• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

android lost directory dec 31 1969

android lost directory dec 31 1969 i know exactly what it is its a hack its the key into any android phone ive been seeing it for seven years as i battled hackers into my phones of all kinds the only thing being constant is that they were android dec 31 1969 is the date the technology was found in the desert its not ours or this earths but it is definatly military and is the keys to the kingdom per say for example one of many attacks i battled and throught a sientific method of ellimination of variables i elliminated theries i received a photo from a freind next thing i know my pictures were dissapearing well through my process of ellimination i checked the details of my so called freinds photo the date was dec 31 1969 by morning my photos were gone along with my freinds photo its like a file magnet it dockes with files and extracts them somtimes taking them completely and other times copying them it is bad thing other dates are jan 30 1980 and i think march 14 1972 thre ndistinct events threee packets of technology that started it all off the beginning of android my hunch is android was stolen technol.ogy think about it if its not supossed to exist who can get in trouble next time you see them check your files and their detailes whos doing my guess government breaking our civil rights also ask your carier for an explantion of fake call doesent jive
 
  • Like
Reactions: dumitchristopher
For what it's worth, UNIX epoch time started at 00:00 on January 1, 1970 UTC (corrected for your local time zone, that would likely be December 31, 1969 if you're in the US). A lot of file systems will revert to that timestamp for files that are corrupted or otherwise have an invalid timestamp.

Whether or not you're being hacked is a whole other issue, but rest assured that the timestamp is a symptom and not the cause. :batdroid:
 
Upvote 0
For what it's worth, UNIX epoch time started at 00:00 on January 1, 1970 UTC (corrected for your local time zone, that would likely be December 31, 1969 if you're in the US). A lot of file systems will revert to that timestamp for files that are corrupted or otherwise have an invalid timestamp.

Whether or not you're being hacked is a whole other issue, but rest assured that the timestamp is a symptom and not the cause. :batdroid:
Oh there you go again.

Sure, we could use words like, "logic," "reason," and "there was no internet on March 14, 1972" but I'm not going to be a party to your fear-mongering.

The simple explanation is the best - file magnets have been sent back in time.
 
Upvote 0
I have a theory that meets in the middle. It is absolutely a folder planted by hackers. They data mine for ANYTHING photos, personal information, things that can be used to extort you, stalk you, etc. It is nearly impossible to delete and initially is a hidden folder. Heres the meet in the middle part. I believe, due to the Epoch Time Conundrum (which for its applicable purposes has been solved) setting the creation date of the application or program at December 31, 1969, an added layer of protection is in place. The system, malware and antivirus apps are either confused or don't even recognize the app for what it is. I believe it allows the app to run in the background free from interference. EVERYTHING that computers do have a correlating timestamp based in Epoch time. If an app was created before epoch time, then it can't be recognized, identified, marked etc. If the program enters your photo folder and copies all your photos, all that's left behind is an empty folder. If you do happen to locate the folder, removing it is impossible, EVEN if you format the storage device (even if you do it more than once). I agree it is or once was a government thing but it has since gone rogue. Thieves of identification, credit cards, burglars, car thieves, the homeless, some police and many what seemed to be regular members of society participate for benefit/profit. Some call them gangstalkers/gaslighters. My opinion is the Android Open Source Project should be shut down and Android as an operating system should be eliminated. ANYONE can take ANY application, add or remove lines of code to do whatever they want it to do, so long as they give notice of such changes- that's like saying the guy whos going to shoot up some place- needs to buy his gun legally. I believe, Amazon, Youtube, Gmail, Facebook, Instagram, Pokemon Go, and many other foreign social sites have compromised beyond repair and these people use said applications to for location purposes, and to use exploits to acquire data. Many of these pieces os are actually developers. What better way to have a million people test out your app then to force them to unknowingly do so with all the corresponding data, collected used for the plythera of reasons stated above.
 
  • Like
Reactions: Honeybe201
Upvote 0
Wow: take a 5 year old post, build a conspriatorial mountain of technically-illiterate FUD and call for the elimination of open source in the mobile operating system (because nobody has ever heard of security problems on a closed-source OS, right?).

William of Occam is currently spinning a little faster in his grave, by the way.
 
