Optimus V Rom question

nixie21

Well-known member
Feb 26, 2011
135
5
0
So I just took the leap and installed rodimus rom...

Just curious what the differences between roms are, why rodimus? What advantages/disadvantages to each optimus v rom?

THANKS
 
The maker of the rom usually posts the differences in the first post.

Rodimus has various tweaks I like. Just one of them is a built in ad-blocker.
 
nothing really. rodimus has themes tho so thats pretty chill. if cyan 2.3 had mms working ik that would be my first choice in roms
 
Rom rundown...

Rodimus was the first rom to come along and is still actively developed. Today, it is a highly tweaked rom with various themes and enhancements (with Virgin junk removed). It is now based on or is similar to Stock + Xionia. It has the best battery life and is one of the best in terms of performance for the Optimus V.

Stock + Xionia is kind of the granddaddy (even if it actually came along second), it's stock Virgin, minus the virgin junk and a tweaked kernel that allows overclock. This rom is important in that it was the first to have a different kernel and is still the basis for many 2.2 roms for the V. It also showed a glimpse of what the V was truly capable of in terms of performance. The kernel was built by Zefie for the Optimus S and was tweaked by RevolutionRed for use in this rom. This rom is still the same as it was when released. While not the fastest or most efficient today, it does outrun the stock rom/kernel by miles in both speed and battery which is why the faster 2.2 roms are still using this as a base. The dev has been busy with school, Aphrodite sort of carries the torch for it.

Aphrodite is built right on top of Stock + Xionia and was more or less an effort to continue what Stock + Xionia started with a different kernel, and stripping out even more things. This rom is relatively new compared to the above, but has been aggressively developed to accomplish a lot quickly, without Rodimus and Stock + Xionia, it wouldn't exist. Created as a personal rom for myself, it evolved quickly. There are now three versions, one with stock kernel (Extra Virgin), another with Xionia 005 (v.1.3.3), and another with 008 (version 2.0, a beta had kernel 013). Version 1.3.x ranks as the fastest and smallest Froyo rom, and one of the best in terms of battery life (1.3.3 should be pretty close to Rodimus for battery life now). There is NO them, in fact, this is so stripped that it does not even contain a boot animation or even many Google apps (get the apps from the Market). It's just a very basic froyo. All current Aphrodite roms include as many up to date apps as possible and even has the malware patch built in (this should be done after any froyo/2.2 rom flash unless built in). Version 1.3.3 is stable, while version 2.0 is kernel progressive, so it may not always be the most stable or fastest rom out there.

Mobius is a work in progress to create a completely new kernel. This is not complete I believe.

Mmmark111, creator of Rodimus also put together a Cyanogen6 rom, which is a work in progress, I'm not sure of the status. It was put together in non-working form so others could take up the project. This is not yet a working rom to my knowledge.

There is also Pure Android, there isn't much known about this one, seems the creator has abandoned it. I do know it has some tweaks that are known to cause problems on occasion (stagefright). It also has some remapped keys (on purpose) and a new boot animation.

Zomg! Rom is a themed rom that uses the stock kernel, ADW launcher, a new video player, and removed Virgin junk. Like Aphrodite, it too does not have any Google Apps.

Wait That Ain't Sense is another themed Rom which simulates the Sense UI. It is cleared of Virgin apps and the stock kernel.

There is also a completely Stock Virgin rom available.

Then you have the 2.3 roms AOSP and Zefies. Zefies is a bit behind at this point. Both use Cyanogen as the base, native wifi tethering does not work, you have to use an alternative and MMS is broken.

Update: AOSP has working native tethering, but minor BT issues.
 
Last edited:
thanks so so much for the post. It was exactly what I was looking for. so do I need to install some malware patch on rodimus?

Sent from my VM670 using Tapatalk
 
Unless the creator says so, assume you need to.

I beleive only Aphrodite is currently patched.
2.3/Gingerbread roms are immune.
 
Last edited:
Thanks again, but forgive my ignorance....what app do I need to install to patch?
 
@LeslieAnn: Just to update your post-- The current release (04/03) of CM7 has wifi tethering working. The only known issues are no receiveing MMS, and some report issues with using the BT headset to make a call, though they can hear audio with it. It was also posted with a note saying they think MMS is close to being fixed.
 
@LeslieAnn: Just to update your post-- The current release (04/03) of CM7 has wifi tethering working. The only known issues are no receiveing MMS, and some report issues with using the BT headset to make a call, though they can hear audio with it. It was also posted with a note saying they think MMS is close to being fixed.

