Firmware

Bypass factory Reset Protection (FRP) on MTK and SPD devices with new 2016 security

Here is just another tutorial on how to bypass Factory Reset Protection (Google Account Lock) on some SPD and MTK devices. If you have been following this blog you must have read other ways on how to do this if not you can read them following the links below

Now new devices are out with updated security patch. From the other tutorials above, it is shown that we can easily get into message app through the calling method. Most new devices now will not allow you receive calls or if it does when you swipe and select message it will not take you to message app thus the methods will not work.

To bypass FRP on these type of devices, follow the procedure below
Note
This tutorial assumes that your are the owner of the phone
I’m not responsible for how this tutorial is used
Use at your own peril……..

Turn off device and input both SIM cards into the phone then turn it ON

When device is ON, Press Next button then connect to a WiFi hotspot
When you have successfully connected to the hotspot, press back till you reach the Startup page
Now select EMERGENCY CALL and dial any emergency number like 911 or 112
Wait for few secs for it to connect
When it connects, all the icons below will be highlighted
Select Contacts
Contacts app will pop up
Press and hold any contact on screen then select share from the pop up
Use Xender app to share it.
Now you are in Xender, you can transfer, install and Launch QuickShortcutMaker App
Once done, the rest process is easy
Type in Google Account in the Search Bar
Select Google Account Manager from the list
Under Google Account Manger, scroll down and select the option with Type Email and Password
Now Tap Try to launch it
You will now see Re-type password page
Tap the 3 dots at top right and select Browser Sign-in
Tap OK and sign in your Account (Connect device to a WiFi network)
After a successful Sign-in, you will be faced with Quick Shortcut app interface
Reboot the phone and set it up.

But if after doing the whole process above and discover the device is runs on 2015 security the process is way to easy like the one in the animated screen shots above,
All you need to do is just enable usb debugging then factory reset the device

Note
If you are doing this for somebody, after the bypass, go and do a factory reset from settings menu (Backup and Reset option) so as to clear your account from the device.

Hope this helps…………

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

To Top

Follow us on Facebook!