[NO-ROOT][SCRIPT]Nokia Debloater. A script that works universally on Nokia devices. - Nokia 6.1 (2018) Guides, News, & Discussion

Moderator Announcement:
THREAD CLOSED on request of OP. Please refer to this cross-device thread in future:
https://forum.xda-developers.com/nokia-6-1-plus/how-to/root-nokia-debloater-t4005895
*******************************************************************
Here is an universal script that should work on every Nokia device right from the first gen devices upto Nokia 9 Pureview.
Exert from my Github readme.md -
Nokia-Debloater
A simple noob-friendly script that debloats your phone from the evenwell apps and soon, Google Apps.
What is evenwell and why should I care?
Evenwell/FiH is chinese company. Specifically, They are a subsidary of the massive Foxxconn group that manufactures consumer electronics for sale around the world. This Evewell group were a business partner of Nokia/HMD and they were responsible for manufacturing and building the software on these phones. We all know the second generation devices from Nokia i.e Nokia 6.1, Nokia 6.1 Plus, Nokia 7 Plus etc are android one devices which are supposed to come with clean software and no bloat. On the surface, These devices have no bloat, But when you go digging deeper into settings and the system, You will encounter them evenwell apps.
What do these apps do?
These apps are supposedly to maintain system stability and protect battery among various other services/features. There are also telemetry apps that send data to the chinese. This is the reason I've decided to create this script.
Nokia has supposedly stopped using the evenwell services/apps, Why would you uninstall them?
Simple, Because
1. I do not want any dead app that previously had an history of snooping in my system.
2. They are not supposed to be there in the first place.
Convinced yet? Get the script from here and you can start.
Enable usb debugging and connect to PC, Put the .bat file in the same folder as your ADB and run the script. Profit.
More info - Nokia Debloater Github

For Discussions please point to this thread - Nokia Debloater, Universal thread
For Changelogs/Release, Head over to - Nokia Debloater changelogs/Releases

Moderator Announcement:
THREAD CLOSED on request of OP. Please refer to this cross-device thread in future:
https://forum.xda-developers.com/nokia-6-1-plus/how-to/root-nokia-debloater-t4005895
*******************************************************************

Related

Creating an Open Libre Device List/Table

Update, here is the new google spreadsheet.
I would like to propose that we document the "openess" state of various Android devices, so that those who are in the market for a new device can potentially get a better picture of which devices might suit them if they are concerned about such things. I have read through countless posts in the last few months, across several forums, to attempt to figure out much of this info myself, for many of the existing devices. Naturally, the state of a device can change as developers figure out how to do things with devices, or as manufacturers release more info, source, or tools. I suspect that at least a few other people would like to share in the fruits of my searches. I also suspect/hope that a few others might be willing to add their own conclusions and references to my research. Let's join together in a common place to do this. Thanks.
I propose to do that with respect to the Open Libre Device guidelines (Specification 0.0) listed below:
Open Libre Device Level 0: Functionally Open
Freedom 0.0: The ability to load software on the device unimpeded.
Freedom 0.1: The ability to access all the intended device's hardware functionality via free/libre software running on the main (non auxiliary) processors. A free/libre software reference implementation must exist to do this.
Freedom 0.2: The ability to use all the device's intended functionality (except for any device communication functionality) without the device communicating with any other device. The reference software implementation must not require external activation of any sorts.
Open Libre Device Level 1: Completely Open
Freedom 1.0: All of the freedoms of level 0
Freedom 1.1: The ability to interact with the device externally with only free/libre software. A free/libre software reference implementation must exist which implements any protocols required to communicate with the device to exercise all the freedoms of level 0. This includes loading software or accessing its functionality such as communications protocols.
Note: the likely currently precludes any cell phones from being level 1 open devices since there are no complete free/libre software stacks for cell networks (yet).
Freedom 1.2: The ability to access the entire device's intended functionality with entirely free/libre software, including all device peripherals (auxiliary processors) running only free/libre software. Free/libre software reference implementations must exist for all device peripherals.
These are guidelines which I came up with a while ago. They are not perfect, and I welcome comments and improvements in both the intent and clarity of these guidelines. I will stipulate however, that I do not ever intend to amend this specification to be in the spirit of Open Source Hardware. The spirit here is about the software that runs on, and interacts with the devices, not about designing the hardware.
So, I am looking for:
A good place to put our list (it could be here in this thread)
A good way to keep track of this info a (table format, a db somewhere, a google spreadsheet?)
Info about devices:
Brand/Device Name/Model #, version (if it matters)
Pass or Fail with respect to any specific point in the guidelines above
A description or reference which (dis)proves 3B
Well, thanks for any support, I look forward to sharing my results with others.
Here is a sample for a device that I currently own:
Code:
Device P/F Freedom Point Reference Date
zt-180 P 0.0 2010/11/24
F 0.1 No kernel source "
P 0.2 (*) "
F 1.0 0.1 "
P 1.1 (*) "
? 1.2 There is likely closed firmware on the GPU "
* No known problems here
Google Spreadsheet
Well, since Matthew Garrett had a pretty good start with GPL compliance listings here:
http://www.codon.org.uk/~mjg59/android_tablets/
I decided to go ahead and create a google spreadsheet which includes columns for each of the freedom points above. I attempted to at least populate the ZT180 all the way at the bottom. Please feel free to add data for any device that you are familiar with. In particular, please add links for any references to help anyone who owns (or would like to own) such a device. Here is the spreadsheet:
https://spreadsheets.google.com/ccc?key=0AnRFPYwp3Th9dHFrRkRXOVFWam01N25DTVdXTUQxM0E&hl=en#gid=1

