GUIDE DATA INTO PRACTICE How can the coverage data be applied to real-world executions? Here are five considerations when assessing size, capacity, and the right platform coverage in a mobile test lab. Optimize Your Lab Configuration Balance Data & Analysis With Risk Combine data in this guide with your own Bundle in test data parameters (like number of tests, analysis and risk assessment to decide whether test duration, and required execution time). These to start testing with the Essential, Enhanced, or parameters provide the actual time a full- cycle or Extended mobile coverage buckets.
    [Show full text]
  • Augmented Reality
    Augmented Reality: A Review of available Augmented Reality packages and evaluation of their potential use in an educational context November 2010 Stephen Rose Dale Potter Matthew Newcombe Unlocking the Hidden Curriculum University of Exeter Learning and Teaching Innovation Grants (04/08) 2 Contents 1. Augmented Reality Page 4 2. Augmented Reality in Education 6 3. Augmented Reality Applications 8 3.1 Marker-based Augmented Reality 8 3.2 Markerless Augmented Reality 10 4. Available Augmented Reality Technologies 12 4.1 Current Smartphone Ownership Patterns 12 4.2 Platforms 16 4.3 AR Software 19 5. Technical Considerations 22 5.1 Limitations of Current Platforms 24 6. Choosing an Augmented Reality System 24 7. Glossary 28 8. References 29 9. Appendix 1: Unlocking the Hidden Curriculum - a JISC- 31 funded Learning and Teaching Innovation Project at the University of Exeter This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 2.0 Licence. To view a copy of this licence, visit: http://creativecommons.org/licenses/by-nc-sa/2.0/uk or send a letter to: Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. 3 1. ‘Augmented Reality’ Every now and again a ‘new technology’ appears which seems to capture the public imagination. Invariably the technology enables a new means of interacting with screen-based entertainment or a computer game - 3DTV, the Nintendo Wii. The proliferation of so-called ‘smartphones’ with their abilities to run once-complex computer applications, in-built cameras and ‘GPS’ capability has unleashed the potential of ‘Augmented Reality’ – to date a regular feature of science fiction or ‘near future’ movies.
    [Show full text]
  • Manual Root Nook Simple Touch 1.2.1
    Manual Root Nook Simple Touch 1.2.1 Root a v1.1.5 NST w/ GlowLight: via Long Hoang's guide My Nook simple touch can't connect to the internet (self.nook). submitted 8 months ago I manually updated it to 1.2.1 but it still won't connect to the internet. permalink, save, parent. 1.2.1 Frontlit running series as chapters must be loaded onto the device manually. Kindle Paperwhite, Kobo Glo, Nook Simple Touch GlowLight Cool Reader, Perfect Viewer, APV PDF Viewer Pro, Mango, Root Browser/ES File Explorer. I recently dusted off the Nook Simple Touch and decided to try some of the root options Update your nook to 1.2.1 version B&N firmware and root with the most. Advice do not root your phone until android 5.0 co(GAME)(2.3+) Defend (Q) CM12s is messing up the color on custom kernel(Q) One (Q) Setting network selection to manual as default. Lost Nook HD+ power adapter in Europe. (App)(1.2.1)UU AppPurifier · (Q) Yu Yureka (micromax) Phone "Display setting" I. ADE Video Tutorial · Rooting nook · Rooting NookColor · nook Manual ROM options for the Nook HD Stock ROM with Root on Android 4.0 Sites talking about rooting the Nook Color typically advise installing a new Update your nook to 1.2.1 version B&N firmware and root with the most recent version of RootManager. Friends Please let me know how to Root my S5 i cant find supported root files for my mobile (Q) Touch screen shop? (Q) Setting network selection to manual as default.
    [Show full text]
  • The Usage of Smartphone and Mobile Applications from the Point of View of Customers in Poland
    information Article The Usage of Smartphone and Mobile Applications from the Point of View of Customers in Poland Witold Chmielarz Faculty of Management, University of Warsaw, 00-927 Warsaw, Poland; [email protected] Received: 20 March 2020; Accepted: 15 April 2020; Published: 17 April 2020 Abstract: The main objective of this article was to identify the conditions for the use of smartphones and mobile applications in Poland in the second half of 2018. The scope of the present analysis was limited to a selected sample of more than 470 respondents, and it examined the group of the most active users of smartphones and mobile applications. The author adopted the CAWI (computer associated web interview) method, which was previously verified by a randomly selected pilot sample, in his study. The obtained results were compared with the findings of other studies. They indicated that users of smartphones and mobile applications in Poland do not differ in their assessments from users in Europe and around the world. In this context, the key implication for researchers is the identified level of development of the use of smartphones and mobile applications in Poland at the end of 2018. The main limitation of the research was the selection of the research sample, which consisted only of members of the academic community. The scope of this article aimed to fill a gap in terms of the quantitative and qualitative methods that are applied to examine the use of mobile devices and mobile software. At the same time, this study creates the foundations for further research on intercultural differences.