Fixed, thanks. :)

Some of it was off the top of my head and some may be a little of, but not much.
I expect MMS within another month probably, just a guess based on how fast development is.
 
thanks so so much for the post. It was exactly what I was looking for. so do I need to install some malware patch on rodimus?
The malware patch referred to by LeslieAnn (hereafter referred to as "CrapPatchDD") offers very little benefit.
It doesn't actually patch any security vulnerability. It just creates a file to make your system look infected, so that if you do get the virus (DroidDream), it won't deliver its payload.

The problem with this, is it doesn't do anything to stop the virus from getting inside your system in the first place. This means the virus author can change just ONE line of code and the virus is immune to CrapPatchDD.

A good malware patch will fix the vulnerability, forcing the virus author to come up with a different way to enter the system. Unfortunately, CrapPatchDD does not do this.

Here's an analogy:
You have an office with a door in the back. The door doesn't have a lock on it.
One day a guy named DroidDream opens the door and installs surveillance cameras in your office.
To remember where he's been, he writes "Bob was here" on the wall. What a jerk.:mad:

Turns out, this DroidDream guy has been opening a lot of back doors and writing "Bob was here" on everyone's walls.
He's in the news. :eek:
Then, a guy named CrapPatchDD gets a brilliant idea!
He writes "Bob was here" on his own wall!
Now if DroidDream shows up, he'll think he already installed the equipment and CrapPatchDD's office will be unharmed! ;)

It seems like a good idea, so you follow CrapPatchDD's lead and write "Bob was here" on your own office wall. Now you can sleep at night knowing you're safe! :cool:

Later that week, DroidDream opens the back door to your office, installs surveillance equipment, and writes "Joe was here" on your office wall.
I guess he read the news and decided he wouldn't leave just because you wrote "Bob was here". Shoot. :'(
To me, leaving the back door unlocked and using CrapPatchDD to write "Bob was here" on my phone seems absurd.

Personally, I don't bother with the patch. If I ever happen to flash a ROM that has the patch, I might remove it on the principle of not having useless files clutter up my system (especially ones intended to mimic files created by a virus).

If you want to be protected, you need to lock the door (security software) or seal it (Gingerbread).
 
Everybody is a security expert on the internet anymore..

But they never offer a solution just say this isn't sufficient and I think its lame..
 
so what patch would I need to apply?


Sent from my VM670 using Tapatalk
Here is the thing its not necessary to install unless you have downloaded the apps. Google remotely pulled apps from the infected phones and from what I understand is keeping a better watch on new devs and apps being uploaded.

So its not necessary to install the patch.
 
The patch is a blank file, so size is pretty much zero and it's one file.

As for being worthless, I disagree. Yes it can be bypassed, so can any protection on your pc, why do you think you have to keep updating your antivirus.

Is this a lame patch, maybe. It's a simple fix to what was a big problem at one time. Remember though, not everyone gets everything from the market and we still have the Melissa virus floating around in computers, YEARS after a simple fix was devised.

It's people thinking "I don't need that" or "that's useless" who end up spreading this junk. I know net admins who claim they don't need anti-virus or protection on their pc's because they are "safe". Sorry, but no, you aren't. If one insignificant file stops a bunch of junk from possibly getting on my phone, no matter how remote, I think that's worth it.
 
Everybody is a security expert on the internet anymore..
If you think I'm wrong, I would love to hear your counter points.
Is there anything you would like me to clarify?
But they never offer a solution just say this isn't sufficient and I think its lame..
Yeah, that really sucks. That's why I offered two solutions. I'll repeat them:
1) Install security software
2) Install Gingerbread

so what patch would I need to apply?
Currently there is no patch that will protect you from the exploit DroidDream used. You need security software or Gingerbread.

Here is the thing its not necessary to install unless you have downloaded the apps. Google remotely pulled apps from the infected phones and from what I understand is keeping a better watch on new devs and apps being uploaded.

So its not necessary to install the patch.
I think you're confused. The patch that was being discussed in this thread is one that is installed on uninfected phones to prevent infection. You seem to be referring to Google's Android Market Security Tool, which is only installed on infected phones.
 
So far I've used the stock which sucked, the stock with xonia kernal which was faster, now I'm on the 2.3 GB aospc and its the best Ive used
 
If you think I'm wrong, I would love to hear your counter points.
Is there anything you would like me to clarify?Yeah, that really sucks. That's why I offered two solutions. I'll repeat them:
1) Install security software
2) Install Gingerbread
Your solutions would have done absolutely nothing and did absolutely nothing about this exploit. NONE. It was a developer that noticed and then alerted google. Lookout was the first to respond to the news and took action in including the files to the scan process.

No Im not confused. I have discussed this before. And it has been discussed before. The file listed here is basically the same as the one google pushed.