Last edited:
Upvote 0
Oh and to ThePearlyMon or whatever it is. The guy isn't fear mongering, he's trying to figure out a pretty messed up bit of software. You know what happens once a conspiracy theory is proven right? There are millions of people in the world right now experiencing financial loss, identity theft, as well as some things that are unbelievable and extremely difficult to prove. Some people have bee experiencing constant attacks in one way or another for years. I get it, you haven't experienced it, and I hope you don't, but when that one year comes around that you have 3 or 4 hard drives left without even an operating system with one of those comps being brand new, then your car starts to have constant issues, everyone at your job turns against you, maybe you even lose your job, family and friends distance themselves from you, multiple phones get wiped, or straight up dissapear, you start getting pulled over on a regular basis, begin to find yourself in confrontations you didnt start because youre not that kind of person, end up sick, homeless, incarcerated institutionalized or worse. If you ever to become a targeted individual, I hope someone listens to you and believes you, instead of treating you like some nut job.

And to Codesplice- you can't just make stuff up and it become the truth. Your statement is so wrong I wont even comment any further on it.
 
  • Like
Reactions: Honeybe201
Upvote 0
Oh and to ThePearlyMon or whatever it is. The guy isn't fear mongering, he's trying to figure out a pretty messed up bit of software.
first off its EarlyMon, a very well respected member of this forum since the beginning, was just joking with codesplice.....another well respected member of this forum. it was not meant to be serious at all.
And to Codesplice- you can't just make stuff up and it become the truth. Your statement is so wrong I wont even comment any further on it.
and second codesplice is correct:
https://www.a2hosting.com/blog/whats-the-deal-with-12-31-1969/
https://www.dailyrazor.com/blog/december-31-1969/
https://en.wikipedia.org/wiki/Unix_time
 
Last edited:
  • Like
Reactions: MoodyBlues
Upvote 0
I have a theory that meets in the middle. It is absolutely a folder planted by hackers...

I completely agree with you and you make points that I have said myself!! I detest Google because of all this yet Apple products are so limited on usability. Over the previous 2 years I have been hacked every way possible...thru my router, home security camera, google/gmail account and my phone as well. I had a Pixel 2 but felt like it was my crazy ex-boyfriends perfect gateway for my initial hacking experience so I didn't keep it long!! And being a single woman I am literally the #1 target for stalkers(gang or solo) so I've had to do much research and try my best to protect myself but it's not easy figuring all these things out.
I believe it started with my ex but it left my accounts vulnerable for more experienced people. I have NEVER linked any of my accts yet my gmail, hotmail and LinkedIn were all tied together a few months ago, and all my contacts were imported into LinkedIn. I even got an email from myself threatening if I didn't send them bitcoins they were going to send a compromising video of me to everyone but I knew it was lies so I replied to myself then changed login after I saw it had been read.
Current situation as of this week..on my laptop...admin rights have been taken away, users and apps added to share things, settings changed and greyed out. I think you're right about the files staying on bc I've hard reset it so many times!! I've already realized they're hidden...Oh, and did I mention I also have a fictitious WiFi in my living room with my old SSID name!!! This happened in August while on vacation. It kept hacking into my router, setting ports and making my real WiFi public. But nobody (locally) knows how it's possible or how to fix it. I've gotten over sounding crazy bc I have all the proof one could possibly have.
And I found this post trying to figure out the 1969 correlation...so frustrating.
 
Last edited:
Upvote 0
It's important to distinguish the real stuff from the junk any scammer can do. So an email "from myself" means nothing(*), and I'm not certain that your contacts being uploaded to LinkedIn does either(**).

But the other stuff, well some of it I don't understand: a WiFi SSID can't "hack into your router", that's just not how it works, though someone could set up a hotspot with your old SSID in the hope that one of your devices will try to connect to it (as a way of hacking that device or your internet traffic). But for the rest, the problem is knowing what all of the vulnerabilities are and clearing out all of the existing exploits: you need to secure both your accounts and your equipment together, one or the other isn't sufficient, and if it's this deep in then you may need specialist advice (and this isn't my speciality). I do know that it's hard to work out the cause just from a few descriptions of symptoms though: for example, you mention your WiFi router settings changing, but that could be done by anyone who had access to your laptop as well as by hacking the router directly (probably more easily, since only some routers are vulnerable that way). I think you really need a specialist to sit down with you by the sound of it.

