This image is a classic example of "zombie information"—technical data that was once partially true but is now largely obsolete

This image is a classic example of "zombie information"—technical data that was once partially true but is now largely obsolete

This image is a classic example of "zombie information"—technical data that was once partially true but is now largely obsolete, misleading, or potentially dangerous because it lacks context.


Here is the breakdown of why this list is mostly false or ineffective for the average user today.


1. The "Universal" Fallacy
The biggest lie in this image is the title: "Android Secret Codes."
Android is an open-source operating system, but every manufacturer (Samsung, Google, Xiaomi, Motorola, etc.) customizes it heavily.

 * The Reality: Most of these codes (USSD or MMI codes) are defined by the manufacturer, not Google.

 * The Result: A code that opens a hidden menu on an HTC phone from 2012 will do absolutely nothing on a Samsung Galaxy S24 in 2025.

2. The Code-by-Code Debunking
Let's break down the specific claims in the image based on modern smartphone reality:


| Code from Image | Claim | Status | The Reality |
|---|---|---|---|


| *#06# | Show IMEI | TRUE | This is the only truly universal code on the list. It is a GSM standard and works on almost every mobile phone, even old flip phones. 


| *#*#4636#*#* | Phone info | PARTIAL | This works on "Stock Android" phones (like Google Pixel or Motorola). It usually fails on Samsung, Huawei, or Xiaomi devices, which have their own specific menus. 

|
| *#*#0*#*# | Hardware test | FALSE | This syntax is incorrect for most major brands. Samsung, for example, uses *#0*# (without the extra stars and hashes) to access the hardware test menu. |


| *#*#349715339#*#* | Camera details | OBSOLETE | This code was common on very old builds of Android (HTC era). It rarely works on modern devices. |


| *2767*3855# | Full reset | DANGEROUS | Do not type this. This is a legacy code (mostly Samsung TouchWiz era). If it works, it performs a hard factory reset immediately without a confirmation prompt, wiping all your data. However, on most modern phones, the dialer simply ignores it. |


| *#*#7780#*#* | Factory Reset | OBSOLETE | Similar to the above. Most modern Android security protocols block dialer codes from initiating factory resets to prevent accidental wipes. 

3. Syntax Errors
Notice how many codes in the image follow the pattern *#*#CODE#*#*.


 * This specific pattern is essentially a command sent to the Android Manifest to open a specific debugging activity.
 * Modern dialer apps (Phone apps) often block these strictly for security reasons.


 * Many manufacturers have shortened their codes. For example, Samsung uses *#0*# for testing and *#1234# for version info, completely skipping the long *#*# prefix/suffix seen in the image.


4. The Security Risk
While most of these codes will simply result in a "Connection Problem or Invalid MMI Code" error, blindly typing codes from the internet is risky.


 * Data Wipe: As mentioned with the reset codes, older devices might wipe data instantly.


 * Sim Cloning/Forwarding: The codes listed for call forwarding (*#*#8351...) are valid MMI commands, but messing with them can accidentally forward your calls to a scammer or mess up your voicemail configuration.


Summary
If you try these on a modern Android phone (like a Galaxy S23 or Pixel 😎, 90% of them will do nothing. The image is a relic from the early days of Android (2010–2014) and applies mostly to older HTC or Developer devices.


The only code from this list you should trust is *#06# to check your IMEI.

Back to blog
0
Tip Amount: $0.00
Total Bill: $0.00
Per Person: $0.00
You Save: $0.00
Final Price: $0.00