[DEVS] Call for Android Developers to port your applications to Playbook

I realize the laughs, smirks, and shuns that the title of this thread may cause.
However, as the founder and community manager for bnxtreme.com, please hear me out.
I am posting this to clear up/clarify some misunderstanding regarding Android on the Blackberry Playbook.
NOTE: This thread is NOT about rooting the Playbook or completely replacing the QNX OS with Android or dual-booting. I will be creating separate threads for those, and hopefully, with enough traction, it could develop into its own section.
Click to expand...
Click to collapse
After DevCon 2011 in October, RIM released their BETA OS2.0 for the playbook.
Included in this release were several new tools for the SDK/NDK, support for additional programming languages, and of course, the reason I'm posting here, a native Android 2.3.3 run-time. Now developers have both on and offline conversion tools to recompile almost any Android APK for use in the BlackBerry PlayBook in BAR format using only a few clicks as shown on the following page:
http s://bdsc.webapps.blackberry.com/android/tool/​
Shortly thereafter, the various Blackberry forums throughout the web were abuzz about what could be done with this new BETA, how to get Android apps install, etc...
Within less than a day, the post appeared with very quick and simple directions for users to easily convert Android APK files to Playbook BAR files. Suddenly, the flood gates were now open and the list of applications being converted started to flood in, as did requests for those who 'got it' to do it for them. Less than 12 hours later, the list became too much for one person to manage alone, so a Google Doc was created based on a Google Form where visitors could submit their requests and updates. The list had taken on a life of it's own:
h ttp://bnxtreme.com/drupal/content/apk2bar-list​
As you can see from this list, individual PlayBook users have been actively collaborating and converting various applications to demonstrate just how easy the process is. It is hoped that this list of converted applications will help encourage developers to re-release their respective application on the BlackBerry Playbook.
IMPORTANT NOTE: If your application has been added to this list, it was done so because it was believed to be a free application on the Android Market, available as a free trial online, or offered for free through the Amazon Marketplace. If this is not the case, or for any reason you wish to have your application removed from the apk2bar list, please e-mail us at [email protected] and we will have your application permanently removed.​
Click to expand...
Click to collapse
Now, within the last few weeks, ported Android applications have already started to appear in the Blackberry AppWorld, being made available to anyone running the OS2.0 BETA
ht tp://crackberry.com/handster-android-app-market-begin-submitting-android-apps-blackberry-app-world-behalf-developers
ht tp://forums.crackberry.com/blackberry-playbook-f222/high-quality-free-android-apps-available-app-world-os2-users-679669/​
The purpose for this post is to call upon Android developers to start porting their applications and submitting them to the Blackberry AppWorld. Again, the process is extremely simple and will open your applications up to a whole new audience.
Additionally, I am also posting to offer our services. Our team is both willing to help test any early BETA builds or to continue any abandoned development projects on their port to the BlackBerry PlayBook operating system; all you have to do is ask.
For more information on how easy it is to develop your existing application for the Blackberry PlayBook, please visit:
ht tp://us.blackberry.com/developers/tablet/​
Thank you for your time to read this posting and we look forward to hopefully developing an active and healthy relationship with xda-developers.
Marc K.
Founder, Project Manager, and Community Manager for the BNXtreme Team.
@technomensch
ht tp://stayinginsync.info
ht tp://bnxtreme.com
I have just purchased a 32Gb Playbook and would love to support your objectives.
I am keen to use the PB on Android...I have little knowledge...but am keen
ANDREW
Why can't it be the other way? Blackberry Apps to Android? That seems to be better

