catsandencryption Are there any features from these that I can enable to improve device security without a lot of my apps breaking?
Hello, the approach I take is to enable all the exploit protections by default initially. Then, if an app crashes due to a specific setting when I first open it, I'll grant that particular permission on a case-by-case basis. I'm also careful when installing new apps, I make sure that they come from the developer and I have no shady app installed. I also try to have as few as apps installed as possible (less is more, it reduces the attack surface).
I my case, almost everything works with those setting enabled by default:
-Hardened memory allocator: on by default (except 1 banking app )
-Memory tagging: on by default (except 2 banking apps )
-Native code debugging: blocked by default (except 1 banking app )
-Webview JIT: Disabled for for all (except the PDF Viewer of GoS )
-Secure app spawning: on
But I need to grant exceptions for a couple of applications for those settings:
-> Dynamic code loading by memory/storage: restricted by default, allowed only if the app crashes.
Sometimes an app displays a notification stating that it tried to use Dynamic code loading by memory/storage, but the app still works well. Then I keep the setting disabled for this app.