But the 1969 correlation is nonsense, and my advice is not to allow it to distract you from the real problem. I can understand that that earlier poster was frustrated with their problems and hence unwilling to accept that this did not mean what they thought, but anybody with the slightest familiarity with *nix systems (Unix/Linux/Android, even MacOS) knows the significance of that date.

---------

(*) It's trivial to spoof email addresses, and a very simple way of scaring people who don't know this into thinking they've been backed is to spoof a mail to appear to come from the address you are sending it to. It's also easy to spot if you have an unusual email provider, e.g. if I get one of those claiming to be from my CERN email account I just need to look at the full headers to see that it did not originate from the CERN mailservers. If however they use a burner gmail account to spoof your gmail address it's much less obvious.

(**) LinkedIn want you to upload your contacts to them (and want to spam them all with invitations). I've known very computer-literate people carefully deselect these things when creating LinkedIn accounts only for LinkedIn to ignore their choices and do it anyway. So I wouldn't rule out that one being down to LinkedIn themselves rather than any hacker (it's one of the reasons I will have nothing to do with LinkedIn).
 
Upvote 0
It's important to distinguish the real stuff from the junk any scammer can do. So an email "from myself" means nothing(*), and I'm not certain that your contacts being uploaded to LinkedIn does either(**).

I understand what you're saying, however, the email from 'myself' also contained my current pw at that time or I would've thought it was spam as well.

From what I've read, a bridge can be built that can make it possible for the 'evil twin' to connect to the router, basically to hijack the internet usage. I was gone for 2 weeks when this happened and used almost 400GB of data when normally I use around 200GB a whole month. I changed out my router 3 times, wiped all my electronics with hard resets and changed all passwords but it kept happening. As of now that has stopped but the rogue WiFi is still present. I even used WiFi meters and tore apart the area it is showing up but couldn't find a physical device. I honestly think moving later this year will be my only refuge..for that. I do unplug it everyday now too.

I know I need professional help but everyone I call will only work with businesses. Looking for the 1969 was more of a mild curiosity as it showed up when my cam was hacked and I got the files recovered that were deleted from the sd card, and again the other day on my laptop I noticed it. Oh, and I've also learned Dropbox and OneDrive are used for some of these illicit file transfers. I didn't even connect my hotmail account to my laptop this last reset and OneDrive shows as being active but the associated files are empty. There was also a .hidden Dropbox file on that SD card I had recovered.

Other than jailbreaking a G1 many many years ago, I have limited knowledge about these things other than my own recent experiences. I'm a great researcher but I'm only getting the surface info, not the background for any resolutions. I do appreciate any and all thoughts tho. I'm literally at my wits end to stop the madness!! lol
 
Upvote 0
I understand what you're saying, however, the email from 'myself' also contained my current pw at that time or I would've thought it was spam as well.
A common scammer practice is to obtain a list of compromised credentials from various data breaches. I suspect that the password included in that email was one of those. You can check your email address at https://haveibeenpwned.com/ or even search for compromised passwords at https://haveibeenpwned.com/Passwords.

If you ever reuse a compromised password then that really opens you up for attack. You should instead use a unique password for each and every service/account so that even if it does get compromised the impact is limited.
 
Upvote 0
I recently ran into the same issue. The malware passes to anyone your text or call. Basically everyone in your contact list. I installed Android Studio, disconnected internet and connected the phone to find the same issue. There are 2 folders that show as 1969 date and 80% of the others appear as 2008. It definitively effects bluetooth and will effect windows media services. It will connect the phone to your laptop and television, then spread out to any other devices such as windows machines, adding media devices for the television, phone and effected laptop. In fact, it loaded 9 duplicated phone devices.

I ran a test while my android was plugged into a windows 10 machine running android studio. First, I disconnected my network cable, disabled wifi and bluetooth and was able to copy the affected files off of the device. Those file included altered dates such as 1969 and 2008. Under the "proc" folder it creates over 1000 subfolders ranging from 1 - 1026 or highter.

The interesting aspect is when I plugged the network cable back into the windows maching running Android Studio, the machine froze, so I unplugged my Android phone for about 1 minute before reconnecting. Once reconnected, the files had reverted back to a 2023 date.

