Just curious if any of you have a list of which packages specifically I should disable or otherwise freeze to block OTAs & their notifications.
I believe its called "Update center" or "Software Update" both the same anyway
Yeah man I'm no stranger to the idea of what packages might be called..
I'm kinda looking for maybe some specific package names from other who have had successes while otherwise debloating their devices..
Filtering by the world Update I don't get either of those 2 specific names..
i've located a few packages that all seem like they have potential but I also don't like just going for it & hoping for the best modifying or freezing random packages with reckless abandon..
Here's hoping perhaps we all can reach a general consensus.. so that's for 1 addition into the pool
Related
Helping friend with a cheating husband. She wants something that can log URLs visited to see if he's making new webmail accounts. Any suggestions?
I figured a stealthy way to do this would be something like privoxy installed via the commandline and started in an init script. He's already rooted his phone, so that should make things a bit easier.
Basically the requirements are hidden (doesn't show in apps list or drawer), can log URLs, doesn't add significant battery drain. I see a bunch of paid apps (mobispy, etc) but can't verify if they're hidden from android OS. If he can just kill it with a something like ES Task Manager and uninstall it with Settings->Apps, it's probably not sufficient.
NDK
Hi.
You can introduce any cross compiled binary into the android system if the phone is already rooted. You can compile programs via the NDK and put them in /system, androids software center will never now.
It's probably easiest to install a network sniffer like tcpdump or even better tshark from wireshark. Just start it in init.d and let it write the first 1k bytes of every packet (port 80/443) to a capture file hidden in some sub directory. This will most likely drain battery.
As for hiding in the process list, it's probably easier to rename your sniffer to something harmless like 'wpa-agent'.
* BUT *
You basically want to introduce malware on another ones phone. This might be a felony in your country. And it's certainly unethical. In these cases I always suggest talking to the partner instead of spying. If it comes to spying on your partner the trust, which is needed in a relationship, is already severly damaged. And I'm really not sure that looking out for webmail accounts will repair this trust.
Hey all,
I'm the proud owner of a Samsung Nexus S (sadly the i9020a model, though). I was forced against my will at gun point by someone named Jealousy to install ICS (4.0.4) on my i9020a when it was released for all other Nexus S devices except for the US AT&T version of the phone.
Anyway, love the ICS and absolutely love the ROM I'm using (Brainmaster's stock ICS, w/ Supercharger V6 and a number of other goodies). But I was a bit confused today when I opened my phone and noticed a recently downloaded APK called "update.apk". Looking at it's info, it's name is "com.android.fixed.update" with no author, developer, and minimum version of 0. It weighs roughly 40kb and is not associated with the market, so I'm going to have to disable my "Market-only" settings in order to install it, otherwise it was about to install itself.
I was wonder what it might be. With no other information, I'm a bit hesitant to install it. The only permissions it asks for is Network Access and Start on Boot.
I thought just maybe it was an OTA from a developer (maybe even Brainmaster) but I wasn't exactly sure what kind of access or ability non-service providers had to OTA functionality and what not. (I suppose, if it can probably be modified with some effort, seeing as the source is available...)
Anyway, hoping to hear your thoughts on it. Google showed ONE result for "com.android.fixed.update" and that's it. Thanks for your input in advance!
We also got the same file on our Moto Xoom, I believe its a virus so do not install it. The file was downloaded at biandroid (dot) info which is definitely not associated with android.com
http://anonhq.com/notcompatible-back-market/
that is the explanation
Back in 2012 malware called Not Compatible was haunting android devices. Now more powerful than ever the latest version of NotCompatible.C has its own self protected encryption. Thus making this program difficult to find and delete.
Lookout Inc, a mobile security firm says that this version of the malware is a threat on a massive scale. Once in it has the tendency to control and hack data. It is an advance form of malware that can be seen on a PC a botnet so powerful that it has a server design architecture, P2P communications and as previously said encryption capabilities.
The programming of the malware is one of the hardest to kill malware that we have observed. Once the malware is installed it does not appear on the android operating system as it keeps itself in the background. It only works when the device is unlocked by the user or if it is restarted.
view
Source: Imgur
The only way you can find out is through Manage Applications>Settings. This will show you that an application by the long name of (com.andriod.fixed.update) is running. All you need to do is simply uninstall it.
Hey all,
I work for Verizon, and we have had a lot of customers coming in with the error "UIDs on the system are inconsistent" message. I am wondering if anyone has been able to find a cause. I understand a factory reset fixes the issue; however, I am wondering if this message is malware related. The button "I'm feeling lucky!" seems to imply that it is not a normal system-related message. I have made a few observations about this particular error.
1. It affects multiple devices. Phones, tablets, phablets, iPhones (just kidding)...it seems nothing is safe.
2. It affects multiple carriers. A google search yielded the same problems on T-Mobile and Sprint android phones.
3. In my experience, every user has had facebook installed (one customer even said the message first appeared when using facebook).
Is it possible that there is facebook distributed malware (perhaps by clicking a link to a malicious site), which installs itself on a user's phone when the user clicks "I'm feeling lucky!"?
Just throwing out some thoughts...
Tom
I've never heard of this, but I also don't use Facebook. I did notice that visiting the facebook pages related to I'm Feeling Lucky with javascript disabled started to load, then jumped to a 404 error.
Hmm...that's interesting. I'm not very knowledgeable in this area...
I've seen websites bring up notification boxes like these before, so I know it's possible. Has anyone else seen this?
I have an app I really like, but the developers have gone down a really bad route. It's been turned into a horrible web app that is now slow to load, clunky to use, and has adopted many iOS UI things.
I have the last known version before they went this horrible way, and they apparently don't care about their plummeting store ratings, and adamant they aren't going back.
I have prevented auto update of the app, but I also want to remove notification in the Play store (and anywhere else) that an update even exists for this app. Is this possible without root?
I am thinking perhaps changing the APK signing key, or package name, or some other way of mangling the app? or some easier way?
Just for reference resigning with a different key will make the app stop appearing in Play Store updates.
I will come out an name and shame UnTappd for not caring what their users want or think about thieir (un)responsive web app garbage.
If anyone wants the original last native APK (2.8.4), I have it, and I also have a resigned on that won't try and update via the play store.
Original (signed by Untappd):
http://hostracon.com/uploads/1763759451.Untappd Discover Beer_v2.8.4_apkpure.com.apk
Modified with new cert:
http://hostracon.com/uploads/439004733.untapped284 alt sign.apk
Hope someone finds them useful.
Hello there!
I use a Motorola Moto G6 that's running on Android 9 Pie (Build no. PPS29.118-11-1) and I was wondering if there was a way to block certain apps from being installed on my device by their package name. I want to be able to do this for the same reason I use very strict settings on Digital Wellbeing: self control.
I know that you can install and block apps and I know that you can use parental settings on your phone but that simply won't help in this situation. I'm also aware that an app with these capabilities might not be available. My question isn't if it's possible now or with the utilities currently provided through apps developed for my Android OS; I'm trying to figure out if it's possible to block apps by their Package Name in any way and if it's impossible to make (in theory) an app that can do it.
I'm not sure how it can be done. Can it be done by having an app that reads through an app that's attempting to be installed and generates bricked app directories where it should chuck out the app's resources so it can't be installed? Maybe. Can it be done by cancelling the installation request of an app that has a Package Name matching one inputted into a list on the hypothetical app in question? Not sure. If anyone knows the answer to those two proposals or has their own suggestions, please do your best to answer my post and keep in mind, this has to be done without the phone being rooted.
An additional but important factor: this is about self control. I can easily bring myself to not remove or otherwise disable restrictive measures on my phone, but I'd like to know if I can make it so that you cannot remove a Package Name that has been blocked in the phone no matter the method used in the first part (other than uninstalling the blocker app, of course).
Regards,
Yoki Aza