How to Make Android as Secure as Possible - Android General

Mobile security is a big deal, probably now more than ever. Most of us live on our phones, with financial information, calendar appointments, family photos, and more stored on our devices. Here’s how to keep your Android phone secure.
Enable Two-Factor Authentication On Your Google Account
A secure Android phone starts with a secure Google account, because that’s where all your synced data is stored—and the more Google services you use, the more crucial this step is.
If you haven’t already, start by enabling two-factor authentication (2FA) on your Google account. There are several options for that second factor, be it a simple text message (which is inherently the least secure of all 2FA methods, but still better than nothing) to adding a U2F key like Google’s Titan Key bundle.
You can find Google’s 2FA settings in My Account > 2-Step Verification (and you’ll have to sign in, of course). We also have a step-by-step guide on enabling the feature if you hit any snags.
But seriously, do that now if you haven’t already.
Also, while you’re poking around in your Google account settings, it’s probably a good idea to go ahead and run a security check. This lets you add or modify recovery phone numbers or email addresses, check recent security events, see what other devices are logged in (and remove them if necessary), and a lot more.
Use a Secure Lock Screen
If you’re not using a secure lock screen, it’s time to change that. This is your absolute first line of defense when it comes to keeping your phone safe.
While the process varies slightly between Android manufacturers and their various flavors of Android, the general gist is Settings > Security > Screen Lock. As I said, the details might vary slightly here, but that will get you in the ballpark.
Make Sure Find My Phone is On
Losing your phone is a gut-wrenching feeling, so you also want to make sure you have a way to track it and, worse case scenario, remotely reset your phone if there’s no chance of getting it back.
Fortunately, Google has a tracking system in place for Android phones. It’s called Find My Phone, and it should be enabled by default on all modern Android phones. To double check, jump into Settings > Google > Security > Find My Phone.
If you ever lose your phone or it gets stolen, you can fire up the closest web browser and search Google for “Find My Phone” and remotely locate your lost device. We have a closer look at everything you can do with Find My Phone if you’re interested in that, too.
Disable “Unknown Sources” and Developer Mode
If you’ve tinkered with your phone in the past, you might have enabled something called “Unknown Sources” (or “Install Unknown Apps” on newer versions of Android). This setting allows you to install apps that are not from the Google Play Store—a process called “sideloading.” And while Oreo made strides to make this a more secure feature, it can still be inherently dangerous to leave enabled.
To improve security, you should disable this feature. On pre-Oreo (8.0) versions of Android, you can do this easily in Settings > Security > Unknown Sources. On Oreo (8.0) and Pie (9.0) you’ll need to disable this feature on a per-app basis, but you can find everything that has access to the feature in Settings > Apps > Special Access > Install Unknown Apps.
Similarly, if you’ve ever enabled Developer Mode for any reason but don’t actively rely on any features, go ahead and disable it. Jump into Settings > Developer Option and slide the toggle at the top to the off position.
Note: On Android Pie (9.0), you can find Developer Options at Settings > System > Developer Options.
Things Google Already Does to Make Sure Your Phone is Secure
It’s not just your responsibility to make sure your phone is secure—Google also does some things to make sure that its system is buttoned up tight.
Google Play Protect
Starting with Android 8.0 (Oreo), Google baked in a feature named Play Protect. This is an always-on, always-scanning cloud-based security system that keeps an eye on apps in the Play Store and on your device. It aims to keep malicious apps at bay—including fake apps—and can even scan apps that you sideload.
To see Play Protect’s settings, head to Settings > Google > Security > Play Protect. You can make sure it’s turned on (and it should be), as well as enable app scanning for side-loaded applications.
On-Device Encryption
In the earliest days of Android, encryption wasn’t even an option. Google added it later, though you had to enable it manually, and that was a hassle. These days, Android is encrypted by default on all modern devices, and you can’t turn it off.
This means that all the sensitive data on your phone is stored in an unreadable, scrambled state upon boot and isn’t decrypted until you enter your password, PIN, or passcode.How to Make Android as Secure as Possible

Related

[GUIDE] 17-10-2013 Guide to Track Android Mobile | Antitheft | Secure your droid

​
"Hello Android buddies!". Sounds really cool, right??
