Libreware – Telegram
Libreware
5.94K subscribers
351 photos
26 videos
113 files
710 links
Libreware Software Library

📡 t.me/Libreware

★ Send us your suggestions and menaces here:
https://news.1rj.ru/str/joinchat/nMOOE4YJPDFhZjZk
Download Telegram
Blocker ( com.merxury.blocker )

Blocker is an open source Android App to block or disable app components (receiver, service, activity and content provider).

It works with PM (Package Manager) mode or IntentFirewall mode, it does support import/export Blocker rules, compatible with MyAndroidTools rules importing (or convert to IFW rules to import). PM mode was used by default.

Both IFW and PM mode require root to work, Blocker also provide Shizuku mode which require Shizuku Manager and adb to setup which does not require root.

Source code:
https://github.com/lihenggui/blocker

Download:

https://github.com/lihenggui/blocker/releases

https://f-droid.org/packages/com.merxury.blocker/

https://play.google.com/store/apps/details?id=com.merxury.blocker


📡 @Libreware 📡 @NoGoolag
#blocker #intent #mat
Aurora Services

It is an extension which when installed as SYSTEM APP, allows Aurora Store & Aurora Droid¹ to install the apps in background without user's intervention.

¹ Its functionality is similar to that of F-Droid's Privileged Extension.

How to setup ?
1. Simply flash unity services zip provided here either through recovery or magisk module.
2. Grant the required permissions.
3. Set installation method in the app store settings as Aurora Services.

Get:
Services Unity ZIP #serviceszip

Aurora Store (Foss playstore client)
https://news.1rj.ru/str/NoGoolag/1123

Aurora Droid (Foss F-Droid client)
https://news.1rj.ru/str/NoGoolag/1242


#aurora #auroradroid #adroid
Forwarded from NoGoolag
patch.sh
3.8 KB
Signature Spoofing patching for Android Q

- All the credit to Darknecromonger for discovering this method -

Basically some tools (namely DexPatcher) have been updated that now allow us to patch Android Q for sigspoofing without using shady stuff like SmaliPatcher.

Setialpha knows about it already and it will probably be in the next ND patcher release.

Meanwhile, here's a handy little shell noscript to be run from a PC. It'll pull, patch and push a sigspoof patched services.jar by itself.

Prerequisites:
- A deodexed ROM
- A PC with java and adb installed

Instructions:
- Connect the device to your PC with a cable and authorise ADB
- Run patcher.sh

[Tested on Debian, but should be distro agnostic]

Troubleshooting:
- ADB can't access USB for your user? Search online how to fix it. Or you can run with sudo, but that's just bad practice


@NoGoolag
#sigspoof #q #patch #patcher
Watt

Watt is an open source android component management application. It uses IFW (Intent Firewall) to disable or enable app components (receivers/services/activities), requires root permissions

https://github.com/tuyafeng/Watt


Features
-Disable or enable components (receivers/services/activities) easily
-Block a broadcast so that no app can receive it to wake itself
-Block the bad Keep-Alive services of some apps without errors
-No data collection
-Efficient and simple interface


⬇️ Download
https://f-droid.org/app/com.tuyafeng.watt (on IzzyOnDroid F-Droid repository)

https://github.com/tuyafeng/Watt/releases


📖 Explanation of IFW (Intent Firewall)
https://carteryagemann.com/pages/android-intent-firewall.html


📡 @Libreware 📡 @NoGoolag
#watt #blocker #intent #mat
👍1
Kiwi browser

Kiwi browser (phone chromium with extensions support) just got open sourced

https://forum.xda-developers.com/showpost.php?p=82317933

https://github.com/kiwibrowser/src

Do tell us if it compiles. Also you might want to ask the dev to submit it to FDroid

@nogoolag @libreware
#kiwi #browser #chromium #extensions
Forwarded from Rahul Patel
AuroraWallpaper_1.0.1.apk
4.4 MB
Hey all !

I made a small wallpaper app, FOSS ofc !

But will upload the same on the various market for as a paid app,
to generate some revenue.

Its called Aurora Walls, suggest me a better name & icon.

Aurora Walls is a client for Wallhaven.cc, that hosts more than 200K wallpapers.
Anime, General, People with SFW, NSFW & Sketchy contents, so beware of filters.

Although I removed NSFW contents, it will be added as a paid feature 🤣🤣.


That's all, have a look at the app & enjoy it!

Feedbacks & suggestions most welcome.

@AuroraOfficial
🔥1
Block app components
(receivers/services/activities/ads/trackers...)