A General Warning about flashing Unknown Roms

Hi.
I recently came across some chinese / asian websites which kang / modify and release a diversity of roms.
I'm not specifying sources / which roms are, this is a general announcement to be careful with what we download & flash into our devices, and why ?
I flashed in order to test some of these roms (not the sense 5 kang tho), since I work in network security, I had noticed on our firewall logs when my mobile connected through the wifi, a bunch of UDP requests / DNS queries to russian websites. This can be used to botnets, DoS, even malware / spam propagation (a diversity of not cool stuff, basically).
A colegue of mine which also has a 'droid had once an app which sent repeatedly ICMP requests in "not random" but specific hours / intervals, he asked me to test his rom which he downloaded and flashed from "another" website, and I confirmed the suspicious behavior. There was established connections to foreigner addresses through a diversity of protocols, data being sent / received and at times, a udp flood directed to specific addresses. This is bad, my friends.
We don't know what these roms have inside, what's their mechanism besides the standard transparent operations which most of us are familiar with, and they could be very well used to do illegal things which I guaranty we don't want to be part of.
Flashing a rom, connecting through 3G or Wifi, and then our mobile is now part of a botnet which participates without our knowledge on such illegal operations is just one of the things that could happen. Phishing is also very possible - in other hand, a lot of things are possible without our knowledge and consent. We don't want this do we ?
The last Rom which I have experienced this, the link was removed and is no longer online. So i'm not pointing URL's / Rom names because this is something that each one of us has to be careful about.
Fortunately we have ways to detect / avoid / remove and make sure our device is used only for us and does only what we "tell" it to do.
We can use this thread to report such roms (since they're not published on xda, we can only warn each other and be aware) and applications that have malicious content.
I'll also be updating this thread with methods, applications for android to detect malware / suspicious activities (I'm not going into depth like using a sniffer or protocol / packet analyzer (although we can) I'll try to keep as simple as possible.
Suggestions, reports are very welcome and should be reported here. We can use this thread to protect our droids and help each other making our devices secure.
This post has the intention of protecting ourselfs, but privacy tips / applications are also welcome. Be careful tho, would be ironic to suggest an app to protect user privacy and in the end the app itself sends private data to GodKnowsWhere.
To be continued / Updated Soon.
List of Applications to monitor / analyze traffic:
Netstat Professional - Allows you to see what connections your android has established. Allows whois info, Real time IP / Port and status information (pretty much like netstat -an), and what service is running / port information.
Wi.cap. Network Sniffer - Much like a network protocol analyzer / network sniffer. This neat app allows you to see what connections are estabilished / protocol / status / analyze packets. If there's a connection estabilished - it will be listed. [Root needed]
Shark for Root - Traffic sniffer for 3G & Wifi (supports FroYo tethered mode too). Records traffic which later you can open with WireShark. To preview you can use Shark Reader.
List of Applications fo scan for malware.
Coming Soon...
Procedures to discover / analyze / report malware / suspicious behaviours and such.
Coming Soon...
Post reserved for procedures which will include:
- Common Sense
- How a malware works (the term malware is used to include viruses, trojans, custom scripts and apps.
- What to look for / suspicious behavior which you should pay attention to (also included in Common Sense).
- Basic tools to detect / analyze / remove malware.
More to come.
Sent from my HTC Z710e using xda premium
Generally, i suggest to use ROMs from XDA only, except for CM/MIUI official website. The risk is real! Thanks to @MidnightDevil for his help and his time
I suggest to read this thread to all the users!
XxXPachaXxX said:
