Zdroide Posted January 4, 2021 Share Posted January 4, 2021 (edited) Hi I am lucky owner of 2 different tablets showing fakes spec. Aida 64 is the only app that truly show real memory. We should always use Aida64 it to proove falsified device. If we all use Aida64, we make a standard. I use it for my records, anyway. I am requesting help, finding what file was temper, showing a different processor and mainly memory size I want to write back to this file, true memory number. Showing very high fake memory size prevent a many app to run. It make a very instable system. For now, one cannot use bigger than 32 GB external on those tablets, fake 128 GB take all free space. Where in Android 7 or 9, do we find a file saying or declaring such memory size and processor type? Can we bypass this fake file or rewrite it? Both Tablets have 5 times less memory then expected, intern and extern. Thanks for any info on how to track the tamper files. This also prevent rooting so far... Edited January 4, 2021 by Zdroide Better understanding Quote Link to comment Share on other sites More sharing options...
Fiery Posted January 6, 2021 Share Posted January 6, 2021 On 1/4/2021 at 6:16 AM, Zdroide said: Hi I am lucky owner of 2 different tablets showing fakes spec. Aida 64 is the only app that truly show real memory. We should always use Aida64 it to proove falsified device. If we all use Aida64, we make a standard. I use it for my records, anyway. I am requesting help, finding what file was temper, showing a different processor and mainly memory size I want to write back to this file, true memory number. Showing very high fake memory size prevent a many app to run. It make a very instable system. For now, one cannot use bigger than 32 GB external on those tablets, fake 128 GB take all free space. Where in Android 7 or 9, do we find a file saying or declaring such memory size and processor type? Can we bypass this fake file or rewrite it? Both Tablets have 5 times less memory then expected, intern and extern. Thanks for any info on how to track the tamper files. This also prevent rooting so far... AFAIK fake device manufacturers use such tricks that are deeply embedded into the firmware of the device, including not just proofed files but also patched Android API calls. I wouldn't spend too much time on trying to reverse this activity. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.