Can I Safely Disable IPSec Service? - Verizon Samsung Galaxy S6 Edge

I'm still seeing Android System using the lion's share of my battery life and I've started looking at the services running within it. The IPSec service is always near the top of the Android System pile and I was wondering if it's safe to disable it.
Some light Googling is turning up the service is related to VPN networking but there's not much more available (at least at an entry level of understanding). This link provides a decent understanding. I don't use remote access or corporate VPNs. My only real question is if I disable it using the App manager, are there routine functions that might be disabled? Should I be weary about Samsung Pay?
Thanks!

Finaly have you find a solution ? i'm reseaching on google and i can't find how disable ipsec on android , if you have know how do this , please let me know

Root your phone to enable super user abilities, and search for ipsec in rom manager, then disable it.

Realizing Im going back in time.. Or if you have a device like the Samsung S6 Active, an AT&T branded, close to perfect device which I have yet to find a way to Unlock the bootloader and root ..? Try AdHell-2. The link(s) are here at XDA. You must... 1.) Create a Samsung Account, 2.) Apply for a Developers Account SEAP, 3.) Request a License Key, 4.) Toggle On Unknown Sources in Settings/Lockscreen & Security/Unknown Sources, 5.) Install the AdHell-2 .apk, 6.) Then Activate the App by Copying your License Key. * This is a great App which not only serves as a highly-efficient Ad Block, but also allows for the Disabling of System and User Apps. Anyone reading this know of a way to root the S6 Active?

Related

Accessing features in Windows phone 8(.1) development

When developing an application for desktop windows, there's always a way to access functionality - sometimes through back doors like the registry, etc... I'm developing an application for Windows Phone 8.1, but there are certain pieces of functionality that aren't exposed in the PRT APIset that is available to me. For example, we want to ensure that the user has password protection on the lock screen when using the application. There doesn't seem to be any associated APIs to readily use. So my question is, are there back door ways to do such things? How? Is there a way to access ALL system settings - like a registry or something of the like?
proch said:
When developing an application for desktop windows, there's always a way to access functionality - sometimes through back doors like the registry, etc... I'm developing an application for Windows Phone 8.1, but there are certain pieces of functionality that aren't exposed in the PRT APIset that is available to me. For example, we want to ensure that the user has password protection on the lock screen when using the application. There doesn't seem to be any associated APIs to readily use. So my question is, are there back door ways to do such things? How? Is there a way to access ALL system settings - like a registry or something of the like?
Click to expand...
Click to collapse
Another question would be - if something like intune can enforce lock screen password policies, shouldn't I be able to do it the same way that intune does it? If so, how? If not - why not?
It's not possible to check if user enabled lock screen password or not as far as I know
but if you want to made your app secure (because it may include important data)
you can create a password for your own application !
I did it in a little notepad app my password page allow user to set a password with all English and Persian Characters , numbers and special Chars like [email protected]#$ and etc.
Sent from my RM-994_eu_poland_1183 using Tapatalk
It's pretty easy to check, using the registry, but at least in 8.0 that's not allowed at all for store apps (your app would get rejected). I don't know if the rules changed for 8.1. There are ways to sneak past the store checks, but they could pull your app from the store if they ever found out. I know of at least three ways to access the registry APIs (4 in WP8.1) and two of them are pretty hard to detect unless somebody checks for them specifically... but they're the kind of technique that malware uses, so such checks may be in place.
I don't know what InTune is doing, specifically - I'd need to pull the app apart to see - but there are special application capabilities (not normally available to third-party developers) that can query and even set policies. Apps without those capabilities will get Access Denied if they try to use the same methods though, and normally you can't add those capabilities to your app.
GoodDayToDie said:
It's pretty easy to check, using the registry, but at least in 8.0 that's not allowed at all for store apps (your app would get rejected). I don't know if the rules changed for 8.1. There are ways to sneak past the store checks, but they could pull your app from the store if they ever found out. I know of at least three ways to access the registry APIs (4 in WP8.1) and two of them are pretty hard to detect unless somebody checks for them specifically... but they're the kind of technique that malware uses, so such checks may be in place.
I don't know what InTune is doing, specifically - I'd need to pull the app apart to see - but there are special application capabilities (not normally available to third-party developers) that can query and even set policies. Apps without those capabilities will get Access Denied if they try to use the same methods though, and normally you can't add those capabilities to your app.
Click to expand...
Click to collapse
Thanks for this great and detailed information. See, that's exactly what I'd do if I were developing a desktop app - since i know that intune does it, I'd figure out how intune does it and voila. I'm finally getting over the idea that the same methodologies apply to windows phone development.
For my own educational purposes (since I want to understand this platform better), I would really like to know specifically how you go about accessing the registry APIs (for example). If there's any way for you to describe any number of these methods, I'd greatly appreciate it. Thanks again!
My NativeAccess libraries (check my signature, or search on the forum or on Codeplex) contain an example of one way to access the registry. The code is open-source; you may use the libraries as-is (don't expect to get them into the store, though I won't stop you from trying), use the source code as a reference, or modify/build them yourself; the license is very liberal (MS Permissive). The functions I use are generally documented on MSDN, in the desktop APIs section; the phone has the same functions, although the DLL names are changed and the header files hide them.

