pls remind me not to be so mean

  • 0 Posts
  • 21 Comments
Joined 2Y ago
cake
Cake day: Jun 06, 2023

help-circle
rss


*Not all of the app data, only the app data in the internal user-accessible storage. The data in the /data partition will not be backed up. Most app settings are stored in /data.


“Must crack open”

crack open has negative connotations. “Must allow” is a much more neutral way to phrase it.

“Epic Judge”

The judge isn’t epic’s, it’s just the judge that happens to be dealing with this case.


rofl at this title trying to victimize google for being monopolistic assholes


Could it be that the system app for picking those images is missing the storage permission?


Lawnchair 2 from F-Droid.

Because it’s pretty and it has plenty of customization features if you like the android stock launcher.


Set your DNS to AdGuard servers. Downloads the Mull Browser from F-Droid with the uBlockOrigin addon, so you can browse the internet without ads. Download a Firewall: Netguard is recommended. Apps that don’t have internet can’t load ads.

If you have root: Firewall: AfWall+ Also, use the app “App Manager” from F-Droid to disable all app components that have “ad” in their name.

With this multi-layer approach you’ll deal with 99.99% of ads



it’s a walled garden

it’s a golden prison*





Kindof, using Storage Isolation (proprietary app made by Rikka, the same developer that made Shizuku)


There’s some seriously cool things you can do with Shizuku and adb:

  • Install custom Material You designs on your device
  • View and modify hidden settings on Android devices
  • Install F-droid app updates automatically without having to tap “Install” a hundred times

A really good list for things to do with it is https://github.com/ThePBone/awesome-shizuku


Been using AnySoftKeyboard for many years now. Highly recommend it


SMS group chats

The what now?



So you’re a couple of power users? You’re living the dream, dude


It depends on what method you use. If you just need a temporary shell as root to fully uninstall system apps, try out a temporary root method like mtk-su.

If that doesn’t work, you can use SnoopSnitch to check your Android security patch level and see if there’s any “Privilege Escalation” exploit that you can take advantage of.

For device-specific details I recommend you to checkout the XDA forum for your device


Jerboa is getting there, but for now I’d recommend using the progressive web app