Android-IMSI-Catcher-Detector
Android-IMSI-Catcher-Detector copied to clipboard
Fix detecting sim card info from tiktok in android #1023
I added a new “Privacy Advisor” feature inside the app that scans installed apps for telephony/SIM-related permissions, shows results, and lets you copy ADB commands to clamp them.
- Launch: open the app → menu → Privacy Advisor.
- What it does: lists apps requesting READ_PHONE_STATE, READ_PHONE_NUMBERS, READ_SMS, READ_CALL_LOG; tap an app to see granted/denied state and copy ADB commands to revoke/ignore and reset the app.
- Docs: added AIMSICD/TikTok-SIM-Privacy.md with step-by-step non-root fixes.
Key Edit:
- Strings added in AIMSICD/src/main/res/values/strings.xml.
- New doc: AIMSICD/TikTok-SIM-Privacy.md.
Status: I created the activity, layout, strings, manifest entry, and menu wiring, plus a troubleshooting doc.
- Added PrivacyAdvisorActivity with list and details dialog; copy-to-clipboard ADB commands.
- Wired into AndroidManifest.xml and main_menu.xml; handled in MainActivity.
- Added minimal strings and a concise doc (AIMSICD/TikTok-SIM-Privacy.md).
Do this in order until TikTok works
- Deny TikTok access to phone/SIM, then reset the app
- Settings > Apps > TikTok > Permissions > Phone → Deny. Also Deny SMS, Contacts, Call logs if present.
- Force stop TikTok.
- Storage & cache > Clear storage.
- Open TikTok on Wi‑Fi and test.
- Most reliable non‑root: use a secondary Android user with no telephony
- Settings > System > Multiple users > Add user.
- When asked, do NOT enable “Phone calls & SMS for this user.”
- Switch to the new user, connect to Wi‑Fi, install only TikTok, sign in, and test.
- Stronger clamp (ADB, no root)
-
Enable Developer options and USB debugging.
-
Connect to a PC with ADB, then run: adb shell pm list packages | grep -i tiktok # Replace PKG with the exact package you see (e.g. com.zhiliaoapp.musically or com.ss.android.ugc.trill) PKG=com.zhiliaoapp.musically
# Revoke dangerous telephony permissions adb shell pm revoke $PKG android.permission.READ_PHONE_STATE adb shell pm revoke $PKG android.permission.READ_PHONE_NUMBERS adb shell pm revoke $PKG android.permission.READ_SMS adb shell pm revoke $PKG android.permission.READ_CALL_LOG 2>/dev/null || true # Clamp app-ops that leak telephony identifiers (Android 10+) adb shell cmd appops set $PKG READ_DEVICE_IDENTIFIERS ignore adb shell cmd appops set $PKG READ_PHONE_STATE ignore adb shell cmd appops set $PKG READ_PHONE_NUMBERS ignore adb shell cmd appops set $PKG READ_SMS ignore # Reset the app after changes adb shell am force-stop $PKG adb shell pm clear $PKG
- On‑device alternative to ADB (still non‑root)
- Install Shizuku, start it.
- Install “App Ops” or “App Manager”; link it to Shizuku.
- For TikTok, set the same app‑ops above to “Ignore/Deny,” and revoke Phone/SMS permissions.
- Force stop and clear storage for TikTok, then test.
- Temporarily disable the SIM subscription while using TikTok
- Settings > Network & Internet > SIMs > toggle OFF the Syrian SIM (disables subscription, not just data).
- Keep Wi‑Fi ON.
- Force stop + Clear storage for TikTok, then test.
- Dual‑SIM: place the Syrian SIM in slot 2 and disable that slot when using TikTok.
- Optional: firewall to Wi‑Fi only
- Install NetGuard or RethinkDNS.
- For TikTok, block “Mobile data,” allow “Wi‑Fi.”
- Use this alongside the steps above; it doesn’t hide the SIM but avoids mobile routing.
Notes
- Always force stop + clear storage before re‑testing so TikTok drops any cached region flags.
- Intercepting what TikTok sends isn’t feasible non‑root due to TLS + certificate pinning.
- If all else fails, use the web version in a browser profile or an Android tablet/Chromebook (no cellular stack). On iPhone it already works, as you noted.
Summary
- Deny Phone/SIM access and clear TikTok’s storage; test on Wi‑Fi.
- Best fix: run TikTok in a secondary user without telephony enabled.
- For stronger enforcement, use ADB (or Shizuku + App Ops) to set telephony app‑ops to Ignore.
Contribution by Gittensor, learn more at https://gittensor.io/