remove the profile and start over again is the best way. You can do this a hundred times and i swear settings are decidedly added like a program flips a coin for consistency
Nnullable
- 23 Feb
- Joined Mar 7, 2024
Just a Good Samaritan. Also, not very smart... Sometimes i write/speak dynamically. Please accept my apology in advance if i say something that offends (point it out so i notice please)
hack the database as the root user?
There used to be a file format for it called vcard. Look toward that direction in a general search and how to export/import a vcard file.
- Edited
TheGodfather Dont make the mistake by assuming auditable open source code as being anything but OPEN.
It's neither good nor bad for privacy. But it could never be just one OR the other.
If you want safety and compliance testing, as well as compatability among many devices - privacy is barely considered in the grand scheme of it all.
The purpose of open source software is a seemingly ethical, professional, and an unofficial moral obligation .
This way everything is done Openly, in view where all can see.
It wasnt designed to be obvious or easy to figure out through observation because patentability obviousness.Is that transparent for you?
Only harm i can imagine coming is with a few specific instances.
- Device emulation - Most USB and bluetooth peripheral devices don't act as 1 single connected device, but often 2 or 3 or more. Some keyboards act as mulitple devices. Logitech used to sell imposter-like usb devices with programmable macros and assignable hot keys.
On Windows pcs, certain drivers would load and change all sorts of registry keys and kernel mode settings upon inserting those usb/bluetooth devices.
- The real problem can arrise when something like a usb keyboard can fool the connected device to thinking it is a storage device when in actuality it has no storage or virtually none.
these arent considered exploits though.. but they're different attack methods someone might use.. Or perhaps can be thought of as a modern convenience.
3.Watch out for devices that act as many different seperate devices. Those logitech devices would act as a camera, multiple keyboards, mouse, or any other combination of programmable devices one could imagine.
Do note that permissions arent always enforcable for every situation. E.g. Chromebooks dont follow Android permissions model and bring along more capability then the connected Android devices are aware of by setting multiple or shared UIDs.
Rooting is great if you know what you're doing or have a purpose to do it. It gives unfettered access to read and manipulate almost everything on the device. Which ends up being against the terms of the included licenses. So messing with files of any kind without exactly knowing what you are doing is absolutely designed to have consequences.
Like everything now a days, a multi layered approach to the security on your devices is your only viable option.. Which means accepting Google as the one true G
GrapheneOS in other words, keeping our devices safe requires multiple layers of security. There is no silver bullet.
Pretty sure Debian maintainers patch or investigate reports faster than MS or Google. Those 2 probably get hundreds or more reports per day from all over the world about any number of vulnerabilities but only a small fraction are reproducable and match the criteria those platforms pay out.
probably went off path a bit, my bad
missing-root back in the day, anti cheat companies used to serve bans to hackers and cheaters in certain video games based of MAC address. Was referred to as a Hardware ban.
Sucked to see that as a pre teenager, knowing u could never play that game ever again.
- Edited
An owners manual.. Comprehensive guide on how to do things. Or used to be a thing, but no longer are. @
Apple and Google's phones arent very different imo. Not at from the perspective u or I might be viewing from.
Pretty sure the key difference lay in who and where code is allowed to be injected into userspace from. But if you aren't familiar with program execution (it is not my forté) this probably will not be a factor for you.
Imo u might consider stock Android first to see what it is you are giving up first hand. The core Google components you'd find still exist on GrapheneOS because i genuienly believe phones wouldnt work the way you'd expect without google stuff entirely...
Is that all "upstream"? And are we all at the mercy of those same ppl as far as what flags, rules and policies are added to Vanadium.
Any idea who manages Labs or anything else in a webview?
i was joking with a friend who uses an Iphone yesterday. That it seems like Google and Apple are fueding over messages and i wouldnt put it past either to try and subvert each's users so everyone has not just one phone but both. IOs and Android. Problem solved then as far as compatability goes. Just use the right phone to talk to those kinds of phones right?
again, i was joking. this would actually be kinda terrible and i'd probably just switch to Apple anyway. i hear that's where AOL messaging software went years ago anyway
i have similair issue but i am fairly certain it's something i changed and not graphene although i just made a post about it minutes ago..
It's too easy to break notifications through removing access to contacts by apps on graphene. The "all or nothing" is no joke
ACuriousFellow are u aware what you are asking for? You basically are requesting a call monitoring service is added like Google has. When u block numbers with their dialer app, it records huge swaths of data for learning why u block the number. So recent conversations with the blockee, frequency of conversationsz topics etc in order to "improve services " for the future.
They also use lists collected this way to block spammers and scammers. In some countries like china and india people's contacts lists are added to databbases which make the services like Call Screening and help prevent spammers/scammer calling numbers from getting through in the first place.
That is what is involved in your phones apps knowing multiple phone numbers for the same people and it auto blocking each of them automatically
- In Contacts
- Edited
Several times now in an effort to conceal the names, numbers etc from people who contact me, i have inadvertently made going back to a usable state impossible without factory resetting the entire device.
Permissions, settings, features etc take me literal hours to complete. Even then i forget some things i end up locating later or forgetting all together.
But in realizing the phone refuses to show missed calls beyond the brief top notification that only initially is viewable for a split second. No call logs or missed calls show up beyond that initial top notification either. I have literally 1 second to decide to write down the number who called or hope they leave voicemail or the number is gone forever.
Now my issue is, since i am stubborn, and despite needing call log access, i am probably NOT going to factory reset the device to undo EVERYTHING just to appease the "all or nothing" people that decided this. I will work around it knowing it's an issue and hope i am aware enough at any moment with pen to write down caller numbers. But i imagine if anyone else finds themselves in this situation, like me, they might be quite unhappy to learn the difficulty added by this setting.
Maybe Graphene can make this more robust or easier to undo whatever i keep doing that butchers Contact access from everything. This shouldnt be a "feature" nor should it be all or nothing but what do i know.
Additionally. The color theme is too monochromatic. it hurts peoples eyes. It's a perfect example of what you'd not ever want to pay for.
It's like yall give ppl the choice of playing with tinted over lays that simulate different types of color blindness while forcing infrared grey scale only. I have a friend who is legit color blind and he doesnt even like it. He does however like some of the ways the greys can appear as different colors while actually not ever using them. Idk what sorcery that is called but doesnt matter
Same with color corrections?
I dont understand why all the preferenced can pretend to be set off or disabled. When in fact almost none of it can be disabled. Especially not system wide.
android 15 lacks nuts. idk about any of u, but i liked the sense of control previous versionsol of android appeared to have. How are people at all happy with all of the limitations in user space ?
The way yall are building things is putting user in a jail cell, placing it in a cargo container, putting them on a boat and sending them to mars with a comisary card to buy more useless shit
Xtreix how about the standard practice of a common application/package manifest? Could step it up and add dependencies with known list of libraries too.
"Authorizations".. Why use that word in particular? Do you play/work with IAM (identity) services?
It seems like a step in a different direction to not mention ATLEAST as much as any other place is doing.. People are generally pretty DUMB when it comes to their phones.
I get it. Permissions dont really work in the sense most ppl think they do.. But if the overall intent here is to free people from the burdon of a rapidly evolving thing, it isnt doing anyone any favors...
missing-root true but we're not talking a measly 5 apps with a dozen permissions. Just one of those (play store) has well over 150 last i checked. Others like GSF enable Google to do even more than that...
IF ANYTHING, i'd hope to see more transparency into what these apps are capable of doing, but u seem to think it's generic or not worth a common courtesey practiced in EVERY other market place or app store. Apkmirror and any of the mirror sites offer it, not just fdroid.
I do understand what you are saying though.. That permissions are generic. Most people dont care. Dont look at them, or seem to understand most any of it.
That isn't advocating for privacy or security. It's enabling a bad practice, period.