Quick Qs - Wanam Xposed, Tethering, and disabling OTA

Hey folks!
I followed the instructions posted by allcaps33 at http://forum.xda-developers.com/showthread.php?p=53549710 to get provisioning disabled, and the native hotspot app is working for me now! I just wanted to confirm if this was an operation similar to running Wifi Tether Router on an unlocked/rooted device (I had an S2Sky prior that I tethered off of regularly). I've got one of those too-rare Unlimited Data plans and am traveling cross-country, made possible by being able to tether my laptop to my phone to work. Just wanting to confirm that this was relatively as secure as using the Wifi Tether Router on my S2Sky. On a semi-related note, that app doesn't seem to want to run properly on my S5; when I click Enable Router it turns on the Wifi, which immediately connects to the house's wired router. It still broadcasts but doesn't send data, and it's hit or miss if a device can even connect to it from there.
Next question - I'm used to flashing a CM ROM within the first couple days of getting a new phone, which doesn't seem feasible just yet with the S5 (from what I can tell anyway; I'm not used to having a current-gen device). I've heard about the myriad evils of OTA updates, and was hoping to get help on how to disable them. I would like to avoid my device upgrading to a point where my above-stated desired functionality is disabled. Ideally, I'd like to get rid of the various bloatware apps as well, though am not sure how to go about that.
I appreciate your time and support, and thanks for being a community that's always been there for me as I derp along with my fancy internet boxes!
Hi!
The absolute easiest way is to use Rom Toolbox. I have the pro version, but I believe it's available in the lite version as well.
Download and open up RTB.
Tap on "App Manager"
Then scroll down until you see "AT&T Software Update"
Tap on it.
A popup will display. Swipe from right to left, and you will be on the "Advanced" tab.
Scroll down and tap on "Advanced Freeze."
You will come to a screen which shows you the Activities, Recievers, Services, and Providers. Tap on EACH box/line. This will Disable OTA services.
We're not done yet!
Go back to the App Manager screen again, and repeat the process for an app called "LocalFOTA"
Finished!
I also Disable most of the bloatware and Knox this way.
Have fun!
---------- Post added at 12:58 PM ---------- Previous post was at 12:49 PM ----------
Now for the hard part...
Yes this can be as secure as the other the tether. Ensure you use and change the password service with the app.
As for the tether turning your wifi on, it is supposed to do that. The best way to get this to work is to turn the tether on and off (then on again). If this does not work, try emptying the data/cache for the built-in tether app. And start from scratch.
allcaps33 said:
I also Disable most of the bloatware and Knox this way.
Click to expand...
Click to collapse
KNOX - What is it? I'm under the impression it's some sort of security for the phone, to protect from malicious activity that you might not be aware of, but also that it'll "tattle" on you if you mod your phone in a way AT&T doesn't approve.
Knox is two things.
1) It is a security container for apps. It works as both a license/drm type software for Samsung official apps.
And
2) Android contains a root environment at all times. This is what makes SU possible. It used to be quite easy to invoke Android system calls as root.
Root is actually separate from super user. Knox, like SEPolicy, helps dev companies detect, halt, and/or hinder apps, not su itself, but apps that that use these root system calls.
Be wise, even though Knox itself does not "report" these types of actions, it still logs them. And there are other apps that can read these logs and send out these reports. I should say (and I'm only guessing) that only work/company issued phones are setup like this. Not your personal phone.
In fact, our phones actually contain a file which logs all root system calls. It has nothing to do with Knox but, I believe this binary is what hinders us open devs, but makes it easy for Samsung and AT&T to restore/repair our phones.
For more info on Knox:
https://www.samsungknox.com/en/partners/app-developers