Generally, i suggest to use ROMs from XDA only, except for CM/MIUI official website. The risk is real! Thanks to @MidnightDevil for his help and his time
I suggest to read this thread to all the users!
Click to expand...
Click to collapse
Thank you for your support
If anyone has suggestions / knowledge about this sort of matter please share
There's a LOT of info that I tend to post on this thread in a way to educate / share knowledge with everyone.
Trusting the developers and sources is the first step for prevention. Be careful with dodgy websites and roms which you don't know about.
Scanning the rom zip file with a virus scanner is useless in this matter.
Unknown Rom
The threat is over when a secure rom is installed (after using a none xda rom) ??
MidnightDevil said:
Thank you for your support
If anyone has suggestions / knowledge about this sort of matter please share
There's a LOT of info that I tend to post on this thread in a way to educate / share knowledge with everyone.
Trusting the developers and sources is the first step for prevention. Be careful with dodgy websites and roms which you don't know about.
Scanning the rom zip file with a virus scanner is useless in this matter.
Click to expand...
Click to collapse
phearell said:
The threat is over when a secure rom is installed (after using a none xda rom) ??
Click to expand...
Click to collapse
So far there isn't malware which persists after full wipe. Can't speak of the contents of the sdcard tho. But usually yes. But then you have the apk's which can contain malicious code and so forth...
Those apps are usually banned from the PlayStore, but there's a short window between published / report / removed from Store which users can download it.
Unless I didn't understood your post
MidnightDevil said:
So far there isn't malware which persists after full wipe. Can't speak of the contents of the sdcard tho. But usually yes. But then you have the apk's which can contain malicious code and so forth...
Those apps are usually banned from the PlayStore, but there's a short window between published / report / removed from Store which users can download it.
Unless I didn't understood your post
Click to expand...
Click to collapse
AFAIK google also scan apps installed on the device. When installing a 3rd party app (not via Google Play), you get a prompt to allow google to scan it anyway for malicious content.
Also, there are a couple of anti-virus apps available from well known companies such Avast for android, and also from AVG.
I never really tried those, but they might help protecting your device. However I doubt if they scan system apps/services, for in most cases they are supposed to be safe (from the OEM itself).
It is well known that the biggest security hole is the user. So the best thing to do is to keep away from unknown ROMs/sources.
astar26 said:
AFAIK google also scan apps installed on the device. When installing a 3rd party app (not via Google Play), you get a prompt to allow google to scan it anyway for malicious content.
Also, there are a couple of anti-virus apps available from well known companies such Avast for android, and also from AVG.
I never really tried those, but they might help protecting your device. However I doubt if they scan system apps/services, for in most cases they are supposed to be safe (from the OEM itself).
It is well known that the biggest security hole is the user. So the best thing to do is to keep away from unknown ROMs/sources.
Click to expand...
Click to collapse
No doubt the biggest flaw usually comes from the end user.
But answering your statemente about anti viruses.
Usually anti viruses (specially in portable devices) act base upon a database of known signatures and suspicious behavior. They provide no protection against a custom developed script or code with a work-around for this behavior. Basically - avoids behaving like a malware.
A code is considered malicious when acts upon suspicious behavior (for example, on windows - when an app registers itself on registry autorun / startup folders / tries to load a file on temp directory / temporary internet files, hooks itself into a process / uses a windows process to deliver it's payload faking a signature, etc etc). Knowing this, any custom app / script that avoids suspicious behavior / does not have a present signature on a AV database and a few more details - all doors are "open" and is a highway to hell.
