Huawei-Nexus-6P-AH-00157

Nexus 6P Factory Reset Protection Bypassed In Latest Video

January 13, 2016 - Written By John Anon

UPDATE: Google reached out to us in regards to this particular vulnerability and have confirmed that the issue of bypassing FRP on Nexus devices (shown in the video below) has been remedied in the latest (January) monthly security update. Therefore, if you are running the latest version (with the security update applied) this should not be an issue for your device. Those interested in reading about the January security update for Nexus devices can do so by clicking here.

Yesterday, a video came through which highlighted an issue with Factory Reset Protection (FRP) on LG devices. To briefly recap, the video maker, Root Junky, showed that by following some relatively simple instructions, anyone can bypass FRP on the LG G4. Although, it was also made clear that this should work for most new LG devices including the like of the LG V10. Of course, this was not the first time we have seen FRP being bypassed on a smartphone, as only a couple of months ago, the same was done by Root Junky for the Galaxy Note 5 by Samsung. As FRP is designed to ensure that once a device is lost or stolen it can no longer be used, the fact that this last ditch protection method seems to have ways to be bypassed, is a little concerning as it does essentially negate the protection.

Well, if you are expecting FRP to be safer (or less able to be bypassed) on the likes of the latest Nexus devices, then you would be wrong. Root Junky has now uploaded a new video today and this one shows how easy it is to bypass FRP on Google’s Nexus 6P. A method that is also claimed to work just as well on the Nexus 5X, Nexus 5 and Nexus 6. In fact, Root Junky makes the point that this method should work on any Android phone which makes use of the stock Google keyboard and other stock Google apps.

The one caveat though is that a SIM card needs to be in the phone to make this FRP bypass workable. That is because the route makes use of creating a dud text message (from the Wi-Fi connect screen), which then allows for a shortcut route back to the phone app. From which, a testing mode can be activated by a dialer code. Once open, the settings menu can be quickly accessed and then of course, a full factory reset can be achieved which will then reset the phone fully, including removing the FRP and allowing the phone to be booted back up and used by anyone. Those interested can check out the video in full and see how it works by hitting play below.