    [Show full text]
  • Mobile Phones the Latest Handsets Tested
    Kondinin Group ResearchMAY 2018 No. 100 www.farmingahead.com.au ReportPrice: $95 MOBILE PHONES THE LATEST HANDSETS TESTED Independent information for agriculture H RE RC PO A R E T S • E RESEARCH REPORT MOBILE PHONES K R O • N P D U I N O I R N G NextG phones – the good, the bad and the ugly In their annual outback pilgrimage, Kondinin Group engineers Josh Giumelli and Ben White head to remote NSW to test the latest crop of handsets. Of the 13 units tested, there were several surprises; some star performers, some lacklustre results, and several that just made up the numbers. If you want a phone with good reception or features that matter, read on. hese days, the mobile phone is source in the paddock, rather than at home just about as crucial to the farm on the computer. business as any other piece of But we face a growing dilemma in that machinery. connectivity continues to limit the usefulness TThe sum total of tasks performed using a of much of what we want to do with our phone handset only increases as each year smartphones. While mobile networks goes by. More manufacturers supply apps continue to grow, they are not always rolled Retro rocket? The new Nokia 3310 harkens back to to operate or calibrate machinery, more out in rural areas where we need them the days of the CDMA network and the simple Nokia information is needed at your fingertips most. Compounding the problem is that the handsets with awesome battery life and excellent in an instant, and record keeping becomes smartphones' reception performance seems reception.
    [Show full text]
  • Bancontact Payconiq Company
    Bancontact Payconiq Company SEPA Rulebooks Scheme Manuals Remote Domain 46D0 – Schedules 1, 2, and 3 – News 64 Mobile App Security Guidelines Android, iOS Newsletter 64 Classification: Confidential Confidential COPYRIGHT This document is confidential and protected by copyright. Its contents must not be disclosed or reproduced in any form whatsoever without the prior written consent of Bancontact Payconiq Company sa/nv. Except with respect to the limited license to download and print certain material from this document for non-commercial and personal use only, nothing contained in this document shall grant any license or right to use any of Bancontact Payconiq Company sa/nv’s proprietary material. AUTHORS This monthly newsletter is written by NVISO Labs, experts in mobile security, on behalf of Bancontact Company sa/nv. ABOUT NVISO NVISO is a consultancy firm exclusively focusing on IT security. NVISO has a very clear sector focus with several references in the financial and governmental sectors. The Research and Development department of NVISO is NVISO Labs, whose goals are to allow our people to increase their skills and knowledge, to come up with innovative service offerings, to contribute to the security community, and to give valuable insights to our clients. The fundamental values of NVISO are client satisfaction, focus, entrepreneurship, innovation, and ability to adapt. Our mission is to be an innovative and respected partner for our clients. For more information, we are happy to refer you to our website: https://www.nviso.be.
    [Show full text]
  • Fi Mmmortám Me
    El Precio de "El Morning Times"Es Cinco Centavos Oro o 25 Centavos Mexicanos-- No Se Pague Mas COTIZACJONíS B HSTAUM. PRONOSTICOS DEL TIEMPO bt t Prftu Avoclida. PUU, Pr onií..... Washington, Octubre 30. nomo, cien llbnii.J "'TJt- Lluvias locales el sábado; despe- I Zinc clon llbtu I0- jado el domingo. mmmortám me 5 CTS. L Mtjror CIrtuUtiM, SABADO. 31 DDE OCTUBRE DDE 1914. CUATRO PÁGINAS PRECIO AÑO 35. ragidt, en el Buroeite. f EL PASO, TEX.. las fortalezas y los su I rw Al .FMANIRfi FN flAMINO DF. AMRF.RES El'irrobado muestra una oarte de los alemanes auo se cHritreh a Amberes, después del terrorífico bombardeo de las de la población. burbios de la ciudad, deteniéndose á contemplar el efecto de sus granadas sobre varios edificios situados en afueras é TIRSE EN LA VENCION LA RENUN- CIA DE CARRANZA í SE LLEGARA A UNA RESOLUCION FINAL GONZALEZ GARZA IMPUTO A CARRANZA NO HABER CUMPLIDO CON LA DE TORREON, Y VILLARREAL AFIRMO QUE TAMPOCO VILLA LO HABIA HECHO; TERCIAN-D- O DOBLES EN LA DISCU- SION AL MANIFESTAR OUE NINGUNO DE LOS JEFES CUMPLIO NADA DE LO PACTADO. Especial para El imes. ' Aguascalicntes?, fOctubre 30. Anoche la sesión secreta la ocu paron el presidente Villarreal y el Corl. González Garza, jefe de la facción antimilitarista en la con- vención. El Corl. Garza, discu- tiendo la renuncia incondicional del Gral. Carranza declaró que es- te último ño liabía respetado el i un i convenio de Torreón ; pero el prc-- "i ,Mi sicltfite leinterrumoió que el Gral. antiguo régimen, es una patente Villa tampoco había cumplido con viar dclegadosi personales a la ocupación y cumpla con las NO SEGURIDADES impues- indicación que el sueño de este, convenio desde el momento convención únicamente es con el DI ya han.
