italian_job
Graphite Can you specifically list which apps and processes are unfamiliar?
I should have taken screens. My memory is shocking. Exact apps and processes aside, the entire OS was tilted. Permissions would change on the fly, notification settings would too. That's two of twenty examples I could rattle off.
Foreward though: I myself don't blackhat, but I do mingle with some who do. I can't rule out spending a night at said house and them not being the culprits.
For example, I've been going through settings meticulously and honestly there is around 40% more than before. Complete categories.
Graphite Yes, but only if there is an unpatched vulnerability. GrapheneOS is kept pretty up to date.
Did I mention that among the 9 hour chaos last night it would not let me check for updates? If not, I definitely should have.
Graphite BadUSB devices infect by emulating a keyboard (HID) device and rapidly typing keystrokes to execute or download a payload. The default setting is to only allow USB accessories when unlocked. But even in that case, you'd see it try to type something. It works on Desktop a lot easier since there are simple keystrokes to open a terminal. Not really going to work on Android. If you've got an infected PC and your device has ADB debugging enabled, then it could try to infect your device in the background, but again, Android will prompt for confirmation to trust the PC that wants to send commands
I've heard of USB cables and wall sockets disguised as well. Is this true? I've only had my phone for 3 months and I've never once connected it to a PC/laptop.
Graphite Can you give a few examples. Certificate Authorities from other countries are common, but can look shady.
(Aain I should've screened it) after studying every one of them I know that even the legit ones had fields left out but these ones for example: the serial number would be 07, blank on organisational unit, had some words starting with capital's, others with lower case. For the life of me I wish I could recall the names but again, I was only able to force close these processes & apps and subsequently successfully wipe/format, after turning off the certs.
I bought this pixel w/ graphene already installed but from my limited, early mid 2010's era flashing with Odin; I presumed the device would no doubt have to be rooted?
Can you recommended any decent system scan apps?
Thank you immensely for the reply! I will reset and post the info from the startup screen which I do still get.