Disable Fuck Services noscript
https://news.1rj.ru/str/libreware/735

Watt
https://news.1rj.ru/str/libreware/756

Blocker
https://news.1rj.ru/str/libreware/745

My Android Tools (closed source)
https://www.myandroidtools.com


Here's a list of things you could disable, it's not complete:

AdIdListener
AppMeasurementService
ContentFiltersService
DailyHygiene$DailyHygieneService
DisplayLeakService
FirebaseInstanceIdService
FirebaseJobDispatcherEngine$FirebaseJobDispatcherService
FlushLogsReceiver$FlushLogsService
HeapAnalyzerService
InstantAppHygieneService
InstantAppsLoggingService
InstantAppsSharedPreferencesService
KeepAliveService
SetupWizardPaymentsEnablementService
WearChangeListenerService
WearSupportService
AdsActivity
Crashlytics
AnalyticsJobService
CampaignTrackingService
AppMeasurementJobService
InterstitialActivity
facebook.ads.AudienceNetworkActivity
Referral.InstallListener
Accountkit
AdAlarmHelperService
AdReminderHelperService
AdTriggerEventsService
AppTrackingService


📡 @Libreware 📡 @NoGoolag
#disablebadservices #blocker #watt #mat #disablefuckservices #block #ifw #intents #services #ads #tracking
👍1
MinMicroG v2.7-beta3-milkandbootloops

28 april, 2020

By MOVZX and FatherJony and FriendlyNeighborhoodShane

Probably the last release with custom APKs made for my own satisfaction until Marvin revives microG to its former glory. With all the recent fixes made while sitting at home (thanks COVID-19!)

Why you would bother flashing this:
Formally put the noscripts under GPLv3
Added an install.md file as a handy reference manual and guide
Update AuroraSuite, Play store
Remove DroidGuard for obvious reasons (thanks Googs!)
Replace abandoned FDroid GSM NLP backend with releases from @ploink
Removed unmaintained radiocell backend that was crashing on many phones
Now uses awk from MBB if you have Magisk installed
Fix the (yet inexplicable) rare simple_mount bug that expanded faster than the universe (thanks advanced physics!)

Still the same selfbuilt GMSCore and UNLP for background location fix
(sauce at github.com/nogoolag)

For y'all younglings that don't know what MinMicroG is, check readme.md inside

Downloads:
https://github.com/friendlyneighborhoodshane/minmicrog_releases/releases

Build noscripts and instructions:
(slightly modified - GMSCore and UNLP selfbuilt)
github.com/friendlyneighborhoodshane/minmicrog

📡 @NoGoolag
#minmicrog #microg #installer
🥰1
Whoogle Search - A self-hosted, ad-free/AMP-free/tracking-free, privacy respecting alternative to Google Search

Get Google search results, but without any ads, javanoscript, AMP links, cookies, or IP address tracking. Easily deployable in one click as a Docker app, and customizable with a single config file. Quick and simple to implement as a primary search engine replacement on both desktop and mobile.


Hi everyone. I've been working on a project lately that allows super easy set up of a self-hosted Google search proxy, but with built in privacy enhancements and protections against tracking and data collection.

The project is open source and available with a lot of different options for setting up your own instance (for free): https://github.com/benbusby/whoogle-search

Since the app is meant to only ever be self-hosted, I intentionally built the tool to be as easy to deploy as possible for individuals of any background. It has deployment options ranging from a single-click deploy, to pip/pipx installs or temporary sandboxed runs, to manual setup with Docker or whatever you want. It's primarily meant to be useful for anyone who is (rightfully) skeptical of Google's privacy practices, but wants to continue to have access to Google search results and/or result formatting.

Here's a quick TL;DR of some current features:

* No ads or sponsored content
* No javanoscript
* No cookies
* No tracking/linking of your personal IP address
* No AMP links
* No URL tracking tags (i.e. utm=%s)
* No referrer header
* POST request search queries (when possible)
* View images at full res without site redirect (currently mobile only)
* Dark mode
* Randomly generated User Agent
* Easy to install/deploy
* Optional location-based searching (i.e. results near <city>)
* Optional NoJS mode to disable all Javanoscript on result pages

Happy to answer any questions if anyone has any. Hope you all enjoy!

https://www.reddit.com/r/degoogle/comments/ggrocn/whoogle_search_a_selfhosted/


#whoogle #Google #search #engine #selfhost #degoogle
Riot Web 1.6, RiotX Android 0.19 & Riot iOS 0.11 — E2E Encryption by Default & Cross-signing is here!!

Hi folks,

We are incredibly excited to present the biggest change in Riot ever: as of the last 24 hours we are enabling end-to-end encryption by default for all new non-public conversations, together with a complete rework of Riot’s user experience around E2E encryption, powered by a whole new suite of encryption features in Matrix. We have released this simultaneously on Web, Desktop, iOS and RiotX Android!

👉🏼 Web:
https://riot.im/app

👉🏼 Desktop:
https://riot.im/download/desktop/

👉🏼 iOS:
https://apps.apple.com/us/app/riot-im/id1083446067

👉🏼 RiotX Android:
https://play.google.com/store/apps/details?id=im.vector.riotx

💡 More info:
https://blog.riot.im/e2e-encryption-by-default-cross-signing-is-here/

#riot #matrix #messenger #e2e #encryption #android #iOS
📡 @Libreware
Disable Tracking Services
By steveglowpunk

https://forum.xda-developers.com/android/development/noscript-disable-tracking-services-t4099469

This is a set of noscripts that disables privacy invasive tracking components in all user installed apps (service/broadcast receiver/activity/content provider).
Root permission is required to run the noscripts.