Google scan engine uses the same mechanism, in fact, I'm not even sure if it has any sort of protection against suspicious behavior as it only executes upon apk install.
Believe me, the biggest flaw is the user as the best protection is also a well educated user. It's a matter of knowing what can do and what should avoid. Fear or suspicion is an important thing these days, as they prevent us from making mistakes as installing an app from a dodgy site. We should know better.
MidnightDevil said:
No doubt the biggest flaw usually comes from the end user.
But answering your statemente about anti viruses.
Usually anti viruses (specially in portable devices) act base upon a database of known signatures and suspicious behavior. They provide no protection against a custom developed script or code with a work-around for this behavior. Basically - avoids behaving like a malware.
A code is considered malicious when acts upon suspicious behavior (for example, on windows - when an app registers itself on registry autorun / startup folders / tries to load a file on temp directory / temporary internet files, hooks itself into a process / uses a windows process to deliver it's payload faking a signature, etc etc). Knowing this, any custom app / script that avoids suspicious behavior / does not have a present signature on a AV database and a few more details - all doors are "open" and is a highway to hell.
Google scan engine uses the same mechanism, in fact, I'm not even sure if it has any sort of protection against suspicious behavior as it only executes upon apk install.
Believe me, the biggest flaw is the user as the best protection is also a well educated user. It's a matter of knowing what can do and what should avoid. Fear or suspicion is an important thing these days, as they prevent us from making mistakes as installing an app from a dodgy site. We should know better.
Click to expand...
Click to collapse
I just remembered of an app called "Who is tracking" (was featured on the portal a while ago), that also scans system files (bloatware) and tells you which app tracks you. tried using it a while ago, but didn'y really try to understand it, and it seems to have changed since. will try it myself.
Agreed with Patcha, unless you 100% trust the source (CM/MIUI are well known and if they did something untrustworthy a massive ****storm would ensue) then I would stick to ROM's posted on XDA (though frankly I avoid MIUI out of moral principle #SouceCodeMuch?). Anything untrustworthy that is posted on XDA is picked up very quickly and dealt with effectively.
More to come from me on this, I need to organize what I want to say so it doesn't sound like a mad persons ramblings
Edit: A thing to look out for in google play store is the permissions, READ THEM, read what they mean, read what permissions the app requests and if you don't know why an app needs that permission or if it looks dodgy (like the permission to send sms messages without the user knowing) then for God's sake don't use the app util you've found out what the app needs that permission for (quick google search or email to the developer). Don't just blindly agree to all the permissions without reading them.
These permissions are declared by the developer in the Android_manifest.xml file and pulled from there when publishing the app on play store. As far as I am aware, there is no way to fool this system - you can't edit the visible permissions through the developer panel of play store, only by editing the manifest - I have a developer account on play store so this I am 100% sure on.
Yup, very true. Something I forgot to mention earlier and is VERY important.
Always check the permissions and what for the permissions are used. Some good developers write what for they need the permissions. Some things are obvious, others not so quite.
Also reading the comments of an app helps as well. More experienced users tend to write a more complete review and sometimes they draw the attention to things that sometimes other users miss. About permissions or anything else.
Any user can write a review, so if you find something important, you can also write in the review. Just make sure you don't underrate an app because of a doubt
Usually developers also have their contact email in case of doubts, it can be used to to bring some things to light.