Currently there is no patch that will protect you from the exploit DroidDream used. You need security software or Gingerbread.
This is wrong info being distributed. Yes there is no patch, yes gingerbread patched the exploit. BUT no security software is 100% fail safe. Again I direct you to the fact NONE of them even detected the exploit. And just because they are watching it now, as you gave a example of, it doesnt mean somebody couldnt find a new way to run the exploit and bypass the "security" software you are adamantly pushing.

@LeslieAnn I agree protecting your device is up to you. But again this patch is not necessary, it is however highly recommended.
 
The patch is a blank file, so size is pretty much zero and it's one file.
Yes, and it offers about as much protection as one would expect from a blank file. That's my point.
As for being worthless, I disagree.
I never said it was worthless. I am actually very careful with my choice of words. You seem to have polarized my view against your own. What I said was:
The malware patch referred to by LeslieAnn (hereafter referred to as "CrapPatchDD") offers very little benefit.
By using that particular choice of words, I acknowledged that it is possible to benefit in some way from CrapPatchDD.

Yes it can be bypassed, so can any protection on your pc...
I believe that saying CrapPatchDD needs to be bypassed is an overstatement. It's a single dummy file. It is more accurate to say CrapPatchDD can be ignored by viruses. The only reason it has any effect on DroidDream is because DroidDream is actively looking for the file and choosing on its own to stop execution.
You can be certain that any future Android viruses (including the next revision of DroidDream should it surface) will not choose to stop execution because of a single dummy file.

...why do you think you have to keep updating your antivirus.
Computers need to be patched to close security vulnerabilities. By closing security vulnerabilities, viruses that haven't even been created yet can be prevented from entering a system.

Antivirus software needs to be updated because old viruses continue to change and new ones are created. By using signature and heuristic detection methods, viruses can be blocked from running on a system.

CrapPatchDD does neither of the above.

Is this a lame patch, maybe. It's a simple fix to what was a big problem at one time.
The purpose of CrapPatchDD is to prevent infection. But it wasn't available until the only known source of infection was removed. So it's a simple fix to what is a virtually non-existent problem, with no additional benefit.

Remember though, not everyone gets everything from the market and we still have the Melissa virus floating around in computers, YEARS after a simple fix was devised.
  1. The Melissa virus could easily propagate itself both to other systems, and within a system.
    Without receiving an update, DroidDream cannot propagate itself.
  2. Once infected with the Melissa virus, user interaction was required to disinfect the system, and there was no way to warn everyone who was infected, because the virus was propagating itself.
    Once infected with DroidDream from the only known source of infection, no user interaction was required to disinfect the system. The infected systems were automatically pushed an update to clean them. Infections were tracked by the market accounts they were installed from, and the virus didn't propagate on its own.

Also, notice that the Melissa virus is not a single virus; it has several variants. But in casual conversation, they are all grouped as one. This is because they exhibited similar behavior and relied on the same vulnerability.
Because of this, only one Melissa virus fix is required. The fix to close the vulnerability.
The Melissa virus is well known, but most people haven't heard of Syndicate, Papa, Marauder, or Mad-Cow. These viruses used the same vulnerability as the Melissa virus, so the same fix prevented them from becoming nearly as wide spread as Melissa was.
CrapPatchDD is the equivalent of stopping just one of the Melissa virus variants and leaving the vulnerability open.

[INFO]
It's people thinking "I don't need that" or "that's useless" who end up spreading this junk. I know net admins who claim they don't need anti-virus or protection on their pc's because they are "safe". Sorry, but no, you aren't. If one insignificant file stops a bunch of junk from possibly getting on my phone, no matter how remote, I think that's worth it.
I never said I was safe; I never said anyone was safe; I said everyone is at risk and CrapPatchDD does virtually nothing to protect them.

You're pushing for better security. You say people need anti-virus programs on their PC's. We're on the exact same side!
I am not disagreeing with your push for security. I just think that what you are calling a "Malware patch" is grossly insufficient and completely unnecessary if real security is used.

If I told you I didn't need to run any anti-virus software on my computer because I created a file on it that stops the Melissa virus, you'd laugh at me. CrapPatchDD is no different.

I believe there are two kinds of people most likely to spread infections. Those without security, and those who behave carelessly because they think they are protected.

I applaud your efforts. But I consider it a disservice to mislead people into thinking they are safe when they are not.
With CrapPatchDD, the vulnerability remains open. This is not an opinion. It is a fact.
[/INFO]
 

Trending Posts

Forum statistics

Threads
957,035
Messages
6,971,122
Members
3,163,689
Latest member
nemismom