Obviously, Android has created a new revolution in the mobile world because of its Open Source features. Though it is Open Source, we can see lot of advantages and disadvantages. I've seen many geeks in android also lot more noobs. More than 1 Billion android users are there in this world and the count is getting increased day by day. Even now many users are reading this blog in your android phones. If so, a Happy news in waiting for you guys.
We are spending huge bucks in buying a Android device but How you feel when it got stolen are Misplaced somewhere? Don't worry guys, you are at right place. Yeah, here we gonna see how to secure your device from thieves hand also how to track it effectively. You know what the word "Effectively" means and you really agree it once you are done with this cool method.
For Android geeks - Best method to track/protect your droid (Rooted devices)
For Noobs - Sorry for you guys, small loop hole is there (NON Rooted devices)
Before we customize our device for tracking, lets consider what a thief will do if he/she steals your mobile.
Power Off your mobile to prevent getting calls and sms or simply to get off from tracking.
If lockscreen protection is enabled, he/she tries to remove the phone battery (in case of removable battery mobiles).
Remove SIM card from your mobile. At this point all users will lose their hope in getting their mobile back.
Factory reset your mobile.
If he/she is a geeky, flashing new ROM is also possible(bit funny but its fact).
To overcome all these darkest part, we gonna use 3 different apps in our process.
STEP 1:
Enable Password protected lock-screen from settings and I hope all users know how to do it. Now your droid's data is protected securely.
STEP 2:
Install Smart Lockscreen protector app from Playstore and ON the Enable Lockscreen option under Power menu settings.
Now this app won't let you to Power Off your mobile from Lockscreen. Its one of the best app for devices with non-removable battery. Problem 1 is solved.
STEP 3:
Install AutomateIT app from Playstore or spend few bucks on AutomateIT PRO which unlocks all features. This app allows user to enable Data/WIFI/GPS using SMS commands. For devices running android version prior to GingerBread 2.3, GPS can be enabled by any third party apps however devices above GB 2.3, Google has blocked the access hence ROOT permission is required to enable this feature. Sorry for the users with non-rooted droids. Check the picture to create trigger and action if you are using the app for the first time. To enable the "Composite Action" in the Action column, you need to unlock the feature at the bottom of the list which asks you to create account. Just Go ahead.
Once you are done with the configuration, test it by sending the sms with specified format gpson from another number and see what happens. You'll receive an acknowledgment sms that the config has been applied and all the options which you've specified are enabled. So if you come to know that your mobile has been stolen, this sms commands let you to activate GPS remotely and we can track effectively compared to Network location. Big thanks to the developer of this awesome app.
STEP 4:
Now we are going to use 2 different steps to track the devices running android version 2.2 and above.
Using Android Device Manger
Using Cerberus Antitheft app
Android Device Manger:
Thanks to Google for allowing us to track our device associated with the Gmail account. To locate your device in ADM, you need to apply some settings. Open Google Settings app and enable the options in picture.
Goto Settings->Security->Phone administrator and Enable Android Device Manger. Now open Android Device Manager from the browser and you can track the device, also it allows you to remotely lock and wipe user data.
Though ADM allows you to locate your device, the features are very limited and I hope Google will update more features in near future.
Cerberus Anti-theft:
I'm sure you guys will surely attracted by this awesome app. Many have heard about this app but still I need to explain its features here but sadly I don't have time for it. Hope you know what I mean. It has hell lot of features which allows user to get device info remotely, call logs, sms logs, Send sms to specified number about the SIM change which is one of the best feature which solves problem 3.
Install Cerberus Antitheft app from Playstore. You'll get one week trail period after that you need to buy license to continue the service and its worth spending few bucks on this app. First installation allows you to create User account and enable the following options
You can register 3 mobile numbers to receive notification about the SIM change. Login to the Cerberus site and there you can see all the features provided by this app and I'm damn sure that you can surely locate your device using any one of the features.
STEP 5:
Catch the thief and show who you are..!! :good:
DEVICE NOW SECURED​​
Even though we considered so many things in mind to protect our device, you must be very careful from looters. I can't guarantee that this method will work 100% but surely I'll give 95% to rooted mobile and 90% to others. Also keep in mind that you've limited time period to track & recover your mobile as it decreases along with the device battery percentage.