Samsung services dialling home to China (360.cn and 360safe.com) after Pie upgrade

Having ran NetGuard in logging mode for a few days now I've noticed that many of Samsung's in-built services are contacting web services associated at multiple DNS subdomains under:
- *.360.cn
- *.cloud.360safe.com
A lot of them on unsecured HTTP port 80 (some go via HTTPS port 443).
Services I've observed this behaviour so far are:
- Samsung ApexService
- ANT+ HAL Service
- Application installer (com.sec.android.preloadinstaller)
- Assistant Menu
- AirCommandManager (com.samsung.android.aircommandmanager)
- Plus too many other default services to list (most of which cannot be disabled)
Phone's running on stock unbranded SM-N960F build number PPR1.180610.011.N960FXXU2CSA2.
I've scanned the phone using bundled Device Care's McAfee security scan with no findings.
Has anyone else observed this behaviour?
sengork said:
Having ran NetGuard in logging mode for a few days now I've noticed that many of Samsung's in-built services are contacting web services associated at multiple DNS subdomains under:
- *.360.cn
- *.cloud.360safe.com
A lot of them on unsecured HTTP port 80 (some go via HTTPS port 443).
Services I've observed this behaviour so far are:
- Samsung ApexService
- ANT+ HAL Service
- Application installer (com.sec.android.preloadinstaller)
- Assistant Menu
- AirCommandManager (com.samsung.android.aircommandmanager)
- Plus too many other default services to list (most of which cannot be disabled)
Phone's running on stock unbranded SM-N960F build number PPR1.180610.011.N960FXXU2CSA2.
I've scanned the phone using bundled Device Care's McAfee security scan with no findings.
Has anyone else observed this behaviour?
Click to expand...
Click to collapse
I haven't looked at this as closely as you have,but,I'm guessing it's all tied-in from the Device Maintenance section of the phone.
The name of the company Samsung is currently in bed with is QIHOO:
https://en.wikipedia.org/wiki/Qihoo_360
https://seekingalpha.com/article/4165136-cheetah-mobile-lost-samsung-relevant-risks
Remember/heard of Cheetah Mobile (of Clean Master infamy) ?
https://www.prnewswire.com/news-rel...mobile-security-and-innovation-300043298.html
Well,that's who used to be in partnership w/Samsung & the Device Maintenance aka built-in Clean Master to most,if not all Samsung mobile products.
Fast-Forward to present day & we still have the crapware on our phones,likely scraping info & selling it to anyone interested.
Now,it's just with another company,presumably one with friendlier terms for Samsung.
As you've probably noticed,you can't fully disengage/disable/deny all permissions here,less root (or ADB disabling/package disabler apps).
At least you have a phone that's rootable & can cruise the ROM scene for one that leaves this crap off the phone.
If root isn't an option:
Set up your phone & apps,fine-tune as you like for battery optimization on a per app basis/permissions/etc....
Then,either via ADB or a package disabler,disable the apps responsible for the crapware,especially the ones related to Device Maintenance.
https://forum.xda-developers.com/ga...laxy-note-9-bloatware-removal-thread-t3857508
Follow the link in the OP to the S9/S9+ forum/thread,it gives a better idea of what each .apk actually is/ties into.
Here's the app I use to disable crapware/things I don't use:
https://play.google.com/store/apps/details?id=com.wakasoftware.appfreezer
As to which apps to disable,the S9/S9+ thread,while not an exact match,should give you info on what to disable to stop the phone from pinging the 360 mothership & hopefully,not having any ill effects on the apps you want to keep on-board.
If you want a better idea of how each app is interconnected throughout the phone,use these two apps to take a look:
https://play.google.com/store/apps/details?id=com.ubqsoft.sec01
SD Maid (Pro):
https://play.google.com/store/apps/details?id=eu.thedarken.sdm&hl=en_US
(See the App Control & file manager sections of SD Maid for detailed app info).
Anyhoo,back to curbing the nonsense:
Whichever method you use to disable,should you choose to do so,start with this one:
com.samsung.android.lool (Device Maintenance).
This will make the entire Device Maintenance section inaccessible as well.
That is why I suggest disabling vs outright uninstalling (which necessitates a factory reset to get it back).
You may need to access Device Maintenance for whatever reason from time to time,hence the recommendation for disabling vs uninstalling.
Continue monitoring for a day or so & see if the pinging to the Mothership subsides,or hopefully puts a full-stop to it.
Please keep us updated on what,if any actions you take w/the results. :good:
Excellent overview, it's quite an eye opener thanks for the info.
I've disabled and force-stopped "com.samsung.android.lool" (amongst other junkware) and so far NetGuard hasn't shown a single network log entry to any of the 360 domains. I've uninstalled all 4 Facebook packages. Continuing to monitor this closely. My thought is that I can re-enable "com.samsung.android.lool" from time to time whenever maintenance is needed and then disable it again. Even better Adhell3 might be useful for blocking "com.samsung.android.lool" network attempts whilst retaining it for device management purposes however I haven't tried this yet.
