Deutsch English Français Italiano |
<v58160$1ep4$1@nnrp.usenet.blueworldhosting.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!news.misty.com!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail From: Andrew <andrew@spam.net> Newsgroups: comp.mobile.android Subject: Re: Android keyboard: your choice. Date: Sun, 23 Jun 2024 02:27:12 -0000 (UTC) Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com) Message-ID: <v58160$1ep4$1@nnrp.usenet.blueworldhosting.com> References: <20240617114559.a2970ac2923facc44a2ec355@gmail.com> <v4ov83$j5oj$1@dont-email.me> <v4sojj$1gqik$1@dont-email.me> <ldfbncFe5o7U1@mid.individual.net> <ldfc9cFe3usU2@mid.individual.net> <ldia8bFrps7U8@mid.individual.net> <ldii1sFt40eU1@mid.individual.net> <ldj2gdFs5uU3@mid.individual.net> <v53gbf$33j85$3@dont-email.me> <ldpc2vFtm5tU6@mid.individual.net> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Injection-Date: Sun, 23 Jun 2024 02:27:12 -0000 (UTC) Injection-Info: nnrp.usenet.blueworldhosting.com; logging-data="47908"; mail-complaints-to="usenet@blueworldhosting.com" Cancel-Lock: sha1:qQfiNFCChEDMP9jMXTFz/+I1W48= sha256:LHZ8rD3V8oSHHafGHvrihgrCJB5tr3vIJXg6lX6UwXg= sha1:i+pLYxB7yiniam2NVImdfjh/gQY= sha256:+54z1EZDPKtHuN85n9pMSGSKQb4WJwqK+aZgfChvXlw= X-Newsreader: PiaoHong.Usenet.Client.Free:1.65 Bytes: 4303 Lines: 72 Arno Welzel wrote on Sun, 23 Jun 2024 03:29:05 +0200 : >> Hey, maybe you have knowledge and the tools to create a small testing app, >> test it and tell us the results ? > > There are already many apps out there which can do this, for example: > > <https://f-droid.org/de/packages/com.mirfatif.permissionmanagerx/> It's always good to obtain tool recommendations from folks who know a lot about Android, where my Galaxy is unrootable but I do use ADB every day and I use the Android Wireless Debugging tile all the time to allow ADB authentication (either by pairing, which requires a password, or by direct connection by USB or over Wi-Fi) - but others who may not be using ADB... they will have to do some homework first. c:\> adb connect 192.168.0.2:36295 c:\> adb pair 192.168.0.2:43145 016983 Even with all that knowledge, my initial connection over ADB failed; but it may have been because I was also using screencopy mirroring at the time. c:\> scrcpy -s 192.168.0.2 Nonetheless, here are the installation particulars that I ran just now. https://f-droid.org/de/packages/com.mirfatif.permissionmanagerx/ https://f-droid.org/repo/com.mirfatif.permissionmanagerx_125.apk Name: permission-manager_com.mirfatif.permissionmanagerx_125.apk Size: 2847225 bytes (2780 KiB) SHA256: 678FAC2556E610E080E058F1E1F362F0259C8BF314B7580282C678BFA750AF19 Privileges: Root or ADB access is required to get AppOp permissions and to change permissions state. [Don't Remind] or [OK] a. Enable Wireless Debugging (pairing) or ADB Over Network. b. Enter port and tap connect button. c. Allow ADB authentication when prompted. https://mirfatif.github.io/PermissionManagerX/help/en/#faq1 Help: Why PMX requires root or ADB access? Android won't allow a normal user app to change other apps' manifest or AppOps permissions, even its own. Only reading AppOps without root or ADB is possible provided that hidden APIs are not blacklisted on your device (which is very unlikely on Android 9+). That's why we run a separate process with high privileges to circumvent the restrictions. By default, the background process (daemon) is run with ADB UID (2000) or (if rooted) System UID (1000). On rooted devices, UID can be changed in PMX Advanced Settings. My device isn't rooted. How can I use PMX? Use PMX with ADB. However ADB is not as powerful as root is. PMX takes more time to build the list of apps when its running with ADB. What are hidden APIs? The core functionality of PMX revolves around Hidden APIs. These are the capabilities required to perform tasks (like granting or revoking permissions) which can only be performed by privileged system apps. So these capabilities aren't available to normal user apps. But PMX uses these capabilities with the help of root or ADB. Usually a user should not be concerned about this.