Found this thread useful..??...Rate & Hit Thanks...:good:
Visit My Blog too..
Reserved for future....!!​​
****deleted****

Pixel 2 Privacy

I'm curious about Google hardware and it's potential impact of my privacy expectations that I've formed using Android devices for years. Is there ANY additional privacy loss when using a Pixel/Pixel 2 device vs using any other Android phone? Google seems to be one of the most transparent in terms of what information it collects (with a few notable embarrassing cases with location data). I also like that Google explicit states that they can not unlock your phone without your passcode on a secured device, especially with the new hardware security module. But in terms of usage, (excluding Project Fi), is there ANY loss of privacy associated with using a Google phone over another Android device?
You might argue that you have fewer privacy concerns: the possible privacy risks are Google + any apps you install, as opposed to Google + device manufacturer + whatever apps the manufacturer & carrier bundle + any apps you install.
The main thing I've noticed is that it doesn't have an option for adding unsynced "phone only" contacts. You can add contacts to accounts other than your Google one, but unsynced isn't an option. You could work around that by adding some other account, turning off sync for that, and then adding the contacts you want to keep private to that account, but it's more of a hassle. As I've not used any other Oreo devices, and hadn't used previous Google devices, I can't say for sure whether this is just a Google thing or a general Oreo feature.

[FRP] Various Ways To Navigate FRP Bugs / Bypasses / Workarounds In Android OS

[FRP] Various Ways To Navigate FRP Bugs / Bypasses / Workarounds In Android OS
I am taking notes on the FRP bypasses I "freestyle" to find things out on my own.. potential new ways into areas of Android needed for successful FRP bypass and some just for fun. I encourage anyone who does this for whatever their reason to post to this thread if you want to share some of your methods. We all know hardware rules everything anymore but personally I have always had a nack at finding bugs / vulns / exploitable vulns since I was young. These are basically FRP workarounds if you want to call them that and are quite easy to come across. Below are some of the areas I have came across that ended up in taking me places that could be beneficial to completing a FRP Removal. These should be known to most everyone as they are basic areas of the Chrome browser. I just never thought about putting them to use in FRP situations until now. I have other workarounds and bugs I have found non Chrome related i will add later.
Below are just my notes crammed together. I will add to this much more when i've the time.
Android 7.0 - Tested on a Boost Stylo 3 Phone during manual FRP removal.
These are all through Chrome Browser. All should be pretty much known to most if you have dev'd / reverse any or just plain want to know wtf all goes down in Chrome.
*goto chrome browser*
chrome://chrome-urls/
then
chrome://bluetooth-internals
left 3 lines (menu)
devices
start scan (may be enabled on some devices - though I doubt it due to protection)
*more ways to get out from chrome into various apps / settings etc*
chrome://chrome-urls/
goto - chrome://net-internals/#hsts - under "Expect-CT" click the link https://tools.ietf.org/html/draft-ietf-httpbis-expect-ct.
click on pdf - this will take you to downloads (dont set a default reader)
click on mail - this takes you to gmail
*google maps*
chrome settings
site settings
location (enable) -> then enable all settings -> and press location (turn on) -> then under location services google location history then top right view/manage - now youre in maps... hit back and youll be taken to maps and from here if you want out from here hit the top left start navigation and say ok google then w/e.. chrome, settings etc (yes i know you can get to maps by clicking maps in google search.. just bringing up alternate ways of getting places that may help in the future in the event other methods are blocked..) then you will be into google maps - you only get this chance once after its all enabled you will have to hard reset and go back through chrome to get here or reset permissions and revoke location for chrome etc
*microphone*
then special access -> phone administrators -> enable/disable phone admins
then special access -> modify system settings -> turn off the ability for certain apps to read/write to the system (could this be another easier way instead of forcing stop / disabling apps ? These settings may not effect much...
then your all permissions -> location permissions -> location (turn on) then under location services google location history then top right view/manage -> now youre in maps.. hit back and youll be taken to maps (yes i know you can get to maps by clicking maps in google search.. just bringing up alternate ways of getting places that may help in the future in the event other methods are blocked..) out from here hit the top left start navigation and say ok google then w/e.. "open chrome, open settings etc -"
chrome://flags -> contextual search settings.. -> enable the physical web...
