Jump to content

Fake memory fixer


Zdroide

Recommended Posts

Hi I am lucky owner of 2 different tablets showing fakes spec. Aida 64 is the only app that truly show real memory.

We should always use Aida64 it to proove falsified device. If we all use Aida64, we make a standard.

I use it for my records, anyway. 

I am requesting help, finding what file was temper, showing a different processor and mainly memory size 

I want to write back to this file, true memory number. 

Showing very high fake memory size prevent a many app to run. It make a very instable system. For now, one cannot use bigger than 32 GB external on those tablets, fake 128 GB take all free space.

Where in Android 7 or 9, do we find a file saying or declaring such memory size and processor type?

Can we bypass this fake file or rewrite it?

Both Tablets have 5 times less memory then expected, intern and extern.

Thanks for any info on how to track the tamper files. This also prevent rooting so far...

 

 

Edited by Zdroide
Better understanding
Link to comment
Share on other sites

On 1/4/2021 at 6:16 AM, Zdroide said:

Hi I am lucky owner of 2 different tablets showing fakes spec. Aida 64 is the only app that truly show real memory.

We should always use Aida64 it to proove falsified device. If we all use Aida64, we make a standard.

I use it for my records, anyway. 

I am requesting help, finding what file was temper, showing a different processor and mainly memory size 

I want to write back to this file, true memory number. 

Showing very high fake memory size prevent a many app to run. It make a very instable system. For now, one cannot use bigger than 32 GB external on those tablets, fake 128 GB take all free space.

Where in Android 7 or 9, do we find a file saying or declaring such memory size and processor type?

Can we bypass this fake file or rewrite it?

Both Tablets have 5 times less memory then expected, intern and extern.

Thanks for any info on how to track the tamper files. This also prevent rooting so far...

AFAIK fake device manufacturers use such tricks that are deeply embedded into the firmware of the device, including not just proofed files but also patched Android API calls.  I wouldn't spend too much time on trying to reverse this activity.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...