[NO-ROOT][SCRIPT]Nokia Debloater. A script that works universally on Nokia devices.

Moderator Announcement:
THREAD CLOSED on request of OP. Please refer to this cross-device thread in future:
https://forum.xda-developers.com/nokia-6-1-plus/how-to/root-nokia-debloater-t4005895
*******************************************************************
Here is an universal script that should work on every Nokia device right from the first gen devices upto Nokia 9 Pureview.
Exert from my Github readme.md -
Nokia-Debloater
A simple noob-friendly script that debloats your phone from the evenwell apps and soon, Google Apps.
What is evenwell and why should I care?
Evenwell/FiH is chinese company. Specifically, They are a subsidary of the massive Foxxconn group that manufactures consumer electronics for sale around the world. This Evewell group were a business partner of Nokia/HMD and they were responsible for manufacturing and building the software on these phones. We all know the second generation devices from Nokia i.e Nokia 6.1, Nokia 6.1 Plus, Nokia 7 Plus etc are android one devices which are supposed to come with clean software and no bloat. On the surface, These devices have no bloat, But when you go digging deeper into settings and the system, You will encounter them evenwell apps.
What do these apps do?
These apps are supposedly to maintain system stability and protect battery among various other services/features. There are also telemetry apps that send data to the chinese. This is the reason I've decided to create this script.
Nokia has supposedly stopped using the evenwell services/apps, Why would you uninstall them?
Simple, Because
1. I do not want any dead app that previously had an history of snooping in my system.
2. They are not supposed to be there in the first place.
Convinced yet? Get the script from here and you can start.
Enable usb debugging and connect to PC, Put the .bat file in the same folder as your ADB and run the script. Profit.
More info - Nokia Debloater Github
What basis is there to suspect that Nokia did not remove the evenwell app?
wrp2015 said:
What basis is there to suspect that Nokia did not remove the evenwell app?
Click to expand...
Click to collapse
1. Go to settings, Apps and notifications, Tap on 3 dots and tap on show system
2. Scroll down and see the apps.
3. You will witness lots of these evenwell apps on your phone.
But Nokia claimed they have disabled them? Why you do this?
Did they though? My answer is no.
1. They aren't removed from the system, Even on Android 10 builds.
2. Nokia did a cheat trick and renamed some of the apps/packages.
Now, If they did remove disable all the evenwell apps, Why rename them in the next major Android updates?
For Discussions please point to this thread - Nokia Debloater, Universal thread
For Changelogs/Release, Head over to - Nokia Debloater changelogs/Releases
Moderator Announcement:
THREAD CLOSED on request of OP. Please refer to this cross-device thread in future:
https://forum.xda-developers.com/nokia-6-1-plus/how-to/root-nokia-debloater-t4005895
*******************************************************************

[NO-ROOT][SCRIPT]Nokia Debloater. A script that works universally on Nokia devices.

Moderator Announcement:
THREAD CLOSED on request of OP. Please refer to this cross-device thread in future:
https://forum.xda-developers.com/nokia-6-1-plus/how-to/root-nokia-debloater-t4005895
*******************************************************************
Here is an universal script that should work on every Nokia device right from the first gen devices upto Nokia 9 Pureview.
Exert from my Github readme.md -
Nokia-Debloater
A simple noob-friendly script that debloats your phone from the evenwell apps and soon, Google Apps.
What is evenwell and why should I care?
Evenwell/FiH is chinese company. Specifically, They are a subsidary of the massive Foxxconn group that manufactures consumer electronics for sale around the world. This Evewell group were a business partner of Nokia/HMD and they were responsible for manufacturing and building the software on these phones. We all know the second generation devices from Nokia i.e Nokia 6.1, Nokia 6.1 Plus, Nokia 7 Plus etc are android one devices which are supposed to come with clean software and no bloat. On the surface, These devices have no bloat, But when you go digging deeper into settings and the system, You will encounter them evenwell apps.
What do these apps do?
These apps are supposedly to maintain system stability and protect battery among various other services/features. There are also telemetry apps that send data to the chinese. This is the reason I've decided to create this script.
Nokia has supposedly stopped using the evenwell services/apps, Why would you uninstall them?
Simple, Because
1. I do not want any dead app that previously had an history of snooping in my system.
2. They are not supposed to be there in the first place.
Convinced yet? Get the script from here and you can start.
Enable usb debugging and connect to PC, Put the .bat file in the same folder as your ADB and run the script. Profit.
More info - Nokia Debloater Github
For Discussions please point to this thread - Nokia Debloater, Universal thread
For Changelogs/Release, Head over to - Nokia Debloater changelogs/Releases
Moderator Announcement:
THREAD CLOSED on request of OP. Please refer to this cross-device thread in future:
https://forum.xda-developers.com/nokia-6-1-plus/how-to/root-nokia-debloater-t4005895
*******************************************************************

Categories

Resources