(as deep as i went so far)
and others that could be of use somehow sometime eventually
chrome://
from settings back out to google chrome
goto apps then youtube then settings then history and privacy then youtube terms of service -> out to web

A20 privacy ultimate guide without root

This guide is for people who enjoys privacy, and want to enjoy a fully controlled experience even on a stock Android, and it dosen't only concerns the Samsung A20 but all powered Android phones, after applying all the steps you'll enjoy a stock firmware free from all bloatwares, free from non useful bandwidth consumption, free from unnecessary battery drains, Without having to root and without the need for a computer.
First make sure you use a non bloated firmware you can tell by its size, if not compare and download and flash the lighter stock rom you find, don't be scared your sim card will work. or just follow this guide to the end and all bloatwares will vanish ?
IN THIS GUIDE I'll be focusing on how to regain your privacy without root, and without needing a computer.
DEBLOAT GOD without root :
You can use adb (you'll need a computer for that), there's fully explained guides here on how to debloat using adb. But as I said I'll be focusing on how to regain control over your phone without the need for a computer.
I don't use Google accounts or Services, so my debloating method will block even Google play Services.
Let's start by hard reset :laugh: but before that, make sure to remove all entered accounts and lock screens before going any further with hard reset, so you don't encounter any problems. (of course you can keep your data, but I don't recommend keeping Google or Facebook apps and accounts.)
1)- Hard reset (enter stock recovery by pressing " Power button + Volume up" and wipe cache, and data)
After rebooting don't connect to wifi, it's preferable if you don't have data connectivity on your sim card either, don't be scared it will launch Android even without internet : on the welcome screen, accept only the first two agreements from the four agreements , then hit "Skip" and "Ignore" buttons always, don't enter any Google or samsung accounts, then click finish.
Once on home screen enter Settings app,
Head to applications, on the right corner select show system apps, disable everything that can be disabled, see my attached screenshots.zip for a full detailed list.
How to disable Google Play Services:
After you disabled the unnecessary things, go to the Settings app again and enter "Biometric and Security" - "Other security settings" - "Device admin apps" and uncheck the "find my Mobile".
Now in the settings application go to applications and you can now disable "Google Play Services" and "Device Health Service" as well.
Reboot :fingers-crossed:
Congratulations now you debloated your phone from unnecessary background Services.
2) - Privacy Bonus : Netguard. For an ultimate Control over your bandwidth and internet privacy (everyone can use this following guide especially rooted phones)
Install Netguard pro or netguard. In the settings Go to advanced options, tick manage system apps, notify on internet access if you want to get notified about what apps are requesting on your behalf ?, ("log internet access" optional only if you want to see what apps are requesting internet inside a log)
Now go back to the main Netguard interface, you will see all system apps, and user apps inside this screen,
Turn everything to red, then click the dollar sign in the left corner, and click "lockdown traffic" in the right corner.
Now you can enable only your browser to access the internet and leave all the rest blocked.
You can enable internet to a certain app by clicking the bandwidth sign and turn it from red to green, then click the arrow in the left next to the application name and tick "allow in lockdown mode", and this app will get internet.
See screenshots zip for more details.
That's all of it ! That's how to regain control over processes and bandwidth, only you can decide what should connect, and what are they doing on your behalf and without your consent.
In the screenshots you'll find out that I did disable Google play store, I always download apps from apkmirror dot com, or apkpure, and install them manually. I don't use Google play store, and with doing so you won't be needing a Google account watching you 24/7
Other steps :
Enter the Settings app - "Biometric and security" - " app permission" , and remove unwanted permissions.
THAT'S ALL OF IT !! NOW ENJOY your new phone speed performances, and it's long battery life
Some questions and answers:
Q- Why did I had to do all of this ?
A- If you install Netguard firewall app you'll notice a traffic from all the apps even what we thought are offline, to some unknown servers, like Amazon, and such, and I didn't agree with this, and they didn't say anything about it. I noticed that the disabled apps are sending internet request even if they are disabled and even I did turned off mobile data, and background activity, that why I used the Netguard Firewall to block them all.
