Privacy-Focused, Open-Source apps alternatives & unwanted content blocking - Android General

Privacy-Focused, Open-Source apps alternatives & unwanted content blocking
Useful apps, alternatives, solutions, unwanted content blocking - discussion and ideas​
Additional Information:
If you use xda app It's recommend to launch this thread in browser - BBCode doesn't work properly. I used it a lot...
I created thread for everyone that want to use some apps alternatives which may be better for your privacy.
I'm not paid, I don't promote any apps or products I don't suggest anything (e.g. these apps are bad), I just share information from what I or others found.
You choose what apps you use, I'm not responsible for any of them or for influence on your choice.
You choose what you block and what is "unwanted content" for you.
I do it in my spare time, so do not expect everyday updates and fast news.
Apps Alternatives for the most common solutions
of course, there are more, here I picked only some of them, for people who don't want to search whole internet and read separated articles.
You may also make a glance into post #6 for lightweight apps collection prepared by HemanthJabalpuri
If app pledges to respect privacy I write green RP
If app needs root (super user) permission to work I write red SU (It doesn't include additional features after granting) because you have a choice
If app uses root for additional features, that are not required I write orange SUF
If app is open source I write blue OS (check I want something more if you want know what role it plays)
If app is "pay to use" I write yellow PTU It doesn't include in app additional purchases, because you have a choice to use basic form or more advanced.
If app has additional features paid I write orange PF ​
Keyboards:
AOSP keyboard - often included in aosp-based os. [ OS ]
show image
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
AnySoftKeyboard - really good customizable keyboard with language packs and gesture typing support [ OS ]
show image
SMS & MMS:
Silence - messaging app with encryption [ OS ]
show image
Video Conferences:
Jitsi Meet - encrypted meeting app [ OS ]
show image
Browsers:
Firefox - browser with add-ons that may help you. If you think, that Firefox is slow especially on android, check
this version Helpful add-ons: NoScript, Ublock Origin, privacy badger, privacy possum, decentraleyes [ OS ]
show image
Onion Browser
Mail:
Tutanota - free e-mail app with encryption [ OS , PF ]
show image
ProtonMail - free encrypted email service, free plan is worse than tutanota's one but someone may find it better [ OS , PF ]
K-9 Mail - POP IMAP Mail Client [ OS ]
FairEmail Client [Downloads from F-droid or playstore]
Chat:
Matrix is an open source project that publishes the
Matrix open standard for secure, decentralized, real-time communication, and its Apache licensed
reference implementations.
Click to expand...
Click to collapse
I got quote from their site additional info: you can either host your own or use public ones.
Element - most advanced client of matrix server [ OS ]
show image
If you don't like elements look, you can use other client like Fluffychat but there are not all features available. Add this repository to F-droid or Aurora Droid to download, or download it from play store[ OS ]
show image
Pattle - other matrix client [ OS ]
show image
MiniVector - other matrix client [ OS ]
show image
Tensor - other matrix client [ OS ]
Rocket.chat - encrypted chat [ OS ]
aTox - TOX client - encrypted p2p chat [ OS ]
Briar - encryped p2p chat [ OS ]
Jami - encryped p2p chat [ OS ]
App store:
F-droid - AppStore.
"F-Droid is a robot with a passion for Free and Open Source (FOSS) software on the Android platform. On this site you’ll find a repository of FOSS apps, along with an Android client to perform installations and updates, and news, reviews and other features covering all things Android and software-freedom related."
Click to expand...
Click to collapse
- got this quote from their site so if you want to search for open-source apps for android, check their repository, and everything from there should be open-source! [ OS ]
show image
Aurora Droid - F-droid but with additional features, with other UI. If you want to download, scroll down and choose direct apk download [ OS ]
show image
Maps and Navigation:
OSMAnd Maps and navigation (can be offline) [ OS ]
show image
Calendar:
DAVx⁵ synchronized calendar [ OS ]
Social:
New Pipe - YouTube, SoundCloud replacement with additional features. [ OS ]
show image
SlimSocial - other Facebook client
Notepad & To-Do list:
Notepad [ OS ]
OpenTasks - Advanced To-Do list [ OS ]
Launcher:
Lawnchair - simple similar to pixel launcher [ OS ]
show image:
Privacy protecting apps:
Xprivacy - choose to successfully block permission and spoof data [ SU , ]
show image
XprivacyLua - continuation of Xprivacy for newer android. [ SU , PF , ]
show image
Exodus - Show trackers and permissions from other installed apps (inbuilt in Aurora store) [ OS ]
TrackerControl - allows users to monitor and control the widespread, ongoing, hidden data collection in mobile apps about user behaviour ('tracking'). [ OS ]
Warden - app from the developer of Aurora Store that lets you disable trackers/loggers [ SU, OS ]
ClassyShark3xodus - Checks apps for code signatures of known trackers (provided by Exodus).Also can list all classes for launchable (via the app drawer) packages. [OS]
Multimedia:
VLC - media player [ OS ]
show image
e-book Reader:
KOReader [ OS ]
Alreader - I have to check if it's open source, but it "respects privacy" RP
[/list]
Unwanted content blocking
include: Ads, adware, malware, pornsites blocking
For rooted devices
Adaway app where you can add external hostlists and whitelist/blacklist your choices. It supports Wildcard characters * and ?.
For not rooted devices
Blokada App
AdGuard
Self hosted vpn with set pihole as a DNS check Want know something more? if you want know how it works
Host Lists
Steven Black Steven Black Host (in different variants)
Energized protection (in different variants)
Cryptocurrency digger blocker
"Peters love"
Dans Pollocks host file
AdAway host file
MVPS
HP Host
Goodbye Ads by Jerryn70
YT ads
Other - list of recommended pi-hole hosts (scroll down), some of them are unfortunately discontinued.
Other package same as above
Source: blokada.org app and projects on github
I want more!
Here will be explanations, sources, experiments and other useful information.
Why using open-source apps are good?
Open-source software (OSS) is a type of computer software in which source code is released under a license in which the copyright holder grants users the rights to use, study, change, and distribute the software to anyone and for any purpose. Open-source software may be developed in a collaborative public manner.
Click to expand...
Click to collapse
(copied from Wikipedia) So what does it mean for every of us? We are able to check code if there may be something unwanted e.g. trackers. The question is: does anyone really do that? Yeah... However It's better when you can do that and it's not forbidden by license or any law. Now compare it with closed-source, really long, unclear licenses. (Don't understand me wrong - I do not point any of company).
how DNS ads blocking works? - It's really smart. You have to know what is DNS So basically pihole is DNS server which doesn't allow ads servers to be loaded. The problem is that it works in your local network. that's why you have to have VPN. With VPN your internet traffic will be going through your local network, so pihole DNS will be found and ads will be blocked (not loaded). If you want some guide how to set up it, write down here, or just type it helpful things you should know something about: DNS, pihole, pivpn, openvpn, wireguard, raspberrypi, ubuntu server, ssh, port forwarding, unattended upgrades.
Is it possible to flash Linux instead Android? Do Linux preinstalled smartphones exist?
Yes! You should be able to replace android on certain smartphones. Check PostmarketOS and Ubuntu Touch and SalfishOS Write down here if you want some PostmarketOS installation tips for newbies (everything you need you should find in their Wiki page)
There are only three Linux designed phones check Librem 5, VollaPhone and PinePhone. PinePhone sholud have maintain Linux kernel!
OK, I want linux on my phone now! - Check if you have compatible device with Ubuntu Touch or PostmarketOS and proceed with steps in installation guide. You need unlocked bootloader and ADB on your computer
There might be a problem... - Many apps are just WebApps, not fully working, without some features like push notification. Look into OpenStore - official Ubuntu touch appstore and search for what you need.
Tutanota is PF!? What are limitations? - Yes, on their site you have choice to have free account which has some limitations... for now [2020/07.05] 1GB space, one account, one calendar, possibility to log in app to one account. Second thing is you are "forced" to use their app their UI because If I'm not wrong they don't provide POP or IMAP. However it's usable
Other Tips to save privacy
Stay offline when you can. (whenever you don't trust the provider)
Become self-hoster. You can easily and ethically replace some services like online drives, music streaming clients, DNS.
Mix your data, don't allow to be identified by one email, one name, one account everywhere. (Of course if Terms allows)
Use proxies, Onion Routing, VPNs,
Dont' be lazy and read the terms of use, privacy policies when you feel something is wrong. be aware of different types of licenses.
Search for alternatives. There are always some. You can use: https://alternativeto.net to find app with open-source license.
Feel free to suggest what apps may be good for privacy, post your observation, app pros and cons
I collect information in 1st post, and make up "Changelog" in second post.
Sometimes I make mistakes, please forgive me and correct by sending pm. ​

Important Notice - Since I moved to Linux Smartphone I won't be searching for new android apps, maybe occasionally (and for cross-platform). Then, you can help! I'll update
Changelog
2021.02.22
#8 apps update, #7 mistake corrected, thanks, added tox, briar, jami
2020.12.22
Cosmetic changes, #6 request applied. Added Tips under I want more section. BBCode correction.
2020.11.15
Added FairEmail to the list, Thanks to @mrrocketdog
2020.07.26
Updated Host list - deleted HP host added YT ads
2020.07.25
Updated Riot.im and riotX - they changed to Element. See: https://element.io
2020.07.08
Added OpenTasks, Exodus, K-9 Mail.
2020.07.05
Organized by section like jitsi meet ==> meeting apps, added some pictures, added launcher app, added marks orange r and orange p, assigned marks to known apps, added two quotes about f-droid and matrix.org server, probably something more that I forgot to write here ...
2020.06.27
Updated Energized link, added anysoftkeyboard
2020.06.18
Topic change
2020.05.06
Topic Creation and UI improvements, BBcode "hide" doesn't work in XDA Labs app

stop tracking
Hello
It seems that the technology products produced are in it a tool to track users on different levels. Big guys want to exploit that more because they have many partners that pay for it.
I don't want to be a negative person, but if the technology manufacturer installs an eavesdropping tool or tracks a user through device activities, it's hard to prevent this, instead only may be unused.
Or maybe you say we use some ad blocking software (but we are being followed by another party).
Or accept using and getting used to the things that happen to avoid becoming more negative. :angel:

innguyengia said:
Hello
It seems that the technology products produced are in it a tool to track users on different levels. Big guys want to exploit that more because they have many partners that pay for it.
I don't want to be a negative person, but if the technology manufacturer installs an eavesdropping tool or tracks a user through device activities, it's hard to prevent this, instead only may be unused.
Or maybe you say we use some ad blocking software (but we are being followed by another party).
Or accept using and getting used to the things that happen to avoid becoming more negative. :angel:
Click to expand...
Click to collapse
Thank you for fast reply.

https://forum.xda-developers.com/showthread.php?t=3824168
should definitely be on the list. damn impressive maintainer also , @M66B.