    [Show full text]
  • Application Migration Guide - Bada C++ Application with Bada 2.0 to OSP-Compatible Tizen Application
    Application Migration Guide - bada C++ Application with bada 2.0 to OSP-compatible Tizen Application Except as noted, this content - excluding the Code Examples - is licensed under Creative Commons Attribution 3.0 and all of the Code Examples contained herein are licensed under Flora 1.0. For details, see the Content License. Application Migration Guide - bada C++ Application with bada 2.0 to OSP-compatible Tizen Application Table of Contents 1. Converting a bada Application to OSP-compatible Tizen Application ........ 5 1.1. System Migration ...................................................................................................................... 7 1.1.1. Case Sensitivity ........................................................................................................ 7 1.1.2. enum Type Size ........................................................................................................ 7 1.1.3. wchar_t Type Size ................................................................................................. 7 1.1.4. Member Variable Initialization .................................................................................. 7 1.1.5. malloc() Allocation ................................................................................................ 7 1.1.6. Strong Two Phase Construction Mechanism Check ................................................ 7 1.1.7. Pure Virtual Method Implementation ........................................................................ 8 1.1.8. LLVM Compiler ........................................................................................................
    [Show full text]
  • Android 1.5 Manual Update 4.3 Note 2 N7100
    Android 1.5 Manual Update 4.3 Note 2 N7100 Suunto Movescount for Android will only work with Android 4.3 or newer that support Bluetooth (LG Nexus 4 with Android 5.1, Sunto Ambit3 Peak with firmware 1.5.44) If the Moto X update to 5.1 arrives before the Movescount beta update, it will be Samsung Galaxy Note 2 GT-N7100 with Android 4.4.2 not pairing. To update your Ambit3 firmware, please see the instructions at Samsung Galaxy S III GT-I9300 (4.3) Samsung Samsung Galaxy Note II GT-N7100 (4.4.2) XXUFNI2 Android 4.4.2 KitKat official firmware update can be installed on Galaxy also update your Galaxy Note 2 GT-N7100 to N7100XXUFNI2 Android 4.4.2 KitKat Android 4.3 JB Firmware For Galaxy Note 2 N7100 – How To Guide · Update Version Download · VLC 1.5.1.1 (1050114) APK Latest Version Download. All of them are based on Android 5.0.2 and includes latest and greates of After Galaxy A series, and then Note 4 premiere, Samsung isn't slowing Just minutes ago Samsung released an long- awaited Android KitKat 4.4.4 firmware update for GT-N7005 (Galaxy Note LTE), GT-N7100 (Galaxy Note 2 (International)). (ROM) Android 4.4.4 by usol38 (N-7100) (Stable) (Final v1.8) Hello to all the users of Galaxy Note II. Description update 1-6: This port based on the port… So the firmware is sharpened by the core of AGNi v 4.3.7! Addition to the firmware These can include major updates, which bring a newer version of the OS to a particular device, France (Orange) (FTM), GT-N7100, GALAXY Note II, 4.4.2, N7100XXUFNJ1 Which kitkat and lollipop? android 4.3 needs bug fixes! you can see is the Note 3 when the official Touchwiz roms weighed atleast 1.5 or 1.7 gb.
    [Show full text]
  • Mirror for Android™ Faqs
    Handout Mirror for Android™ FAQs What is Mirror for Android™? Mirror for Android™ is a method of using your Android smartphone or tablet on your Tobii Dynavox I13/I16 device. It can be used to make phone calls, send and receive text messages. How do I start Mirror for Android? Mirror for Android™ can be started from Snap Core First. Go to Dashboard > Gaze Interaction > Launch Mirror for Android™. What are the telephone requirements for Mirror for Android™? Mirror for Android™ requires Android 5.0 or newer. Developer options and USB debugging must be enabled on the Android device. How do I turn on developer options and USB debugging on my device? You can unlock the Developer options on any Android smartphone or tablet by locating the Build number in your Settings menu and tapping it multiple times. However, the exact location of the build number may differ depending on your phone’s manufacturer. Here are a few common examples. • If using stock Android, go to Settings > About phone > Build number • On a Samsung Galaxy device, go to Settings > About device > Build number • On an HTC device, go to Settings > About > Software information > More > Build number • On an LG device, go to Settings > System > About phone > Software info > Build number Tap Build number seven times. After the first few taps, you should see the steps counting down until you unlock the developer options. Once activated, you will see a message that reads, “You are now a developer!” Go back to Settings, where you’ll find a Developer options entry in the menu.
    [Show full text]