This document created at May 3, 2022, 10:56:42 AM and modified at May 18, 2022, 4:07:46 PM.
In this document, you are going to read about our new feature: Reset FRP lock
What is FRP lock?
If a factory reset is performed on an Android device without the owner's authorization, the FRP will pop-up with the message, "This device was reset. To continue, sign in with a Google Account that was previously synced on this device." Therefore, Factory Reset Protection (FRP) is a built-in security feature that was designed by Google for smartphones and tablets running Android 5.1 and later to restrict other people from using your smartphone or tablet if they forcefully perform a factory reset on the device.
Reset FRP Lock (2022)
Factory Reset Protection (FRP) is automatically activated in every Android device during the Google account setup process. Once FRP is enabled in your Android device, and someone wants to reset the device using Backup & Reset feature in the Settings app, then the system would require the device's security PIN to protect the owner's data and files. An FRP locked device may ask you to sign in to an account, which was previously associated with that device. Reset FRP Lock is our newest function to bypass this and works for most of the newer Samsung models. The success of this procedure does not depend on the device’s binary version or software version. Reset FRP Lock function can be accessed from modem/wizzard mode (not download mode).
How to do it?
First of all, you have to connect the device in MODEM/ WIZZARD mode to the Chimera Tool. This method will be available only in that mode. This is important as previously the FRP Reset services could be reached in Download mode. Now it is a bit different:
1. If your phone does have an active Factory Reset Protection, try to do a Factory reset. If you are unable to Factory reset your phone, you need to reflash it.
2. Once the process is finished, the phone will be rebooted and the Setup Wizard will start.
3.Connect your phone to Chimera and select the model number.
4. Start the process by clicking on the Reset FRP Lock method.
5. During the process the method will stop once because the Reset FRP Lock will require some user interaction:
6. In the Setup Wizard press the emergency call button.
7. Enter the service code: *#0*#
8. Back to the tool: click on the OK in the Chimera.
9. Back to the phone: In a pop-up window press, "allow USB debugging".
10. The Reset FRP Lock will continue, it will be finished and eventually the phone will be rebooted without the lock.
If your device is not able to connect to ChimeraTool you have to restart the phone, if that does not work, reflash it.
Martview is not our official forum but it can bring help to all our customers, since the questions asked are answered by professionally relevant users and administrators there.Open forum
This is our official English-language forum. We recommend it for all of our users, because many problems and errors have been described and answered here over the years.Open forum
We would like to inform you that as from 25 May 2018, our company acts according to the General Data Protection Regulation (GDPR) of the European Union.
Please note some of our main aspirations to protect our customers’ security and personal data. We have always paid special attention to user data and the way we process them, but let us show you some examples:
We provide the option to delete your profile
You can initiate this on the https://chimeratool.com/#user-settings page.
You can always check where else you are signed in from to the site, and if that is not you, you can sign out that browser. https://chimeratool.com/#user-sessions
As a first line of defense, your data is protected by security systems specialized in preventing hacking attacks, but our other self-developed security solutions and our ever-running monitoring systems enable us to declare with great certainty that we do everything to prevent unauthorized users from acquiring any sensitive data.
In case of a potential unauthorized physical access to any of our servers, the data stored there is useless, as our storage media are protected by sector-level AES encryption.
All passwords we store are unknown to us as well, since only the passwords’ hash values are stored, randomized with “salt”. This minimizes the risk of any leakage of actual user passwords in case of a potential database leak.