Q- How to install apps if you blocked or deleted google play store and Samsung store ?
A- I download APK from apkmirror (dot com), they are clean, and by this you can always have them in case you want them after you 'reset' your phone or uninstall them, and especially no internet is required in order to install apps
.
.
If you liked my post or find it somewhat informative hit Thanks or comment :fingers-crossed: , if not I'm sorry for wasting your time :laugh: i just wanted to share my experience with some people like me. Peace.

Securing/controlling OnePlus 8 with OOS 11.0.88.IN21BA

I am a brand new owner of a OP 8. First thing I did was flash it to OOS 11, then installed Magisk. The phone is now up and running and rooted.
I am coming from a galaxy S5 that I have owned and used for more than 7 years, and for most of that time it has been running Lineage OS. I am used to the control that Lineage gives me, and I would expect that I could exercise the same degree of control with a rooted OOS.
But, this appears to not be true.
On the S5, I had 3C System Tuner Pro which is now an obsolete app, so I have replaced it with the current variant; 3C All-In-One toolbox. This package should allow me to control which apps start at boot, but it seems I cannot turn any of the apps off; when I uncheck them, the app fails to actually remove them from the startup list.
Also, I expect the 3C tool to allow me to uninstall pretty much any app, but there are a lot of google apps that I just can't remove.
I also use greenify (the paid version) and mostly it seems to be working OK, except that I cannot seem to access system apps from it, which makes it very hard for me to shut down things that I don't want running.
I also use afwall (the paid version) and it seems to work as expected. Which is good.
My focus is security and privacy, and my mantra is: "on android, the app that is not running is the app that is not spying". Thus, I want everything that is not needed to satisfy my purposes to not be running, and I only want apps running when *I* say that they can run.
Now, my S5 was running Lineage 17.1 which is android 9. I did not update it past that. And now I am running android 11, and I note that there is a lot of new hardware-based validation in android 11. So possibly I can't remove some things without disabling this validation (which I would prefer not to do). But even if I can't remove, I can disable (which, fortunately, I AM able to do). But I should be able to remove things from the startup list so they don't get started automatically at boot time. Right now, the way it works is they all start, then greenify shuts them down (and that isn't always completely reliable). I need more to make this phone genuinely secure and private.
So.
Does anyone here know how I could gain the capability to remove apps (including system apps) from the startup list and have it stick? Does anyone know what I need to do to get greenify to recognize system apps so I can shut them down when they are not needed, or failing that, can anyone steer me to a different app than greenify that will do that?
Perhaps I would gain by adding the xposed framework? I have not used it in a very long time (since I move to lineage) and I recall it being a bit of a pain.
I suppose I could move to Lineage from OOS, but I would prefer to not do that because of the camera software. This device seems to have a fine camera and not a lot of bloatware, so I would much prefer to stay with OOS for as long as the device is supported by the manufacturer.
But I do insist on being able to completely control it, and disabling apps that I can't stop from running is a much bigger hammer than I would like to use; some of those apps I might actually want to use from time to time.
OK, after some work I have successfully taken full control of the OnePlus 8 and have been able to configure startups as I want them. I installed xposed through Magisk.
I also installed the latest greenify (3.7.8) and afwall, and have those set up too. Since I did purchase greenify, I am able to greenify system apps as well. So, generally, I have full control over the device.
But there remains a problem.
I have disabled wifi and data connections in settings for all apps that I don't want to have accessing a network. I have also blocked those apps in afwall. And yet, my pihole DNS server that services my LAN shows me some of my apps are trying to call home, even when their capability to talk on the internet is denied.
Specifically, greenify is denied network access and is firewalled off, yet there is an attempt to connect to oasisfeng.com.
Also, I use an old version of ES File Explorer (from before it was sold and turned into something very like malware) and it is allowed LAN access but denied any access beyond the LAN...and I see it trying to call its old home domain (estrongs.com).
Similarly, I use an old version of UB Reader (later versions again approach malware status), and it is completely denied network access. But, I see a connection to mobisystems.com.
This clearly indicates that there is a proxy in use somewhere in the system, that is allowing these guys past my blocks. I am using adaway to block these specific domains, but it would be far better to just block that proxy.
However, I don't know where the proxy is and what it is called. Can someone here tell me?
If not, it will be trial and error, which is painful because functionality will break when I turn something off to see if this is it.
jiml8 said:
OK, after some work I have successfully taken full control of the OnePlus 8 and have been able to configure startups as I want them. I installed xposed through Magisk.
I also installed the latest greenify (3.7.8) and afwall, and have those set up too. Since I did purchase greenify, I am able to greenify system apps as well. So, generally, I have full control over the device.
But there remains a problem.
I have disabled wifi and data connections in settings for all apps that I don't want to have accessing a network. I have also blocked those apps in afwall. And yet, my pihole DNS server that services my LAN shows me some of my apps are trying to call home, even when their capability to talk on the internet is denied.
Specifically, greenify is denied network access and is firewalled off, yet there is an attempt to connect to oasisfeng.com.
Also, I use an old version of ES File Explorer (from before it was sold and turned into something very like malware) and it is allowed LAN access but denied any access beyond the LAN...and I see it trying to call its old home domain (estrongs.com).
Similarly, I use an old version of UB Reader (later versions again approach malware status), and it is completely denied network access. But, I see a connection to mobisystems.com.
This clearly indicates that there is a proxy in use somewhere in the system, that is allowing these guys past my blocks. I am using adaway to block these specific domains, but it would be far better to just block that proxy.
However, I don't know where the proxy is and what it is called. Can someone here tell me?
If not, it will be trial and error, which is painful because functionality will break when I turn something off to see if this is it.
Click to expand...
Click to collapse
If you are concerned about security, you should stay away from Xposed.
First of all, Xposed requires disabling Selinux, otherwise, it won't work. So during the installation, your Selinux status is turned to 'permissive'. That, coupled with the fact that almost every custom rom sets 'ro.secure to Zero', exposes your System partition to third party apps. So, basically, anything can exploit your phone.
Second, Greenify, with all due respect to its great developer, is not needed anymore, since Android 10, because now we have builtin sleep mode that does the same thing as Greenify.
Third, even if Xposed didn't require disabling Selinux, it is still an exploit that creates a back door to your system.
optimumpro said:
If you are concerned about security, you should stay away from Xposed.
First of all, Xposed requires disabling Selinux, otherwise, it won't work. So during the installation, your Selinux status is turned to 'permissive'. That, coupled with the fact that almost every custom rom sets 'ro.secure to Zero', exposes your System partition to third party apps. So, basically, anything can exploit your phone.
Second, Greenify, with all due respect to its great developer, is not needed anymore, since Android 10, because now we have builtin sleep mode that does the same thing as Greenify.
Third, even if Xposed didn't require disabling Selinux, it is still an exploit that creates a back door to your system.
Click to expand...
Click to collapse
Device security is only one aspect of security, and I handle that mostly through device configuration and usage policy anyway.
Overall security involves many other factors, which include maintaining full privacy and control over all data that gets out of the device and goes...elsewhere. To maintain this level of privacy requires reconfiguring any android device to prevent the release of that information. If this requires setting Selinux to permissive, then that tradeoff is quite acceptable. I might prefer it not be the case, but so long as all android devices sold into the marketplace represent the interests of google, the manufacturer, and any third-party that pays the manufacturer ahead of my interests then I will make that tradeoff.
As for Greenify, I have not found the sleep mode that is available in Android 11 to be adequate because it does not allow me to control system apps. You can take it as a maxim that the only android app that does not spy is the android app that is not running - and this includes lots of system apps that I might not want to delete or disable but also don't want running unless I say so, and then only while I am satisfying MY purpose for them.
As for the problem I was asking about, I added the specific URIs to the adaware blocklist and that suppressed them. Prior to that, I was seeing the DNS requests on my LAN DNS. I suspect the network utility I am using to monitor the phone's traffic is reporting requests ahead of the iptables FILTER table, and the packets were being suppressed prior to leaving the device, but I am not certain of that. The only way I could tell would be to monitor the device traffic as it went through the upstream VPN gateway on my LAN, and I did not do that.
