[CLOSED] What's the best approach in Android for disabling all peripheral ports for certain applications? - AOKP Feature Development

Mod edit: Thread closed as duplicate of
What's the best approach in Android for disabling all peripheral ports for certain applications?
My company has their own Android tablets created by an OEM partner and we are using custom ROM based on Android 11. The stakeholders have a strange requirement now. They want to allow only our applications (identified by bundle id) to have access...
forum.xda-developers.com
- Oswald Boelcke
Hey Guys,
My company has their own Android tablets created by an OEM partner and we are using custom ROM based on Android 11. The stakeholders have a strange requirement now. They want to allow only our applications (identified by bundle id) to have access to printers and bar code scanners connected to the peripheral ports. Users are allowed to install any application of their choice from the Playstore and they will function normally but when it comes to printing or scanning via peripheral ports, it shouldn't work.
We have full control over the AOSP build and can do whatever we want to ensure above requirements are met. I have no clue where to start and appreciate some help.
Thanks
Jugs

Related

[Q] Android development capabilities

Hey guys,
I'm in the very very early stages of my masters work and I was toying around with the idea of using an Android tablet for part of it. I want to ask you devs what can be done when modifying the Android OS itself specifically in terms of a few things.
1. Logins - I would like to implement a classic user/password combination with levels of access for user, administrator, and some sort of superuser.
2. Restriction of User account - I would like to lock the user into one particular application. It must be relaunched when the device is booted and if the application crashes (hopefully not!) it must be restarted. Additionally, no market access, web access, etc.
3. Remote management if possible
4. Data encryption if possible
5. Prevent anything from being introduced from USB ports, SD slot, etc if unwanted.
I guess this brings me around to - is Android even the most suitable platform for such an endeavor. I'm not sure, to be honest, but I would love to get into development myself and this seems like a great way to learn. This is all just one part of a much larger project that I don't want to discuss just yet so sorry for being lax on details.
Thanks guys!
Android runs a virtual machine system called dalvik, in which each application gets it's own insuranceof the machine. It's implemented in such a way that each application gets assigned a user id, which unfortunately for you means each app is a different user, at least to the system. That's going to be a major wrench in the multi user plans. taking that into consideration, to have the same level of control over your tablet you'd have to give even the most basic user level "root" access or else the apps will start crapping their collective pants. As far as unwanted usb, there are a few apps that implement this functionality freely available through the market. Same with remote management. What I haven't seen yet is total encryption and I don't know enough about it to say it's possible or not. Seems feasible though.
My advice: write a custom login screen widget and then bake all these features into a pretty rom.

[REF]Android terminology for newcomers

I got useful information From thread posted by ThC23. Credit goes to him
ThC23 said:
Decided to post this for anyone that is curious and wants to know the terminology used in these roms.
I take NO CREDIT for this, just wanted to share my findings. Source below. Let me know if I missed any.
http://wiki.cyanogenmod.com/index.php/Terminology
http://www.addictivetips.com/mobile/what-is-odex-and-deodex-in-android-complete-guide/
TERMINOLOGY -
*CWR aka ClockworkMod Recovery-
A custom recovery for Android phones and tablets that allows you to perform several advanced recovery, restoration, installation and maintenance operations on your Android device that aren’t possible with the stock recovery.
*Superuser-
A progam which gives unlimited access privileges to perform any or all operations on the operating system.
*KIES mini-
Kies Mini is an official application from Samsung that is used to update the software on your phone. It should not be confused with the full Kies application, which has a lot more functionality and is not officially supported in the USA. Therefore, abbreviating "Kies Mini" as just "Kies" can cause confusion.
*ODIN-
Odin is the Samsung software used to update Samsung phones. It does not work with any other devices other than official Samsung phones.
*OTA or FOTA-
(F)OTA stands for (Firmware) Over The Air and is the process by which required updates and enhancements to your phone's basic operating system can be sent to you through the cellular network. The Galaxy S II software update will be sent via FOTA and is available through Samsung Kies mini.0
*ODEX-
In Android file system, applications come in packages with the extension .apk. These application packages, or APKs contain certain .odex files whose supposed function is to save space. These ‘odex’ files are actually collections of parts of an application that are optimized before booting. Doing so speeds up the boot process, as it preloads part of an application. On the other hand, it also makes hacking those applications difficult because a part of the coding has already been extracted to another location before execution.
*DEODEX-
Deodexing is basically repackaging of these APKs in a certain way, such that they are reassembled into classes.dex files. By doing that, all pieces of an application package are put together back in one place, thus eliminating the worry of a modified APK conflicting with some separate odexed parts.
In summary, Deodexed ROMs (or APKs) have all their application packages put back together in one place, allowing for easy modification such as theming. Since no pieces of code are coming from any external location, custom ROMs or APKs are always deodexed to ensure integrity.
*Busybox-
A set of Unix tools / commands that has been compiled for use on your phone. These are not usually full-featured versions of the Unix commands found on the larger platforms counterparts, but they are pretty close and useful nonetheless.
*3G/4G-
3G/4G is the term generally used to describe 3rd/4rth Generation mobile telecommunications, specifically allowing for greater throughput of data over cellular networks.
*Baseband/Modem-
Baseband refers to the original frequency range of a transmission signal before it is converted, or modulated, to a different frequency range.
*Bloatware-
Software or 'apps' that you don't need, but come preinstalled to a device's /system partition, meaning that you cannot remove them unless the device has been rooted. Usually, these are apps are sponsored by a company and included by a carrier for profit. For example, the Photobucket app included on the G2 by TMobile.
*CDMA-
Code division multiple access (CDMA) is a channel access method used by various radio communication technologies. It should not be confused with the mobile phone standards called cdmaOne and CDMA2000 (which are often referred to as simply CDMA), which use CDMA as an underlying channel access method.
*Firmware-
Programs stored in the ROM, EPROM, or flash memory that usually control various internal electronic devices (Hard Drives, Keyboards, Displays, etc). Firmware is typically 'fixed' software that is not updated in consumer devices, however it is often updated (or 'flashed') by advanced users to fix bugs or add features to the device. Flashing firmware designed for one device onto a different device, or not following a specific procedure while flashing will often render the device unusable.
*Flash-
Non-volatile computer storage that can be electrically erased and reprogrammed (similar to EPROM). No power is needed to maintain the information stored in the chip. This technology is primarily used in memory cards and USB flash drives for general storage and transfer of data between computers and other digital products. Because of its ease of use, speed, ability to be updated (see flashing), this technology is often used in mobile devices, PDAs, digital media players.
*Kernel-
The central or core software component of most operating systems. Its responsibilities include managing the system's resources (the communication between hardware and software components) and can provide the lowest-level abstraction layer for resources (especially memory, processors, and I/O devices).
*IMEI-
The International Mobile Equipment Identity is a number unique to every GSM, WCDMA, and iDEN mobile device, as well as some satellite devices. The IMEI number is used by the GSM network to identify valid devices and therefore can be used to stop a stolen device from accessing the network. For example, if a mobile device is stolen, the owner can call their network provider and instruct them to "ban" the device using its IMEI number. This renders the device useless, whether or not the device's SIM is changed. The IMEI can be displayed by dialing *#06#.
*IRC-
Internet Relay Chat. Basically a chatroom, or a cross between Instant Messaging and a forum.
*Open-source-
Open-source is software that anyone is allowed to see the 'source' code. In the context of Android, Open-source refers to the approach to the design, development, and distribution of software. This offers accessibility to a software's source code for modification, improvement, bug-fixing, and security-enhancement. CyanogenMod is based on this principle.
*ASOP-
Android Open Source Project
*Radio-
The cellular radio on the device which needs control software called firmware to control it.
*ROM-
Read Only Memory. In the context of an Android device, ROM is the internal flash memory where the core operating system resides. It can also refer to a specific version firmware that can be applied to a device through a process usually referred to as flashing. An improperly flashed ROM can often brick the device, rendering it unusable.
*SDK-
Software Development Kit. You can find the Android SDK at http://developer.android.com/sdk.
*Vanilla-
A clean, unmodified version of something. In the context of Android ROMs, vanilla refers to the stock ROM that came pre-installed on the device.
*Widget-
An application that lives (in other words, is always running) on the homescreen instead of being 'run' like a regular app. Common examples are calenders and weather widgets.
Android Specific Definitions
*ADB-
Android Development Bridge. Command line tool used to communicate with & control the device over a USB link from a computer. The ADB command is found in the Android SDK.
*Android-
Unveiled on 5 November 2007, Android is a mobile operating system running on the Linux kernel developed by Google.
*Apps2SD-
Move applications from the internal NAND memory on the device to a removable SD Card.
*CyanogenMod Updater-
An updater written by Cyanogen that allows you to receive OTA (Over-The-Air) updates to CyanogenMod.
*Dalvik-Cache-
The dalvik-cache directory holds all of the pre-compiled .dex files created from installed apps. These files are static and do not change unless the app is updated.
*Fastboot-
Fastboot is protocol used to directly update the flash filesystem in Android devices from a host over USB. It allows flashing of unsigned partition images. It is disabled almost all production devices since USB support is disabled in the bootloader.
*GApps-
See Google Apps.
*Google Apps-
An add-on for Google's applications (Market, GMail etc.), packaged separately to avoid copyright issues
*Logcat-
A debugging tool built into Android devices that displays system logs as they occur. See Logcat.
*NANDroid-
A set of tools that will enable anyone who has root on their Android device to make FULL system backups, in case something goes wrong or you want to try out that new experimental ROM/theme. NANDroid will backup (and restore) /system, /data, /cache, and /boot partitions.
*Recovery Mode-
A special environment that you can boot into for troubleshooting and upgrading purposes.
*Tethering-
Using a wireless device (e.g. an Android phone) to share it's wireless data connection to another device (e.g. laptop). With an Android device, the wireless data connection can usually be shared via WiFi, Bluetooth or USB connection.
*Wipe-
Usually refers to wiping data and cache partitions of the device.
*Zipalign-
Reduces the amount of RAM consumed when running the application by allowing data to be mmap'd in; which causes all uncompressed data within the .apk, such as images or raw files, to be aligned on 4-byte boundaries.
Hacking Definitions
*Aftermarket-
Aftermarket generally refers to any product or service applied or requisitioned by end-users to add usability or functionality to the original product. Many aftermarket modifications can void the manufacturer's warranty. From a manufacturer's perspective, the after-market is any goods or services offered by the manufacturer directly to end-users of a given product or service. After-market services include support for warranties, contracts, and parts and accessories sales.
*Brick-
a device that no longer functions, generally caused by a failed firmware or SPL update. Since the device no longer works as intended, it is often referred to as a "brick" or "paper-weight", since that is all it is good for.
*Flashing-
The process of applying a firmware image (or ROM) to a device. It generally entails a very specific order of steps. Failing to complete any one of these steps properly may result in bricking the device.
*Kang-
The process of creating a code based of someone else's code or reapplying code that someone else created into your own code (e.g. git cherry-pick)
*Rooting-
Obtaining root ("administrator", or "full") access to the device. This means you can mount its internal memory partition as read/write, which lets you do various things: have USB or Wi-Fi tethering, uninstall applications you otherwise can't uninstall (e.g. the Amazon MP3 store), install applications that need root access (such as AdFree), disable the camera shutter sound (simply by deleting the shutter sound file), overclock or underclock the CPU, install and boot Debian, and so on. Installing CyanogenMod roots the device in the process. The "Superuser" app controls what applications may gain root privileges.
*Unlock-
Most GSM devices are locked to only work with the sim cards of a particular carrier. Obtaining root access (e.g. installing CyanogenMod) on the device usually does nothing to the sim-lock. The usual way to unlock the device to all SIM cards is to obtain a subsidy unlock code from a carrier.
Click to expand...
Click to collapse
For beginners it would be something:]
Yeah it's very helpful ^-^

[APP 2.2+] [ Tool ] Who is Tracking - which app tracking you

Who is Tracking '
Paid app link :https://play.google.com/store/apps/details?id=com.appz.trackingpaid
The application will detect any malicious APPS or BLOATWARE trying to track your location and user information (Bluetooth, WiFi, Bank Accounts, Messages, GPS, Social Networks information, 2G & 3G, etc.).
Application - Features :
'Who is Tracking' will detect any malicious apps or bloatware trying to track your location using GPS, or tracking user data from incoming / outgoing call lists, messages, Wi-Fi network information, 2G/3G data, Gmail, Facebook and similar apps. (Few features works only paid). Using this applicaiton you can find-out any one HACKING or TRACKING your phone.
WiFi, GPS,2G,3G,4G,GPS,NFC & SERVER TRACKER: After running the detection test, you will receive a real time sound alert if any traces of tracking is found. In-case anyone is trying to track you, the sound will come automatically (Real time sound works only paid).
App Server Tracker : Track apps server location (Which country server the app is using) Gmail Server location, FB, Twitter, etc...
Sus App list : List Danger apps
App Permission Blocker - Block certain application permission..
Sound Alert : After running the detection test, you will receive a real time sound alert if any traces of tracking is found. In-case anyone is trying to track you, the sound will come automatically (Real time sound works only paid).
System Information : Know about your device system information (Processor, CPU Core , SD card, Memory).
Android OS : Manufacture info, Model No, Product Release, Version, Device Info, Open GL, Kernel info, etc.
App Permission : List of permission required by the apps.
User Installed App : List of applications installed by user.
System App : List of System apps.
'Who is Tracking 'provides a list of all apps which are accessing GPS, Wi-Fi, 2G/3G, Gmail and other apps, and also the reason why the apps need this info (Few features works only paid).
Allow Mock Allocation : Enable this feature to send mock GPS data if any app is trying to access GPS info for longer duration or multiple times.
[ Example : Yelp has permissions to access GPS data to triangulate on your current location to provide you with restaurants around you. But it accesses the data only once on initialization, but malicious tracking apps will keep accessing the GPS data to track your movements and location at all times in the background. ]
Select - Delete History : Deletes complete history information from your device (Few features works only on paid version).
Why 'Who is Tracking ' was created
There are communities in hacker forums and blogs whereby they push to develop and publish apps which can track your data and retrieve the extracted information (Ex. your contact information, email IDs, phone numbers, saved bank account details or any other important information).
Android, to a certain extent, can restrict such apps from being published in PlayStoreTM , but hackers bypass these by using techniques like reflection, API mirroring, etc.
Even though all the custom ROM developers take immense care in providing ultimate user data protection, still hackers copy the OS, modify the APIs to provide access to personal data and hidden / internal APIs. By this, they will be able to monitor, record and access the data created by you while sharing with various apps on your Android device.
We used a couple new features of ANDROID to stop hackers to track the information.
http://selinuxproject.org/page/SEAndroid
http://source.android.com/compatibility/
http://efytimes.com/e1/fullnews.asp?...date=6/10/2013
http://securitywatch.pcmag.com/mobil...ld-for-android
http://www.electronicsweekly.com/eye...droid-2013-03/
Any issue, feel free mail me.. we will release paid version very soon with complete features..
Please Don't forget to hit THANKS BUTTON.
seems useful. it's always frightining to know what android can do with your data. how it can very easily compromise your privacy. but,apps like these should be installed by default in base os. users have right to know what's happening to their data and where it is going. Thanks fir your effort. also, a quick question? if some apps have so much power to buypass security protocols and hack ur data,then what about custom roms? aren't they capable of doing that? can a developer tweek things and add scripts that very easily transfer almost all data my phone collects? like most people here on xda, i use a lot of custom roms for my devices and this is one of the questions i always wonder.
Sent from Heaven
delay response..
Check the inline comment....
lavinigam said:
seems useful. it's always frightining to know what android can do with your data. how it can very easily compromise your privacy. but,apps like these should be installed by default in base os. users have right to know what's happening to their data and where it is going. Thanks fir your effort. also, a quick question?
if some apps have so much power to buypass security protocols and hack ur data,then what about custom roms?
What is the meaning of custom rom, developed by the general user etc.... There are default behavior in android which no one will change.. its a flow... so once app can work for any device with any rom.. simple logic....
aren't they capable of doing that? can a developer tweek things and add scripts that very easily transfer almost all data my phone collects?
If the custom rom dev thing he can do that... its your wish to choose to use or not.... but 99.9% they will not.. its all about brand name.. no one here to spoil or hack data... we are here to save users.. as much as we can...
like most people here on xda, i use a lot of custom roms for my devices and this is one of the questions i always wonder.
Hope you understand my answer...
Sent from Heaven
Click to expand...
Click to collapse

Strange File existing within System/

Hey guys,,
Most know me here,
I found this "KNOX" file located within many roms so far within system parameters...
"Please check in System>App>FixmoISA.apk"
Just curious who else has this?
I'm gonna supply you a link to policy of "KNOX" They allow 3rd party associates access (restrictions) and have "FULL CONTROL" over any device with there software built in.
http://electronicstaff.com/2013/a-breakdown-of-dod-security-controls-for-ios-and-android
Click the link and download the pdf of there policy and check it out...I think it's more or less a privacy issue now.
I included a photo of the Manifest file and it clearly says its active on my phone?
Opinions? Just "Freeze" the apk? Is there more within our phones?
Example from Site:Unclassified
2.2 Compliance via Third-party Applications and Components
The Samsung Knox platform provides various APIs for third-party solution vendors to develop Knox security components that can be used to implement several Mobile Operating System (MOS) SRG IA controls. This allows for the integration of any third-party applications and components to achieve compliance to the Samsung Knox Android STIG. The APIs that are provided by the Samsung Knox platform are:
 The Samsung MDM API includes over 500 policies and 1100 interfaces that are designed to be called by any MDM agent. Using these policies and interfaces, the MDM solution vendor can implement an MDM solution that can meet or exceed the SRG requirements. Examples of MDM vendors that implement the Samsung MDM API include Mobile Iron, AirWatch, SOTI, and Fixmo.
 The Samsung Integrity Services Layer (ISL) provides an interface that allows any third- party vendor to implement an Integrity Services Agent (ISA) solution to communicate with the on-device MDM agent. The ISA will provide scanning for integrity failures on the device, and report results to the MDM server. Examples of solutions that implement the ISL include Fixmo ISA.
 The Samsung MDM API includes advanced VPN policies and interfaces that allow an MDM administrator to configure any third-party IPSec VPN solution which implements the MDM interfaces. The VPN enables the Samsung Knox Android device to connect to DoD networks and uses a FIPS 140-2 validated cryptographic module to protect data in transit. Examples of solutions that implement the MDM interface include Mocana KeyVPN and Inside Secure VPN.
 The Samsung Smart Card API provides an interface that allows any third-party vendor to implement smart card reader functionality for the Samsung Knox Android device. olutions implementing this interface enable Samsung Knox Android to support applications leveraging the DoD Common Access Card (CAC) for PKI-related transactions, including user authentication to DoD networks and websites, S/MIME digital signatures, and, if desired, device unlock. Examples of solutions that implement this interface include the Biometrics Associates Bluetooth Smart Card Reader.

[Beta]SPatch - A new root free Xposed framework

SPatch By SK Team
What is SPatch ?
Let devices without root or bootloader unlock to use Xposed framework!
SPatch is a new root free Xposed framework, also available for devices not unlock bootloader.
Support both ARM(SandHook) and X86(SHook, for Android emulator)
Good performance
One key root (Alpha)
Frida framework inject (Frida gadget)
No module limit!
Support HUAWEI device​
System requirements:
Android 6.0+ (Support Android 11)
256MB ram or more
128MB free disk space
How to use:
1. Open SPatch app and wait until password activity appear
2. Input zero four times, then long press D button
3. Click visit button, remember numbers that pop up from the top of window, then input the numbers you remember
4. Click M button for Xposed or Cydia modules injecting, V for virtual machine, T for hack tools, rest of all for your explore
5. Click add button for add application you installed or apk file in internal storage, wait for action finish then reinstall or install application.
Application you add by SPatch will load all Xposed modules you installed. You can use SPromoter for module managing.
Official Web
spatch.die.lu
Official Web Of SPatch
Direct Download Link
github.com/lianglixin/SPatch/releases
Get it on Github​
Reserve for update
中国人请看这里:
如果使用QQ、TIM、微信之类的应用,可以使用SandVXposed!
快手、抖音(头条应用)以及京东、淘宝、B站之类的应用,可以使用SandVXposed,莫得问题!
SandVXposed可以在酷安(酷市场)搜索SandVXP下载。
多开、存储重定向、脱壳、虚拟定位 可以用SandVXP,请不要问为什么SPatch新版不能脱壳,谢谢!