For reference, here is my current list of disabled packages:
Code:
package:com.monotype.android.font.rosemary
package:com.samsung.android.app.ledcoverdream
package:com.sec.android.widgetapp.samsungapps
package:com.samsung.android.app.galaxyfinder
package:com.samsung.svoice.sync
package:com.cnn.mobile.android.phone.edgepanel
package:com.samsung.android.easysetup
package:com.samsung.android.provider.stickerprovider
package:com.samsung.android.app.sbrowseredge
package:com.samsung.android.rubin.app
package:com.sec.android.cover.ledcover
package:com.samsung.faceservice
package:com.monotype.android.font.foundation
package:com.sec.android.widgetapp.easymodecontactswidget
package:com.samsung.android.app.settings.bixby
package:com.sec.android.app.billing
package:com.samsung.android.app.selfmotionpanoramaviewer
package:com.samsung.android.game.gamehome
package:com.samsung.daydream.customization
package:com.sec.enterprise.knox.attestation
package:com.samsung.systemui.bixby2
package:com.dsi.ant.service.socket
package:com.microsoft.skydrive
package:com.samsung.SMT
package:com.samsung.android.drivelink.stub
package:com.android.hotwordenrollment.xgoogle
package:com.samsung.android.sm.devicesecurity
package:com.dsi.ant.sample.acquirechannels
package:com.samsung.android.aircommandmanager
package:com.samsung.android.bixby.service
package:com.samsung.android.smartface
package:com.android.egg
package:com.samsung.android.emojiupdater
package:com.samsung.android.bixby.agent
package:com.android.printspooler
package:com.android.hotwordenrollment.okgoogle
package:com.samsung.android.hmt.vrsvc
package:com.samsung.storyservice
package:com.android.dreams.basic
package:com.android.bips
package:com.samsung.android.game.gametools
package:com.samsung.android.app.simplesharing
package:com.samsung.android.service.peoplestripe
package:com.samsung.android.da.daagent
package:com.dsi.ant.plugins.antplus
package:com.samsung.android.app.taskedge
package:com.google.android.webview
package:com.samsung.android.app.mirrorlink
package:com.dsi.ant.server
package:com.samsung.android.allshare.service.fileshare
package:com.samsung.android.universalswitch
package:com.sec.android.app.apex
package:flipboard.boxer.app
package:com.google.android.printservice.recommendation
package:com.monotype.android.font.chococooky
package:com.android.dreams.phototable
package:com.samsung.android.bixbyvision.framework
package:com.samsung.android.game.gos
package:com.android.wallpaper.livepicker
package:com.samsung.android.beaconmanager
package:com.sec.enterprise.mdm.services.simpin
package:com.samsung.android.stickercenter
package:com.samsung.android.bixby.wakeup
package:com.samsung.android.samsungpass
package:com.samsung.android.spayfw
package:com.linkedin.android
package:com.samsung.android.lool
package:com.samsung.android.knox.analytics.uploader
package:com.samsung.android.sm.policy
package:com.sec.android.emergencylauncher
package:com.samsung.android.visionintelligence
package:com.samsung.android.app.watchmanagerstub
package:com.samsung.android.svoiceime
package:com.samsung.android.mateagent
package:com.enhance.gameservice
package:com.google.vr.vrcore
package:com.hiya.star
package:com.sec.enterprise.knox.cloudmdm.smdms
package:com.samsung.android.app.appsedge
package:com.samsung.android.samsungpassautofill
package:com.monotype.android.font.cooljazz
package:com.samsung.android.allshare.service.mediashare
package:com.samsung.android.app.clipboardedge
package:com.samsung.android.app.motionpanoramaviewer
package:com.samsung.android.bio.face.service
package:com.samsung.android.bixby.agent.dummy
sengork said:
Excellent overview, it's quite an eye opener thanks for the info.
I've disabled and force-stopped "com.samsung.android.lool" (amongst other junkware) and so far NetGuard hasn't shown a single network log entry to any of the 360 domains. I've uninstalled all 4 Facebook packages. Continuing to monitor this closely. My thought is that I can re-enable "com.samsung.android.lool" from time to time whenever maintenance is needed and then disable it again. Even better Adhell3 might be useful for blocking "com.samsung.android.lool" network attempts whilst retaining it for device management purposes however I haven't tried this yet.
For reference, here is my current list of disabled packages:
Code:
package:com.monotype.android.font.rosemary
package:com.samsung.android.app.ledcoverdream
package:com.sec.android.widgetapp.samsungapps
package:com.samsung.android.app.galaxyfinder
package:com.samsung.svoice.sync
package:com.cnn.mobile.android.phone.edgepanel
package:com.samsung.android.easysetup
package:com.samsung.android.provider.stickerprovider
package:com.samsung.android.app.sbrowseredge
package:com.samsung.android.rubin.app
package:com.sec.android.cover.ledcover
package:com.samsung.faceservice
package:com.monotype.android.font.foundation
package:com.sec.android.widgetapp.easymodecontactswidget
package:com.samsung.android.app.settings.bixby
package:com.sec.android.app.billing
package:com.samsung.android.app.selfmotionpanoramaviewer
package:com.samsung.android.game.gamehome
package:com.samsung.daydream.customization
package:com.sec.enterprise.knox.attestation
package:com.samsung.systemui.bixby2
package:com.dsi.ant.service.socket
package:com.microsoft.skydrive
package:com.samsung.SMT
package:com.samsung.android.drivelink.stub
package:com.android.hotwordenrollment.xgoogle
package:com.samsung.android.sm.devicesecurity
package:com.dsi.ant.sample.acquirechannels
package:com.samsung.android.aircommandmanager
package:com.samsung.android.bixby.service
package:com.samsung.android.smartface
package:com.android.egg
package:com.samsung.android.emojiupdater
package:com.samsung.android.bixby.agent
package:com.android.printspooler
package:com.android.hotwordenrollment.okgoogle
package:com.samsung.android.hmt.vrsvc
package:com.samsung.storyservice
package:com.android.dreams.basic
package:com.android.bips
package:com.samsung.android.game.gametools
package:com.samsung.android.app.simplesharing
package:com.samsung.android.service.peoplestripe
package:com.samsung.android.da.daagent
package:com.dsi.ant.plugins.antplus
package:com.samsung.android.app.taskedge
package:com.google.android.webview
package:com.samsung.android.app.mirrorlink
package:com.dsi.ant.server
package:com.samsung.android.allshare.service.fileshare
package:com.samsung.android.universalswitch
package:com.sec.android.app.apex
package:flipboard.boxer.app
package:com.google.android.printservice.recommendation
package:com.monotype.android.font.chococooky
package:com.android.dreams.phototable
package:com.samsung.android.bixbyvision.framework
package:com.samsung.android.game.gos
package:com.android.wallpaper.livepicker
package:com.samsung.android.beaconmanager
package:com.sec.enterprise.mdm.services.simpin
package:com.samsung.android.stickercenter
package:com.samsung.android.bixby.wakeup
package:com.samsung.android.samsungpass
package:com.samsung.android.spayfw
package:com.linkedin.android
package:com.samsung.android.lool
package:com.samsung.android.knox.analytics.uploader
package:com.samsung.android.sm.policy
package:com.sec.android.emergencylauncher
package:com.samsung.android.visionintelligence
package:com.samsung.android.app.watchmanagerstub
package:com.samsung.android.svoiceime
package:com.samsung.android.mateagent
package:com.enhance.gameservice
package:com.google.vr.vrcore
package:com.hiya.star
package:com.sec.enterprise.knox.cloudmdm.smdms
package:com.samsung.android.app.appsedge
package:com.samsung.android.samsungpassautofill
package:com.monotype.android.font.cooljazz
package:com.samsung.android.allshare.service.mediashare
package:com.samsung.android.app.clipboardedge
package:com.samsung.android.app.motionpanoramaviewer
package:com.samsung.android.bio.face.service
package:com.samsung.android.bixby.agent.dummy
Click to expand...
Click to collapse
:good: THX for the update,much appreciated! :good:
I was gonna post this in a bit (just noticed it myself this afternoon,LOL) ,but,it looks like you have added the other two .apks to your disabled list:
https://forum.xda-developers.com/showpost.php?p=78103170&postcount=123
It'a a shame the mfgs aren't required to be more up-front & state ,in common use language where the print is larger than a gnat's ass, the exact nature of the .apks & even more control over the services installed on them.
KOLIOSIS said:
It'a a shame the mfgs aren't required to be more up-front & state ,in common use language where the print is larger than a gnat's ass, the exact nature of the .apks & even more control over the services installed on them.
Click to expand...
Click to collapse
The closest to a manufacturer application list I came across was:
- https://support.samsungknox.com/hc/en-us/articles/115015195728-Common-Criteria-Mode
- For example https://docs.samsungknox.com/CCMode/N960F_O.pdf
This seems to relate to computer security certification known as Common Criteria:
- https://en.wikipedia.org/wiki/Common_Criteria
So the dial home behaviour seems to have passed this security certification (or perhaps the network flows were not part of the certification process). We can only guess...
I've had to reenable the following items to get APK installs to function (either through Play Store or locally stored APKs):
Code:
com.samsung.android.sm.policy
com.samsung.android.sm.devicesecurity
https://forum.xda-developers.com/ga...val-thread-t3857508/post78744845#post78744845
Continuing to monitor with NetGuard. So far ~1hr I haven't seen the packets repeat.
sengork said:
I've had to reenable the following items to get APK installs to function (either through Play Store or locally stored APKs):
https://forum.xda-developers.com/ga...val-thread-t3857508/post78744845#post78744845
Continuing to monitor with NetGuard. So far ~1hr I haven't seen the packets repeat.
Click to expand...
Click to collapse
IIRC,something like this was mentioned in the S9/S9+ debloat thread.
I didn't mention it earlier as you hadn't reported any issues,but,glad you were able to figure it out/find the same info I'd stumbled upon.
Well after a day of usage I can say that battery life is poorer without "com.samsung.android.lool". I've enabled it again now and blocked its domains via Adhell 3:
Code:
360.cn
360safe.com
*.360.cn
*.360safe.com
Furthermore I have disabled its WiFi and Mobile network access in Adhell 3. However this block is bypassed whenever applications using Android's native VPN facility are switched on so its not absolutely fool proof. Similar blocking can be done using NetGuard itself as long as you keep it switched on and filtering continuously.
I'll keep an eye on which other domains it attempts to contact.
sengork said:
Well after a day of usage I can say that battery life is poorer without "com.samsung.android.lool". I've enabled it again now and blocked its domains via Adhell 3:
Code:
360.cn
360safe.com
*.360.cn
*.360safe.com
Furthermore I have disabled its WiFi and Mobile network access in Adhell 3. However this block is bypassed whenever applications using Android's native VPN facility are switched on so its not absolutely fool proof. Similar blocking can be done using NetGuard itself as long as you keep it switched on and filtering continuously.
I'll keep an eye on which other domains it attempts to contact.
Click to expand...
Click to collapse
How much of a difference in battery life are we talking about?
It felt to be about 20%. Is Pie without Device Maintenance expected to put applications to sleep? I am guessing sleep is the major factor here (opposed to cleaning up caches and other storage capacity functions of Device Maintenance app).
sengork said:
It felt to be about 20%. Is Pie without Device Maintenance expected to put applications to sleep? I am guessing sleep is the major factor here (opposed to cleaning up caches and other storage capacity functions of Device Maintenance app).
Click to expand...
Click to collapse
I would like to think so,hoping Device Maintenance isn't ingrained to the level where it breaks the native Doze feature in Android.
JMHO,Device Maintenance seems to be just like Clean Master,running on top of Android/counterproductive,putting a hat on a hat,so to speak,LOL.
I haven't had a Nexus device since the N6 & never had a Pixel,but,I'm pretty sure none of 'em have DM..................................
Whenever I decide to update to Pie,I'm going to continue as I am now:
Battery Optimize all apps that I don't rely on for auto-updating or push notifications & then disabling Device Maintenance.
If something starts acting up,only then do I re-enable DM,take a look at Battery Optimizing for whatever is affected & again,disabling DM.
Guessing you've just recently updated to Pie.......
If it were me,I'd continue to disable DM & give the new OS upgrade a week or so,see what your battery life looks like then.
Battery life loss could be due to some user-installed apps that aren't playing nice w/Pie & not due to DM being disabled.
You will find the logo or text "powered by 360" on storage screen in Samsung device management app.
KOLIOSIS said:
Battery Optimize all apps that I don't rely on for auto-updating or push notifications & then disabling Device Maintenance.
If something starts acting up,only then do I re-enable DM,take a look at Battery Optimizing for whatever is affected & again,disabling DM.
Click to expand...
Click to collapse
I have taken your advise a few weeks ago and have concluded that removing DM whilst manually optimising all individual apps has resulted in no battery loss (in fact it has probably improved but this is within a margin of error). Thanks for your guidance.
Unless you need to connect to a Chinese domain for whatever reason, just block *. cn for good and forever about it.
hello guys i have bought galaxy note 9 in China and there is not preinstalled google play store app...
can anyone tell me how to install safely ))?? thank you ...
hey thanks for your attention but i dont need to access i have vpn i know how to access i want to know how to install because it is not installed so do you have some ideas ?))) how to do it
sandro comaia said:
hey thanks for your attention but i dont need to access i have vpn i know how to access i want to know how to install because it is not installed so do you have some ideas ?))) how to do it
Click to expand...
Click to collapse
Just side-load this .apk & you should be good to go:
https://www.apkmirror.com/apk/googl...5-22-all-0-pr-254908059-android-apk-download/
Was original poster was the only one who had this issue?
Is this a samsung thing or all androids?
Can this be a security risk?
There was a link to the s9 bloatware thread but it doesn't work
https://forum.xda-developers.com/ga...laxy-note-9-bloatware-removal-thread-t3857508
Says 404 not found for me
Nameduser6 said:
Was original poster was the only one who had this issue?
Is this a samsung thing or all androids?
Can this be a security risk?
There was a link to the s9 bloatware thread but it doesn't work
https://forum.xda-developers.com/ga...laxy-note-9-bloatware-removal-thread-t3857508
Says 404 not found for me
Click to expand...
Click to collapse
Should be only Samsung phones. Interestingly i haven't seen it dial home since my original post and up until i uninstalled the Device Care package. Samsung might have changed the domains the tool dials home to.
Sent from my SM-N960F using Tapatalk

keyloggers in custom roms.

i am concerned.
i love to root my device and remove bloatware. ya. samsung devices. full of junk.
i use titanium backup but it seems to have trouble with magisk because its systemless and not like supersu.
anyways, my concern is about custom roms that we download from these forums.
what are the odds of rom creators infecting "Keyloggers" in these roms? i mean these days we use Lastpass to enter in our master password which contains all our passwords for our emails and other sites.
as well as authy.
its just a question.
yes. i prefer a custom rom and favor it as opposed to samsung roms.
any feedback?
@cylent
It's absolutely possible from looking at the Android Accessibility APIs:
developer.android.com/guide/topics/ui/accessibility
But, from my knowledge and testing, the key logger would need EXPLICIT access to the 'Accessibility Services'.
(Options > Settings > Accessibility) + see the attached screen shot.
If you installed a custom ROM and saw an application listed here not explicitly defined in the release notes, ensure it isn't enabled. Next query the developer as to its purposes. It's possible that just because it shows here that it isn't necessarily malicious and might serve a greater purpose.
If you receive no response or a runaround, disable it under 'Accessibility' and find the corresponding name under 'Apps' and remove it.
For that matter, dump the ROM altogether and find another immediately. I'd like to think our savvy little community would pick up on this breach of trust ASAP.
For testing purposes, mine is called 'Android Keylogger' but a malicious user could (and likely would) call it something less threatening.
Hopes this helps!

Blocking Ads in Apps

Over the weekend, I purchased a Galaxy S10. It’s the Verizon variant and as such wont get root. I’m actually not interested in root as my last phone was missing the last few years updates as I did the Ron Popiel, “Set it and forget it”. I’m all good there and am rather happy with it since I had an S5 running Lollipop.
Before upgrading, I asked some questions regarding whether I needed root as my main desire was to be able to use ad blocking software and block ads in applications. I was told to use Blokada. I’ve installed it and it’s not doing what I expected. What it does:
1. It installed a VPN which I keep having to turn on and off.
2. It does not block ads in all applications.
3. It prevents some apps from working: Spectrum, NFL…
Coming from AdAway, I was looking for a program that ran in the background and simply blocked ads. This program does not and now that it installed a VPN, It’s going to cause trouble for me when I want to use the corporate VPN to access my work computer. Besides, not being unobtrusive, the fact that it’s using a VPN means that whoever built the program now has access to my data stream.
Does some know if maybe I’ve misconfigured the program or if there is another program that I should use to achieve seamless background operation.
Maybe all I need is alterative DNS servers so ads won’t load. I’m not sure what to do.
Use Blokada or Adguard, or at least that's what I've used. I actually use paid version of Adguard but the other works fine
https://blokada.org/index.html
I'm using AdGuard DNS with a Quick Settings toggle I've made with Tasker to enable and disable it on the fly.
No app needed, it's fast and works like a charm even in apps or YouTube.
I need to disable it for public WiFi with login to make the login sites work, only. If I'm logged it I re-enable it.
I was using AdAway before but I wanted to try a rootless phone after I had issues with my USB Port and I like it.
I just tried Blokada again. I found that I could use the DNS frature and be protected from ads, but spectrum tells me, "VPN Unsupported". how do I get around this and not use VPN to block Ads?

Categories

Resources