Adaware works adequately for this, and I am not seeing any other unexpected/unacceptable traffic from my phone. The one remaining thing I need to check for will involve monitoring from the VPN gateway, as I look for any DoH or DoTLS traffic. I hope I don't find any; that will be a ***** to block. I do block it on the IOT VLAN on my network, but it requires a separate device running a script I wrote. To block DoH/DoTLS on my phone, while allowing appropriate DNS will be...fun.
Edit: And, actually, I just took a quick look. The sestatus command returns that my selinux status is "enforcing". The xposed framework I installed, actually, is lsposed, which is a systemless install using magisk. It implements the xposed framework but in a systemless way; I was just lazy when I wrote about it in my previous post.
jiml8 said:
Device security is only one aspect of security, and I handle that mostly through device configuration and usage policy anyway.
Overall security involves many other factors, which include maintaining full privacy and control over all data that gets out of the device and goes...elsewhere. To maintain this level of privacy requires reconfiguring any android device to prevent the release of that information. If this requires setting Selinux to permissive, then that tradeoff is quite acceptable. I might prefer it not be the case, but so long as all android devices sold into the marketplace represent the interests of google, the manufacturer, and any third-party that pays the manufacturer ahead of my interests then I will make that tradeoff.
As for Greenify, I have not found the sleep mode that is available in Android 11 to be adequate because it does not allow me to control system apps. You can take it as a maxim that the only android app that does not spy is the android app that is not running - and this includes lots of system apps that I might not want to delete or disable but also don't want running unless I say so, and then only while I am satisfying MY purpose for them.
As for the problem I was asking about, I added the specific URIs to the adaware blocklist and that suppressed them. Prior to that, I was seeing the DNS requests on my LAN DNS. I suspect the network utility I am using to monitor the phone's traffic is reporting requests ahead of the iptables FILTER table, and the packets were being suppressed prior to leaving the device, but I am not certain of that. The only way I could tell would be to monitor the device traffic as it went through the upstream VPN gateway on my LAN, and I did not do that.
Adaware works adequately for this, and I am not seeing any other unexpected/unacceptable traffic from my phone. The one remaining thing I need to check for will involve monitoring from the VPN gateway, as I look for any DoH or DoTLS traffic. I hope I don't find any; that will be a ***** to block. I do block it on the IOT VLAN on my network, but it requires a separate device running a script I wrote. To block DoH/DoTLS on my phone, while allowing appropriate DNS will be...fun.
Edit: And, actually, I just took a quick look. The sestatus command returns that my selinux status is "enforcing". The xposed framework I installed, actually, is lsposed, which is a systemless install using magisk. It implements the xposed framework but in a systemless way; I was just lazy when I wrote about it in my previous post.
Click to expand...
Click to collapse
I have been building Android roms for multiple devices for 9 years. When I started, I also gave a significant positive weight to Xposed, etc... . But the more I learned Android code, the more I became convinced that all those 'privacy' layers are mostly useless and even harmful, because they create a false sense of security.
Vanilla Android roms, actually, contain very little advertising/spying, and it makes a perfect sense: why would Google open-source their spying/advertising machine?
The only thing that might be considered spying (in vanilla Android) is captive portal detection that checks the internet connection and a few other network tools/tests that periodically connect to the internet, but not necessarily with nefarious purposes. But even these could be disabled or changed to other servers.
Android becomes an advertising tool only when you install Google Apps/Google Services Framework, register a Google account, etc. Once you have that, and 100% of stock roms do, no amount of tweaking can prevent spying, because these Google 'structures' sit lower than any systemless layer. In other words, they can go around Magisk/Xposed tricks. Moreover, on devices with stock roms, one doesn't even need encryption and the use of apps like Signal/Telegram/Silence etc.. Google Services Framework can see your outgoing messages before they are encrypted, and incoming messages after decryption. In other words, they can see what your eyes see on the screen.
So, the only way to prevent Google interests from taking over your phone is never install Google 'things', which is the case with my rom and my phone.
optimumpro said:
I have been building Android roms for multiple devices for 9 years. When I started, I also gave a significant positive weight to Xposed, etc... . But the more I learned Android code, the more I became convinced that all those 'privacy' layers are mostly useless and even harmful, because they create a false sense of security.
Vanilla Android roms, actually, contain very little advertising/spying, and it makes a perfect sense: why would Google open-source their spying/advertising machine?
The only thing that might be considered spying (in vanilla Android) is captive portal detection that checks the internet connection and a few other network tools/tests that periodically connect to the internet, but not necessarily with nefarious purposes. But even these could be disabled or changed to other servers.
Android becomes an advertising tool only when you install Google Apps/Google Services Framework, register a Google account, etc. Once you have that, and 100% of stock roms do, no amount of tweaking can prevent spying, because these Google 'structures' sit lower than any systemless layer. In other words, they can go around Magisk/Xposed tricks. Moreover, on devices with stock roms, one doesn't even need encryption and the use of apps like Signal/Telegram/Silence etc.. Google Services Framework can see your outgoing messages before they are encrypted, and incoming messages after decryption. In other words, they can see what your eyes see on the screen.
So, the only way to prevent Google interests from taking over your phone is never install Google 'things', which is the case with my rom and my phone.
Click to expand...
Click to collapse
I don't really program Android, though I am a kernel developer in both Linux and Freebsd. I also am one of the principal architects of a network infrastructure appliance that is getting a lot of attention in the industry.
So, while I do not know android in detail at a low level, I know linux thoroughly and I am fully equipped to completely monitor and control what access that android (or any other computer) has to any network. And that has been my dilemma; I can see what my device is doing and I am determined to stop it.
I agree with you about vanilla Android, absent all the google stuff. It is just linux with a different desktop on it, and the connections it makes to google are just for network management functions; the network device I have built also contacts google (and a few others) for network maintenance only and not any information transfer.
Unfortunately, the google apps infrastructure is required for some things that I use the phone for. Google maps is required by both Uber and Lyft; without Maps, I can't use those apps - and there are times when I am traveling where I really need to be able to use those apps.
Also, unfortunately, the company I am contracted to (where I am part-owner) for which I have built this network appliance makes heavy use of google tools. I have not been able to convince my partners to move away from google, and they can outvote me.
I have to allow Meet, and Chat to run on my device; I don't have a practical alternative. So I have spent a lot of time determining exactly which google components are the minimum required to allow those apps to run, and I have disabled or blocked or restricted permissions for all other google components - and both greenify and afwall play key roles in this activity.
With my old Galaxy S5, I just would install the smallest google package that supported Maps onto my Lineage OS on that device, but on this OnePlus 8, I have elected to stick with OOS for as long as it receives updates. So, tying google's hands is a lot more work.
My monitoring tells me I have it now as good as it will be. There are a few connections to google, as expected, but the frequency of those connections is not high and very little data is being transferred in either direction. I believe most of the traffic is administrative. The only thing I have not yet checked is whether there is any DoH or DoTLS traffic. My IOT VLAN watches for and blocks such traffic (my IOT VLAN exists to isolate and completely control my Android TV), and I have connected the phone to the IOT VLAN for a short while to see if any DoH/DoTLS was detected and none was - but I really need to connect it to that VLAN for an extended period.
I do root around in the phone's databases (which reveals what Google is doing, and Google can't stop that...) and the result is that I know Google is not doing much.
So, it isn't perfect. I would be much happier if the company would move away from google. But it is as good as its going to get, and I don't believe google is sneaking anything by me; I would have detected it. I do block a LOT of google URIs.
Also, as far as google open-sourcing their spying machine...that, quite explicitly, is the purpose of Android. It is open-sourced spyware for google.
They open-sourced it partly because they had to (the gnu licensing ties their hands) and partly to gain acceptance; its open source nature is why it is now the dominant architecture. It greatly reduces development costs for device manufacturers while providing a standardized framework upon which they can build.
Those of us who put in the effort to exploit that open-source nature to stop the spying are a small fraction of the total marketplace, and google can easily tolerate us.
Android has increased google's reach and ability to collect data about individuals to an enormous extent. From the standpoint of knowing everything about everybody (which is google's explicit goal) it is an enormous win for them.

Categories

Resources