You can now use SPromoter for module management!
Just let SPromoter hang in background, then you can enable Xposed module management and Sandboxed scoped storage features in SPromoter's menu.
V100.0 released:
YOU MUST BACKUP ALL YOUR DATA BRFORE YOU UPGRADE TO THIS VERSION
ALL DATA WILL BE LOST AFTER YOU UPGRADE TO V100.0!!!!!!
Support Android 13
Add more features
V66.0-S2 released:
Fix bugs
Add split apk support
Add Android 12 support
V60.6 released:
Add More features
Fix bugs
Root will always be better
([emoji88]Cr Droid[emoji88])
hopefully it works good luck
naivewinner said:
Support HUAWEI device​
Click to expand...
Click to collapse
does this only work for HUAWEI devices ?
loopypalm said:
does this only work for HUAWEI devices ?
Click to expand...
Click to collapse
Devices compatible with system requirements are also support.
naivewinner said:
Devices compatible with system requirements are also support.
Click to expand...
Click to collapse
i have a redmi note 8 runing custom rom (A10) rooted
i want to use xposed as system files and not as magisk module
do you have any idea how ?
Seems same app as lucky patcher
loopypalm said:
i have a redmi note 8 runing custom rom (A10) rooted
i want to use xposed as system files and not as magisk module
do you have any idea how ?
Click to expand...
Click to collapse
Use SPatch system mode for one key injection, or only modify framework.jar in /system/framework.
Those should work without root but acquire a bootloader unlock.
loopypalm said:
i have a redmi note 8 runing custom rom (A10) rooted
i want to use xposed as system files and not as magisk module
do you have any idea how ?
Click to expand...
Click to collapse
Use SPatch system mode for one key injection, or only modify framework.jar in /system/framework.
SPatch got a feature named enforce at whole system is available for function you mentioned that without magisk or root.
Those should work without root but acquire a bootloader unlock restriction. If you wanna inject Xposed feature to system apps, you must unlock device's bootloader or use a 0day for hacking.
naivewinner said:
V for virtual machine
Click to expand...
Click to collapse
downloaded from official github repo, V option and most of the other parts doesn't work. how to enable it?
Behroozfar said:
downloaded from official github repo, V option and most of the other parts doesn't work. how to enable it?
Click to expand...
Click to collapse
Download new version for VirtualMachine(QEMU)feature.
lianglixin/SPatch
SPatch a develope tool for WinNT/iOS/Android. Contribute to lianglixin/SPatch development by creating an account on GitHub.
web.archive.org
This application respects and protects the privacy of all users who use the service. In order to provide you with more accurate and personalized services, this application will use and disclose your personal information in accordance with the provisions of this privacy policy. However, this application will treat this information with a high degree of diligence and prudence. Except as otherwise provided in this privacy policy, the application will not disclose or provide such information to third parties without your prior permission. This application will update this privacy policy from time to time. When you agree to this application service usage agreement, you are deemed to have agreed to the full content of this privacy policy. This privacy policy is an integral part of this application service usage agreement. This Agreement applies to users of all ages. Please accept the privacy agreement under the age of 14 under the escort of guardians. 1. Scope of application (a) When you use the application network service or visit the web page of the application platform, the application automatically receives and records the non-privacy information on your browser and computer, including your IP address, the type of browser, the language used, the date and time of access, the software and hardware characteristics information and the web page record data you need; You understand and agree that the following information does not apply to this privacy policy: (a) The information collected by the application about your use of the application, including but not limited to application-in-application virtualization application information, application virtualization application installation information, permissions required for In-Application services, application crash and unique identifiers of users; (b) Violation of the law or the rules of application and the measures taken by the application to you (c) the application itself will not take the initiative to collect your privacy information, but it may collect your privacy information as follows: if you have installed QQ and QQ software, you may call QQ and indirectly access your privacy information. If you collect the information, you will take the privacy agreement of the two parties as the criterion. Gender information, property information, communication records and contents, credit information, trajectory, accommodation information, health and physiology information, transaction information and personal information of minors under 14 years old. (d) The application may call an external application, which may provide some privacy or non-privacy information to you, whichever is the privacy protocol of the external application. 2. Information Use (a) The application will not provide, sell, rent, share or trade your personal information to any unrelated third party unless prior permission is obtained from you, or the third party and the application (including the affiliated company of the application) provide services to you individually or jointly, and after the end of the service, they will be prohibited from accessing all such information, including all that they have previously been able to access. (b) This application also does not allow any third party to collect, edit, sell or disseminate your personal information free of charge by any means. If any user of this application platform engages in the above activities, the application has the right to terminate the service agreement with that user immediately upon discovery. (c) The information collected by this application will be used for advertisement pushing, user cheating analysis and disclosure of cheating, registration of accounts and enjoyment of our community services, application experience improvement, entity and virtual goods transactions, information security trend analysis. 3. Information Disclosure Under the following circumstances, this application will disclose your personal information in whole or in part according to your personal wishes or legal provisions: (a) Disclosure to third parties with your prior consent; (b) To provide the products and services you require, you must share your personal information with third parties; (c) Disclosure to third parties or administrative or judicial bodies in accordance with the relevant provisions of the law or the requirements of administrative or judicial bodies; (d) if you appear in violation of Chinese laws, regulations or the application service agreement or the relevant rules, you need to disclose it to the third party. (e) If you are a qualified intellectual property complaint and have lodged a complaint, you should disclose it to the respondent at the request of the respondent so that both parties can handle possible rights disputes; (f) In a transaction created on this application platform, if either party has fulfilled or partially fulfilled its transaction obligations and made a request for information disclosure, the application has the right to decide to provide the user with necessary information such as the contact mode of the other party of the transaction, so as to facilitate the completion of the transaction or the settlement of disputes. (g) Other disclosures that the application deems appropriate in accordance with laws, regulations or application policies. 4. Information Storage and Exchange (a) The information and information collected by this application about you will be stored on the server of this application and/or its affiliated company. This information and information may be transmitted to your country, region or overseas where the information and information collected by this application are located and accessed, stored and displayed abroad. (b) Any information about you can be retained during your use. You do not use this application and write off your account as not using it. The information you never use will be retained for no more than 180 days. You can contact us to delete, change or obtain the information we have collected about you. 5. Use of Cookies (a) If you do not refuse to accept cookies, the application will set or access cookies on your computer so that you can log in or use cookies-dependent application platform services or functions. This application uses cookies to provide you with more thoughtful personalized services, including promotional services. (b) You have the right to accept or reject cookies. You can reject cookies by modifying browser settings. But if you choose to reject cookies, you may not be able to log in or use cookies-dependent native application network services or functions. (c) The relevant information obtained through cookies set up in this application will be applicable to this policy. 6. Information Security (a) This application account has security protection function. Please keep your username and password information properly. This application will ensure that your information is not lost, abused and altered by encrypting user passwords and other security measures. Despite the aforementioned security measures, please also note that there is no \"perfect security measures\" on the information network. (b) When using this application network service for online trading, you will inevitably have to deal with the counterparty or potential trading pair. 7. Changes in the Privacy Policy (a) if we decide to change the privacy policy, we will publish these changes in this policy, our website and where we think it is appropriate so that you can understand how we collect, use your personal information, who can access this information, and under what circumstances we will disclose this information. (b) The Company reserves the right to amend this policy at any time, so please check it frequently. If any major changes are made to this policy, we will inform you by way of website notification. 8. User\'s Rights and Duties (a) Please protect your personal information properly and provide it to others only when necessary. If you find that your personal information is leaked, especially the username and password (or unique identifier) of this application has been leaked, please contact the application customer service immediately so that the application can take appropriate measures. (b) the main body of operation is contact: Company Name: Xin Wei Information Security Co., Ltd., registered address: No. 18 industrial road, Shuangliu District, Zhejiang Province. Contact: Miss Fang. E-mail: [email protected], QQ: 384550791.
Click to expand...
Click to collapse
@mlgmxyysd
Why does this framework collect so much private information?
Why it has a company behind it?
Why he used Epic but changed its Copyright name?
Update info · lianglixin/[email protected]
EPIC For Android P/Q By Saurik. Contribute to lianglixin/epic development by creating an account on GitHub.
web.archive.org
Can we trust it?
Spoiler: my bad
well, i think i already got an answer here, my bad, i shouldn't have asked :
不靠谱的喵(>^ω^<)
更新:更新Android支持版本,将商业化分为“免费商业化”和“付费商业化”两种,更新部分隶属关系 ———————————- 目前已知的几种 Xposed 实现方案的「作者是个人还是公司、是否开源、是否商业化」的总结 鉴于阻止运行的前车之鉴:「2.3.2之后(不含2.3.2)的阻止运行你敢用嘛?」 建议各位有使用 Xposed 的需求的朋友在条件适宜的情况下拥抱开源或者虽闭源但非商业化的实现方案。 另:在任何情况下均不建议关注「某个 Xposed 实现方案的作者」的「推送过多次广告文章」的微信公众号。( From @LetITFlyW )...
t.me
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
SekiBetu said:
lianglixin/SPatch
SPatch a develope tool for WinNT/iOS/Android. Contribute to lianglixin/SPatch development by creating an account on GitHub.
web.archive.org
@mlgmxyysd
Why does this framework collect so much private information?
Why it has a company behind it?
Why he used Epic but changed its Copyright name?
Update info · lianglixin/[email protected]
EPIC For Android P/Q By Saurik. Contribute to lianglixin/epic development by creating an account on GitHub.
web.archive.org
Can we trust it?
Spoiler: my bad
well, i think i already got an answer here, my bad, i shouldn't have asked :
不靠谱的喵(>^ω^<)
更新:更新Android支持版本,将商业化分为“免费商业化”和“付费商业化”两种,更新部分隶属关系 ———————————- 目前已知的几种 Xposed 实现方案的「作者是个人还是公司、是否开源、是否商业化」的总结 鉴于阻止运行的前车之鉴:「2.3.2之后(不含2.3.2)的阻止运行你敢用嘛?」 建议各位有使用 Xposed 的需求的朋友在条件适宜的情况下拥抱开源或者虽闭源但非商业化的实现方案。 另:在任何情况下均不建议关注「某个 Xposed 实现方案的作者」的「推送过多次广告文章」的微信公众号。( From @LetITFlyW )...
t.me
View attachment 5354583
Click to expand...
Click to collapse
Thanks for the top post., do not answer this kind of brain-dead question.
感谢顶贴,不回答这种脑残问题。
naivewinner said:
SPatch​
Click to expand...
Click to collapse
Thx for the updates
on the main github page you said (Supports Android 5.0~9.0)
and on release i saw : Add Android 12 Beta 1 Support
you forgot to update description maybe ...
my questions :
1-does it support A10 ?
2-does it support GravityBox and Xposed edge pro ?
and thank you !
loopypalm said:
Thx for the updates
on the main github page you said (Supports Android 5.0~9.0)
and on release i saw : Add Android 12 Beta 1 Support
you forgot to update description maybe ...
my questions :
1-does it support A10 ?
2-does it support GravityBox and Xposed edge pro ?
and thank you !
Click to expand...
Click to collapse
Support Android 10, and support GravityBox/XposedEdge for root mode
The newest version support Android 12 Beta 3 and fix issue which cause crash on Android 10/11+
Enable root mode may slow down device and cause bootloop, you can uninstall root plugin for disable root mode
To uninstall root plugin, just delete lu.die.spatch.plugin_full package at path /data/app
naivewinner said:
Support Android 10, and support GravityBox/XposedEdge for root mode
The newest version support Android 12 Beta 3 and fix issue which cause crash on Android 10/11+
Enable root mode may slow down device and cause bootloop, you can uninstall root plugin for disable root mode
To uninstall root plugin, just delete lu.die.spatch.plugin_full package at path /data/app
Click to expand...
Click to collapse
does it need internet ?
that's a no for me, sorry ....
loopypalm said:
does it need internet ?
that's a no for me, sorry ....
Click to expand...
Click to collapse
It doesn't need internet connection.
SPatch is currently update to V100.0 for Android 13, download it from http://spatch.die.lu/ and enjoy new beta version.
You must backup all your userdata before upgrade to V100.0, or your data may lost after you upgrade.
the passcode 0000 Long press D doesn't work.. tried many times
davie9x said:
the passcode 0000 Long press D doesn't work.. tried many times
Click to expand...
Click to collapse
Then you can click visit button, the password will show after you click it.

Categories

Resources