Luckily, I ran the same test the next day, and there it was.... All the folders were mis-dated and the "proc" folder had 1000 sub directories.

I can confirm that this malware will spread to every new number that you add to your contacts and text. I tested this several times and it is a 100% confirmation. What this means is that even if you get a new phone or number, you'd most likely be reinfected because the people you contact most often have now been affected and will pass the malware back to you.

I can also confirm, that anything you connect to via bluetooth such as your laptop, television or xbox will also be affected. If you're not aware, it is very challenging to turn off all NFC and Bluetooth on an Android. You have to root the phone and know what you're doing. From there, you'll have to manually block all reference to Bluetooth. The only way that I've found that works, is to only use Cellular, disengage all bluetooth, wifi, casting, NFC or similar. From there, keep the device off of in airplane mode when not in use.

Even with those measures, the malware works on a schedule and will attempt to use the speakers or connect online whenever it gets a chance.
This looks like an APT model and is very effective and spreading to other devices very quickly.

The next item that helped was to change the router config and setting it to the highest security, turning off all MoCa and other protocols, blocking all connections from devices in your home network, and/or segmenting all home media devices like xbox or similar onto it's own separate network.

Bluetooth and 2.4 wifi run in the same range, so if you can segment those devices to 2.4, block all unnecessary port access and run your other devices on 5Ghz after disabling wifi and bluetooth, you can prevent those devices from reaching your phone or laptop. It's a super pain and you bascially have to sanitize every device in your home. reconfigure your network, activate logging and network monitoring, and it's still not 100%.

I was able to find references by running a simple "netstat" command on an affecting windows machine. With no programs running, you'll see 3 connection types that are normally overlooked. These include aws cloud services, Akamai Cloud Services and microsoft cloud services. This malware is connecting to cloud services and this is likely a command and control server connection which exfiltrates or loads additional malware on your device.

I would recommend reporting this to law enforcement, but they are pretty useless in this regard. You can research through MitreAttack and see if you can identify the apt or toolsets that match. From there, establish contact with security engineers that have documented such attacks, or document your own APT model yourself through Mitre.

Bascially, you're optons are to find attribution and then switch your approach to an offense counter measure. You can report the AWS accounts to amazon, and other cloud services and any URL's you find in the process, report them and block them. The biggest challenge is how to santize all of the devices that this has spread to. In my case, I documented every aspect and reported each to the appropriate provider such as Google, Microsoft and Amazon. Even after all of that, you're not in the clear. You have to continue to maintain a strong defense which can be challenging for your friends and family members. You have to make sure that they too are aware of the problem and will follow good practices concerning leaving their wifi and bluetooth open and exposed.
 
Upvote 0
I completely agree with you and you make points that I have said myself!! I detest Google because of all this yet Apple products are so limited on usability. Over the previous 2 years I have been hacked every way possible...thru my router, home security camera, google/gmail account and my phone as well. I had a Pixel 2 but felt like it was my crazy ex-boyfriends perfect gateway for my initial hacking experience so I didn't keep it long!! And being a single woman I am literally the #1 target for stalkers(gang or solo) so I've had to do much research and try my best to protect myself but it's not easy figuring all these things out.
I believe it started with my ex but it left my accounts vulnerable for more experienced people. I have NEVER linked any of my accts yet my gmail, hotmail and LinkedIn were all tied together a few months ago, and all my contacts were imported into LinkedIn. I even got an email from myself threatening if I didn't send them bitcoins they were going to send a compromising video of me to everyone but I knew it was lies so I replied to myself then changed login after I saw it had been read.
Current situation as of this week..on my laptop...admin rights have been taken away, users and apps added to share things, settings changed and greyed out. I think you're right about the files staying on bc I've hard reset it so many times!! I've already realized they're hidden...Oh, and did I mention I also have a fictitious WiFi in my living room with my old SSID name!!! This happened in August while on vacation. It kept hacking into my router, setting ports and making my real WiFi public. But nobody (locally) knows how it's possible or how to fix it. I've gotten over sounding crazy bc I have all the proof one could possibly have.
And I found this post trying to figure out the 1969 correlation...so frustrating.
Did you find a solution? I am having all the same issues they've ordered phones on my Verizon account, configured my iPhone to their Mac OS, put me in action locks, admin on my windows, fake group Policy's. So I buy a android and the hack that within a week and I've now got these 1969 system apps I can't delete. I can't find anyone with a solution android and apple both tried and neither could patch so I don't know what to do.
 