How it works:
UpdateExodus.sh downloads tracker names from Exodus Privacy ( https://etip.exodus-privacy.eu.org)

DisableTracking.sh will dump a list of components of all installed apps, compare it against the list of trackers name, and disable those components (using the 'pm disable' command) if they match.

Download: Goolag Drive link (https://drive.google.com/drive/mobile/folders/1_G6-M8ToF0PsjY0HIrZIAVrTHT6nbptE?usp=drive_open) or attached below

Check instructions.txt for details on how to use the noscripts.
The latest version is 1.5.
You are recommended to backup your apps before running the noscripts.

I hope you will find this useful

The noscript was originally based on #disablefuckservices here:
https://forum.xda-developers.com/android/development/noscript-disable-fk-services-trackers-apps-t4074427


📡 @Libreware 📡 @NoGoolag
#disablebadservices #disable #blocker #watt #mat #block #ifw #intents #services #ads #tracking
Demo:
Prerequisites:
Root access is required.
You also need these extra binaries installed in a directory of $PATH (such as /sbin):
-aapt
-jq
You can download these binaries from the Termux app ( https://f-droid.org/app/com.termux
Or https://play.google.com/store/apps/details?id=com.termux )
To download those binaries, run these commands in Termux:

pkg install aapt
pkg install jq

Copy them from /data/data/com.termux/files/usr/bin to a directory of $PATH
Then give them execution permission, e.g.: chmod +x /sbin/aapt

To see what directories are in $PATH, run this command: echo $PATH

Note: if you've placed the binaries in /sbin, or you have installed Magisk,
the binaries will be deleted every reboot. You'll have to copy them again.

Note: the aapt and jq in the Google Drive folder was downloaded on a phone running aarch64 architecture and may be incompatible with your phone.
If that's the case, follow the above instrcutions to download the version that works on your phone.

------------------------------------------------------------

Usage:
-All noscripts and txt files must be in the same directory as DisableTrackers.sh

You need a terminal emulator to run these noscripts.
Personally I use "Terminal Emulator for Android" ( https://f-droid.org/app/com.termoneplus
Or
https://play.google.com/store/apps/details?id=jackpal.androidterm )
This terminal emulator lets you add launcher shortcuts. Quite convenient in my opinion.
Termux may also work, but I haven't tested it.

For first time usage, run UpdateExodus.sh first.
i.e. run this command: su -c sh /path/to/noscript/UpdateExodus.sh
If the noscript runs successfully, a MergedTrackers.txt will be created.
Then you can run DisableTrackers.sh AS SU to start disabling trackers. (root permission is required)
i.e. run this command: su -c sh /path/to/noscript/DisableTrackers.sh

------------------------------------------------------------

Explanations:
UpdateExodus.sh will download a tracker list from Exodus Privacy, and merge it with CustomTrackers.txt (if it exists)
You can add your own trackers to CustomTrackers.txt. You may also write comments in this format: #(comment here)
MergeExodus.sh does the merging of exodustrackers_extracted.txt and CustomTrackers.txt.

DisableTracking.sh will dump a list of components (service/broadcast receiver/activity/content provider) of all installed apps,
compare it against the list of trackers in MergedTrackers.txt, and disable those components if they match.
It will save a list of already processed apps to a database file in the noscript's directory,
so they will not be processed twice when you run the noscript again (like maybe you've installed a new app and you want to disable its trackers by running the noscript).

Apps with trackers will be logged to AppsWithTrackers.txt.
exodustrackers.json is the raw list downloaded from Exodus Privacy.
exodustrackers_extracted.txt contains the actual tracker names from the json.
MergedTrackers.txt contains the merged results of exodustrackers_extracted.txt and CustomTrackers.txt.
ProcessedApps.db contains a list of already processed apps. They will be skipped in the next run of DisableTrackers.sh.

------------------------------------------------------------

Enjoy!

Scripts written by steveglowplunk
Based on the noscript here:
https://forum.xda-developers.com/android/development/noscript-disable-fk-services-trackers-apps-t4074427

------------------------------------------------------------

Known issues:
-You can't process system apps yet. I will fix this when I have time.
Update log:
Version 1.1:
-Added functionality of downloading tracker names from Exodus Privacy

Version 1.2:
-Skip disabling tracking services that have already been disabled
-Fixed some typos and improved noscripts' logic

Version 1.3:
-Fixed problems with directories containing spaces in the name.
-Small improvements to the noscript's logic.

Version 1.4:
-Small optmisations in DisableTracking.sh for (insignificant) performance improvements

Version 1.5:
-DisableTracking.sh now uses a database to store processed app names and versions.
This means if an app was updated, it will check for trackers in the updated app again.
-If there was a deleted app, DisableTracking.sh will now delete its record from ProcessedApps.db automatically. No more manual deletion.
-Note: if you've used version 1.4 or below and don't want the noscript to process all apps again, run CreateAppDB.sh.
It will create a ProcessedApps.db with records of all currently installed apps.
Troubleshooting: