You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: blog/25-12-29/flash-android-on-pixel-phone/flash-android-on-pixel-phone.html
+14-6Lines changed: 14 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -145,12 +145,20 @@ <h1 class=title>
145
145
146
146
<divclass=description>
147
147
<p>
148
-
the only way to truely wipe a mobile phone is by reflashing the os. Fortunately for pixel phones google has made this super simple. This is
149
-
the reason i bought the pixel phone as it seems to be one of the few phones where a complete reflash is available. Factory reset is not enough.
150
-
Factory Reset ( despite its name ) simple wipes the user data partition and nothing else. Malware can potentially still exist in the system
151
-
partitions, through a exploit that harnessed priviledge escalation or if someone had physical access to the device, rooted it, installed malware
152
-
and unrooted it, at least thats my thinking anyway. There is talk of partition hashes, but ultimately the golden rule is, once someone has had physical
153
-
access to the device - all bets are off.
148
+
the only way to truely wipe a mobile phone is by reflashing the os.
149
+
<br>
150
+
Fortunately for pixel phones google has made this super simple. This is the reason i bought the pixel phone as it
151
+
seems to be one of the few phones where a complete reflash is available.
152
+
<br>
153
+
<b>
154
+
Factory reset is not enough.
155
+
</b>
156
+
<br>
157
+
Factory Reset ( despite its name ) simple wipes the user data partition and nothing else.
158
+
<br>
159
+
Malware can potentially still exist in the system partitions, through a exploit that harnessed priviledge escalation
160
+
or if someone had physical access to the device, rooted it, installed malware and unrooted it, at least thats my thinking anyway.
161
+
There is talk of partition hashes, but ultimately the golden rule is, once someone has had physical access to the device - all bets are off.
154
162
</p>
155
163
<p>
156
164
this blog will cover windows to start, i'll update later to include linux and macos
0 commit comments