I am also maintaining some apps list, but those are lightweight https://forum.xda-developers.com/t/lightweight-apps.3803885/
For offline working apps, I use the following equation No Internet Permission = 100% secure and privacy-focused
I will give suggestions here too.

BigBrother84 said:
Rocket.chat - encrypted chat
Click to expand...
Click to collapse
you can add OS there (on page it says Why open source? and code on github

BigBrother84 said:
Privacy protecting apps:
Click to expand...
Click to collapse
Can please also add TrackerControl from https://f-droid.org/en/packages/net.kollnig.missioncontrol.fdroid/
Also Warden at https://www.xda-developers.com/warden-open-source-app-aurora-store-disable-trackers-loggers/
and ClassyShark3xodus at https://f-droid.org/en/packages/com.oF2pks.classyshark3xodus/
Thanks

Related

[APP] BitDefender Mobile Security

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
BitDefender Mobile Security (BETA) is a next-gen security solution for Android devices focused on little (to zero) system or battery impact while providing access to a number of security functions in order to help you have a safer and more informed Android experience.
Currently in BETA, we’re aiming at validating a small array of features while, in background, we’re working hard on adding a host of new functionalities to add extra layers of security for your device. Our main focus is to provide as much as possible while sticking to a very strict policy in terms of performance and battery impact.
Key Features:
- Very small battery or performance impact
- On-demand malware scanner, relying fully on Cloud technology (read: no updates required)
- On-install scan - a hook on the application install event allows us to scan each application the moment it gets installed
- Security Audit - Have you ever wondered how many applications installed on your device have been granted permission to access your private data ? Or connect to the internet ? Or send text messages ? The Security Audit screen grants you the possibility to have an overview on what applications match various permissions.
FAQ:
Q: Where do I send my compliments, suggestions, bug reports and feedback ?
A: http://bdmobilesecurity.betaeasy.com
Q: Will BitDefender Mobile Security work on my device?
A: BitDefender Mobile Security works on any device running Android 2.0 and up.
Q: Does BitDefender Mobile Security require an Internet connection?
A: The application needs to communicate with the BitDefender servers in order to determine the security status of the applications which are being scanned. Therefore, it only connects to the Internet when an on-install or on-demand malware scan is performed.
Q: How will BitDefender Mobile Security impact my device’s performance and battery autonomy?
A: The impact on both parameters is very low because the application only runs when it absolutely has to - during on-install or on-demand scans and when you are browsing the application interface. BitDefender does not run in the background when you call your buddies, type a message or play a game on your device.
Q: I have A LOT of apps (and a not so powerful phone). How long will a scan usually take ?
A: It doesn’t matter how powerful your phone is since all the processing is done in the cloud. It took about 30seconds on a device with roughly 100 apps installed during our tests
Q: What does the Security Audit tell me about the applications I installed?
A: By tapping Security Audit in the application interface you can see the permissions required by each of the applications installed on your device. The permissions are grouped into three categories and you can filter the applications using any combination of the three:
- applications that require Internet access.
- applications that require access to sensitive data such as your contacts, messages, calendar entries or photo gallery.
- applications that may produce additional charges on your phone bill by sending messages or initiating phone calls.
Q: What kind of information can I see in the Event Viewer?
A: BitDefender Mobile Security keeps a log of all important actions, status changes and other critical messages related to its activity. You can access this information at any time by tapping Event Viewer in the application interface.
Screenshots:
Full album on imgur: http://imgur.com/a/1oJvi
Download http://m.bitdefender.com or from the Android market https://market.android.com/details?id=com.bitdefender.security
Since yesterday, the Bitdefender Mobile Security for Android application benefits from 2 new key features: Anti-Theft and SD Card Scanning. All the current installations will benefit from this update automatically through Android Market. Right now, Bitdefender Mobile Security sports the following functionalities:
On Demand Anti-Malware scan for the installed applications and SD Card
On install scan for applications
On mount scan for SD Card
Privacy Audit - detailing key permission-related information about installed applications
Web Security - preventing access to dangerous web content (phishing, malware, etc) by making use of the Bitdefender cloud
Anti-Theft - allowing the remote locate or wipe of a device
Anti-Theft:
In the simplest of terms, the user only has to link the device with his (or her) Bitdefender account. Once that's set, when accessing https://my.bitdefender.com, the device will be present in his "Mobile Security" area and the "Remotely wipe" and "Remotely locate" buttons will be available, as in the screenshot below
2) SD Card scanning is also a new function added in this release. Whenever an on-demand scan is performed, BMS will also check the SD Card for apps that may pose a threat to the system. Optional, the SD Card will also be scanned "on-mount" (whenever a new sd card is inserted or mounted after being connected to a computer)
Right now, the application has over 60 thousand total installations with an average of 4.4 stars rating on Android Market.
If you have any questions, don't hesitate to ask here or via private message.
Hi, i've just installed this app, i've created mu account on bitdefender website, now i think i was suppose to assigned my phone to my account...i just don't find the place to do it...can anyone help me out?
Thx
Hello,
Sorry for my late response. You can do like this:
On your Android device, start Mobile Security and click on the Anti-Theft button (the 4th button). Then, click on the Login button and enter the username and password from my bitdefender.
There you go.
Hi, thank you for the reply, well i've done that and i allways get Login failed even though i enter my credentials correctly...
For the moment there is a problem with the Bitdefender cloud servers. I will post further informations later.
okay, thank you once again, will wait for an update
It's up and ready now.
Sorry for the inconvenience.
thank you, login worked
Was looking at this, but I am still torn on whether or not Mobile Antivirus does anything beneficial or just wastes batteries.
ddemlong said:
Was looking at this, but I am still torn on whether or not Mobile Antivirus does anything beneficial or just wastes batteries.
Click to expand...
Click to collapse
the day your phone gets a virus will be the day you will regret asking this question. its better to be safe than sorry. (im not assuming that you dont have mobile security; im just saying this because i just am )
and apps like this hardly waste battery. even if they do, it doesnt hurt to charge your phone
sweetnsour said:
the day your phone gets a virus will be the day you will regret asking this question. its better to be safe than sorry. (im not assuming that you dont have mobile security; im just saying this because i just am )
and apps like this hardly waste battery. even if they do, it doesnt hurt to charge your phone
Click to expand...
Click to collapse
Well, when they find an actual Virus, I will definitely get one. Until then I think just watching what u install is doing to do just as good as long as Google still manages the market and controls remote delete.
Just 10-20mb of ram running in the background all the time is a little much.
Bitdefender Mobile Security doesn't run actively. So, it doesn't occupy the resources all the time.
Also, Bitdefender Mobile Security doesn't scan only for Android viruses but also searches for Windows viruses which can affect your PC when you connect your phone at it.
The Android viruses can do a lot of "damages" (visible or not):
- access your phone functions: send SMS, make calls;
- access your privacy: search for accounts from Google, Facebook etc.
- access your email messages and so your personal things can get to a possible "hacker"
- etc.
I have a Motorola Milestone with only 256mb ram and Bitdefender Mobile Security doesn't affect the performance of my phone.
If you login to mybitdefender using your Gmail acct what is your user name and password? I tried my email address and the password associated with it and it tells me that login failed...
Hello All,
It gives me great pleasure to announce that as of today, Bitdefender Mobile Security has been updated with new features along with several bugfixes. All Bitdefender Mobile Security users should receive notifications from their Market application and will be able to easily upgrade to the latest version. If there are still people who don't have it installed, you can get it here or by scanning the QR Code below
The current list of features included in BMS is
- NEW!!! Remotely Lock the device
- NEW!!! Remotely make the device play a sound
- NEW!!! Remotely send a message to the device
- Remotely locate the device
- Remotely wipe the device
- On-demand (and fully cloud accelerated) malware scanning for all installed applications and SD Card contents
- On-install scanning for each newly installed app
- On-Mount scanning for SD Cards in order to make sure no malware is transmitted when the device is connected to a PC
- Security Audit - outlining and classifying the applications based on the granted permissions
- Web Security - seamlessly integrated with the Android Default browser, providing cloud-based phishing and fraud protection
- Little to zero battery impact. Bitdefender Mobile Security is currently ranked as being the lightest and with the least (not sensible) impact on the device's battery performance
What's next ?
- OAUTH support in order to allow all Android users to login into MyBitdefender by using their already linked Google account
- BETA EXIT & Feature splitting into Free and Premium (more details on this soon)
Known Issues:
- The Antitheft section isn't protected (yet). We're considering adding support for password protecting the application or just the anti-theft module
- The interface is starting to get a bit cluttered. We've started talks with the UX/UI team(s) in order to adjust the interface and beautify it a bit
Here are some screenshots with the new features available through MyBitdefender (our ongoing thanks to the MyBitdefender team for their continued support)
Login not working
Login isn't working for me. I did exactly as described - created an account, then inserted the credentials in bitdefender mobile but to no avail - error message: login failed.
Would be nice if you could help!
Love this app but the malware scanner is not working on my 3g moto xoom. it starts the scan but when it gets to querying the server it fails. it said to check my Internet conn. but have tried 3g an wifi, same result. any ideas?
- NEW!!! Remotely Lock the device
- NEW!!! Remotely make the device play a sound
- NEW!!! Remotely send a message to the device
The new features are not appear in my.bitdefender.com , why?
thanks
Frogkiller
Did you activate the options in the installed application?
Sent from my Optimus 2X using xda premium
m0fizor said:
Did you activate the options in the installed application?
Sent from my Optimus 2X using xda premium
Click to expand...
Click to collapse
Yes
Figured out where is the problem is in the my.bitdefender.com
If I switch from Portuguese to English as everything appears

[APP][4.4+] Privacy Browser

Privacy Browser is an open source Android web browser focused on user privacy. It is released under the GPLv3+ license. The source code is available from git.stoutner.com.
The only way to prevent data from being abused is to prevent it from being collected in the first place. Privacy Browser has two primary goals.
Minimize the amount of information that is sent to the internet.
Minimize the amount of information that is stored on the device.
Most browsers silently give websites massive amounts of information that allows them to track you and compromise your privacy. Websites and ad networks use technologies like JavaScript, cookies, DOM storage, user agents, and many other things to uniquely identify each user and track them between visits and across the web.
In contrast, privacy sensitive features are disabled by default in Privacy Browser. If one of these technologies is required for a website to function correctly, the user may choose to turn it on for just that visit. Or, they can use domain settings to automatically turn on certain features when entering a specific website and turn them off again when leaving.
Privacy Browser currently uses Android’s built-in WebView to render web pages. As such, it works best when the latest version of WebView is installed. In the 4.x series, Privacy Browser will switch to a forked version of Android’s WebView called Privacy WebView that will allow for advanced privacy features.
Warning: Android KitKat (version 4.4.x, API 19) ships an older version of OpenSSL, which is susceptible to MITM (Man In The Middle) attacks when browsing websites that use outdated protocols and cipher suites.
Features:
Integrated EasyList ad blocking.
Tor Orbot proxy support.
SSL certificate pinning.
Import/Export of settings and bookmarks.
Further information:
News
Changelog and Downloads
Roadmap
Permissions
Privacy Policy
Bug Tracker
Security and Privacy Canary
Mastodon
The standard version is available on F-Droid, Google Play, the Amazon Appstore, and the Galaxy App Store. The free version has all the features of the standard version with the addition of a banner ad across the bottom of the screen. It is available on Google Play, the Amazon Appstore, and the Galaxy App Store.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
One thing I thought I'd mention, using the default html ddg page I get a forbidden message any time I do a search. Using the toolbar works fine though.
Thanks for the app!
blk_jack said:
One thing I thought I'd mention, using the default html ddg page I get a forbidden message any time I do a search. Using the toolbar works fine though.
Thanks for the app!
Click to expand...
Click to collapse
I'm assuming that you are having this problem with the DuckDuckGo's .onion website. If so, this is a bug in their website that I have already tried to submit to them, but so far have not got any response.
https://forum.duckduckhack.com/t/searches-fail-on-the-onion-site-if-javascript-is-disabled/1927
https://www.reddit.com/r/duckduckgo...earches_fail_on_the_onion_site_if_javascript/
There are a couple of workarounds you can use until DuckDuckGo fixes their problem.
1. Set the Tor homepage setting to be https://start.duckduckgo.com instead of https://3g2upl4pq6kufc4m.onion/. The normal website works fine with JavaScript disabled.
2. Use domain settings to automatically turn on JavaScript for https://3g2upl4pq6kufc4m.onion/. You should also set the Tor search to be JavaScript enabled to match.
You might also add your voice to either of the websites above where I submitted the bug report. If enough people mention the problem it will probably get to the person who can fix it.
Problems with the default homepage.
blk_jack said:
One thing I thought I'd mention, using the default html ddg page I get a forbidden message any time I do a search. Using the toolbar works fine though.
Thanks for the app!
Click to expand...
Click to collapse
This problem will be fixed in the next release of Privacy Browser by changing the default homepage to https://duckduckgo.com/?kao=-1&kak=-1, which works with both JavaScript enabled and disabled. See https://www.reddit.com/r/duckduckgo...hes_on_startduckduckgocom_fail_if_javascript/ for more information.
So, this browser starts in an incognito or..?
Privacy Browser Defaults
Freddy1X said:
So, this browser starts in an incognito or..?
Click to expand...
Click to collapse
Privacy Browser starts with the following defaults, which can be configured on-the-fly, by domain, or globally:
JavaScript disabled.
First-party cookies disabled.
Third-party cookies disabled.
DOM storage disabled.
Form data disabled.
Incognito mode is off by default, but can be turned on in the preferences. Incognito mode clears the history and cache after each webpage finishes loading.
There is also a Clear and Exit button, which clears all cookies, DOM storage, form data, cache, and removes Privacy Browser from memory.
How to switch tabs ?
jerryn70 said:
How to switch tabs ?
Click to expand...
Click to collapse
Tabbed browsing is not yet implemented. See the roadmap for more information.
Privacy Browser 2.5 has been released.
Changelog:
• Add SSL certificate pinning to domain settings.
• Add searx.me to the list of search engines.
• Update the default homepage to work with both JavaScript enabled or disabled.
• Fix a bug that caused the website title to be lost on rotate.
• Ghost the “Clear DOM Storage” options menu item if there is nothing to delete.
• Use non-bolded red text to indicate unencrypted websites.
• Fix a bug that sometimes caused custom domain user agents to fail.
• Fix a bug that caused website modifications (like the sorting of a list) to be lost if Privacy Browser was moved to the background.
• Many small improvements were made to the Domains activity.
• Updated Italian translation provided by Francesco Buratti.
• Updated Spanish translation provided by Jose A. León.
There is a blog post with more information about the new features.
Privacy Browser 2.6 has been released.
Changelog:
• Add night mode rendering.
• Update the dark theme rendering of the About and Guide sections.
• Add support for HTTP authentication.
• Color code the Common Name in the view SSL certificate dialog.
• Updated Italian translation provided by Francesco Buratti.
• Updated Spanish translation provided by Jose A. León.
There is a news post with more information about each of these items.
Awesome privacy browser..I have already purchased it from google play store. Please add tabbed browser option.
Please update it soon.
Tabbed Browsing
nausha7 said:
Awesome privacy browser..I have already purchased it from google play store. Please add tabbed browser option.
Please update it soon.
Click to expand...
Click to collapse
nausha7, I'm glad you like it.
Tabbed browsing will be part of the 3.x series. You can read the roadmap for more information.
Privacy Browser 2.7 has been released.
Changelog:
• Add a bookmarks drawer that is accessed by sliding from the right.
• Prevent Night Mode from flashing a white background when loading new pages.
• Update the user agents.
• Bump target API to 26 (Android Oreo, 8.0.0).
• Updated Italian translation provided by Francesco Buratti.
• Updated Spanish translation provided by Jose A. León.
There is a blog post with more detailed information about the changes.
How is webRTC IP leaks handled?
WebRTC
m0d said:
How is webRTC IP leaks handled?
Click to expand...
Click to collapse
Privacy Browser currently uses Android's WebView to render web pages. WebView does not provide any controls over WebRTC, which is a privacy problem.
WebRTC requires JavaScript. By default, JavaScript is disabled in Privacy Browser. So when browsing the web with the default settings, WebRTC will not function and will not leak a user's IP address.
In Privacy Browser, JavaScript may be enabled on the fly or automatically by domain. Because of risks like WebRTC, users should only enable JavaScript for domains they trust.
In the 4.x series, I plan on forking Android's WebView to make Privacy WebView. I will then add WebRTC privacy controls, which will allow a user to disable WebRTC even when JavaScript is enabled.
https://redmine.stoutner.com/issues/62
https://www.stoutner.com/category/roadmap/
Hello! I first download Privacy Browser from F-Droid, then bought in Play store. Updates first appears in Play store, but I haven't update option, only uninstall.
Is it possible to update app installed from F-droid by Play store, or I have to uninstall F-droid version and than install Play store version? Is it possible to keep setting or export and import them?
APK Signatures
CubaoX said:
Hello! I first download Privacy Browser from F-Droid, then bought in Play store. Updates first appears in Play store, but I haven't update option, only uninstall.
Is it possible to update app installed from F-droid by Play store, or I have to uninstall F-droid version and than install Play store version? Is it possible to keep setting or export and import them?
Click to expand...
Click to collapse
Android will only let an app update if the signature on the new APK matches the signature on the currently installed APK. The APKs on Google Play, XDA Labs, and stoutner.com are all signed with my personal key. The APKs on F-Droid are built from source by F-Droid and signed by their key. I believe that the Amazon Appstore strips my signature from the APK I upload to them and applies their own signature, but I have not taken the time to verify that is the case.
As such, when Privacy Browser is installed from Google Play, XDA Labs, or stoutner.com it can afterwords be updated using APKs from any of these three locations. Note, however, that Google Play will only offer to update Privacy Browser if the signature matches and the Play Store database indicates the user has purchased the app through them. I would imagine that XDA Labs performs a similar check, but I have not verified that such is the case.
Because F-Droid builds the app from source there is a delay between when a new version is released and when it becomes available on F-Droid. Some information about the current status of the build can be found at:
https://f-droid.org/wiki/page/com.stoutner.privacybrowser.standard
See also this forum thread:
https://forum.f-droid.org/t/is-the-f-droid-build-process-currently-broken/195
It is not currently possible to export and import settings, but that is a planned feature that will likely be implemented in the next few months:
https://redmine.stoutner.com/issues/23
https://www.stoutner.com/category/roadmap/
Of course, if you have root access, you can use a program like Titanium Backup to backup and restore the bookmarks and settings.
It is also now possible to get F-Droid to include the original APK with my signature on their platform using reproducible builds. As far as I know this was not an option when I first uploaded Privacy Browser to F-Droid. Switching to it now would cause difficulty for those who already have Privacy Browser from F-Droid installed because they would no longer be able to update. So at a minimum I would want to have the ability to backup and restore bookmarks before implementing reproducible builds. Also, there is some infrastructure that would be required. I have not made a complete decision about reproducible builds for F-Droid, but it is likely that at some point in the future I will implement them.
https://f-droid.org/docs/Reproducible_Builds/
https://f-droid.org/wiki/page/Deterministic,_Reproducible_Builds
Thank You for answer. So now I'm really waiting for import/export option!
CubaoX said:
Thank You for answer. So now I'm really waiting for import/export option!
Click to expand...
Click to collapse
The next release, version 2.8, will likely be the last release in the first half of the 2.x series. Version 2.9 will move to the second half of the 2.x series and introduce the dangerous file permissions. Once those permissions are added, the features will be implemented to make the default download location public, allow uploading of files to webpages, and export and import of bookmarks and settings, likely in that order.
Privacy Browser 2.7.1 has been released.
Changelog:
• Fix a crash when editing a bookmark in the new bookmarks drawer.
There is a blog post with further information.

[APP][6.0+] RethinkDNS: Anti-Censorship + Adblocker + Firewall [open source] [no root]

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
RethinkDNS is an anti-internet censorship tool with DNS-based adblocking and a firewall built-in for Android 6+ devices.
The app itself is free to use and comes with RethinkDNS (previous name BraveDNS) resolver with support custom denylists, allowlists, ability to store DNS logs for later analysis, view those logs consolidated from multiple devices in a single interface and so on: Pretty much a pi-hole in the cloud.
Why'd we build this?
As concerned Android users: It absolutely irks us that people who do care enough about privacy still couldn't use privacy-enhancing apps without requiring a degree in computer science. We saw this pattern unfold multiple times and a lot of tools over the years have done a tremendous job of making niche security tools accessible to naive users. We wanted to further that conversation on Android with a vision for what we think such a tool should look like:
1. Anti-censorship: Enable open internet. DNS over HTTPS (and the imminent ESNI standard) is going to effectively break censorship as implemented in a lot of countries without requiring to route the traffic through VPNs. VPNs (and distributed tech like IPFS and mesh networks like Lantern) are still required in countries that employ Deep Packet Inspection. That's something we'd like to tackle in the near future.
2. Anti-surveillance: Expose apps, their activity logs, network logs, and provide some actionable insights to the users on what they could do next. Exodus Privacy does a good job at statically analyzing an app and laying bare the trackers and permissions in-use, whilst the evergreen NetGuard does ever-so-well in revealing an app's connectivity history. We believe, there's a lot more that can be done than simply firewall an app: For instance, you could disable it, uninstall it, remove its permissions, remove the so-called special permissions (like read notification permission, read SMS permission, read app-usage statistics permission etc). Basically, empower the user with whatever control is available without-root in a neat little interface (think CleanMaster vs using the stock Settings app but being actually effective and not lie).
The current version of RethinkDNS (previous name: BraveDNS) is a start in the direction laid out above partly because we want such an app ourselves and partly because we feel people deserve more such tools, and we hope to build it with this community's input, because god knows we have been wrong plenty when it comes to "what people really want".
As privacy enthusiasts: We were frustrated that if we wanted to use NetGuard we couldn't use another VPN app, or if we wanted to use a DNS changer like Blokada then we couldn't use NetGuard (though, NetGuard + Private DNS feature alleviates the problem on Android 9+). We wanted something that wasn't as restrictive because we knew it could be built and so we did.
Key points:
1. Easy configuration.
2. No root required.
3. Free and open source (forked from Intra).
4. No built-in trackers or analytics.
5. In continuous development.
Current features:
1. DNS over HTTPS (circumvent censorship and prevent surveillance of DNS logs by ISPs and everyone else), DNSCrypt v2 with Anonymized Relays, and DNS over Tor.
2. View DNS logs, including latencies and other metadata.
3. Ad-block through RethinkDNS (previous name: BraveDNS) free resolver and local blocklists.
4. Add your own DNS over HTTPS / DNSCrypt v2 servers.
5. Firewall by app categories.
6. Firewall individual apps.
7. Firewall individual IP addresses.
8. Firewall when apps are in the background (not-in-active-use).
9. Firewall when device is locked.
10. Forward DNS and TCP connections to Orbot (Tor as a proxy).
11. Forward HTTP connections to any HTTP proxy.
12. Forward TCP connections to any SOCKS5 endpoint or to Orbot.
13. Forward DNS connections to any app running locally on-device or any endpoint (either local or on the Internet).
14. [v053g / Sep '21] Firewall when apps bypass DNS (for example, block connections to IPs that apps resolve themselves).
15. [v053g / Sep '21] Pause: Pause the Firewall and DNS for a brief time-period.
16. [v053g / Sep '21] DNS Trap: Proxy all requests made on Port 53 to user-set DNS endpoint (for instance, this traps and redirects all custom DNS requests WhatsApp sends to Google's `8.8.8.8` DNS servers to the DNS endpoint of a user's choice).
17. [v053i / Jul '22] IPv6 support.
18. [v053i / Jul '22] Firewall based on metered (LTE) or unmetered connection (Wifi).
Planned (in order):
0. Custom DNS allowlists/denylists.
1. WireGuard VPN integration.
3. Per-app DNS and VPN (route traffic to multiple VPNs / DNS based on which app is making those connections).
See: github/celzero/rethink-app/feature-backlog.
We can't emphasize this enough: Let us know what you'd like to see us build and more importantly what'd make this tool use-able for other Android users who care enough but aren't as tech-savvy.
If you'd like to contribute, please feel free to send pull requests our way.
Thanks.
---
Source: github/celzero/rethink-app
Website: rethinkfirewall.com
Blog: blog.rethinkdns.com
Twitter: twitter.com/rethinkdns
FAQ: rethinkdns.com/faq
License: Apache 2.0
Download: via RethinkDNS.com | PlayStore | F-Droid.
---
Reserved.
pls add system apps block on firewall, also block domain on dns log and dns server change
Thanks.
System apps: Good catch. We'd look to put that in the coming days.
DNS block button against a domain in the logs: We do plan add that but not sure if it ends up violating PlayStore terms. May be we need two versions, one for f-droid and another for PlayStore like Blokada has.
Can you elaborate what you mean by block domain on DNS server change?
ignoramous said:
Thanks.
System apps: Good catch. We'd look to put that in the coming days.
DNS block button against a domain in the logs: We do plan add that but not sure if it ends up violating PlayStore terms. May be we need two versions, one for f-droid and another for PlayStore like Blokada has.
Can you elaborate what you mean by block domain on DNS server change?
Click to expand...
Click to collapse
block/allow individual domains which are showed by log.
change dns servers just like nebulo app.
also proxy on tor n dnscrypt support like invizible-pro app.
> change dns servers just like nebulo app.
Dnscrypt shouldn't be much trouble to implement but I wonder what extra protection it affords over DNS over HTTPS. That said, I've added it to our backlog.
> block/allow individual domains which are showed by log.
Gotcha but as mentioned before I am not sure if this feature breaks PlayStore terms. Added.
> also proxy on tor n dnscrypt support like invizible-pro app.
Yes! This is something that we want to do next. Once the part with Firewall and DNS is done (our immediate attention is adding missing features and later add support for Android 6+). Thanks for the heads-up: invizible-pro looks great, and exactly the kind of app that we envision to build ourselves.
Is this affiliated in any way with https://brave.com/?
No it isn't affiliated with brave.com.
We won a grant from Mozilla Builders, however; to pursue this, which we are now doing so full-time.
Hello, I am on a stock Pixel 2 XL, Android 10, latest security patches as of August. The app starts and runs, but tapping the start circle does nothing. DNS or Firewall doesn't start.
So this still exposes one's real IP address, yes?
y0himba said:
Hello, I am on a stock Pixel 2 XL, Android 10, latest security patches as of August. The app starts and runs, but tapping the start circle does nothing. DNS or Firewall doesn't start.
Click to expand...
Click to collapse
Strange. This is unlikely related to Pixel or the latest Android Oreo update. Please check if any other VPN app has been set to "Always-on VPN" like-so (also see attached):
1. Settings -> Wifi and internet -> VPN.
2. Click on the sprocket icon against the apps.
3. Check if "Always-on VPN" is check-marked.
Disable that setting (if and only if you do not want that VPN app to be an "Always-on VPN") and BraveDNS should now prompt you for VPN access once you click "Start".
BraveDNS (or any app that requires VPN API access to function) cannot work with other VPN apps in-tandem (especially, not with "Always-on VPNs").
pocholo36 said:
So this still exposes one's real IP address, yes?
Click to expand...
Click to collapse
Yes, BraveDNS isn't a VPN service like ProtonVPN / Mullvad / Lantern etc are. Right now (though we do have plans to add VPN servers like Lantern et al in probably two to three months from today but that'd be only to support anti-censorship and not anonymity). See: https://github.com/celzero/brave-android-app/issues/52 and https://github.com/celzero/brave-android-app/issues/51
We're adding support for SOCKS5 and HTTPS-Proxy in the upcoming release (next week) which would help forward traffic to VPNs (like NordVPN) that support those protocols: https://github.com/celzero/brave-android-app/issues/45
Right now, BraveDNS uses VPN access on-device to change DNS and implement Firewall functionality (similar to what the excellent NetGuard app does).
ignoramous said:
Yes, BraveDNS isn't a VPN service like ProtonVPN / Mullvad / Lantern etc are. Right now (though we do have plans to add VPN servers like Lantern et al in probably two to three months from today but that'd be only to support anti-censorship and not anonymity). See: https://github.com/celzero/brave-android-app/issues/52 and https://github.com/celzero/brave-android-app/issues/51
We're adding support for SOCKS5 and HTTPS-Proxy in the upcoming release (next week) which would help forward traffic to VPNs (like NordVPN) that support those protocols: https://github.com/celzero/brave-android-app/issues/45
Right now, BraveDNS uses VPN access on-device to change DNS and implement Firewall functionality (similar to what the excellent NetGuard app does).
Click to expand...
Click to collapse
I've been looking for an all in one solution. Currently forced to use AdGuard+Nord...
Looking forward to it. Thanks for all you guys do.
Thanks. Nice work.
Unfortunately, it usually comes down to firewall or VPN
Would love to see what you guys do (if at all) to allow third party VPNs
My brief experience with this is not great. Breaks several apps once turned off the app no longer opens so has to be uninstalled to turn it back on. Ad blocking did not seem to function at all.
ignoramous said:
Strange. This is unlikely related to Pixel or the latest Android Oreo update. Please check if any other VPN app has been set to "Always-on VPN" like-....
Click to expand...
Click to collapse
That fixed it. I should have figured as much, but I'm getting too old for this I think. I can't wait until you offer subscriptions! This is brilliant. I hope it's on the up and up though, I'm paranoid so don't mind me.
bladestonez said:
My brief experience with this is not great. Breaks several apps once turned off the app no longer opens so has to be uninstalled to turn it back on. Ad blocking did not seem to function at all.
Click to expand...
Click to collapse
So sorry this app has forced you to uninstall apps in order to use them. That definitely sounds like something went wildly wrong.
Would you please tell us more about the device, the Android version, and probably the list of steps that led to this issue you saw? You could also email us logs or a screen recording at [email protected]
We do know of crashes especially on flaky networks and on network changes, and we would eventually fix those but they have been extremely hard to track-down in production builds to a root cause (due to lack of stack trace / debug symbols for native crashes).
BraveDNS has been in development for a total of 2 months and was released three weeks back. It is a baby app and I fully expect stupid bugs to appear in the wild but cautiously hopeful that we'd fix most if not all.
Re: adblocking:
Adblocking is done exclusively through DNS. If the default endpoint doesn't work, you can point the app to a custom DNS over HTTPS endpoint. https://dns.adguard.com/dns-query is AdGuard's content blocking DNS endpoint. And https://doh.pi-dns.com/dns-query is another volunteer-run content-blocking DNS.
How is this different from adguard?
Using a VPN method to firewall on a rooted device is a no from me (i can totally understand if you use this to increase your userbase to non-root users, but thats not for me), ill stick with Invisible (for DNSCrypt & its ability to load my 19Mb blacklist) and my root firewall for now.
Really need to change the name.
Brave = Brave Browser
A lot of people are going to assume it's a VPN by Brave.
It's like calling it FirefoxVPN.

[APP][4.4+][v.9.33.31] Telegraher, a Telegram fork with blackjack and hookers

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Hi folks it has been 9+ months that i consistently developing my telegram fork, "Telegraher with blackjack and hookers!"
The main idea is that vanilla TG client pretty annoying:
remote deletions
impossible to screenshot in greenchats
content restrictions
have too much privileges & tracking
So slowly i started to mod that client to make my own. I use Telegram official source as a base. I don't use Tg-FOSS cause author is pretty slow in updates. Also i don't use popular "cat-forks" cause i have "real life" and i hate x2 screen size tap menus.
I started from version 8.3.0 and 1st release was made for 8.3.1. While i'm writing this post we're on 8.8.5, so our internal version is look actual stuff section.
We're not in Izzy's repo (cause fork >30Mb), we're not on fdroid either because I don't want to depend on their CI/CD and their repo. We're on github and apps made by CI/CD and posted by github too. Then releases are picked up by the bot and send to our TG chat, from where i move them into the channel. Also i send a copy to Matrix (which i made as a backup since Telegram send us a strike in march'22, to loveletter to "Telegraher team"). And i move them also on my CDN with TOR access enabled, so folks can download files w/o JS and hide their IP as they want.
Why i did it for telegram and not for Matrix or XMPP, it's because i have lot of contacts on telegram. When my friends will leave TG i will leave it too. Also i love to piss-off telegram fanboys.
Main features are:
we're in bundle, 4 architectures and we work from android 4.4+ (early versions 4.1+)
no remote deletions at all (green chats & timed medias also)
no gapps, the app is FOSS (notifications are same like in Tg-FOSS, via notification badge cause since A8 OS can kill the app)
we have shadowban to shadowban people or channels you don't want to see
no content restrictions, also in greenchats (save all you want, but don't forward, 'cause forward if fully API function)
emulator detection is disabled
we have device spoofing (actually TG doesn't change devices pretty fast for active sessions, but you can change it globally and add an account)
the phone you type is "always active" and you have that simcard
we have session manager & unlimited multiacc (while you have memory, we're tested 80 accs easily).
wal is disabled for db, so no journal grow
we're on vanilla API keys & keep vanilla behaviour to avoid any client bans (we keep low profile, sending vanilla keys, package, vendor, codeversion & fingerprint also)
..and many other features what i added or picked somewhere (or community is asked me).
Application links:
Github repo, CI/CD releases (all is made here, the origin)
Gitlab repo, just synced from Github.
CDN releases and cloned repo also (manual copy here, front is Cloudflare, backed by AWS, if you care about your IP, use VPN or TOR)
Telegram resources: channel, chat, FAQ EN/RU & FAQ Persian.
Matrix resource: the space, chat & apks (after last incident with free oracle cloud we're lost local files, but i launched anotherone with same keys, server is in swiss)
"Press":
Techtracker.in (08/2022)
FAQ:
Can i be banned?
Officially - no. Telegram have 2 TOS: one for the users, another is for the devs. User TOS is the TOS you need to follow when you use the app. User TOS forbid `spam, scam, violence & porn`. This is an open-source fork which don't have hidden features to `spam, scam, violence & porn`. Dev TOS is the TOS which devs must follow when they develop the apps and use generated API keys. Telegraher as an app break the DEV TOS only & Telegraher use vanilla API keys. User TOS it's up to you!
Actual stuff:
Actual release is 9.33.31
.
.
if you face the issue "update your app it's too old" go here
About me:
I'm not an Android dev, but i code on Java, thats why i do what i do. I'm a russian and i live already 10y in France. My life & work c'est ici.
P.S. Telegraher there are no "p", it's not a "Telegrapher" and have nothing to do with.
Thank you for the fork !
Rush-er said:
Thank you for the fork !
Click to expand...
Click to collapse
my pleasure!
nikitasius said:
Hi folks it has been 9+ months that i consistently developing my telegram fork, "Telegraher with blackjack and hookers!"
The main idea is that vanilla TG client pretty annoying:
remote deletions
impossible to screenshot in greenchats
content restrictions
have too much privileges & tracking
So slowly i started to mod that client to make my own. I use Telegram official source as a base. I don't use Tg-FOSS cause author is pretty slow in updates. Also i don't use popular "cat-forks" cause i have "real life" and i hate x2 screen size tap menus.
I started from version 8.3.0 and 1st release was made for 8.3.1. While i'm writing this post we're on 8.8.5, so our internal version is 8.85.47 .
We're not in Izzy's repo (cause fork >30Mb), we're not on fdroid either because I don't want to depend on their CI/CD and their repo. We're on github and apps made by CI/CD and posted by github too. Then releases are picked up by the bot and send to our TG chat, from where i move them into the channel. Also i send a copy to Matrix (which i made as a backup since Telegram send us a strike in march'22, to loveletter to "Telegraher team"). And i move them also on my CDN with TOR access enabled, so folks can download files w/o JS and hide their IP as they want.
Why i did it for telegram and not for Matrix or XMPP, it's because i have lot of contacts on telegram. When my friends will leave TG i will leave it too. Also i love to piss-off telegram fanboys.
Main features are:
we're in bundle, 4 architectures and we work from android 4.1+
no remote deletions at all (green chats & timed medias also)
no gapps, the app is FOSS (notifications are same like in Tg-FOSS, via notification badge cause since A8 OS can kill the app)
we have shadowban to shadowban people or channels you don't want to see
no content restrictions, also in greenchats (save all you want, but don't forward, 'cause forward if fully API function)
emulator detection is disabled
we have device spoofing (actually TG doesn't change devices pretty fast for active sessions, but you can change it globally and add an account)
the phone you type is "always active" and you have that simcard
we have session manager & unlimited multiacc (while you have memory, we're tested 80 accs easily).
wal is disabled for db, so no journal grow
we're on vanilla API keys & keep vanilla behaviour to avoid any client bans (we keep low profile)
..and many other features what i added or picked somewhere (or community is asked me).
Application links:
Github repo, CI/CD releases (all is made here, the origin)
Gitlab repo, just synced from Github.
CDN releases and cloned repo also (manual copy here, front is Cloudflare, backed by AWS, if you care about your IP, use VPN or TOR)
Telegram resources: channel, chat, FAQ EN/RU & FAQ Persian.
Matrix resource: the space, chat & apks (after last incident with free oracle cloud we're lost local files, but i launched anotherone with same keys, server is in swiss)
"Press":
Techtracker.in (08/2022)
About me:
I'm not an Android dev, but i code on Java, thats why i do what i do. I'm a russian and i live already 10y in France. My life & work c'est ici.
P.S. Telegraher there are no "p", it's not a "Telegrapher" and have nothing to do with.
Click to expand...
Click to collapse
Thanks sir keep up the good work
AmirulAndalib said:
Thanks sir keep up the good work
Click to expand...
Click to collapse
thaaaanks
nikitasius said:
Hi folks it has been 9+ months that i consistently developing my telegram fork, "Telegraher with blackjack and hookers!"
The main idea is that vanilla TG client pretty annoying:
remote deletions
impossible to screenshot in greenchats
content restrictions
have too much privileges & tracking
So slowly i started to mod that client to make my own. I use Telegram official source as a base. I don't use Tg-FOSS cause author is pretty slow in updates. Also i don't use popular "cat-forks" cause i have "real life" and i hate x2 screen size tap menus.
I started from version 8.3.0 and 1st release was made for 8.3.1. While i'm writing this post we're on 8.8.5, so our internal version is 8.85.47 .
We're not in Izzy's repo (cause fork >30Mb), we're not on fdroid either because I don't want to depend on their CI/CD and their repo. We're on github and apps made by CI/CD and posted by github too. Then releases are picked up by the bot and send to our TG chat, from where i move them into the channel. Also i send a copy to Matrix (which i made as a backup since Telegram send us a strike in march'22, to loveletter to "Telegraher team"). And i move them also on my CDN with TOR access enabled, so folks can download files w/o JS and hide their IP as they want.
Why i did it for telegram and not for Matrix or XMPP, it's because i have lot of contacts on telegram. When my friends will leave TG i will leave it too. Also i love to piss-off telegram fanboys.
Main features are:
we're in bundle, 4 architectures and we work from android 4.1+
no remote deletions at all (green chats & timed medias also)
no gapps, the app is FOSS (notifications are same like in Tg-FOSS, via notification badge cause since A8 OS can kill the app)
we have shadowban to shadowban people or channels you don't want to see
no content restrictions, also in greenchats (save all you want, but don't forward, 'cause forward if fully API function)
emulator detection is disabled
we have device spoofing (actually TG doesn't change devices pretty fast for active sessions, but you can change it globally and add an account)
the phone you type is "always active" and you have that simcard
we have session manager & unlimited multiacc (while you have memory, we're tested 80 accs easily).
wal is disabled for db, so no journal grow
we're on vanilla API keys & keep vanilla behaviour to avoid any client bans (we keep low profile, sending vanilla keys, package, vendor, codeversion & fingerprint also)
..and many other features what i added or picked somewhere (or community is asked me).
Application links:
Github repo, CI/CD releases (all is made here, the origin)
Gitlab repo, just synced from Github.
CDN releases and cloned repo also (manual copy here, front is Cloudflare, backed by AWS, if you care about your IP, use VPN or TOR)
Telegram resources: channel, chat, FAQ EN/RU & FAQ Persian.
Matrix resource: the space, chat & apks (after last incident with free oracle cloud we're lost local files, but i launched anotherone with same keys, server is in swiss)
"Press":
Techtracker.in (08/2022)
FAQ:
Can i be banned?
Officially - no. Telegram have 2 TOS: one for the users, another is for the devs. User TOS is the TOS you need to follow when you use the app. User TOS forbid `spam, scam, violence & porn`. This is an open-source fork which don't have hidden features to `spam, scam, violence & porn`. Dev TOS is the TOS which devs must follow when they develop the apps and use generated API keys. Telegraher as an app break the DEV TOS only & Telegraher use vanilla API keys. User TOS it's up to you!
About me:
I'm not an Android dev, but i code on Java, thats why i do what i do. I'm a russian and i live already 10y in France. My life & work c'est ici.
P.S. Telegraher there are no "p", it's not a "Telegrapher" and have nothing to do with.
Click to expand...
Click to collapse
Niki u are everywhere.
Niki u are everywhere.
tyler19820201 said:
Niki you are everywhere.
Click to expand...
Click to collapse
Salut Tyler
yep, i was surprised that i did not had account here. I was visiting XDA for my nexus4 in 2013, but probably w/o making an account.
Also in more places i am - harder for TG to ban the project
nikitasius said:
Salut Tyler
yep, i was surprised that i did not had account here. I was visiting XDA for my nexus4 in 2013, but probably w/o making an account.
Also in more places i am - harder for TG to ban the project
Click to expand...
Click to collapse
Welcome on the board.
Brilliant , congrats for posting on xda.
Walden0 said:
Brilliant , congrats for posting on xda.
Click to expand...
Click to collapse
thanks !
nikitasius said:
Hi folks it has been 9+ months that i consistently developing my telegram fork, "Telegraher with blackjack and hookers!"
The main idea is that vanilla TG client pretty annoying:
remote deletions
impossible to screenshot in greenchats
content restrictions
have too much privileges & tracking
So slowly i started to mod that client to make my own. I use Telegram official source as a base. I don't use Tg-FOSS cause author is pretty slow in updates. Also i don't use popular "cat-forks" cause i have "real life" and i hate x2 screen size tap menus.
I started from version 8.3.0 and 1st release was made for 8.3.1. While i'm writing this post we're on 8.8.5, so our internal version is 8.85.47 .
We're not in Izzy's repo (cause fork >30Mb), we're not on fdroid either because I don't want to depend on their CI/CD and their repo. We're on github and apps made by CI/CD and posted by github too. Then releases are picked up by the bot and send to our TG chat, from where i move them into the channel. Also i send a copy to Matrix (which i made as a backup since Telegram send us a strike in march'22, to loveletter to "Telegraher team"). And i move them also on my CDN with TOR access enabled, so folks can download files w/o JS and hide their IP as they want.
Why i did it for telegram and not for Matrix or XMPP, it's because i have lot of contacts on telegram. When my friends will leave TG i will leave it too. Also i love to piss-off telegram fanboys.
Main features are:
we're in bundle, 4 architectures and we work from android 4.1+
no remote deletions at all (green chats & timed medias also)
no gapps, the app is FOSS (notifications are same like in Tg-FOSS, via notification badge cause since A8 OS can kill the app)
we have shadowban to shadowban people or channels you don't want to see
no content restrictions, also in greenchats (save all you want, but don't forward, 'cause forward if fully API function)
emulator detection is disabled
we have device spoofing (actually TG doesn't change devices pretty fast for active sessions, but you can change it globally and add an account)
the phone you type is "always active" and you have that simcard
we have session manager & unlimited multiacc (while you have memory, we're tested 80 accs easily).
wal is disabled for db, so no journal grow
we're on vanilla API keys & keep vanilla behaviour to avoid any client bans (we keep low profile, sending vanilla keys, package, vendor, codeversion & fingerprint also)
..and many other features what i added or picked somewhere (or community is asked me).
Application links:
Github repo, CI/CD releases (all is made here, the origin)
Gitlab repo, just synced from Github.
CDN releases and cloned repo also (manual copy here, front is Cloudflare, backed by AWS, if you care about your IP, use VPN or TOR)
Telegram resources: channel, chat, FAQ EN/RU & FAQ Persian.
Matrix resource: the space, chat & apks (after last incident with free oracle cloud we're lost local files, but i launched anotherone with same keys, server is in swiss)
"Press":
Techtracker.in (08/2022)
FAQ:
Can i be banned?
Officially - no. Telegram have 2 TOS: one for the users, another is for the devs. User TOS is the TOS you need to follow when you use the app. User TOS forbid `spam, scam, violence & porn`. This is an open-source fork which don't have hidden features to `spam, scam, violence & porn`. Dev TOS is the TOS which devs must follow when they develop the apps and use generated API keys. Telegraher as an app break the DEV TOS only & Telegraher use vanilla API keys. User TOS it's up to you!
About me:
I'm not an Android dev, but i code on Java, thats why i do what i do. I'm a russian and i live already 10y in France. My life & work c'est ici.
P.S. Telegraher there are no "p", it's not a "Telegrapher" and have nothing to do with.
Click to expand...
Click to collapse
Welcome to XDA and thanks for sharing!
orb3000 said:
Welcome to XDA and thanks for sharing!
Click to expand...
Click to collapse
Thaaanks!
Some folks facing the issue "update your app" on actual release.
If you read it and face it also, please share information about via reply to this message:
- phone model
- ROM
- how many telegram clients are running on that device already on same time while you're adding the acc to the graher.
nikitasius said:
Some folks facing the issue "update your app" on actual release.
If you read it and face it also, please share information about via reply to this message:
- phone model
- ROM
- how many telegram clients are running on that device already on same time while you're adding the acc to the graher.
Click to expand...
Click to collapse
Here is a video i did on old Nexus 4 running LOS with Android8 and no gapps.
I also have no issues on fresh install on Mi Mix 2 running LOS with Android11 also w/o gapps.
P.S. video made on linux using Kazaam, play it via VLC.
Interessing moments folks
This is github update 9.0.0 -> 9.0.1 https://github.com/DrKLO/Telegram/commit/11edd5ee0d924b8db0bd9b2460c7abdf664ad716
There are the part: code version changed from 2799 to 2800 and version also 9.0.0 to 9.0.1 (screenshot from github).
While on market 9.0.0 version had code 2800 and not a 2799 (screenshot from jadx).
Why could build 9.0.1 with vanilla keys on github with codeversion 2800 and 9.0.0 with same vanilla keys and codeversion on gplay?
I see only 2 reasons:
dev is ****edup the build on google
easypeasy way to detect ALL FORKS on vanilla keys, cause they will have codeversion 2800 for appversion 9.0.1
Just filter requests and ban all "bad forks":
vanilla keys
code 2800
app 9.0.1 and NOT 9.0.0
Release 8.85.48
ㅤbit changed login part
ㅤ.gitignore fix
ㅤyou can enable WAL mode for DB (using debug menu in the client)
this is the last update fro 8.8.x. All next will for beta 9.0.x now.
Github, the origin, CI/CD
CDN, copied from github manually
P.S. IDK if i should to share an APK here, it's about 64Mb.
1-st of all i wanna thank the great community, cause together we're debugged the issue #update_app_to_login .
The facts:
- users on chinese ROMs like MIUI (xiaomi) or EMUI (huawei, most of cases)
- users on chinese phones but w/o chinese ROM does not face the issue (like me on Xiaomi Mi Mix 2 under LOS w/ android 11).
- users face this issue NOT only with graher, but also with with official bundles https://www.apkmirror.com/apk/telegram-fz-llc/telegram/telegram-8-8-5-release/ & https://www.apkmirror.com/apk/telegram-fz-llc/telegram/telegram-8-8-6-release/ (we're on "8.8.6" codeversion).
From my side i re-debugged login flow and made it maximum correct and legit as it looks.
But folks on huawei still faced the issue.
So, we're simply did this: we're changed the device.
Users on the Huawei swapped their devices via device spoofing to `Xiaomi`/`MI MIX 2`/`30` (30 for the OS).
And magically it worked fine.
So, if you just installed graher 8.85.x and you have this issue:
- find a NON-Huawei device, like this http://deviceinfohw.ru/devices/item.php?item=565947 (search on this website)
- clean the app using Kaboom or any APP MANAGER or simply reinstall it (cause it's reshly installed you risk nothing)
- go to app properties (android system menu)
- go to storage manage and you will see "cache cleaning UI" from the app
- go to graher menu at the bottom
- change BRAND, MODEL & OS
- kill the app (red button)
- REPEAT it till "go to graher menu" to check that the device is spoofed well
- START the APP and ADD your account!
If you did it all and you still face the error, please write on forum or in chat we'll debug it. Or just wait new release on 9.0.x telegram.
I pretty sure, as it work with a spoofing that it's server side issues.
Release 8.85.49 bundle
ㅤapp use data from BuildVars everywhere
ㅤlogin flow looks now pretty legit for me
this is the really last update fro 8.8.x. All next will for beta 9.0.x from now.
Github, the origin, CI/CD
CDN, copied from github manually
attached to this post also
Today i got multiple messages that ****ty avast mark us as `Evo-Gen`. Well, as you see 23/09 was nothing, today - we're the "virus".
For Avast team i have 2 recomendations:
check our source code and CI/CD on github
mark as `Evo-Gen` official Telegram client also if you ignore 1.
Spoiler: Screenshots

Development [ROM][lemonade][A13] iodéOS = LineageOS 20 + MicroG + adblocker [04/04/2023]

{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Introduction
iodéOS is a privacy-focused operating system powered by LineageOS and based on the Android mobile platform. iodéOS aims at protecting the user's privacy with a built-in adblocker and by freeing the smartphone from snitches.
The objectives in the conception of this ROM are threefold:
To keep the stability and security level of LineageOS, by minimizing the modifications made to the system. Apart the system modifications required by the adblocker, we mainly only added a few useful options commonly found in other custom ROMs, made some cosmetic changes, modified a few default settings to prevent data leaks to Google servers.
To ease a quick adoption of this ROM by new users. We especially target users that are concerned by the protection of their privacy, but are not reluctant to still use inquisitive apps like Google ones. We thus included MicroG as well as a coherent set of default apps (all open source, with one exception), and simplified the initial setup of the system. Particularly, an initialization of MicroG has been made with GCM notifications allowed by default, a privacy-friendly network location provider (DéjàVu) pre-selected, as well as Nominatim Geocoder.
To provide a new and powerful way of blocking ads, malwares, data leaks of all kinds to many intrusive servers. We are developing an analyzer, tightly integrated into the system, that captures all DNS requests and network traffic, as well as a user interface (the iodé app). Compared to some other well-known adblockers, this has the advantages of:
Avoiding to lock the VPN for that use. You can even use another adblocker that uses VPN technology alongside our blocker.
Being independent of the kind of DNS server used by the system or set by an independent app: classical DNS on UDP port 53 or any other one, DNS over TLS (DoT), DNS over HTTPS (DoH), ..., as we capture the DNS requests before they are transmitted to the system function that emits the DNS request. What we do not support, is DoH when it is natively built into applications, i.e. when an app communicates directly with a DoH server, without asking name resolution to the system. It would require to decrypt HTTPS packets between such an app and the DoH server, which may create a big security hole.
Precisely mapping DNS requests and network packets to the Android apps that emitted (or received) them.
Deciding which apps have a filtered network usage (by default, all apps), and which ones can communicate with blacklisted servers.
Since its first versions, we added many features to the iodé blocker: several levels of protection, fine-grained control over the hosts that should be blocked or authorized, displaying statistics on a map to see the quantity of data exchanged to which countries, clearing statistics... We are actively developing the blocker, and new functionalities will be regularly added.
Features
Changes in LineageOS to prevent data leaks:
Default DNS server: Google's DNS replaced by Quad9's 'unblocked' servers in all parts of the system.
A-GPS: patches to avoid leaking personnal information like IMSI to supl server.
Captive portal login: connectivitycheck.gstatic.com replaced by captiveportal.kuketz.de for connectivity check.
Dialer: Google default option replaced by OpenStreetMap for phone number lookup.
Pre-installed apps:
We included many useful default apps, but our choice cannot suit everyone; so we added the possibility to remove them. It can be done at the end of the phone setup, or at any time by going to Parameters -> Apps & Notifications -> Preinstalled apps.
MicroG core apps: GmsCore, GsfProxy, FakeStore.
NLP backends for MicroG : DejaVuNLPBackend (default), MozillaNLPBackend, AppleNLPBackend, RadioCellsNLPBackend, Nominatim Geocoder.
App stores : FDroid (with F-Droid Privileged Extension) and Aurora Store.
Browser: our own fork of Firefox (with Qwant as default search engine, many other ones added, telemetry disabled, parts of telemetry code removed) instead of Lineage’s default browser Jelly.
SMS: QKSMS instead of Lineage's default SMS app.
Email: p≡p (Pretty Easy Privacy).
Camera: our own fork of Open Camera, with a few tweaks.
Maps/navigation: Magic Earth GPS & Navigation (the only one free but not open source).
Keyboard: OpenBoard instead of AOSP keyboard.
PDF: Pdf Viewer Plus.
Personnal notes: Carnet.
{Ad/Malware/Data leak}-blocker: iodé.
News: to keep users informed about our developments, as well as a FAQ.
Meteo: Geometric Weather.
Pre-included FDroid repository:
The apps that we tweak or develop (microG services, the browser based on Firefox, the News app, Open Camera ...) are available through a repository that we included in FDroid (check the "Apps for iodéOS" category). For this purpose and to avoid name conflicts of some apps, we also had to make a few changes in FDroid.
Useful options from other custom ROMs:
Smart charging (disables charging when a given level is reached, to protect battery health).
Fingerprint vibration toggle.
Installation Instructions
To download and flash our latest build, see https://gitlab.com/iode/ota.
You can also find here direct links to the latest builds.
Supported devices
Fairphone FP3/FP3+
Fairphone FP4
Google Pixel 3
Google Pixel 4
Google Pixel 5
Google Pixel 6
Google Pixel 6a
OnePlus 9
OnePlus 9 Pro
Samsung Galaxy A5/A7 2017 (a5j17lte/a7j17lte)
Samsung Galaxy S9/S9+ (starlte/star2lte)
Samsung Galaxy Note 9 (crownlte)
Samsung S10e/S10/S10+ (beyond{0,1,2}lte)
Samsung Note 10 (d1)
Samsung Note 10+ (d2s)
Sony Xperia XA2 (pioneer)
Sony Xperia XZ1 (poplar)
Sony Xperia XZ2 (akari)
Sony Xperia XZ3 (akatsuki)
Xiaomi Mi9 (cepheus)
Teracube 2e
Xiaomi Mi 10T 5G / Mi 10T Pro 5G
Xiaomi Mi 10 Lite 5G
Sources
iodéOS: https://gitlab.com/iode/os
LineageOS: https://github.com/lineageos
device tree: https://gitlab.com/iode/os/public/devices/oneplus/device_oneplus_lemonade
https://gitlab.com/iode/os/public/devices/oneplus/device_oneplus_sm8350-common
kernel: http://github.com/LineageOS/android_kernel_oneplus_sm8350[/URL]
Bug Reporting
You can post a message in this thread or (preferred) open an issue here.
Credits
LineageOS is a free, community built, aftermarket firmware distribution of android, which is designed to increase performance and reliability over stock android for your device.
All the source code for LineageOS is available in the LineageOS Github repo. If you would like to contribute to LineageOS, please visit their Wiki for more details.
This ROM would be nothing without the tremendous work made on MicroG, and all the other open source apps that we included. We are very grateful to their authors.
Contributors
Direct contributors: @iodeOS, @vince31fr
Indirect contributors (too numerous to list): All the people that contributed to the device tree, to LineageOS, and to the included open source apps.
Sponsoring
You can help in the development of this ROM by paying us a coffee here: https://paypal.me/iodeOS.
Screenshots
Downloads :
iodéOS
04/04/2023 (build 20230401):
Installation procedure: move to a fastboot script (read instructions: https://gitlab.com/iode/ota)
Blocker: improved use of blocking lists (sub-domains blocking)
FDroid: fixes an issue on apps update
LineageOS synchronized with March security patch included
All apps updated
07/02/2023 (build 20230131):
Upgrade to iodéOS 4.0 based on Android 13 / LineageOS 20
Blocker:
Improved blocking settings. You can now choose 'Standard' blocking (ads, trackers, malwares, etc) or 'Reinforced' blocking (same objective but more extensive), and then select additional categories.
The 'Porn' category has been extended to a wider 'Sensitive content' one, that also includes fake news, gambling, drugs, piracy, torrent..., with mainly child protection in mind.
The 'Extreme' category has been removed, as it is now part of the reinforced blocking.
Improved blocking lists. We merge several acknowledged and up-to-date sources, and have diversified our sources to produce more complete lists. The standard list has however been reduced a bit, to avoid as much as possible interference with apps expected behavior.
Added a new network location provider: Local NLP Backend. It is an improved version of the DéjàVu NLP backend which was already available in iodéOS. Like DéjàVu, it builds a local database connecting localizations learned from other NLP backends and apps using GPS, and mobile antennas/Wifi; but also has an active mode (not preselected) that can trigger GPS requests. To configure it: Settings -> System -> microG -> Location modules
LineageOS synchronized with January security patch included
All apps updated
New devices support: Pixel 3, 6, 6a
16/12/2022 (build 20221215):
Blocker: added multiple selection in settings / domain customization. Long-press on a domain, select several domains or all, apply actions (block all, authorize all...)
PdfViewerPlus: improved security by updating core libraries
Network settings: added a switch to disable connectivity check (and thus captive portal detection)
LineageOS synchronized with December security patch included
All apps updated
New devices support: Pixel 4 & 5, OnePlus 9 & 9 Pro
10/12/2022 (build 20221210): initial publicly available build of iodéOS for OnePlus 9.
for oneplus 9pro please
bluebirdsysx said:
for oneplus 9pro please
Click to expand...
Click to collapse
I am with you on that one. Need this rom for Oneplus 9pro @vince31fr really enjoyed on samsung 9+.
break.cold said:
I am with you on that one. Need this rom for Oneplus 9pro @vince31fr really enjoyed on samsung 9+.
Click to expand...
Click to collapse
bluebirdsysx said:
for oneplus 9pro please
Click to expand...
Click to collapse
soon !
vince31fr said:
soon !
Click to expand...
Click to collapse
great.
Thank you so much... been trying to do MicroG on my own but can be confusing trying to figure it all out and where to go for the various items needed. Glad to see all in one and will try this with excitement! Coming from an Android 13 custom rom should be no issues if I follow instructions correct?
lorilucille9 said:
Thank you so much... been trying to do MicroG on my own but can be confusing trying to figure it all out and where to go for the various items needed. Glad to see all in one and will try this with excitement! Coming from an Android 13 custom rom should be no issues if I follow instructions correct?
Click to expand...
Click to collapse
This should be work yes. The low-level A12 firmware is embedded in the ROM, so it should be flashable in any situation.
bluebirdsysx said:
for oneplus 9pro please
Click to expand...
Click to collapse
break.cold said:
great.
Click to expand...
Click to collapse
There is an untested blind build for 9 pro here:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.3-20221212-lemonadep.zip
Recovey:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.3-20221212-lemonadep-recovery.img
dtbo:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.3-20221212-lemonadep-dtbo.img
Use at your own risk!
vince31fr said:
There is an untested blind build for 9 pro here:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.3-20221212-lemonadep.zip
Recovey:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.3-20221212-lemonadep-recovery.img
dtbo:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.3-20221212-lemonadep-dtbo.img
Use at your own risk!
Click to expand...
Click to collapse
Will try. Great
break.cold said:
Will try. Great
Click to expand...
Click to collapse
New version:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.4-20221215-lemonadep.zip
Recovey:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.4-20221215-lemonadep-recovery.img
dtbo:
https://github.com/vincentvidal/iode_ota/releases/download/v1/iode-3.4-20221215-lemonadep-dtbo.img
Did someone try the previous build ?
vince31fr said:
Did someone try the previous build ?
Click to expand...
Click to collapse
I tried. Battery life was poor and smoothness with performance it's bit more optimzation.
If you don't mind can you upload on Oneplus 9 Pro forum you will get more users than over here.
*** New Update : 16/12/2022 ***
Available as OTA (see OP)​
Hello
Would you write installation instructions? Follow the steps one by one. Oneplus 9 12/256, My current system: Android 12.1
Waiting for help. Pls.
Numberslevin said:
Hello
Would you write installation instructions? Follow the steps one by one. Oneplus 9 12/256, My current system: Android 12.1
Waiting for help. Pls.
Click to expand...
Click to collapse
Instructions for op9 are already here, read OP
vince31fr said:
Instructions for op9 are already here, read OP
Click to expand...
Click to collapse
Thank you.
Hello
Does this system have call recording?
Numberslevin said:
Hello
Does this system have call recording?
Click to expand...
Click to collapse
yes
vince31fr said:
Introduction
iodéOS is a privacy-focused operating system powered by LineageOS and based on the Android mobile platform. iodéOS aims at protecting the user's privacy with a built-in adblocker and by freeing the smartphone from snitches.
The objectives in the conception of this ROM are threefold:
To keep the stability and security level of LineageOS, by minimizing the modifications made to the system. Apart the system modifications required by the adblocker, we mainly only added a few useful options commonly found in other custom ROMs, made some cosmetic changes, modified a few default settings to prevent data leaks to Google servers.
To ease a quick adoption of this ROM by new users. We especially target users that are concerned by the protection of their privacy, but are not reluctant to still use inquisitive apps like Google ones. We thus included MicroG as well as a coherent set of default apps (all open source, with one exception), and simplified the initial setup of the system. Particularly, an initialization of MicroG has been made with GCM notifications allowed by default, a privacy-friendly network location provider (DéjàVu) pre-selected, as well as Nominatim Geocoder.
To provide a new and powerful way of blocking ads, malwares, data leaks of all kinds to many intrusive servers. We are developing an analyzer, tightly integrated into the system, that captures all DNS requests and network traffic, as well as a user interface (the iodé app). Compared to some other well-known adblockers, this has the advantages of:
Avoiding to lock the VPN for that use. You can even use another adblocker that uses VPN technology alongside our blocker.
Being independent of the kind of DNS server used by the system or set by an independent app: classical DNS on UDP port 53 or any other one, DNS over TLS (DoT), DNS over HTTPS (DoH), ..., as we capture the DNS requests before they are transmitted to the system function that emits the DNS request. What we do not support, is DoH when it is natively built into applications, i.e. when an app communicates directly with a DoH server, without asking name resolution to the system. It would require to decrypt HTTPS packets between such an app and the DoH server, which may create a big security hole.
Precisely mapping DNS requests and network packets to the Android apps that emitted (or received) them.
Deciding which apps have a filtered network usage (by default, all apps), and which ones can communicate with blacklisted servers.
Since its first versions, we added many features to the iodé blocker: several levels of protection, fine-grained control over the hosts that should be blocked or authorized, displaying statistics on a map to see the quantity of data exchanged to which countries, clearing statistics... We are actively developing the blocker, and new functionalities will be regularly added.
Features
Changes in LineageOS to prevent data leaks:
Default DNS server: Google's DNS replaced by Quad9's 'unblocked' servers in all parts of the system.
A-GPS: patches to avoid leaking personnal information like IMSI to supl server.
Captive portal login: connectivitycheck.gstatic.com replaced by captiveportal.kuketz.de for connectivity check.
Dialer: Google default option replaced by OpenStreetMap for phone number lookup.
Pre-installed apps:
We included many useful default apps, but our choice cannot suit everyone; so we added the possibility to remove them. It can be done at the end of the phone setup, or at any time by going to Parameters -> Apps & Notifications -> Preinstalled apps.
MicroG core apps: GmsCore, GsfProxy, FakeStore.
NLP backends for MicroG : DejaVuNLPBackend (default), MozillaNLPBackend, AppleNLPBackend, RadioCellsNLPBackend, Nominatim Geocoder.
App stores : FDroid (with F-Droid Privileged Extension) and Aurora Store.
Browser: our own fork of Firefox (with Qwant as default search engine, many other ones added, telemetry disabled, parts of telemetry code removed) instead of Lineage’s default browser Jelly.
SMS: QKSMS instead of Lineage's default SMS app.
Email: p≡p (Pretty Easy Privacy).
Camera: our own fork of Open Camera, with a few tweaks.
Maps/navigation: Magic Earth GPS & Navigation (the only one free but not open source).
Keyboard: OpenBoard instead of AOSP keyboard.
PDF: Pdf Viewer Plus.
Personnal notes: Carnet.
{Ad/Malware/Data leak}-blocker: iodé.
News: to keep users informed about our developments, as well as a FAQ.
Meteo: Geometric Weather.
Pre-included FDroid repository:
The apps that we tweak or develop (microG services, the browser based on Firefox, the News app, Open Camera ...) are available through a repository that we included in FDroid (check the "Apps for iodéOS" category). For this purpose and to avoid name conflicts of some apps, we also had to make a few changes in FDroid.
Useful options from other custom ROMs:
Smart charging (disables charging when a given level is reached, to protect battery health).
Fingerprint vibration toggle.
Installation Instructions
To download and flash our latest build, see https://gitlab.com/iode/ota.
You can also find here direct links to the latest builds.
Supported devices
Fairphone FP3/FP3+
Fairphone FP4
Google Pixel 4
Google Pixel 5
OnePlus 9
OnePlus 9 Pro
Samsung Galaxy A5/A7 2017 (a5j17lte/a7j17lte)
Samsung Galaxy S9/S9+ (starlte/star2lte)
Samsung Galaxy Note 9 (crownlte)
Samsung S10e/S10/S10+ (beyond{0,1,2}lte)
Samsung Note 10 (d1)
Samsung Note 10+ (d2s)
Sony Xperia XA2 (pioneer)
Sony Xperia XZ1 (poplar)
Sony Xperia XZ2 (akari)
Sony Xperia XZ3 (akatsuki)
Xiaomi Mi9 (cepheus)
Teracube 2e
Xiaomi Mi 10T 5G / Mi 10T Pro 5G
Xiaomi Mi 10 Lite 5G
Sources
iodéOS: https://gitlab.com/iode/os
LineageOS: https://github.com/lineageos
device tree: https://gitlab.com/iode/os/public/devices/oneplus/device_oneplus_lemonade
https://gitlab.com/iode/os/public/devices/oneplus/device_oneplus_sm8350-common
kernel: http://github.com/LineageOS/android_kernel_oneplus_sm8350[/URL]
Bug Reporting
You can post a message in this thread or (preferred) open an issue here.
Credits
LineageOS is a free, community built, aftermarket firmware distribution of android, which is designed to increase performance and reliability over stock android for your device.
All the source code for LineageOS is available in the LineageOS Github repo. If you would like to contribute to LineageOS, please visit their Wiki for more details.
This ROM would be nothing without the tremendous work made on MicroG, and all the other open source apps that we included. We are very grateful to their authors.
Contributors
Direct contributors: @iodeOS, @vince31fr
Indirect contributors (too numerous to list): All the people that contributed to the device tree, to LineageOS, and to the included open source apps.
Sponsoring
You can help in the development of this ROM by paying us a coffee here: https://paypal.me/iodeOS.
Screenshots
Click to expand...
Click to collapse
there is no vendor_boot.img which is ranked 5th in the install configs. How can I be procured?
fastboot flash vendor_boot <recovery for OnePlus 9 | Recovery for OnePlus 9 Pro>
incesu571 said:
there is no vendor_boot.img which is ranked 5th in the install configs. How can I be procured?
fastboot flash vendor_boot <recovery for OnePlus 9 | Recovery for OnePlus 9 Pro>
Click to expand...
Click to collapse
It is the file containing 'recovery' in its name.

Categories

Resources