Upvote 0
Did you find a solution? I am having all the same issues they've ordered phones on my Verizon account, configured my iPhone to their Mac OS, put me in action locks, admin on my windows, fake group Policy's. So I buy a android and the hack that within a week and I've now got these 1969 system apps I can't delete. I can't find anyone with a solution android and apple both tried and neither could patch so I don't know what to do.
what phone do you have? what 1969 system apps are we talking about? how do you know you were hacked?

i would:
1. setup two step verification for your google account as well as any other account that you might have.
2. i would hard reset your phone. now keep in mind that this will trip FRP(factory reset protection) but as long as you have your google account info on hand, you should be fine.
3. setup a lockscreen code or fingerprint after everything is setup again.

the hard reset will wipe out any "hack" that was on the phone. and the two step verification will make it very difficult to "hack" into your account.
 
Upvote 0
I've gotten 3 demand letters, had several account takeovers, fraud on my accounts, lost admin rights on PC, greyed out settings because they stuck me in group policy with my stolen domain..among other things like the picture they left in my phone of one of them with a headset on and my Google account profile icon top right
I have a pixel 7a now. And the 1969 app is google safety resources, media, Android service library, android system, Bluetooth, just to name a few, then I also have a bunch that say 12/31/2008. I did 3 factory resets , in the demand letter I got most recent they mocked at my attempts to factory reset and said no matter how many resets I do I will always land on their server. I don't know what that means but I noticed on windows when I reinstall it's instantly configured so it seems like what the hacker stated is true. I'm not paying them a dime so I just keep researching. I found codes ran on my stolen GitHub account so I think the hack is terminal based. It's so confusing
 
Upvote 0
hard reset....not factory reset. there is a difference. hard reset is done by using a combination of the power button and volume buttons.
https://www.hardreset.info/devices/google/google-pixel-7/
should be the same for the 7a

also if there is a letter. why not go to the cops?
Thanks I didn't know there was a difference.im going to try that now!
I did call them, they directed me to IC3.gov which I guess is the cybercrime FBI. I've made 3 reports. I never get any communication back.i gave them the hackers Bitcoin wallet they requested us to deposit to about 3 weeks ago ...I've went everywhere possible for help. I'm awaiting homeland security to approve my request for help now so fingers crossed there.
 
  • Like
Reactions: ocnbrze
Upvote 0
have you thoug
Thanks I didn't know there was a difference.im going to try that now!
I did call them, they directed me to IC3.gov which I guess is the cybercrime FBI. I've made 3 reports. I never get any communication back.i gave them the hackers Bitcoin wallet they requested us to deposit to about 3 weeks ago ...I've went everywhere possible for help. I'm awaiting homeland security to approve my request for help now so fingers crossed there.
have you thought of changing your google account? maybe try using a burner phone for awhile as well.
 
Upvote 0
have you thoug

have you thought of changing your google account? maybe try using a burner phone for awhile as well.
Ya, Ive changed it all. I believe the fake group policy they put us under allows them control as if my devices belong to an employer & that's how they keep getting back in. It's pretty complicated but they tricked me faking to be Microsoft offering me 90 days endpoint and remoted in. They gave me a email which was my own stolen domain and no password but remoted in and only messed with my settings didn't put any software on. Then later tricked me as Avast and I allowed them to remote in to fix the VPN and the again messed with settings & didn't fix. I have a picture of the screen they were on with a pop up warning of malware. I messaged and asked wtf was he doing. He lied and said scanning and claimed the malware pop up was a false positive but it was clear they weren't really Avast when they left and didn't even attempt to fix the VPN then asked for more money when I complained. It seems too crazy to be true because I chose the Avast app that was official. But it happened and I've documented everything & have thousands of screenshots but I don't know who to trust I'm always getting redirects to deprecated sites and it's unnoticeable, I learned to use a tool to check my links now. It's a nightmare and has legit wrecked my life
 
Upvote 0

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones