Keep apps running in background via crond - Android Software/Hacking General [Developers Only]

Hello all,
I have a feeling I am not the only one who is bothered by this problem. You have apps that, for various reasons, you want to keep running in the background no matter what. I have at least a couple of these apps for example:
Surfshark - so VPN stays active on my phone
CNN - for some reason if the process is killed, I don't get any news notifications
A well behaved app that is supposed to stay running in the background will revive itself even after you deliberately close them by pressing the home screen square icon then tapping 'x' (to close all apps). And yes, like many (presumably anyway) I have a habit of cleaning up all running apps from time to time by doing the square icon + 'x' combo. But some apps are not written as well as others I guess, and the two apps I mentioned above both have difficulty keeping themselves alive, even with autostart switch on, battery optimization disabled..... even after I systemize them (with the magisk systemizer module).
Well I finally decided to do something about it.
This script below is what I have written to check whether these 2 apps are alive, and start them if not.
Spoiler: Script
#!/bin/sh
#This script force starts apps even if they don't know how to start themselves
SCREEN_UNLOCKED="true"
SURFSHARK_RUNNING="android"
CNN_RUNNING="phone"
LAST=`dumpsys power | grep 'mHolding' | grep true | tail -c5`
if [ "$LAST" != "$SCREEN_UNLOCKED" ];then
#Screen is locked, do the magic
LAST=`ps -ef | grep shark | grep android | tail -c8`
if [ "$LAST" != "$SURFSHARK_RUNNING" ];then
am start -n com.surfshark.vpnclient.android/com.surfshark.vpnclient.android.StartActivity
am start -a android.intent.action.MAIN -c android.intent.category.HOME
fi
LAST=`ps -ef | grep cnn | grep phone | tail -c6`
if [ "$LAST" != "$CNN_RUNNING" ];then
am start -n com.cnn.mobile.android.phone/.features.splash.SplashActivity
am start -a android.intent.action.MAIN -c android.intent.category.HOME
fi
fi
With this script, all I need is a cron daemon to execute it at regular intervals. Even after searching elsewhere in XDA however I couldn't figure out a way to get the 'crond' that comes with Magisk busybox to work properly. People mention about using post-fs-data.d to start crond at boot... no joy. And even after starting crond manually, for some reason the script above ends up not doing what it is supposed to. Of course when I manually run the script it works.
I then found out about an app in the F-Droid store called... you guessed it... 'crond'. This seems to work really well after I've set it up (and I went ahead to systemize it although I am not sure if that's necessary).
So now I have a more consistently active VPN, and CNN alerts me whenever there is breaking news. All good.
Hope this helps someone out there. BTW I am a total noob at writing scripts, so I am sure it can be written a whole lot better.
Edit: I just realized for some strange reason, on my phone this seems to work only when it is not being charged...

Update:
Forget the f-droid app. That app simply doesn't work 100%. I'd say don't even bother using it.
So I was back on making the actual crond daemon work. I also ended up changing the script a bit. Now it is rock solid:
1. I modified the script a little (instead of mHolding I changed it to mHoldingDisplay):
Spoiler: Modified Script
#!/bin/sh
#This script force starts apps even if they don't know how to start themselves
SCREEN_UNLOCKED="true"
SURFSHARK_RUNNING="android"
CNN_RUNNING="phone"
LAST=`dumpsys power | grep 'mHoldingDisplay' | grep true | tail -c5`
if [ "$LAST" != "$SCREEN_UNLOCKED" ];then
#Screen is locked, do the magic
LAST=`ps -ef | grep shark | grep android | tail -c8`
if [ "$LAST" != "$SURFSHARK_RUNNING" ];then
am start -n com.surfshark.vpnclient.android/com.surfshark.vpnclient.android.StartActivity
am start -a android.intent.action.MAIN -c android.intent.category.HOME
fi
LAST=`ps -ef | grep cnn | grep phone | tail -c6`
if [ "$LAST" != "$CNN_RUNNING" ];then
am start -n com.cnn.mobile.android.phone/.features.splash.SplashActivity
am start -a android.intent.action.MAIN -c android.intent.category.HOME
fi
fi
2. Credits to https://stackoverflow.com/questions/16747880/how-to-use-crontab-in-android for making crond work for android. Basically I had to do the following:
Spoiler: Do this once
/system/xbin/mount -o remount,rw /
/system/xbin/ln -s /system/bin/ /bin
echo 'root:x:0:0:root:/data:/system/bin/sh' > /system/etc/passwd
/system/xbin/mount -o remount,ro /
This will allow crond to work for android devices apparently.
3. Make crond start at boot
Create a file 'start_crond.sh' at /data/adb/post-fs-data.d/ , with the following content:
Spoiler: Shell Script
#!/bin/sh
crond -c /data/crontabs/
With that I believe you are good to go.

Related

[TWEAK]Improve Performance and battery by Saving Power Usage - app, update.zip added

Hey Guys,
I have found this tweak on the G1 forums posted by defconoi.
One Click APP for the following tweak by dympy - Download
Update.zip for the following tweak by pcz - Download
When echoing in the following sysctl settings they do not remain after reboot, so we can adb remount then create a sysctl.conf file on our pc's with these settings, then ./adb push sysctl.conf /etc/ then the kernel should apply the settings every reboot.
Open a Terminal and Execute these commands as root
Tweak virtual memory to conserve power when running on battery:
Code:
echo 0 > /proc/sys/vm/swappiness #can be ignored if you dont use swap
echo 0 > /proc/sys/vm/dirty_expire_centisecs #can be ignored if you dont use swap
echo 0 > /proc/sys/vm/dirty_writeback_centisecs #can be ignored if you dont use swap
echo 60 > /proc/sys/vm/dirty_background_ratio
echo 95 > /proc/sys/vm/dirty_ratio
Tweak virtual memory for running on Charger:
Code:
echo 0 > /proc/sys/vm/swappiness #can be ignored if you dont use swap
echo 3000 > /proc/sys/vm/dirty_expire_centisecs #can be ignored if you dont use swap
echo 500 > /proc/sys/vm/dirty_writeback_centisecs #can be ignored if you dont use swap
echo 10 > /proc/sys/vm/dirty_background_ratio
echo 40 > /proc/sys/vm/dirty_ratio
Detecting apps/services that hog the battery/cpu:
Also while on battery, you should stop all applications that don't really stay idle when you're not using them, if you want to find which apps arent really staying idle you can:
Code:
strace -p $(pidof yourapp) # for all your running applications
ps aux | awk '{print$10,$11}' | sort -n # will list all running softs sorted by used cpu time
By default when Linux runs out of memory it goes through the process list and starts killing off processes that it thinks are using too much memory. This sysctl makes Linux kill the runaway process that made the system run out of memory instead, which is usually what you want.(this will also reduce cpu time and increase battery usage).
Code:
sysctl -w vm.oom_kill_allocating_task=1
Credit: ccpp0
vfs_cache_pressure to 10 , gives more mem to cache fs dentry and inode to save cpu
At the default value of vfs_cache_pressure = 100 the kernel will attempt to reclaim dentries and inodes at a "fair" rate with respect to pagecache and swapcache reclaim. Decreasing vfs_cache_pressure causes the kernel to prefer to retain dentry and inode caches. Increasing vfs_cache_pressure beyond 100 causes the kernel to prefer to reclaim dentries and inodes.
Code:
sysctl -w vm.vfs_cache_pressure=10
I have not tested these yet, if you test them, please post on the thread, so others can benefit from the same
fact : i?m a newb and i do not know if what i'm about to say is possible / compatible with this trhead,
question: can you make a update.zip of this?
+1 on update.zip
Yes. An update.zip would be nice.
Hope some DEV can take a look in to this it looks very useful and a good thing to implement in Future roms
Will dis work on ma galaxy 5???
Sent from my Galaxy5 Cyanogen7 using XDA Premium App
I don't know how to create an update.zip from this.
But since it's all terminal codes, I can put them in an app with separate buttons for each of them. (if I'm right, the Runtime.exec("the line you want to execute"); Or something into that direction (it works for other adb shell commands))
If anyone's interested, let me know.
Dympy
yup if you can do it like one click that would be nice
Sure thing!
Just going to make my last exams today and then I will get started (but first I'll finish another little project I'm working on).
Dympy
dympy said:
Sure thing!
Just going to make my last exams today and then I will get started (but first I'll finish another little project I'm working on).
Dympy
Click to expand...
Click to collapse
gr8...all the best
School network was down, so the exam couldn't be done.
Anyhow, I assume you'll need Super User for this?
I'm making the app right now and will upload in about an hour or so.
Will report then.
Dympy
Howw nice man good luck with it i will be on to check it and Thanks
I'm having some errors building the code.
Never had them before..
Will google something and retry.
Dympy
Has anyone tried this manually?
as long as it works take your time
I can build again.
The name of the project was given trouble.
The app will be very basic but needs super user permission (prompted when started).
It consists of 4 buttons.
2 for when the phone is on battery and 2 for when the phone is on charger.
Both set of buttons consist of a version WITH swap enabled and one WITHOUT swap enabled.
But ron_gangte is right, has someone even mentioned if it worked?
Dympy
dympy said:
I can build again.
The name of the project was given trouble.
The app will be very basic but needs super user permission (prompted when started).
It consists of 4 buttons.
2 for when the phone is on battery and 2 for when the phone is on charger.
Both set of buttons consist of a version WITH swap enabled and one WITHOUT swap enabled.
But ron_gangte is right, has someone even mentioned if it worked?
Dympy
Click to expand...
Click to collapse
It is a part of my battery saver ROM
I used tweak virtual memory to conserve power when running on battery
Alright then, I'm going to add the final onclicks for the buttons, build and upload.
Give me half an hour MAX
Dympy
dympy said:
Alright then, I'm going to add the final onclicks for the buttons, build and upload.
Give me half an hour MAX
Dympy
Click to expand...
Click to collapse
take how much time you need...
thanks for doing this
Good work

[SOLVED] Mount a smb/cifs share

Thank you in advance if you can help with this, unfortunately I'm not going to be able to follow through with this very well at the moment. If this gets no attention I'll bump it when I can follow through.
I want to mount a smb/cifs share from my router to my Nexus 5.
I can successfully mount the share and view it in terminal but none of it shows up in any apps...and that's pretty much my issue.
Here's some unimportant info, and a little info about me, I'm as scatterbrained as they come. The reason I want to do this is to stream my movies on the "NAS" to my Chromecast through Allcast or something.
As of now I'm using an entware mini dlna package on the router to stream everything to Avia. My problem is dlna broadcasts all my media to my entire network...no password required or anything. Also accessing my files through Avia is a pain in the ass, navigating through the folders repetitively gets exhausting.
Here's what I've come up with so far:
I'm using hammerhead-faux123-010m kernel, and SlimRC3.
CIFS DebugData:
Code:
CIFS Version 1.78
Features: posix xattr
Active VFS Requests: 0
Servers:
1) Name: 192.168.1.1 Domain: WORKGROUP Uses: 1 OS: Unix
NOS: Samba 3.0.37 Capability: 0x80e3fd
SMB session status: 1 TCP status: 1
Local Users To Server: 1 SecMode: 0x3 Req On Wire: 0
Shares:
1) \\192.168.1.1\NAS Mounts: 1 Type: NTFS DevInfo: 0x0 Attributes: 0xf
PathComponentMax: 255 Status: 0x1 type: 0
MIDs:
The disk is actually Ext3, not NTFS.
This guy kinda just crushed all my hopes and dreams of the future but I'm trying to use his OneClickMount alpha app.
http://forum.xda-developers.com/showpost.php?p=49651026&postcount=127
app here:
http://forum.xda-developers.com/showpost.php?p=49693815&postcount=129
This is what I have tried, I ended up with the same results:
Code:
[email protected]:/storage/emulated/0/cifs # setenforce Permissive
[email protected]:/storage/emulated/0/cifs # getenforce
Permissive
[email protected]:/storage/emulated/0/cifs # mount -r -o noperm,rw,file_mode=777,dir_mode=777,uid=1023,gid=1023,unc=\\\\192.168.1.1\\NAS,username=***,password=*** -t cifs none /storage/emulated/0/cifs
[email protected]:/storage/emulated/0/cifs # ls
My Music
My Pictures
My Videos
Torrents
Then I tried OneClick Mount app:
https://www.dropbox.com/sh/muabb9vp1i8ubxt/o78FSYMcHo
From what I can tell from the app logcat, the app tries to move the debuggered file, create its own with a chosen command inside, start then stop it, and restart the original.
I might try to do this manually later, as in a month from now at the least. I'm pretty sure a certain someone is pissed off at me for not becoming one with the universe n all that jazz.
I'm gonna leave a couple links here so I can delve into them later, they seem to have crazy amounts of useful information:
[HINT] How Stickmount (and others...) are working with Android 4.2
Debuggered script
Sincerely, Head is spinning
Sorry but as of android 4.4.2 CIFS at a device level (all accounts see the network shares) no longer works and no one has a solution. This includes rooted devices and custom Roms. Of course apps such as ES File Explorer can have network share accesses but not all apps can utilize that access. For example MX player can be invoked from an ES file folder by clicking on a video file but apps like PowerAmp cannot see those folders. Some apps include built in network share features but they have the same restrictions as I previously described.
Things all changed when Android included multiple accounts and security started to get tighter. Initially developers found ways around those measures but too my knowledge, with 4.4.2 no one has found a work around.
Sent from my Nexus 10 using XDA Premium HD app
3DSammy said:
Things all changed when Android included multiple accounts and security started to get tighter. Initially developers found ways around those measures but too my knowledge, with 4.4.2 no one has found a work around.
Sent from my Nexus 10 using XDA Premium HD app
Click to expand...
Click to collapse
One workaround is hijack a system process such as debuggerd (debugger daemon) which runs with higher than su permissions. This method still works but is awkward to exploit manually. Apps such as foldermount use this workaround but not for network mounting, but it shows that it is still possible.
I have a Raspberry Pi running OpenELEC for streaming my locally stored media. I use my Chromecast for streaming Netflix, Google Play media, etc.
I understand what you are trying to do, but a dedicated device works great for me.
That said, you might keep an eye on VLC to see if they start supporting casting to Chromecast. That would likely accomplish what you are asking.
rootSU said:
One workaround is hijack a system process such as debuggerd (debugger daemon) which runs with higher than su permissions. This method still works but is awkward to exploit manually. Apps such as foldermount use this workaround but not for network mounting, but it shows that it is still possible.
Click to expand...
Click to collapse
This is what I'm going to attempt next, from what I read it can be terribly inconsistent if not done through SSH, so that's a bummer. I just need to get more information on how to do it. Debuggered in general confuses me.
embhorn said:
I have a Raspberry Pi running OpenELEC for streaming my locally stored media. I use my Chromecast for streaming Netflix, Google Play media, etc.
I understand what you are trying to do, but a dedicated device works great for me.
That said, you might keep an eye on VLC to see if they start supporting casting to Chromecast. That would likely accomplish what you are asking.
Click to expand...
Click to collapse
This is what I've been wanting to do with my old Galaxy Nexus. I have the HDMI adapter and everything but the screen is broke (the digitizer works), so I plug it into my TV and randomly hit the screen hoping to eventually connect my bluetooth mouse lol. No such luck. I wish I could just boot it into a custom build but that's never gonna happen. Unless OpenELEC works on android devices? Seems unlikely.
debuggerd can be replaced with a shell script with the mount command in it and it will run at boot.
It's really messy. I found I had to put the original debuggerd back or the phone would lock up.
Sent from my Nexus 5 using Tapatalk
WEEEEEOOOOOOO I finally got all my stuff to show in a file manager, now I just need to find a terminal command to trigger media scan on the folder. Right after I eat a bunch of chicken.
Awesome, it works perfectly. And by perfectly I mean it's the messiest thing I've ever done on Android. I'm not really sure how this affects battery and all but thank god this finally works.
For anyone interested:
Follow the directions in this post.
I didn't understand the mount command he used so I used
Code:
/system/xbin/busybox mount -r -o noperm,rw,file_mode=777,dir_mode=777,uid=1023,gid=1023,unc=\\\\192.168.1.1\\NAS,username=***,password=*** -t cifs none /data/media/0/cifs
You also need to use /data/media/0/ otherwise it will only work in already opened apps apparently.
So thanks rootSU...And that should work, I'm going to do it in a way where I don't have to use scriptmanager but that's the gist. All the credit goes to the people in the threads I linked, I have absolutely no idea what I did here and I learned nothing.
Nothing special to see here. :good:
Here's a way to unmount it so it doesn't explode your apps when you disconnect WiFi:
/system/bin/debuggerd.binnn
Code:
#!/system/bin/sh
/system/bin/umount_movies.sh
exec /system/bin/debuggerd.bin "[email protected]"
/system/bin/umount_movies.sh
Code:
#!/system/bin/sh
/system/xbin/busybox umount /data/media/0/cifs
/system/xbin/busybox umount -r -o noperm,rw,file_mode=777,dir_mode=777,uid=1023,gid=1023,unc=\\\\192.168.1.1\\NAS,username=***,password=*** -t cifs none /data/media/0/cifs
Script_eject.sh
Code:
#!/system/bin/sh
mount -o rw,remount /system
sleep1
/system/xbin/busybox mv /system/bin/debuggerd /system/bin/debuggerd.binn
sleep 1
/system/xbin/busybox mv /system/bin/debuggerd.binnn /system/bin/debuggerd
sleep 1
mypid=$(/system/xbin/busybox ps -o pid,comm | /system/xbin/busybox grep 'debuggerd' | /system/xbin/busybox awk 'NR == 1 {print $1}')
/system/bin/kill $mypid
sleep 1
/system/xbin/busybox mv /system/bin/debuggerd /system/bin/debuggerd.binnn
sleep 1
/system/xbin/busybox mv /system/bin/debuggerd.binn /system/bin/debuggerd
sleep 1
mount -o ro,remount /system
I'm automating all this with Tasker.
Script task: (I have it run at boot)
waits 15 seconds
run shell command to kill debuggerd
wait 5 seconds
media action scan card /
Script_eject task: (I have it run when I disconnect from my SSID)
run shell command with the script_eject.sh code
wait 6 seconds
media scan card /
It has been seamless so far, also lol.
sendan said:
For anyone interested:
Follow the directions in this post....
Click to expand...
Click to collapse
I have yet to try your solution but what Rom and kernel do you have installed? I ask because in the past (Android 4.1) you needed a custom kernel that supported CIFS or you needed to add modules to stock.
I'm using rooted stock, Franco Kernel.
Sent from my Nexus 10 using XDA Premium HD app
3DSammy said:
I have yet to try your solution but what Rom and kernel do you have installed? I ask because in the past (Android 4.1) you needed a custom kernel that supported CIFS or you needed to add modules to stock.
I'm using rooted stock, Franco Kernel.
Sent from my Nexus 10 using XDA Premium HD app
Click to expand...
Click to collapse
I'm on the latest Slim, with latest faux kernel. Faux has cifs modules built in, I'm not sure about Slim or Franco kernel. If you have a cifs folder in /proc/fs I assume that means the kernel has the cifs modules.

[TUTO] How To Secure Your Phone

INTRODUCTION​
There was a time where “enlightned” people used to make fun of guys like me:
paranoid, conspirationist, tin foil hat, ha ha ha!
The thing is that there has never been any conspiracy theory, it's a term invented by those in power to ridicule people exposing their treacheries.
A conspiracy is a plot aimed at overthrowing a king or a government so how could those in power make any conspiracy against the people, us, since we are not in power?
A theory is something that has not been proven and well, after the Snowden's revelations things have been made clear, so long for the “conspiracy theory”.
The enlightened stopped laughing and started to realise what's going on, and that their dear government and their beloved google were not such a nice bunch to say the least.
Nowadays more and more people wake up and understand that their phones are heartlily spied upon and data mined all the time, and I decided to write a tutorial about how to gain back one's privacy on one's phone.
Remember, Android has not been build with privacy in mind and everybody wants our data, cuz data means money and money has been driving, is driving and will be driving humanity for a long time.
In a way it's ok if one doesn't mind ads and spams, one has to bear in mind that nothing comes for free and the costs to develop an app like let's say what's app or to maintain a site like facebook are huge so the money has to come from somewhere (as some say, if it's free than you are the product).
Plus, one is allways free not to use them, but unfortunately one needs an OS (google), and one needs an oem to manufacture the phone.
Then comes power, it has been driving humanity for even longer than money.
As @CHEF-KOCH said, data means knowledge and knowledge means power. In the past it was a hard task to manually gather data about people and one can easily understand that the present huge data sum that's on the web is of very significative importance for the agencies.
So of course they pressure google, facebook, apple, microsoft and the others to get access to your data, from their point of view it makes sense.
I have nothing to hide but as a matter of principle I have allways tried my best to be in control, and I have to admit that it's fun and interesting too, one learns many things in the process.
I don't know everything (who does anyway?) and everyone is welcome to add some more infos on the subject, let's share our privacy settings!!!
Let's start, with a brand new phone...
I - THE BASICS​
1 - Don't give your real name when you buy a new phone (it sounds obvious but many people don't even think about it), and pay in cash in order not to leave any traces.
2 - Second, don't give your real name when you buy a SIM.
3 - DO NOT put any SIM in the phone for now, DO NOT connect to the internet through WIFI, and put your phone in plane mode. You'll be able to connect after you're done and secure.
4 - Root and install Busybox, flash a custom recovery (I won't cover that part, search the forum and you'll find all what you need).
5 – Let the fun begin, uninstall as many stock apps as you can!
Don't think that installing a custom ROM like AOSP or CM would be any better than your stock ROM privacy wise, custom ROMs don't have OEM bloatware but when it comes to privacy, data mining and outrageous system apps' permissions they are exactly the same than stock ROMs.
Before you start your uninstalling job, download Aroma File manager from here:
http://forum.xda-developers.com/showthread.php?t=1646108
Put it on your SD.
It will enable you, in case you get a bootloop, to push back from recovery the file (s) you removed that caused the bootloop, instead of restoring your backup and loosing all the work you did.
TWRP has a built in file manager that does the same, just make sure you have /system and /data mounted in the settings.
Uninstall gradually.
Start with the google apps and the OEM bloatware, reboot and see how it goes. If everything is ok then uninstall more stuff, again reboot and see how it goes, and keep on doing it until you feel it's ok.
You'll be wise, everytime you uninstall a bunch of apps, to copy them first on your SD and label it something like apps1, apps2 etc.
Now read carefully the folowing about safe to remove apps, in order you to know more precisely what can be done, and you will see that my phone works with only 10 system apps left.
(Tested on Samsung Mega I9200 XXUAMEE running JB 4.2.2)​
I removed more than 150 system apks, and my Mega works like a charm.
You will notice that the google apks are missing, and that the contacts, video player, music player, file manager etc. are missing as well, I removed them because I don't like the way they spy on us and suck our private data. No worries, just keep on reading for some alternative apks...
IMPORTANT​
1 - Before deleting any app do a Nandroid back up, and do a back up of your system/app folder (where all the system apps are) in case you want to reinstall a specific app later.
2 - If you decide to uninstall the filemanager apk, install first an alternative file manager, like let's say Ghost Commander, because if you don't then you won't have any app anymore to navigate to your files after having uninstalled the file manager.
Same story with the launcher, or you will get a bootloop.
3 - After you uninstalled all the apps do a cache and a dalvik cache wipe.
4 - Reboot and enjoy full speed and no lags, and 1% battery decrease every 10-12 hours when in stand by!!!
5 - Go to the data/data folder and erase the folders from the removed apps, or use SD Maid or whatever similar app to do it for you (you don't need to do it if you are on JB 4.2 or later since the system will take care of it for you when you reboot)..
IMPORTANT 2​
Do not mess with system apps if you don't know what you are doing and if you don't know how to get back to the beginning in case things go wrong.
I won't take any responsability for any damage caused to your phone. All what I mention below has worked for me but once more, do not play with your system unless you know how to recover if things get out of control.
SAFE TO REMOVE APPS​
Rather than giving a list of removed apps I will list here the apps I didn't remove, so that you can assume that any app that is not on the list is safe to remove. I do so because it's faster to list the remaining apps than the removed ones...
So, here are the apps I kept (I have to admit that it's a bit extreme, and you are of course not obliged to keep so few apps, but at least you'll know which ones are safe to remove):
-Default Container Service
-Fused Location
-Hybrid Radio (removable if radio is not your thing)
-Job Manager (the task manager)
-Package Access Helper
-Sec Phone
-Sec Settings
-Sec Settings Provider
-Sec Telephony Provider
-System UI
- Note -​If you delete the Media Provider apk you won't be able to change your ringtone and your notification tone anymore (not a big deal for me but I don't know for you), and you will be stucked with the default tones. To change them manually you'll have to open the res/raw folder in framework-res.apk and replace the default tones with your own, not a big deal.
If you delete the camera then some third part cameras won't work, but A Better Camera does.
If you delete the MTP apk your device won't be detected by your computer anymore, use SG USB Mass Storage Enabler or something similar (only works on the external SD).
You can delete VPN Dialogs but then you won't have VPN access anymore.
ALTERNATIVE APPS​- Play Store:
F-Droid offers open source apps and you'll find almost all what you need there. If you can't live without apps from the pay store download them on your computer using Racoon (found in XDA's games and apps section).
- Launcher:
Holo Launcher HD (very low RAM consumption and plenty of customisation), or ADW (open source up to v 1.3.6 standalone, found on F-Droid), but install it before you uninstall your stock launcher!
- Keyboard:
I use a modded Xperia keyboard but there are many others (install it as a /system app otherwise you may have problems if you encrypt your phone). Beware of Swift and Touch Pad, they have many outrageous permissions and are difficult to restrict.
- SMS:
Text Secure (open source), up to v 1.0.6.
- Bluetooth:
if you use it for speakers or headphones keep it, but if you use it only to transfer files then uninstall it and use Fast File Transfer (it works without WIFI connection and it's MUCH faster than the Bluethooth) and/or any open source FTP app (like Swiftp for example, but such apps require an active internet connection) instead.
- Contacts:
before to uninstall it back up your contacts, then install any third part contacts app. As for me, I made a file with all my contacts in alphabetical order and copied it as a note in Clipnote apk (a clipboard manager), and when I need to call someone I just have to click on the phone number within the file and it opens in the dialer.
- Dialer:
since Logs Provider has been uninstalled you probably don't have any more dialer, just install any third part dialer that you like.
- Video:
VLC. (open source)
- File manager:
Ghost Commander (open source, dual panel mode, root browser and more).
- Music player:
I like Gone Mad Music Player but VLC does the trick too.
- Browser:
Pale Moon for full desktop experience (it's open source and based on Firefox, but it has less permissions and no adds), Atlas or Lightning (open source) when I want to browse without leaving any cookies (I have changed its data/data/nextapp.atlas/databases' permissions to rx, rx, x (5, 5, 1) and I erased everything inside the folder, that way no cookies or history are recorded), Naked Browser to access my email.
Chrome? No thanks, the least google stuff I have in my phone the better I feel!!!
- Gallery:
Quick Pic.
- PDF reader:
Mantano or PDFReader (open source, found on F-Droid).
- Edit documents (doc., docx. etc.):
Office Suite or Kingsoft Office. Those apps need to be toroughly restricted, otherwise use a text editor like 920 Text Editor (open source, found on F-Droid).
- Gmail:
any email app will do, otherwise access gmail from Naked Browser or Atlas or Lightning, it's faster. Still, you'd better leave gmail and go for another email, just my two cents...
- Alarm:
Alarm Klock (open source, found on F-Droid).
- Google maps:
Rmaps (open source, found on F-Droid).
- Clipboard:
Clipnote.
- Calculator:
Arity (open source, found on F-Droid).
- Quick Notes:
Floating Stickies (open source, found on F-Droid).
- Html Viewer:
replacable by a third part html viewer or by most browsers as they can read html.
- Camera:
Open Cam (open source, found on F-Droid)
- Bonus:
Greenify (try it, it hybernates apps and saves juice, I'll explain about it later).
Done?
Cool, now go to post #3 and see what else can be erased...
- Note 2-​On KK there are more apps that can't be uninstalled, about 30 or something, pretty annoying and I guess that it doesn't get any better with Lollipop, thanks to google's efforts to strenghten its grip on Android and on us.
As for me I came back to JB and you have to ask yourself whether you want to compromise your privacy to get the latest gimmick and the latest fancy color (that have anyway been made available on JB with Xposed modules) or whether you want to be safe.
There are small sacrifices to make and I think the game is worth the candle, but it's up to you...
You can read more on that topic in post #3
II – THE TOOLS​Now you need some tools, namely:
- Xposed Installer:
http://repo.xposed.info/module/de.robv.android.xposed.installer
- Xprivacy:
http://repo.xposed.info/module/biz.bokhorst.xprivacy
- App Settings:
http://repo.xposed.info/module/de.robv.android.xposed.mods.appsettings
- AF+ Firewall:
https://f-droid.org/repository/browse/?fdfilter=af&fdid=dev.ukanth.ufirewall
- Network Log:
https://f-droid.org/repository/browse/?fdfilter=network+log&fdid=com.googlecode.networklog
- Greenify:
http://forum.xda-developers.com/apps/greenify
- Blue Box Security Scanner (apps and vulnerabilities scanner)
- SQ Editor
- Rom Toolbox Lite (free) or Pro (paid)
- Privacy Blocker (paid)
- First
Open Privacy Blocker.
Scan all your third part apks one by one, and see their dirty little secrets. Then mod the ones you don't like, it's easy, just follow the onscreen instructions.
- Second
Open Rom Toolbox.
Block adds, prevent apps from auto starting and disable any receiver you don't like, and try some build.prop and kernel tweaks while you're at it (be careful).
- Third
Open Greenify.
Greenify everything, except the launcher, the System UI, the Package Access Helper (you could greenify it but it does nothing since that app is ungreenifiable) and the Keyboard. You can greenify Settings and Settings Storage too, but it will slow down Settings when you lauch it.
DO NOT greenify Xprivacy and AF+ Firewall since you need them to run in the background (don't worry, those apps have a very low RAM footprint).
Create a “hibernate now” shortcut on your home screen, and don't forget to use it regularly to hibernate your apps.
Note that you'll need the donate version to greenify system apps, but it doesn't cost much and it's a nice way to support the dev.
- Fourth
Install Xposed, Xprivacy and App Settings.
Enable Xprivacy and App Settings in Xposed's menu (under modules), reboot, and make a new backup cuz from now chances to get in a bootloop will increase and dependingwhat you've done it may not be Aroma File manager recoverable..
Open App Settings and disable the apps' perms you don't like (be careful with System UI as it may result in constant force close).
To give you an idea I have attached some examples of what can be restricted. You will notice that stock apps (like contacts, phone, CSC, settings etc.) are the most restricted, that's because they have the most outrageous perms. The apps in the list don't use the name they have in the play store but the packages' names (to find them go to data/app and check there).
Done? Now, open App Settings' menu and make a backup of your current settings.
Open Xprivacy and do the same, but first have a read at its documentation here:
https://github.com/M66B/XPrivacy#xprivacy
and at the following tutorial I wrote some months ago (it was for an old version of Xprivacy, but you'll get the idea) :
This page is about generic settings that work with more or less any app.
USER APPS​
After a new app is installed restrict everything in Xprivacy. Open the app and check if it crashes or not.
If it doesn't it's fine, you're all set.
If it does, go back to Xprivacy and look for which data the app has tried to access by looking for categories that have a triangle next to them, and subcategories written in bold with numbers on the right (the first number is today's date, the four digits after the slash mean the last time the app tried to access that data). Unrestrict the data it has tried to access and see what happens, it should most likely bring your app back to life.
BUT!​
Some apps try to access data even if they don't really need it to work, which means that restricting it shouldn't be a problem (it's not because an app has tried to access this or that data that it needs it to function, and that's what Xprivacy is about).
Try selectively : restrict one subcategory, launch the app and see what happens. If it crashes or forces close it means that you shouldn't have restricted that subcategory, so just allow it again and go for the next one. If once opened the app doesn't crash and seems to have its basic functions working normally then you can go for more restrictions, but close the app first (not by hitting the back button, you need to really close/kill it, with a task killer or anything similar).
Back to Xprivacy, restrict one new subcategory's data access, launch the app again, see what happens and so on...
Usually, and as a rule of thumb, what causes apps to crash is restricting some subcategories in the Shell section (like "loadLibrary", "load", and sometimes "exec"), the Storage section (mainly "getExternalStorage", but it could be "sdcard" as well), and the System (installed apps) section. So look for the triangles and the subcategories in bold, because if it's ok to restrict a subcategory in let's say Accounts or Contacts even though you see it in bold, most of the time restricting such a subcategory in the Shell, Storage, and System sections will make the app force close, or at least prevent it from working normally.
Don't take my word for it though, in some cases it's possible to restrict even subcategories in bold in those three sections. But it's on a case by case basis, thus making it impossible to give a general rule. The only way to find out is to test by yourself...
Now let's see section by section.
The below settings are the ones I use for my phone and my tab, and you will probably notice that I'm a bit extreme and that I don't use some very popular apps. You are of course not obliged to be as restrictive as I am, but at least you will see what can be restricted and what can't be.
Accounts (Google, Facebook, etc) :
I don't want ANY app to know which accounts are registered on my phone so it's all restricted for all apps, even for the ones that try to access this data like Firefox (remember the triangle and the subcategories in bold?). Feel free to add whatever you think is relevant for people that use Facebook, Gmail, Google play, Yahoo or whatever similar app, as for me I can't since I don't use those apps.
Browser (bookmarks/history), Calendar, Calling (phone, SMS, MMS), Contacts, Dictionary (user), Email, Identification (device) :
those sections can be completely restricted (with all their subcategories), except for specific apps that need to access such data (but once more, always try to restrict first). Since I don't use such apps I can't tell anything about it, feel free to add some lines if you do.
Internet :
an app that needs internet shouldn't have it restricted, for obvious reasons. Most apps that need internet will work with only "inet" allowed, although some may need "isConnected" to be allowed as well.
Since version 1.7 more restrictions have been added, and I found out that besides "inet" some browsers may need "getAllByName", and/or “getbyName”, and/or “getActiveNetworkInfo” allowed.
Location (fine/coarse) :
I don't want ANY app to get my location so by me it's all restricted for all apps. Feel free to add whatever settings you have if you use apps that need to know one's location.
Media (audio, photo, video) :
the subcategories are pretty self explanatory, allow or restrict based on your apps. Restrict all for an app that doesn't need media access, allow "startRecording" and/or "setOutputFile" for a voice recorder, "takePicture" and/or "android.media.action.Image_Capture" for the camera etc., easy.
Messages (SMS, MMS) :
pretty self explanatory as well, all restricted for all apps, except SMS app.
On mine only "getAllMessagesFromIcc" and "VoiceMailContentProvider" have been restricted, I had to leave the three other ones allowed as my SMS app (Go SMS) crashes otherwise.
Network (addresses) :
all restricted, for all apps, except apps like FTP or Fast File Transfer (file transfer through WIFI). For those apps I left "getInetAddresses" and "getInterfaceAdresses" allowed. Some other similar apps may need "getScanResults" as well.
NFC :
all restricted, for all apps. If you use NFC you will have to find by yourself which one (s) can or can't be restricted but no biggie, there are only three subcategories.
Phone (ID, numbers, calls) :
all restricted, for all apps.
Shell (commands, superuser) :
root apps may or may not need "sh" and "su" allowed, look if they are in bold if an app crash. Same thing for "exec", "load", "loadLibrary" and "start" (root and non root apps alike), look if they are in bold but bear in mind that in some rare cases you still can restrict those subcategories even if you see them in bold (as said above).
Try selectively if like me you like to restrict just for the sake of it.
Storage (media, SD card) :
all restricted for all apps, except the ones that need to access data on the sdcard like media player, pdf reader etc.
Once more look for the subcategories in bold, and once more remember that this bold text doesn't necessarily mean that the app needs access to that data to be able to work. Generally apps that need sdcard access will need "getExternalStorageState", and/or "sdcard", and/or “media”, and/or “open” allowed, but surprinsigly sometimes they work even with some of those subcategories restricted. The "media" restriction is to prevent writing on the external sdcard, leaving it read only.
System (installed apps) :
all restricted, for all apps, except apps like Sidebar or Launcher that really need to know which apps are on the device. Those ones need some subcategories to be allowed and the bold text is sometimes your friend, but as usual, the fact that it's there doesn't mean that data access for this subcategory is really needed.
View (browser) :
restricted, for all apps. If you restrict it you have to know that it won't work anymore when you click on a link inside an app and want it to be opened in your favorite browser, and for this reason if you want to report an issue in Xprivacy you will need to have it unrestricted. You may have to enable “android.intent.action.View” to open files from your file manager
CAUTION!​
We are talking about user (installed) apps. For those apps, wrongly restricting something in Shell, Storage or System is not a big disaster, since at the most it will force close repetitively but still leave you enough time between two force closes to get back to Xprivacy.
When it comes to system (stock) apps it's another story, and restricting the wrong one (s) could result in a bootloop.
SYSTEM APPS​
As said above, restricting those apps is potentially dangerous and you need some tools beforehand, in case something gets out of control. Most people do a Nandroid backup but hey, it takes forever to restore, and if your backup is a bit old the latest changes you made in your ROM will be lost.
Use Aroma File Manager instead (look for it in XDA, all credits to its developer amarullz), a very nice little zip that enables you to copy, paste, delete and change files' permissions from within CWMR.
TWRP can do the same, without Aroma FM.
If you get in a bootloop, all you have to do is to boot into recovery and install Aroma File Manager. Once done it will open by itself and then you can navigate to the folder where Xprivacy is installed (/data/app if it's installed as an user app, /system/app if it's installed as a system app) and delete it. Just to be on the safe side delete as well the Xprivacy .dex in /data/dalvik-cache. I'm not sure whether it's really needed or not, if you have a definitive answer about it you are welcome to edit this article.
Now you can reboot. Of course Xprivacy is gone, and so are its settings, but if you had backed it up (hopefully you had) using the pro key or Titanium Backup you are good.
I have tested the following settings on Samsung Galaxy Grand I9082, Galaxy Tab 7 Plus P6210 and Galaxy Mega I9200, but I don't see any reason why it shouldn't work on other Samsung ROMs.
My ROMs are skinned to the extreme and to the extent that I only have a few system apps left, which implies that I only can talk about those apps. My settings are a bit extreme as well, and you may want to allow more subcategories than I did depending on what you want to do with your device in terms of sharing, social networks, location access, contacts and the like, this article has only been meant as a guideline to show what can be restricted under extreme conditions.
Android System, Settings Storage, Settings, Wlan Test :
Particular care must be taken here, it's the most dangerous package and the most prone to cause bootloops.
Remember that the following settings work for sure on Samsung Galaxy Grand I9082, Galaxy Tab 7 Plus P6210 and galaxy Mega I9200, but on other devices no one knows before one tries. Have your Aroma File Manager ready, and go for it...
All categories and subcategories are restricted, except :
"getDetailedState", and "isConnected" in Internet (on my devices restricting "getDetailedState" ended up in a bootloop),
update as for Xprivacy version 3.5, allowed:
“Connectivity.getActiveNetworkInfo”, “Connectivity.getNetworkInfo”, “InetAddress.getByAddress”, “InetAddress.getByName”, “NetworkInfo.getDetailedState”, “NetworkInfo.getState”, “NetworkInfo.isConnected”, “NetworkInfo.isConnectedOrConnecting”, “Wifi.getConnectionInfo”,
"getScanResults" in Location (if I restrict it my devices can't see new WIFI networks anymore, but on other devices it can be restricted without that annoying side effect. In any case it won't cause a bootloop so just try),
"getConfiguredNetworks" in Network,
update as for Xprivacy version 3.5, allowed:
“NetworkInfo.getExtraInfo”, “Wifi.get.ConfiguredNetworks”, “Wifi.get.ConfiguredInfo”, "Wifi.getScanResults",
all the Shell subcategories. It worked with "sh" and "su" restricted but I decided to allow them again by fear that it could lead to instability. Android System is one of the core app in your device and AFAIK it can bypass such restrictions, so there's no point restricting them, plus that doing so could cause instabilities (but I may be wrong, if anyone knows better please correct me). Regarding "exec", "load", "loadLibrary" and "start", I didn't even try to restrict them, for the same reasons as above,
all the Storage subcategories. I used to have them restricted and everything was still working, except that it erased most of my /data/data folders' contents,
"getInstalledApplications", "getInstalledPackages", "getRunningAppProcesses", "queryIntentActivities", "queryIntentActivitiesOptions" and "queryIntentServices" in System.
You can restrict those subcategories though, but if you do so the Application Manager in your device's Settings won't show your apps, and your keyboard (s) may not pop up.
If you use a Lock Screen that requires Device Administrator to be enabled you may have to allow "queryBroadcastReceivers".
Update as for Xprivacy version 3.5:
Overlay and Sensors categories, I let them all alowed.
Camera :
All categories and subcategories restricted, except :
"loadLibrary" in Shell,
"getExternalStorageState" and "sdcard" in Storage.
Certificate Installer :
All categories and subcategories restricted.
*'''com.sec.android.FlashBarService (Multi Windows Bar) :'''
All categories and subcategories restricted, except :
"queryIntentActivities" in System.
Contacts, Contacts Storage, Logs Provider :
All categories and subcategories restricted, except :
the whole Contacts section,
"loadLibrary" in Shell.
If you want to import/export your contacts list you will have to allow "sdcard" in Storage, but once it's done you can restrict it again.
Package Access Helper :
All categories and subcategories restricted, except :
"sdcard" in Storage.
Package Installer :
All categories and subcategories restricted, except :
"sdcard" in Storage.
Phone, Dialer Storage, Sim Toolkit, CSC :
All categories and subcategories restricted.
If the Phone app crashes the first time you run it after you restricted everything, just allow the bold subcategories in the Phone (ID, Numbers, Calls) section. In my case it was "getSubscriberID" and "TelephonyProvider", and the app actually crashed when I disabled plane mode for the first time (I had installed Xprivacy while in plane mode). Once everything was back to normal I restricted again the two above mentioned subcategories and everything has been fine ever since.
System UI :
All categories and subcategories restricted, except :
"isConnected" in Internet (this one is actually restrictable, but if you do so the WIFI icon won't show up anymore when you are connected), Inet.Address.getByAddress,
"getExternalStorageState" in Storage,
"getRecentTasks", "getRunningTasks" and "queryIntentActivities" in System.
Task Manager :
All categories and subcategories restricted, except :
"getRunningAppProcesses" and "getRunningTasks" in System.
Done with Xprivacy? Now, open its menu and backup its settings.
(To Be Continued)
(Continued From Last Post)
- Fifth
Open Blue Box Security scanner and let it scan for vulerabilities.
Most likely it will find some, patch them with Master Key and Fake ID Fix:
http://repo.xposed.info/module/tungstwenty.xposed.masterkeydualfix
http://repo.xposed.info/module/tungstwenty.xposed.fakeidfix
- Sixth
Get init.d support.
Make a script to disable some folders that are otherwise recreated each time the phone boots.
I give you the following as an example that works on Samsung 4.2.2 but you may have to edit it depending which phone you have and which ROM version you are on:
#!/system/bin/sh
rm -r /data/anr/*
rm -r /data/backup/*
rm -r /data/clipboard/*
rm -r /data/connectivity/*
rm -r /data/local/tmp/*
rm -r /data/log/*
rm -r /data/system/container/*
rm -r /data/system/dropbox/*
rm -r /data/system/netstats/*
rm -r /data/system/shared_prefs/*
rm -r /data/system/usagestats/*
rm -r /data/system/throttle/*
rm -r /data/tombstones/*
if [ -e dev/log ] ; then rm -r dev/log ; fi
busybox chmod 000 /data/anr/
busybox chmod 000 /data/log/
busybox chmod 000 /data/system/dropbox/
busybox chmod 000 /data/system/throttle/
busybox chmod 000 /data/system/usagestats/
busybox chmod 000 /data/tombstones/
If you decide to use this script paste it in a good editor like Note Pad Plus. Then edit it if needed and don't forget to set the EOL conversion (found in the edit menu on the toolbar) to Unix/OSX format.
You want to do it directly from your phone?
Try 920 Text Editor app, it does the job fine (when you save a file set "Convert Line Break" to Unix/Android) :
http://920-text-editor.en.uptodown.com/android
Here's another init.d script, done with Pimp My Rom app (credits @Androguide.fr), to protect your phone from various MIM (Man In The Middle) attacks :
#!/system/bin/sh
### Pimp my Rom : Block Redirects
busybox sysctl -e -w net.ipv4.conf.all.accept_redirects=0; ###ICMP broadcast
busybox sysctl -e -w net.ipv4.conf.default.accept_redirects=0;
busybox sysctl -e -w net.ipv4.conf.all.secure_redirects=0;
busybox sysctl -e -w net.ipv4.conf.default.secure_redirects=0;
### Pimp my Rom : Block Source-Routing
busybox sysctl -e -w net.ipv4.conf.default.accept_source_route=0; ### ICMP redirects
busybox sysctl -e -w net.ipv4.conf.all.accept_source_route=0;
### Pimp my Rom : IPv4 Tweaks
busybox sysctl -e -w net.ipv4.tcp_timestamps=0;
busybox sysctl -e -w net.ipv4.tcp_sack=1;
busybox sysctl -e -w net.ipv4.tcp_fack=1;
busybox sysctl -e -w net.ipv4.tcp_congestion_control=cubic;
busybox sysctl -e -w net.ipv4.tcp_window_scaling=1;
### Pimp my Rom : Avoid Time-Wait
busybox sysctl -e -w net.ipv4.tcp_tw_recycle=1;
busybox sysctl -e -w net.ipv4.tcp_tw_reuse=1;
### Pimp my Rom : Protection against SYN Attacks
busybox sysctl -e -w net.ipv4.tcp_syncookies=1;
busybox sysctl -e -w net.ipv4.conf.all.rp_filter=1; ###Forwarding traffic
busybox sysctl -e -w net.ipv4.conf.default.rp_filter=1;
busybox sysctl -e -w net.ipv4.tcp_synack_retries=2;
busybox sysctl -e -w net.ipv4.tcp_syn_retries=2;
busybox sysctl -e -w net.ipv4.tcp_max_tw_buckets=16384;
busybox sysctl -e -w net.ipv4.icmp_echo_ignore_all=1;
###Turn on protection for bad icmp error messages
busybox sysctl -e -w net.ipv4.icmp_ignore_bogus_error_responses=1;
busybox sysctl -e -w net.ipv4.tcp_max_syn_backlog=1024;
busybox sysctl -e -w net.ipv4.tcp_no_metrics_save=1;
busybox sysctl -e -w net.ipv4.tcp_fin_timeout=15;
busybox sysctl -e -w net.ipv4.tcp_keepalive_intvl=30;
busybox sysctl -e -w net.ipv4.tcp_keepalive_probes=5;
busybox sysctl -e -w net.ipv4.tcp_keepalive_time=1800;
busybox sysctl -e -w net.ipv4.ip_forward=0;
One more (credits @bazz77 – http://forum.xda-developers.com/showthread.php?p=40767777#post40767777 , do visit the thread as you will find infos about how to harden your system) :
###Avoid a smurf attack
sysctl -w net.ipv4.icmp_echo_ignore_broadcasts=1;
###ICMP redirects ipv4
busybox sysctl -e -w net.ipv6.conf.all.accept_redirects=0;
###ICMP redirects ipv6
busybox sysctl -e -w net.ipv4.conf.all.send_redirects=0;
### ICMP redirects
busybox sysctl -e -w net.ipv4.conf.all.forwarding=0;
###Forwarding traffic
busybox sysctl -e -w net.ipv4.conf.all.log_martians=1;
###filter martians
busybox sysctl -e -w net.ipv4.tcp_max_syn_backlog=1280;
###TCP syn half-opened
sysctl -w net.ipv4.ip_forward=0;
###Tune IPv6 and disable lol
busybox sysctl -e -w net.ipv6.conf.default.router_solicitations=0;
busybox sysctl -e -w net.ipv6.conf.default.accept_ra_rtr_pref=0;
busybox sysctl -e -w net.ipv6.conf.default.accept_ra_pinfo=0;
busybox sysctl -e -w net.ipv6.conf.default.accept_ra_defrtr=0;
busybox sysctl -e -w net.ipv6.conf.default.autoconf=0;
busybox sysctl -e -w net.ipv6.conf.default.dad_transmits=0;
busybox sysctl -e -w net.ipv6.conf.default.max_addresses=1;
busybox sysctl -e -w net.ipv6.conf.all.disable_ipv6=1;
busybox sysctl -e -w net.ipv6.conf.default.disable_ipv6=1;
busybox sysctl -e -w net.ipv6.conf.lo.disable_ipv6=1;
### Don't act as a router
busybox sysctl -e -w net.ipv4.conf.all.send_redirects=0;
busybox sysctl -e -w net.ipv4.conf.default.send_redirects=0;
- Seventh
Open AF+ and set it for WIFI, data, VPN and roaming.
I think using white list option (allow selected) is better than black list since newly installed apps are blocked by default.
Restrict all apps, including system apps, that don't need to have internet access, and restrict Linux kernel, Linux shell, Internet time servers, DHCP+DNS services, GPS and Media server.
Enable IPV6 support.
Now, make a script to block inbound and outbound unwanted connections, call it whatever you want (but don't forget to end it with the .sh extension, and to give it RWX, RX, RX (755) permissions), and put it in data/local or in data/data/dev.ukanth.ufirewall/app_bin.
Here's an example of such script :
# Necessary at the beginning of each script!
IP6TABLES=/system/bin/ip6tables
IPTABLES=/system/bin/iptables
## Force DNS (in this Case [OpenDNS](http://www.opendns.com/))
$IPTABLES -t nat -D OUTPUT -p tcp --dport 53 -j DNAT --to-destination 208.67.222.222:53 || true
$IPTABLES -t nat -D OUTPUT -p udp --dport 53 -j DNAT --to-destination 208.67.222.222:53 || true
$IPTABLES -t nat -I OUTPUT -p tcp --dport 53 -j DNAT --to-destination 208.67.222.222:53
$IPTABLES -t nat -I OUTPUT -p udp --dport 53 -j DNAT --to-destination 208.67.222.222:53
# Deny IPv6 only connections
$IP6TABLES -P INPUT DROP
$IP6TABLES -P OUTPUT DROP
#
# Google
$IPTABLES -A "afwall" --destination "8.8.8.8/32" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "8.8.4.4/32" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "64.233.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "66.102.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "66.249.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "72.14.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "74.125.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "173.194.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "209.85.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "216.239.0.0/16" -j "afwall-reject" || exit
#
# Others
$IPTABLES -A "afwall" --destination "23.4.92.33/32" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "23.32.0.0/11" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "23.64.0.0/14" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "23.253.56.120/32" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "64.207.128.0/18" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "68.232.32.0/20" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "91.103.140.0/24" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "104.16.0.0/12" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "104.64.0.0/10" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "116.214.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "118.214.0.0/16" -j "afwall-reject" || exit
$IPTABLES -A "afwall" --destination "198.232.125.88/32" -j "afwall-reject" || exit
#
# Turla
$IPTABLES -A "afwall" --destination "80.248.65.183/32" -j "afwall-reject" || exit
#
# Google
$IPTABLES -I INPUT -s 8.8.8.8/32 -j DROP || exit
$IPTABLES -I INPUT -s 8.8.4.4/32 -j DROP || exit
$IPTABLES -I INPUT -s 64.233.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 66.102.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 66.249.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 72.14.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 74.125.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 173.194.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 209.85.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 216.239.0.0/16 -j DROP || exit
#
# Others
$IPTABLES -I INPUT -s 23.4.92.33/32 -j DROP || exit
$IPTABLES -I INPUT -s 23.32.0.0/11 -j DROP || exit
$IPTABLES -I INPUT -s 23.64.0.0/14 -j DROP || exit
$IPTABLES -I INPUT -s 23.253.56.120/32 -j DROP || exit
$IPTABLES -I INPUT -s 64.207.128.0/18 -j DROP || exit
$IPTABLES -I INPUT -s 68.232.32.0/20 -j DROP || exit
$IPTABLES -I INPUT -s 91.103.140.0/24 -j DROP || exit
$IPTABLES -I INPUT -s 104.16.0.0/12 -j DROP || exit
$IPTABLES -I INPUT -s 104.64.0.0/10 -j DROP || exit
$IPTABLES -I INPUT -s 116.214.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 118.214.0.0/16 -j DROP || exit
$IPTABLES -I INPUT -s 198.232.125.88/32 -j DROP || exit
#
# Turla
$IPTABLES -I INPUT -s 80.248.65.183/32 -j DROP || exit
If you decide to use this script paste it in a good editor like Note Pad Plus. Then add you own values and don't forget to set the EOL conversion (found in the edit menu on the toolbar) to Unix/OSX format.
If you want to do it directly from your device look back at part six, I've put a link to a Text Editor app.
Bear in mind that by using it you will prevent google from accessing your phone, so google related web sites (youtube, blogspot, google search, play store etc.) won't work anymore.
Now it's up to you, if you want google access you'll have to erase the lines under #google (both inbound and outbound).
If you want to check where an IP adress belongs go to :
http://whois.domaintools.com/ (I like this one the most cuz it shows you the IP range to block)
http://www.hcidata.info/host2ip.htm
Want more?
Check here (credits @ukanth and @CHEF-KOCH ) :
https://github.com/ukanth/afwall/wiki/CustomScripts
.
While you're at it change the DNS in the system/etc/resolv.config file to Open DNS or whatever you wish (if you don't use Open DNS then edit the beginning of this script accordingly), and do the same for system/etc/dhcpd/dhcpd-hooks/20-dns.conf.
Note to Kit Kat users, credits @Primokorn :
On Nexus 5 - Kitkat 4.4.4 - I do not have the first file (resolv.config). At the end, I downloaded an app called DNS forwarder by Evan He (read the description for more details especially the information for KitKat users).
OpenDNS has been successfully tested through this URL: https://store.opendns.com/settings/
To check whether you are using Open DNS or not you'll have to enable cookies.
If you still see unwanted connections despite the Firewall check posts #71 and #72, big thanks to @optimumpro for the tip!
To stop the DNS resolve of, and HTTP request to clients3.google.com on every connection to any Wifi Access Point open your android terminal and type :
su -c "settings put global captive_portal_server 127.0.0.1"
su -c "settings put global captive_portal_detection_enabled 0"
To stop the resolve/request for 2.android.pool.ntp.org on every boot (even with network time disabled) type :
su -c "settings put global ntp_server 127.0.0.1"
(credits https://blog.torproject.org/)
- Eighth
Install a good host file in system/etc, it will block adds and unwanted web sites.
Check this link about MoaAB (Mother of All Ad Blocking), credits to @BSDgeek_Jake :
http://forum.xda-developers.com/showthread.php?t=1916098
You can add the following web adresses to whatever host file you decide to use, I have hand picked them one by one (but as above, don't forget to set the EOL conversion to Unix/OSX format):
127.0.0.1 localhost
::1 localhost
127.0.0.1 apis.google.com
127.0.0.1 ajax.googleapis.com
127.0.0.1 www.googletagservices.com
127.0.0.1...51-0-107.deploy.static.akamaitechnologies.com
127.0.0.1 a23-51-0-107.deploy.static.akamaitechnologies.com
127.0.0.1 pa-in-f109.1e100.net
127.0.0.1 pd-in-f109.1e100.net
127.0.0.1 sin04s02-in-f30.1e100.net
127.0.0.1 sin04s01-in-f30.1e100.net
127.0.0.1 sin01s14-in-f30.1e100.net
127.0.0.1 sin01s14-in-f1.1e100.net
127.0.0.1 sa-in-f95.1e100.net
127.0.0.1 2.android.pool.ntp.org
127.0.0.1 174.37.231.83-static.reverse.softlayer.com
127.0.0.1 208.43.122.142-static.reverse.softlayer.com
127.0.0.1 50.22.240.168-static.reverse.softlayer.com
127.0.0.1 108.168.180.116-static.reverse.softlayer.com
127.0.0.1 mqtt-shv-10-frc1.facebook.com
127.0.0.1 mqtt-shv-13-prn1.facebook.com
127.0.0.1 mqtt-shv-08-prn2.facebook.com
127.0.0.1 mqtt-shv-06-frc1.facebook.com
127.0.0.1 mqtt-shv-06-ash2.facebook.com
127.0.0.1 mqtt-shv-04-ash3.facebook.com
127.0.0.1 74-82-89-154.rdns.blackberry.net
127.0.0.1 74-82-91-166.rdns.blackberry.net
127.0.0.1 74-82-93-25.rdns.blackberry.net
127.0.0.1 74-82-93-39.rdns.blackberry.net
127.0.0.1 ec2-54-227-243-121.compute-1.amazonaws.com
127.0.0.1 ec2-54-235-74-151.compute-1.amazonaws.com
127.0.0.1 r-199-59-150-46.twttr.com
127.0.0.1 en.mywebzines.com
127.0.0.1 pnsen.dolphin-browser.com
127.0.0.1 tracken.dolphin-browser.com
127.0.0.1 jekyll.ispgateway.de
127.0.0.1 amazonaws.com
127.0.0.1 ads.yahoo.com
127.0.0.1 geo.query.yahoo.com
127.0.0.1 ucs.query.yahoo.com
If you restrict all those adresses you won't be able to connect to facebook, twitter and any google service (including youtube, blogspot, google search, play store) anymore, so filter first and remove the web sites you want to be able to access.
- Ninth
Open Network Log and connect to the internet.
Check all your connections (long press on an IP to know which web site it refers to, or check with the web sites I mentionned in part 7), some are legit, some are not.
Block the unwanted stuff using either the host file, or the firewall script, or both.
There's an apk called Blockit! that can help you find host names for some stubborn web sites that can't be blocked using their IP, and whose host name can't be found otherwise (like apis.google.com, ajax.googleapis.com, www.googletagservices.com, fonts.googleapis.com, google-public-dns-a.google.com, just to name a few that I found thanks to BlockIt!).
About one year ago I found out that my kernel was connecting to some google related IPs and to google's DNS (eventhough I had set the phone to use Open DNS in the resolv.conf file, eventhough I had removed over 150 system apps and eventhough I was already using AF+Firewall, App Settings and Xprivacy), and that my android system was calling home (read "at google's central office in Mountain View, California") everytime I connected (note that my phone had never been linked to any google account whatsoever).
From that day that I started to gather informations about host files and firewall scripts...
- Tenth
Open SQ Editor, and have a look at your apps' databases.
If you find anythig you dislike, erase it (it's located in data/data/yourappname/databases).
Some files, like google analytics or gaClientid, reappear once the app is reopened again, in this case you have to set their perms to 000 and fully erase their content (like this the files are still there and don't get recreated, but they are inactive).
You may have to suppress the write permissions on the folder that contains those files (use you file manager), ie something like rx, rx, x (5, 5, 1).
Some other potentially unwanted files could be in data/data/yourappname/files or in data/data/yourappname/shared_prefs, if that's the case do as above.
III - ADVANCED​- I'll deliberately stay vague on those matters, only people that know what they are doing should mess with that kind of stuff. -
1- Decompile some of your system apps and some of your jars, and track lines refering to specific websites and DNS.
For a starter have a look at SecSystem.apk, framework.jar and framework2.jar...
2 - Xprivacy is a fantastic tool, but due to android limitations it can't restrict ids for the android system.
Have tou ever heard of android.id, build.serial, ro.boot.serialno, ro.serialno etc.?
And what about the serial_no and the mac in the efs folder? And the cpu info in proc? And the serial_number in sys?
Those are ids specific to your device and of course they identify you, that's what they are meant for!
An example, have a look at the wpa_supplicant.conf localised in data/misc/wifi. You'll see that it has your serial_number which means, and experts please correct me if I am wrong, that everytime you connect on the WIFI your serial_number gets sent.
You want to change it manually?
Yeah sure, edit it directly from the file. Now start you wifi and check again the serial_number, you are back to the original value.:cyclops:
I'm not sure whether, if your firewall script is well done and if Xprivacy has been well configured (read "VERY restrictively configured"), those ids leaks or not, but since I like to have more than one protection layer I've edited all of them.
Some ids are easily changed using the setprop command (with an android terminal) or the setpropex command (I've attached it at the end of this post, unzip it and depending your configuration put it in system/bin or system/xbin, and chmod it rwx, rx, rx or 7, 5, 5. Credits @goroh_kun -- http://forum.xda-developers.com/showthread.php?t=1201657 ). Then make an init.d script like:
#!/system/bin/sh
/system/xbin/setpropex ro.boot.serialno 1
/system/xbin/setpropex ro.serialno 1
echo 1 > /sys/devices/virtual/android_usb/android0/iSerial
echo 1 > /sys/devices/cpaccess/cpaccess0/cp_rw
echo 00000001 > /sys/devices/platform/wcnss_wlan.0/serial_number
(the last one will take care of the WIFI's serial_number I spoke about few lines above),
some will require editing in the efs folder (potentially dangerous, so back it up first!), and some will require boot.img tweaks, but I won't explain any further since as written above only people knowing what they do should play with that stuff.
IV – BASEBAND ISOLATION​That's an important subject and here's an interesting link to start with :
https://blog.torproject.org/blog/mis...ty-and-privacy
You can uninstall STK.apk, LogsProvider.apk, CSC.apk, SecContacts.apk, SecContactsProvider.apk, SecPhone.apk and SecTelephonyProvider.apk altogether, problem solved, your phone isn't a phone anymore (obviously) but a WIFI only device.
Or, you can buy a WIFI only device and save some money compared to a GSM device.
As for me I solved the matter by uninstalling STK.apk, LogsProvider.apk, CSC.apk, SecContacts.apk and SecContactsProvider.apk, and by chmoding SecPhone.apk's and SecTelephonyProvider.apk's permissions to 000 in order to completely disables them (which is not the case when one freeze them, or when one uses the pm command, the apps are ineffective in the way that the user can't use them but they are on nevertheless). Then, I made a chmod 644/000 script to enable/disable them, done!
Of course it's not very practical, and if one only uses one's phone to call one's mum or one's girlfriend/boyfriend there's no need to turn to such extreme safety measures.
But if one lives in a rogue country and if one could be put in danger because of one's phone then it's something that one has to consider.
Otherwise, if you don't want anyone to know that you are using that phone then use a public phone, because whatever we do our provider allways knows who we are calling, for how long etc., everytime we use the phone functions, and AFAIK there's no way to prevent that. Except maybe by using those apps that encrypt communications but I can't comment on that since I don't use my phone to call or to text.
Well, the thing is that if security really matters you shouldn't have a GSM device but a WIFi only device, or a GSM device where STK.apk, LogsProvider.apk, CSC.apk, SecContacts.apk, SecContactsProvider.apk, SecPhone.apk and SecTelephonyProvider.apk have been uninstalled, the above link leading to Tor project's blog explains well why.
One more thing, have you ever heard about IMSI catcher AKA fake cell towers? Here's a very interesting project that deals with it :
http://forum.xda-developers.com/showthread.php?t=1422969
Oh yeah, you may like that one too :
http://www.wired.com/2014/10/verizons-perma-cookie/
ANDROID 5.0 (Lollipop)​
Xposed is not yet compatible with ART, so no Xprivacy and no App Settings.
App Settings can be replaced by Permissions Denied Pro (paid), but make sure it's Lollipop compatible :
https://play.google.com/store/apps/details?id=com.stericson.permissions.donate&hl=en
Sorry for the play store link but that's the only non warez site I found about that app. If you want to purchase it you don't need to go through the play store though, just contact its dev and pay him with Pay Pal :
[email protected]
It's a powerfull app so before to start using it read its FAQ (when in the app swipe to the right until you get to it) and remember that you have to unlock permissions before you flash a new OS. Otherwise you may have a powerful bootloop, it happened to me once and believe me it wasn't funny.
You can use the settings examples I put for App Settings (in the second chapter part 4) since Permissions Denied works more or less the same way.
It's a bit more tricky, if doable at all, to replace Xprivacy. Have a look at Donkey Guard, its dev said that he will make it Cydia substrate compatible but I'm not sure he managed :
http://forum.xda-developers.com/xposed/modules/app-donkeyguard-security-management-t2831556
Alternatively, see if Pdroid is Lollipop compatible but AFAIK it isn't.
As for me I'll stay away from Lollipop, at least for now...
A FEW WORDS ABOUT COMMON SENSE​Stick to older Android versions, like 4.1 or 4.2.
From 4.2 google has strengthned its grip on Android, and added some very unpleasant stuff.
In 4.2 it added FusedLocation.apk, to know better where you are, basically a spying app eventhough google calls it an “enhancement”.
That apk can neither be uninstalled nor be frozen (or well, it actually can but then the phone doesn't boot), but fortunately its receivers can be desactivated with Rom Toolbox and it can be greenified.
In Kit Kat it got worse, you will understand by yourself when you start uninstalling system apps and/or when you have a look at what's inside the system folder.
As I already said in the first chapter, you have to ask yourself whether you want to compromise your privacy to get the latest gimmick and the latest fancy color (that have anyway been made available on JB with Xposed modules) or whether you want to be safe.
Forget about Kit Kat, I think the game is worth the candle but it's up to you...
Do not trust too much encryption and do not store sensitive data in your phone. If you have sensitive data keep it on an usb stick, or a hard disk, the idea is to have it on a support that is not web connected.
Do not link your phone with any account, and don't use apps like facebook, twitter etc... Access those web sites from your browser , and greenify your browser once done.
Use Tor to secure your IP, your operator will know that you use Tor but it won't know anything else.
Depending what you do, where you live or travel and who you are you may consider to have two phones, a secured one for your sensitive activities, and an insecure one to call mum.
Do not update your apps blindly, not all updates bring improvements. Sometimes they add more permissions and/or adds, sometimes the app got sold to a company and policies have changed, you see what I mean. So before you update make a backup of the current app's version, in case you want to get back to it later.
CREDITS AND THANKS​
@rovo89 for Xposed, respect!
@M66B for the Xprivacy, respect!
@Tungstwenty for App Settings, Master Key Dual Fix, Fake ID Fix, respect!
@Chainfire for Super Su, respect!
@ukanth for AF+Firewall, respect!
@oasisfeng for Greenify, respect!
@THE Tor Project Team, respect!
@f-droid, respect!
@all the XDA people writing tutorials and sharing their knowledge, respect!
Did I forget anyone? If that's the case be insured that it was absolutely unintentionnal, send me a PM and I'll fix it
Last but not least, all those devs and groups have spent days, if not weeks or even months, coding, writing, tweaking, modding, in a word working, for us to enjoy better security on our devices.
They did it for free, in a materialistic, greedy and selfish world where gratuitousness and altruism are an oddity, so the least we can do is to support them.
Please consider sending them a donation, or buying the pro version/license of their app (s), we are talking about a few dollars which is not much compared to what they have given, are giving, and will give to us.
Remember that we are nothing, or let's say not much, without them!!!
Thanks in advance for them...
LINKS​
http://repo.xposed.info/module/de.robv.android.xposed.installer]
https://github.com/M66B/XPrivacy#xprivacy
https://f-droid.org/repository/browse/
https://github.com/ukanth/afwall
http://forum.xda-developers.com/apps/greenify
https://www.torproject.org/
https://blog.torproject.org/
https://guardianproject.info/
https://prism-break.org/en/
CONCLUSION​That's all what I can remember for now and that's it, my phone works fine...
An additional plus is that while in standby battery decrease is only 1% every 10-12 hours, it doesn't hurt
If all of the above has been done I don't think that anyone can get much data out of your phone, but I'm no security expert and I'd like to hear what the big guys on this forum have to say on that matter....
Feel free to add any settings, tips and tricks you have, thanks in advance:good:
Posts can't be more than 30000 words long, and since both post #1 and post #2 have reached that limit I have to put the last updates to OP here.
Sorry for the mess:silly:.
(Continued from the end of 'Safe To remove Apps" in Chapter I)
Before to proceed copy your system/etc/permissions, system/framework and system/lib somewhere safe, make sure you have aroma file manager ready at hand, and that you have a backup of your system.
Safe to remove jars in system/framework :​
access.control.jar
allshare.jar
allshareJmDNS.jar
android.test.runner.jar
bmgr.jar (backup manager)
browsermanagement.jar
bu.jar
cneapiclient.jar
com.android.future.usb.accessory.jar
com.android.location.provider.jar (if you remove this jar then FusedLocation.apk will force close when the phone boots, greenify once the apk and click on the "hibernate all" widget everytime after booting to get rid of the annoyance)
com.android.nfc_extras.jar
com.broadcom.bt.jar
com.broadcom.nfc.jar
com.dropboxpartner.jar
com.google.android.maps.jar
com.google.android.media.effects.jar
com.google.widevine.software.drm.jar
com.quicinc.jar
com.samsung.android.sdk.bt.jar
com.samsung.device.jar
content.jar
CustFeature.jar
GlobalConfig.jar
ime.jar (stock keyboard)
javax.obex.jar
kies_feature.jar
libvtmanagerjar.jar
mmappframeworklib.lib.jar
mms-common.jar
monkey.jar
org.codeaurora.Performance.jar
org.simalliance.openmobileapi.jar
qcmmediaplayer.jar
requestsync.jar
sc.jar
scrollpause.jar
sec_feature.jar
sec_platform_library.jar
seccamera.jar
sechardware.jar
secmediarecorder.jar
secosp.jar
services-ext.jar
settings.jar
smartfaceservice.jar
smartfaceserviceapi.jar
smatlib.jar
stayrotation.jar
svc.jar
svi.jar
sws.jar
uiautomator.jar
videowall.jar
After you're done don't forget to wipe the dalvik-cache.
Bear in mind that it works for me cuz I removed nearly all the stock apps, but depending on your phone configuration you may have to keep more jars.
For example, the stock keyboard would probably not work anymore if ime.jar is gone, same story with the stock camera if seccamera.jar has been deleted.
The same applies to other apps and functionalities, but the good news is that most jars are self explanatory.
Safe to remove xmls in system/etc/permissions :​
access.control.xml
allshare_library.xml
allshareJmDNS_library.xml
android.hardware.nfc.xml
android.hardware.wifi.direct.xml
android.software.live_wallpaper.xml
android.software.sip.voip.xml
com.android.location.provider.xml (warning, to remove this xml you'll need to mod FusedLocation.apk in order to force it not to need the xml anymore)
com.android.nfc_extras.xml
com.broadcom.nfc.xml
com.google.android.media.effects.xml
com.google.widevine.software.drm.xml
com.samsung.android.sdk.bt.xml
com.samsung.device.xml
com.sec.feature.hovering_ui (accelorometer sensor)
com.sec.feature.irda_service.xml
com.sec.feature.yosemite.xml (accelorometer sensor)
kies_feature_library.xml
mmappframeworklib_library.xml
org.simalliance.openmobileapi.xml
sec_feature.xml (may break the stock FM radio, dunno about third part radios like Spirit)
sec_mdm.xml
seccamera.xml
secmediarecorder.xml (may break the stock FM radio, dunno about third part radios like Spirit)
smartfaceservice.xml
smat_library.xml
svi_library.xml
sws.xml
usb_print2.xml
videowall_library.xml
vtmanager_library.xml
Bear in mind that it works for me cuz I removed nearly all the stock apps, but depending on your phone configuration you may have to keep more xml.
For example, the nfc would probably not work anymore if one of the xmls that have "nfc" in the title is gone, same story for stock camera if seccamera.xml has been deleted (but some third part cameras will still work).
The same applies to other functions, but fear not since most xmls are self explanatory.
Safe to remove files in system/lib :​
the whole drm folder
all files that have "google" in it
More files can be removed (about 60 that I tested up to now), but risks to break this or that functionality increase, and since I don't think that many people use such a barebone phone like me I'll pass for now.
If you want to know which libs just tell me and I'll add them.
Miscellaneous :​
- The system/etc/cmds folder.
- The system/etc/secure_storage folder.
- The system/etc/videotelephony folder.
- The system/tts folder (unless you use text to speech features).
- The system/usr/srec/en_US folder (unless you use google now's english offline typing features).
- The system/voicebargeindata folder.
- The system/wakeupdata folder
Special cases​​
Am.jar (Activity Manager)​It can be removed, and then something interesting happens:
newly installed root apps can't get super user rights, but root apps that had previously been installed and are in the super su list work as usual.
I'm not 100 % sure, but that could prevent privilege escalation by malicious apps or processes.
Still, be careful and test it only with root apps that you know for sure are safe.
Actually this am.jar works as an activity manager that can be used remotely to start an activity or an app, force stop apps, kill processes, debug, broadcast an intent and more, through adb or directly from within your phone by using a terminal app.
To get an idea about what it can do type in your terminal:
su
am
and see by yourself.
If you are not into playing with such activities and if you don't use adb you won't feel any difference once you disabled am.jar, not to mention that preventing adb operations is one more step towards better security.
There's another am file in system/bin and it works as a trigger to activate am.jar, so disabling/chmoding 000 that system/bin/am prevents am.jar from starting/working without the need to remove am.jar.
Still, I rather take care of both, just to be on the safe side.
I made two scripts.
One to erase/disable the am functionalities (but before to proceed, copy system/framework/am.jar somewhere safe):
#!/system/bin/sh
mount -o remount,rw /system
rm /system/framework/am.jar
chmod 000 /system/bin/am
rm /data/dalvik-cache/[email protected]@[email protected]
One to restore/enable am (make a folder called scripts in your sd, and put am.jar inside):
#!/system/bin/sh
mount -o remount,rw /system
cp /sdcard/scripts/am.jar /system/framework
chmod 0644 /system/framework/am.jar
chmod 0755 /system/bin/am
Pm.jar (Package Manager)​
Pm.jar can be removed too, and just like am.jar it has a triggering file located in system/bin. Disabling them will disable the package manager.
This package manager enables apps to be installed/uninstalled, apps' data to be cleared, apps' components to be enabled /disabled, apps' permissions to be granted/revoked and more, through adb or with an Android terminal app.
To know what it can do type :
su
pm
and see by yourself if you think it's worth keeping it or not.
If you don't use adb you won't feel any difference after you disabled pm.jar (you will still be able to install, uninstall and clear data manually) not to mention that preventing adb operations and specially remote installation/uninstallation of apps is pretty important security wise.
Still, you have to bear in mind that apps like Titanium backup, Rom Toolbox or App Settings use pm to freeze apps or disable apps' components and permissions, and for example when pm is desactivated it prevents me from disabling apps receivers/components (like start on boot, factory reset, etc.) with Rom Toolbox.
Not a big deal cuz pm can easily be enabled and disabled, but I report the issue nevertheless in case it happens to somebody else....
In theory, removing pm could enable one to install unsigned apps, which can be useful in some situations (particularly when one needs to edit the android manifest on system apps).
Remember that doing so is dangerous, since any dodggy app could be installed, so be cautious and test it only with system apps and/or apps that you trust.
As said above there's another pm file in system/bin and it works as a trigger to activate pm.jar, so disabling/chmoding 000 that system/bin/pm prevents pm.jar from starting/working without the need to remove pm.jar.
Still, I rather take care of both, just to be on the safe side.
Now, two scripts.
One to erase/disable pm (but before to proceed, copy system/framework/pm.jar somewhere safe):
#!/system/bin/sh
mount -o remount,rw /system
rm /system/framework/pm.jar
chmod 000 /system/bin/pm
rm /data/dalvik-cache/[email protected]@[email protected]
One to restore/enable pm (make a folder called scripts in your sd, and put pm.jar inside):
#!/system/bin/sh
busybox mount -o remount,rw /system
cp /sdcard/scripts/pm.jar /system/framework
chmod 0644 /system/framework/pm.jar
chmod 0755 /system/bin/pm
Disabling adb
This should do the trick :
#!/system/bin/sh
mount -o rw,remount -t rootfs rootfs /
chmod 000 /sbin/adbd
mount -o ro,remount -t rootfs rootfs /
If it doesn't work try this :
#!/system/bin/sh
mount -o remount,rw /system
chmod 000 /system/bin/adb
Safe to remove applets​
Applets are like small programms or commands that can be performed by the system, sometimes with root permissions. They are located in system/bin and system/xbin, and this is where the heart of your root beats (su and sh). Some came preinstalled on your phone, others are installed along busybox (those ones are usually symlinked, and bear a different installation date than the stock applets).
We all have different interests and different needs, so here's some documentation in order to help you decide which applets you want to keep and which applets you want to remove (don't forget to make a backup) :
http://busybox.net/downloads/BusyBox.html
To start, you can delete the ones that are nothing but a trigger for framework jars (like am or pm they bear the same name than their framework counterpart, and they are very light, like 100-200 b, since all what's inside is a short command to trigger the jar).
Then, watch out for the ones that have internet access.
I will write more about it, and give some examples, in a few days when I have time...
Disable NFC and Bluetooth​
#!/system/bin/sh
mount -o rw,remount -t rootfs rootfs /
chown 0.0 /dev/bcm2079x
chmod 000 /dev/bcm2079x
mount -o ro,remount -t rootfs rootfs /
That will disable NFC (it has to be ran as an init.d script cuz files recreate at each boot), but before to run this script bear in mind that it may be different on your phone. So, go to the /dev folder, see which files have nfc as owner, and edit the script accordingly.
The same applies to the following init.d script that disables bluetooth :
#!/system/bin/sh
mount -o rw,remount -t rootfs rootfs /
chown 0.0 /dev/smd2
chmod 000 /dev/smd2
chown 0.0 /dev/smd3
chmod 000 /dev/smd3
chown 0.0 /dev/smd7
chmod 000 /dev/smd7
chown 0.0 /dev/ttyHS0
chmod 000 /dev/ttyHS0
chown 0.0 /dev/uhid
chmod 000 /dev/uhid
chown 0.0 /dev/uinput
chmod 000 /dev/uinput
rm -r dev/socket/qmux_bluetooth
rm -f persist/.bt_nv.bin
mount -o ro,remount -t rootfs rootfs /
Alternatively, you can run the following once (but again, check that your files match the script and edit if needed):
mount -o remount,rw /system
chmod 000 /system/app/Bluetooth.apk
chmod 000 /system/app/BluetoothTest.apk
chmod 000 /system/etc/bluetooth
chmod 000 /system/etc/bluetooth/audio.conf
chmod 000 /system/etc/bluetooth/auto_pair_devlist.conf
chmod 000 /system/etc/bluetooth/auto_pairing.conf
chmod 000 /system/etc/bluetooth/blacklist.conf
chmod 000 /system/etc/bluetooth/bt_did.conf
chmod 000 /system/etc/bluetooth/bt_secure_manager_app_pub_key
chmod 000 /system/etc/bluetooth/bt_stack.conf
chmod 000 /system/etc/bluetooth/input.conf
chmod 000 /system/etc/bluetooth/iop_bt.db
chmod 000 /system/etc/bluetooth/main.conf
chmod 000 /system/etc/bluetooth/network.conf
chmod 000 /system/etc/permissions/com.samsung.android.sdk.bt.xml
chmod 000 /system/framework/com.broadcom.bt.jar
chmod 000 /system/framework/com.samsung.android.sdk.bt.jar
chmod 000 /system/framework/sec_feature.jar
chmod 000 /system/lib/libbluetooth_jni.so
rm /data/dalvik-cache/[email protected]@[email protected]
rm /data/dalvik-cache/[email protected]@[email protected]
rm /data/dalvik-cache/[email protected]@[email protected]
rm /data/dalvik-cache/[email protected]@[email protected]
rm /data/dalvik-cache/[email protected]@[email protected]
rm -r /data/data/com.android.bluetooth
rm -r /data/data/com.sec.android.app.bluetoothtest
mount -o remount,ro /system
Disable auto start on boot and receivers​
Edit as per your needs:
#!/system/bin/sh
/system/bin/pm disable android/com.android.server.BootReceiver
/system/bin/pm disable android/com.android.server.DRMEventReceiver
/system/bin/pm disable android/com.android.server.TimaServiceEventReceiver
/system/bin/pm disable android/android.accounts.ChooseAccountActivity
/system/bin/pm disable android/android.accounts.ChooseAccountTypeActivity
/system/bin/pm disable android/android.accounts.ChooseTypeAndAccountActivity
/system/bin/pm disable android/android.accounts.GrantCredentialsPermissionActivity
/system/bin/pm disable android/android.content.SyncActivityTooManyDeletes
/system/bin/pm disable android/com.android.internal.app.ChooserActivity
/system/bin/pm disable android/com.android.internal.app.DisableCarModeActivity
/system/bin/pm disable android/com.android.internal.app.HeavyWeightSwitcherActivity
/system/bin/pm disable android/com.android.internal.app.NetInitiatedActivity
/system/bin/pm disable android/com.android.internal.app.PlatLogoActivity
/system/bin/pm disable android/com.android.internal.app.ResolverGuideActivity
/system/bin/pm disable android/com.android.internal.os.storage.ExternalStorageFormatter
/system/bin/pm disable android/com.android.server.DrmEventService
/system/bin/pm disable android/com.android.server.MasterClearReceiver
/system/bin/pm disable android/com.android.server.ShutdownActivity
/system/bin/pm disable android/com.android.server.TimaService
/system/bin/pm disable android/com.android.server.updates.CertPinInstallReceiver
/system/bin/pm disable android/com.android.server.updates.SmsShortCodesInstallReceiver
/system/bin/pm disable android/com.android.server.wifi_offload.AppRunnOverWifiDialog
/system/bin/pm disable android/com.carrieriq.iqagent.service.IQService
/system/bin/pm disable android/com.carrieriq.iqagent.service.receivers.EnableToggleImpl
/system/bin/pm disable android/com.carrieriq.iqagent.service.ui.ShowMessage
/system/bin/pm disable android/com.carrieriq.iqagent.service.ui.UserPage
/system/bin/pm disable android/com.carrieriq.iqagent.stdmetrics.survey.android.QuestionnaireActivity
/system/bin/pm disable android/com.carrieriq.iqagent.stdmetrics.survey.android.QuestionnaireLaunchActivity
/system/bin/pm disable ccc71.at.free/ccc71.at.receivers.phone.at_boot_receiver
/system/bin/pm disable ccc71.at.free/ccc71.at.receivers.phone.at_boot_script_receiver
/system/bin/pm disable ccc71.at.free/ccc71.at.receivers.phone.at_sd_link_receiver
/system/bin/pm disable ccc71.at.free/ccc71.at.receivers.phone.at_battery_plug_receiver
/system/bin/pm disable ccc71.at.free/ccc71.at.receivers.phone.at_battery_unplug_receiver
/system/bin/pm disable ccc71.at.free/ccc71.at.receivers.phone.at_media_receiver
/system/bin/pm disable de.esoco.android.clipboard/de.esoco.android.clipboard.ClipNoteBroadcastReceiver
/system/bin/pm disable com.jb.mms/com.jb.mms.transaction.MmsSystemEventReceiver
/system/bin/pm disable com.jb.mms/com.jb.mms.transaction.SmsReceiver
/system/bin/pm disable com.jb.mms/com.jb.mms.transaction.MmsSystemEventReceiver
/system/bin/pm disable com.jb.mms/com.jb.mms.ui.security.StartSecurityReceiver
/system/bin/pm disable com.ceco.gm2.gravitybox/com.ceco.gm2.gravitybox.BootCompletedReceiver
/system/bin/pm disable com.oasisfeng.greenify/com.oasisfeng.greenify.Startup
/system/bin/pm disable android/com.carrieriq.iqagent.service.receivers.BootCompletedReceiver
/system/bin/pm disable com.lostnet.fw.free/com.lostnet.fw.AutostartReceiver
/system/bin/pm disable com.googlecode.networklog/com.googlecode.networklog.BootCompletedReceiver
/system/bin/pm disable org.torproject.android/org.torproject.android.OnBootReceiver
/system/bin/pm disable org.palemoon.mobile/org.mozilla.gecko.background.announcements.AnnouncementsBroadcastReceiver
/system/bin/pm disable org.palemoon.mobile/org.mozilla.gecko.background.healthreport.upload.HealthReportBroadcastReceiver
/system/bin/pm disable eu.chainfire.pryfi/eu.chainfire.pryfi.BackgroundServiceReceiver
/system/bin/pm disable com.android.settings/com.android.settings.accounts.AccountReceiver
/system/bin/pm disable com.android.settings/com.android.settings.accounts.AddAccountSettings
/system/bin/pm disable com.android.settings/com.android.settings.accounts.ChooseAccountActivity
/system/bin/pm disable com.android.settings/com.android.settings.accounts.SyncSettingsActivity
/system/bin/pm disable com.android.settings/com.android.settings.wifi.WifiStatusReceiver
/system/bin/pm disable com.android.settings/com.android.settings.nearby.MountReceiver
/system/bin/pm disable com.android.settings/com.android.settings.SettingsIntentReceiver
/system/bin/pm disable com.android.settings/com.android.settings.powersavingmode.PowerNotiReceiver
/system/bin/pm disable com.android.settings/com.android.settings.nfc.SBeamStateReceiver
/system/bin/pm disable com.android.settings/com.android.settings.dormantmode.DormantModeNotiReceiver
/system/bin/pm disable com.android.settings/com.android.settings.ethernet.EthernetConfigure
/system/bin/pm disable com.android.settings/com.android.settings.ethernet.EthernetEnabler
/system/bin/pm disable com.android.settings/com.android.settings.EthernetSettings
/system/bin/pm disable com.android.settings/com.android.settings.FactoryResetBroadcastReceiver
/system/bin/pm disable com.android.settings/com.android.settings.FactoryResetDialog
/system/bin/pm disable com.android.settings/com.android.settings.KiesLocationReceiver
/system/bin/pm disable com.android.settings/com.android.settings.MasterClearModemReset
/system/bin/pm disable com.android.settings/com.android.settings.MediaFormat
/system/bin/pm disable com.android.settings/com.android.settings.MediaFormatSd
/system/bin/pm disable com.android.settings/com.android.settings.nearby.NearbySettings
/system/bin/pm disable com.android.settings/com.android.settings.nfc.NfcGateReceiver
/system/bin/pm disable com.android.settings/com.android.settings.UsageStats
/system/bin/pm disable com.android.settings/com.android.settings.UsbSettings
/system/bin/pm disable com.android.settings/com.android.settings.UserDictionarySettings
/system/bin/pm disable com.android.settings/com.android.settings.XmlBackup
/system/bin/pm disable com.android.settings/com.samsung.wfd.WFDSourceService
/system/bin/pm disable com.sec.android.app.controlpanel/com.sec.android.app.controlpanel.PackageIntentReceiver
/system/bin/pm disable com.keramidas.TitaniumBackup/com.keramidas.TitaniumBackup.schedules.BootReceiver
/system/bin/pm disable com.vipercn.viper4android_v2/com.vipercn.viper4android_v2.receiver.BootCompletedReceiver
/system/bin/pm disable com.vipercn.viper4android.xhifi/com.vipercn.viper4android.xhifi.receiver.BootCompletedReceiver
Upgrading to later Android versions?​
Some people say that later Android versions are "safer" cuz vulnerabilities have been patched?
Nice one, that's what google and his friends want you to believe.
Like this you will jump on new versions as soon as you can, and they will tighten the knot.
Most vulnerabilities (except one or two) only work if one has installed a doddgy app, or has had a nasty app installed remotely hence the importance to disable pm, or opened a nasty sms through WAP push (WAP is anyway uninstalled if one has followed OP).
If you are the type of guy that installs apps from shaddy sources, and that clicks on any link on any sms that promises to increase your d...k's size to 25 inches then I agree, you should stick to later Android versions.
But as for me I'm not that type of guy, and anyway, what are those bad apps using those vulnerabilities we are talking about?
They are a few nasty bits, flooded amongst millions of Android apps on board over one billion Android devices, and those nasty bits account for something like 0.01% (even less if you only installs from trusted sources and don't click on 25 inches offer sms').
OTOH, google's tracking on Android is on 100 % of newly bought smartphones and wifi tablets, and its tracking becomes more and more sophisticated and harder and harder to remove as the Android version rises (it started with 4.2 and got much worse with 4.4).
Now think a bit, what kind of risk are you willy to take with your phone?
Still undecise? I don't have too much time to search the net about it, but since I'm a good uncle here's a link to start with:
http://www.greenbot.com/article/214...-is-on-android-but-good-luck-catching-it.html
ADDITIONAL LINKS​
Wanna read more? Here are two interesting projects you may like (thanks @Froschohnenamen for reminding me of those).
Pri-Fy from @Chainfire, the great master of root:
http://forum.xda-developers.com/showthread.php?t=2631512
NOGAPPS, or how to replace google proprietary stuff with some open source equivalents:
http://forum.xda-developers.com/showthread.php?t=1715375
WIP:
- safe to remove system/framework jars (done),
- safe to remove system/etc/permissions xmls (done),
- safe to remove system/libs (done),
- safe to remove stuff in system/bin and system/xbin (done),
- annihilate bluethooth and nfc (done),
- search the baseband/modem for privacy leaks (started, but still a long way to go). That one will be a hard task, I'm new in that field and most of it is closed. Any help will be very much appreciated, thanks in advance!!!
- 2-3 things more
This is something....
Love the idea! Hope will be able to help!
Just one thought to add, instead of a boot script to delete files, I have a Tasker task which deletes them as soon as the screen turns of
Brilliant !!!
Even people used to (and some still) call me outdated. "You don't beleive in Cloud" "You don't beleive Google" "You think too much. Be cool".
Now many of them come to me to ask how they can secure their data.
Times are surely changing
Subscribed.
I really like the idea of this thread. Now if we could get some other people to chime in. Lately I've been wanting to lock down my note4 as much as possible.
Awesome job! We do see that you know what you are talking about.
A lot of good advice in this guide. One again the help from devs would be appreciated.
Added to my sign
Thanks everybody for your support!!:good:
I've edited the first post and attached a file with some examples of restrictions with App Settings, hope it helps
One again the help from devs would be appreciated.
Click to expand...
Click to collapse
Yep...
Added to my sign
Click to expand...
Click to collapse
Thanks mate!
Where are the DEVs and SECURITY experts?
It seems that DEVs and SECURITY experts are avoiding this thread! Why? Did this thread smell? Or it's not worth your DEVs capabilities? Hmmm
Subscribed :good:
On a side note, I guess it would be a good thing to mention MoaAB for the host file part.
Even if it's written in the Github of XPrivacy it's worth to mention it here (to avoid any leak of data during the process): How to update Xprivacy? & Procedure to update a ROM
The host file I put in OP has been carefully hand picked by unclefab, but hey, he's getting old the poor fella and he had forgotten to mention MoaAB:silly:
Thanks for remembering him, link to MoaAB thread added in the host section on the second post:good:
I'm learning how AFwall+ works. Regarding Turla (https://securelist.com/blog/research/67962/the-penquin-turla-2/ & http://arstechnica.com/security/201...x-trojan-may-have-infected-victims-for-years/) how you block the below DNS IP?
Hardcoded C&C, known Turla activity: news-bbc.podzone[.]org
The domain has the following pDNS IP: 80.248.65.183
Click to expand...
Click to collapse
Just add this in your script (there are other ways, with the "OUTPUT" command for instance, but at the end of the day it does the same):
#
# Turla outbound
$IPTABLES -A "afwall" --destination "80.248.65.183/32" -j "afwall-reject" || exit
#
# Turla inbound
$IPTABLES -I INPUT -s 80.248.65.183/32 -j DROP || exit
I've updated the script in OP with the above lines, and I added the following address (credits @ukanth and @CHEF-KOCH ) for anyone that wants to learn more about firewall scripts:
https://github.com/ukanth/afwall/wiki/CustomScripts
I've added the credits as well, I don't know why but I had forgotten to put them, I'm really getting old:silly:
unclefab said:
Just add this in your script (there are other ways, with the "OUTPUT" command for instance, but at the end of the day it does the same):
#
# Turla outbound
$IPTABLES -A "afwall" --destination "80.248.65.183/32" -j "afwall-reject" || exit
#
# Turla inbound
$IPTABLES -I INPUT -s 80.248.65.183/32 -j DROP || exit
I've updated the script in OP with the above lines, and I added the following address (credits @ukanth and @CHEF-KOCH ) for anyone that wants to learn more about firewall scripts:
https://github.com/ukanth/afwall/wiki/CustomScripts
I've added the credits as well, I don't know why but I had forgotten to put them, I'm really getting old:silly:
Click to expand...
Click to collapse
Ok, done.
It is very inconvenient to enter a custom script from within AF+, we can't scroll the lines. I don't know a good app (like Notepad+ on PC) to create a custom .sh file from my phone so I'll have to do it from my PC.
I use that one, it has all what we need:
http://920-text-editor.en.uptodown.com/android
While I'm at it I'll add it to OP...
unclefab said:
Just add this in your script (there are other ways, with the "OUTPUT" command for instance, but at the end of the day it does the same):
#
# Turla outbound
$IPTABLES -A "afwall" --destination "80.248.65.183/32" -j "afwall-reject" || exit
#
# Turla inbound
$IPTABLES -I INPUT -s 80.248.65.183/32 -j DROP || exit
Click to expand...
Click to collapse
I get "error applying IP tables rules" and AFWall+ becomes disabled.
Using these two lines works.
iptables -I INPUT -s 80.248.65.183 -j DROP
iptables -A OUTPUT -s 80.248.65.183 -j DROP
If you get "error applying IP tables rules" and AFWall+ gets disabled it means that there's something wrong in the way the script has been written (on my device it works fine).
It could be that the EOL converson has not been set to Linux/Android, or it could be that when you copied pasted a quotation mark ( " ) or a line break got lost, or something else in the same style.
Anyway, if it works with OUTPUT don't bother, the important is to have it to work, right?
Actually when I first wrote this script I only made it outbound, using "afwall" --destination "whatever IP" -j "afwall-reject" || exit.
Then I made it inboud and I used INPUT, and I must confess that I didn't change the original outbound part to use OUTPUT instead of "afwall" --destination "whatever IP" -j "afwall-reject || exit", out of pure lazyness. :cyclops:
unclefab said:
Anyway, if it works with OUTPUT don't bother, the important is to have it to work, right?
Actually when I first wrote this script I only made it outbound, using "afwall"
Click to expand...
Click to collapse
Maybe it's because it's now called AFWall+? Or maybe because I didn't do any EOL conversion as my Windows Notepad/Wordpad doesn't have it? I just copy pasted what you posted in this thread. I have no idea about the script. I only added in the IP from the block incoming request example.
But your post #2 is more comprehensive and I can't apply it but maybe I can pick out bits and edit using templates? For example:
Why is this necessary at the beginning of each script? I didn't put it in.
Code:
# Necessary at the beginning of each script!
IP6TABLES=/system/bin/ip6tables
IPTABLES=/system/bin/iptables
What's bad about IPv6 and why do we need to deny IPv6 only connections?
Code:
# Deny IPv6 only connections
$IP6TABLES -P INPUT DROP
$IP6TABLES -P OUTPUT DROP
What are some of those other non google IP destinations that need to be rejected?
P.S. Found the error. It was the line breaks.

[APP] Waze Without Ads or POI Balloons or Popup Ads

Hello there folks! If you are like many of us, you enjoy using Waze to get around but in the last several versions you may have taken a active dislike to distracting and potentially dangerous advertising popping up while you are on the road. These advertisements come in two forms, one of which is so-called "Points of Interest" [POI] balloons and the other is pop-up advertising when you are stopped at an intersection.
I'm very sorry, but I don't need to see distracting pop-ups in traffic for the local movie, as this is an excellent way to end up having an accident due to how modern human brains have been wired to stare constantly at electronic screens. Plus the POI's obstruct other navigation icons or notifications of traffic on the screen. (My body will thank me if I don't stop by Dunkin' Donuts or the local fried chicken restaurant.)
The overall solution is you will download an older version of Waze, and overwrite the preferences file with a modified file that cuts out the advertising. You will need root level access in order to do this.
Since we are not modifying the program itself, and since the program is given away for free (in exchange for all that sweet, sweet "big data"), this is not what would be classified as "warez".
Most advertising from Waze is served from advil.waze.com or some localized equivalent thereof, depending on your language. We replace callouts in the preferences file to advil.waze.com instead with http://127.0.0.1 which causes the android computer to connect to nothing. We also set the number of POI balloons on the screen to zero.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Instructions are as follows:
0. If you have Waze already installed, your first step is to roll over to /data/data/com.waze/ and delete the entire folder. Then uninstall your existing copy of Waze.
1. Next download and install the attached version of Waze 3.9.6.0.
com.waze_3.9.6.0.zip 34.8 MB
https://mega.nz/#!VRcFmBSA!Ztlwd8tuQm_KNickcnlrr3kZ47edtmfnUEuWWbMMyTk
(No, it is not the most current version but this is what we do to block ads, and it works well enough.)
2. Open this version of Waze on your android device just to get it going. Close out after you get to the navigation screen.
3. Save the attached preferences zip onto your local disk, then decompress it there.
4. Take this preferences file, copy it onto your android device.
5. Navigate over to /data/data/com.waze/ and overwrite the preferences file you find there with our modified one.
6. Enjoy a pleasant, relaxing, ad-free drive.
This works excellently for older RK3188 CPU android head units.
(Alternately, if you discover this modified preferences file causes problems on your phone or hardware, you should uninstall, reinstall, and manually replace any preferences callout to "advil.waze.com" with http://127.0.0.1 then set any references in that file about "POI" to zero.)
As a general note, any rooted android device you have should have ad blocking enabled, which can be done by installing AdAway through FDroid. https://f-droid.org/ downside is most of these advertising filters are not quite well tuned to block advertisements in Waze.
So we get around this by adding advil.waze.com to the blacklist option in AdAway.
Works well even in later versions of Waze, even if you can't block out POI balloons with this approach.
Happy Motoring!
Any thoughts or questions?
Thanks! I applied the same to the latest version as of this post. I'll let you know how it goes. I also found the following and changed them, hopefully correctly.
Code:
ExternalPOI.Popup Enabled: no
ExternalPOI.My Coupons URL: https://127.0.0.2
ExternalPOI.Max POIs Display Small Screen: 0
@oreo27
Latest versions of Waze will overwrite preferences file on startup.
If you own the file by root, 1. that will get reset by android on bootup, and 2. waze creates an alternate file anyway.
We can solve this by owning preferences as root, and /data/data/com.waze as root after reboot.
If you're running magisk, you can create a script in /magisk/.core/post-fs-data.d/99waze with these contents; (remember to chmod 755 your script)
Code:
#!/system/bin/sh
sleep 30
chown root:root /data/data/com.waze
chown root:root /data/data/com.waze/preferences
chmod 755 /data/data/com.waze
chmod 644 /data/data/com.waze/preferences
After doing this, some of your other preferences won't save between launches, so I suggest you set waze up the way you like it before you apply this.
Unfortunately waze does not honour "Max POIs Display", "Coupons", "Ad Images" and "External POI URL*" in preferences.
It does honour these which gets rid of popups at stoplights;
ExternalPOI.My Coupons Enabled: no
ExternalPOI.Feature Enabled: no
ExternalPOI.Popup Enabled: no
You can still adblock advil.waze.com and adsassets.waze.com to get rid of POIs, however this results in waze constantly "searching for network". I suggest redirecting them to a valid https webserver instead. The cert will simply fail. (doesnt work.)
skanadian said:
@oreo27
Latest versions of Waze will overwrite preferences file on startup.
If you own the file by root, 1. that will get reset by android on bootup, and 2. waze creates an alternate file anyway.
We can solve this by owning preferences as root, and /data/data/com.waze as root after reboot.
If you're running magisk, you can create a script in /magisk/.core/post-fs-data.d/99waze with these contents; (remember to chmod 755 your script)
Code:
#!/system/bin/sh
sleep 30
chown root:root /data/data/com.waze
chown root:root /data/data/com.waze/preferences
chmod 755 /data/data/com.waze
chmod 644 /data/data/com.waze/preferences
After doing this, some of your other preferences won't save between launches, so I suggest you set waze up the way you like it before you apply this.
Unfortunately waze does not honour "Max POIs Display", "Coupons", "Ad Images" and "External POI URL*" in preferences.
It does honour these which gets rid of popups at stoplights;
ExternalPOI.My Coupons Enabled: no
ExternalPOI.Feature Enabled: no
ExternalPOI.Popup Enabled: no
You can still adblock advil.waze.com and adsassets.waze.com to get rid of POIs, however this results in waze constantly "searching for network". I suggest redirecting them to a valid https webserver instead. The cert will simply fail.
Click to expand...
Click to collapse
Thanks for the comprehensive answer. I actually did run into this problem when doing trying this myself. I made a similar .sh script which failed miserably for some reason
Code:
#Place this in /magisk/.core/post-fs-data.d since scripting this in a module doesn't seem to work.
# Change the owner of the Waze Directory and Preferences file to root
chown root:root /data/data/com.waze
chown root:root /data/data/com.waze/preferences
# Lock Permissions of the Waze Directory and Preferences file
chmod 555 /data/data/com.waze
chmod 555 /data/data/com.waze/preferences
# Replace any preferences that may have been modified
# Using the piping "|" delimeter so that I can use forward slashes which are common in web addresses.
# Using .* for wildcards so that it works with any region
# Using 127.0.0.2 in case one is utilizing localhost
sed -i -e 's|.*ExternalPOI.My Coupons Enabled:.*|ExternalPOI.My Coupons Enabled: no|g' /data/data/com.waze/preferences
sed -i -e 's|.*ExternalPOI.Feature Enabled:.*|ExternalPOI.Feature Enabled: no|g' /data/data/com.waze/preferences
sed -i -e 's|.*Download.Ad Images:.*|Download.Ad Images: http://127.0.0.2|g' /data/data/com.waze/preferences
sed -i -e 's|.*ExternalPOI.Max POIs Display:.*|ExternalPOI.Max POIs Display: 0|g' /data/data/com.waze/preferences
sed -i -e 's|.*Search Autocomplete.Ads URL:.*|Search Autocomplete.Ads URL: https://127.0.0.2|g' /data/data/com.waze/preferences
sed -i -e 's|.*ExternalPOI.URL:.*|ExternalPOI.URL: https://127.0.0.2|g' /data/data/com.waze/preferences
sed -i -e 's|.*ExternalPOI.URL V3:.*|ExternalPOI.URL V3: https://127.0.0.2|g' /data/data/com.waze/preferences
sed -i -e 's|.*ExternalPOI.URL V2:.*|ExternalPOI.URL V2: https://127.0.0.2|g' /data/data/com.waze/preferences
sed -i -e 's|.*ExternalPOI.Popup Enabled:.*|ExternalPOI.Popup Enabled: no|g' /data/data/com.waze/preferences
sed -i -e 's|.*ExternalPOI.My Coupons URL:.*|ExternalPOI.My Coupons URL: https://127.0.0.2|g' /data/data/com.waze/preferences
sed -i -e 's|.*ExternalPOI.Max POIs Display Small Screen:.*|ExternalPOI.Max POIs Display Small Screen: 0|g' /data/data/com.waze/preferences
I suppose the sleep is on there because the ownership changes within the first 30 seconds of boot? Perhaps that's why my permissions got messed up?
Also, I noticed that once the file is modified, Waze will initialize and download language. Does this happen on your end as well?
Also, is there a way to simply block ads without modifying the file/s?
Edit - Also, since I did this, Waze would just freeze up while in navigation. I've tried uninstalling and re-installing the app and that didn't seem to work.
oreo27 said:
I suppose the sleep is on there because the ownership changes within the first 30 seconds of boot? Perhaps that's why my permissions got messed up?
Click to expand...
Click to collapse
Yup.
oreo27 said:
Also, I noticed that once the file is modified, Waze will initialize and download language. Does this happen on your end as well?
Click to expand...
Click to collapse
After a fresh install, you have to start/exit waze twice before owning by root. It doesn't download the language files until the 2nd start.
oreo27 said:
Also, is there a way to simply block ads without modifying the file/s?
Click to expand...
Click to collapse
Blackhole/redirect advil/adsassets does a decent job, but you'll still get a big blank white page at most stop lights. Editting preferences is the only way to get rid of that. I wish someone would mod the apk to get rid of all the ads. (or waze offered a one time/subscription fee to remove them.)
oreo27 said:
Edit - Also, since I did this, Waze would just freeze up while in navigation. I've tried uninstalling and re-installing the app and that didn't seem to work.
Click to expand...
Click to collapse
It gets sketchy with adsassets/advil blocked but generally navigation still works for me. I've had more luck with redirection instead of blackholing them.(doesn't help)
The 3.9.6 apk supports these mods a little better (and more, like alert distance), but it lacks a lot of features like trips with friends, eta's, spotify integration, the inbox doesn't work, etc.
@oreo27
Code:
chown root:root /data/data/com.waze/waze/skins/default
chmod 555 /data/data/com.waze/waze/skins/default
find /data/data/com.waze/waze/skins/default -name "*x28*" | xargs rm -rf
Explanation: POI icons get placed in that directory with the name [randombull****][email protected] We'll prevent access to the directory and dump any cached POIs.
Full script for anyone else that comes here
https://forum.xda-developers.com/showpost.php?p=73880023&postcount=19
Can anyone confirm if the above works?
It does
Popups at stoplights are still showing, I'm working on it.
Hm, very interesting.
Is it possible to roll this into a Magisk module, or TWRP flashable, similar to iYTBP?
Would be much more user-friendly and appreciated.
Valiante said:
Hm, very interesting.
Is it possible to roll this into a Magisk module, or TWRP flashable, similar to iYTBP?
Would be much more user-friendly and appreciated.
Click to expand...
Click to collapse
I wound like this as well. Good stuff.
Valiante said:
Hm, very interesting.
Is it possible to roll this into a Magisk module, or TWRP flashable, similar to iYTBP?
Would be much more user-friendly and appreciated.
Click to expand...
Click to collapse
While that may be simpler, it's really quite easy to paste the code into a text file, rename to .sh, copy it where the directions say, and change it's permissions. I consider myself pretty dumb and useless and even I could figure it out XD
gohamstergo said:
While that may be simpler, it's really quite easy to paste the code into a text file, rename to .sh, copy it where the directions say, and change it's permissions. I consider myself pretty dumb and useless and even I could figure it out XD
Click to expand...
Click to collapse
It's not the fact of 'pretty dumb' ... It's for people who flash a lot of roms to make it substantially easier.
kinda confused on something... should i name the file 99waze or 99waze.sh?
tymestopm said:
It's not the fact of 'pretty dumb' ... It's for people who flash a lot of roms to make it substantially easier.
Click to expand...
Click to collapse
gohamstergo said:
While that may be simpler, it's really quite easy to paste the code into a text file, rename to .sh, copy it where the directions say, and change it's permissions. I consider myself pretty dumb and useless and even I could figure it out XD
Click to expand...
Click to collapse
From my understanding, everytime the app updates you have to do this again. That's why a module would make sense
EDIT; My mistake OP says it should survive, I misread
hmm i did this and now i am having issues updating or installing apps from google play store. I dont know if its directly related but just before i did this mod by adding a script for magisk and rebooting, I updated all my apps. now i cant. It just says download pending
It might be just a coincidence, but its weird...
Would love if somebody could package this in some way to make an easy install for us. Would donate via paypal.
anyone made any further progress?
Waze blocked owning the skins directory by root/removing permissions in the latest version. (4.29 broken, 4.28 works).
Hi waze devs! Can I have a t-shirt?
I don't think I'll be posting anything else here.
Code:
[12:45:xx.xxx (0xd15xxxx) 15xxx 15xxx Error] Java Layer: Skins dir /data/user/0/com.waze/waze/skins/default permissions were changed; Notifying and exiting [Logger_JNI.c:55 (Java_com_waze_Logger_WazeLogNTV)]
For future visitors, I'm adblocking advil.waze.com and using this code on 4.28 (check apkmirror) and it works fairly well.
Code:
#!/system/bin/sh
sleep 30
chown root:root /data/data/com.waze/waze/skins/default
chmod 555 /data/data/com.waze/waze/skins/default
find /data/data/com.waze/waze/skins/default -name "*x28*" | xargs rm -rf
lame.

Android tags seem not to install in apk

We are trying to run an app on an android watch that sends data to a database. When we run the app from android studio on the watch it works well.
However, when we try to build the apk and manually install the app on the watch the data is not sending.
It seems it may be due to some tags not being saved to the apk but I'm not sure why this is happening.
Ex. of tags:
adb shell am start -n "com.example.ourappcom.example.ourapp.Activity"
-a android.intent.action.MAIN -c android.intent.category.LAUNCHER
Thanks so much!

Categories

Resources