Forwarded from Beechat Network
Kaonic will enable unstoppable, uncensorable mesh networks everywhere. Our production is now ramping up and nothing can stop it
👍3
Forwarded from Beechat Network
Our previous product Beechat Clip had only one radio to which users needed to connect via USB. Each radio module was region specific, so when travelling to a region with other frequency bands, the module would not work in that region. It had a maximum of 32 network hops.
Over the last year, we've developed Kaonic:
- 2x independent radios
- Live audio call capability (instead of walkie-talkie "push-to-talk")
- Frequency switchable for different regions (868/900 MHz)
- Longer range at highest data rate option (over 200%)
- More than 200% maximum data rate from previous model (250 vs 600 kbps)
- Capability to connect not only via USB, but also via WiFi tethering, and Bluetooth pairing
- Up to 128 network hops for globally scalable networks
- Open source firmware
- End-to-end encrypted
Over the last year, we've developed Kaonic:
- 2x independent radios
- Live audio call capability (instead of walkie-talkie "push-to-talk")
- Frequency switchable for different regions (868/900 MHz)
- Longer range at highest data rate option (over 200%)
- More than 200% maximum data rate from previous model (250 vs 600 kbps)
- Capability to connect not only via USB, but also via WiFi tethering, and Bluetooth pairing
- Up to 128 network hops for globally scalable networks
- Open source firmware
- End-to-end encrypted
Forwarded from M Bednarik
Could you please explain (for a regular end user) exactly how to communicate with other Kaonic radios, send text, audio files, etc.
Has any end-user software been written yet? In other words, as a non-dev, how would I use it?
Has any end-user software been written yet? In other words, as a non-dev, how would I use it?
Forwarded from Beechat Network
1. Install the Kaonic app: the download link will be on the QR code within the package
2. Create an account (no information is sent to any server) you can do this purely offline.
3. Log in
4. You can start scanning the network around you and find surrounding nodes.
5. Click on a user to begin chatting, sending files or even start an audio call
2. Create an account (no information is sent to any server) you can do this purely offline.
3. Log in
4. You can start scanning the network around you and find surrounding nodes.
5. Click on a user to begin chatting, sending files or even start an audio call
Forwarded from Beechat Network
Kaonic is compatible with Android, Windows, Mac, Linux and iOS.
However iOS doesn't provide open access to USB ports, so only WiFi/BT tethering will work with it.
However iOS doesn't provide open access to USB ports, so only WiFi/BT tethering will work with it.
Forwarded from Beechat Network
Kaonic 1S is our flagship Single Board Computer with dual integrated long range radios.
It enables capabilities that were only available to the military sector before, such as encrypted live audio calls over mesh networks.
Meshing is based on the revolutionary Reticulum mesh network, with our own backwards compatible Rust port for much higher performance.
Our firmware and software is open source, allowing users to modify the system to their own needs and providing full transparency of the system’s capabilities.
Kaonic is the future of decentralised off grid communication.
It enables capabilities that were only available to the military sector before, such as encrypted live audio calls over mesh networks.
Meshing is based on the revolutionary Reticulum mesh network, with our own backwards compatible Rust port for much higher performance.
Our firmware and software is open source, allowing users to modify the system to their own needs and providing full transparency of the system’s capabilities.
Kaonic is the future of decentralised off grid communication.
🔥16
Find out the #IP address through a call to #Telegram
https://medium.com/@ibederov_en/find-out-the-ip-address-through-a-call-to-telegram-a899441b1bac
Github: https://github.com/n0a/telegram-get-remote-ip
Note: Only if user has enabled Peer to Peer Calls
#tg
https://medium.com/@ibederov_en/find-out-the-ip-address-through-a-call-to-telegram-a899441b1bac
Github: https://github.com/n0a/telegram-get-remote-ip
Note: Only if user has enabled Peer to Peer Calls
#tg
Medium
Find out the IP address through a call to Telegram…
1️⃣ Download Wireshark (https://www.wireshark.org/download.html), open it and be sure to specify the protocol we need in the filter — STUN…
👍6
How to trace IP of someone's id in telegram using Golang!
Code:
Code:
package mai
import (
"fmt"
"log"
"os"
"os/exec"
"strings"
)
func main() {
const CAP_PATH = "/tmp/tg_cap.pcap" // Temporary path for pcap capture file
const CAP_TEXT = "/tmp/tg_text.txt" // Temporary path for text file with information
const CAP_DURATION = "5" // Capture duration in seconds
// Get the external IP address of the device
ipCmd := exec.Command("curl", "-s", "icanhazip.com")
ipOutput, err := ipCmd.Output()
if err != nil {
log.Fatal("Failed to get IP address:", err)
}
MY_IP := strings.TrimSpace(string(ipOutput))
// Check if Wireshark is installed
_, err = exec.LookPath("tshark")
if err != nil {
log.Println("[-] Wireshark not found. Try installing Wireshark first.")
log.Println("[+] Debian-based: sudo apt-get install -y tshark")
log.Println("[+] RedHat-based: sudo yum install -y tshark")
os.Exit(1)
}
fmt.Println("[+] Discovering User's IP Address on Telegram using Golang")
fmt.Println("[+] Starting traffic capture. Please wait for", CAP_DURATION, "seconds...")
// Start traffic capture with Wireshark
captureCmd := exec.Command("tshark", "-w", CAP_PATH, "-a", "duration:"+CAP_DURATION)
captureOutput, err := captureCmd.CombinedOutput()
if err != nil {
log.Fatal("Traffic capture error:", err)
}
fmt.Println("[+] Traffic captured.")
// Convert pcap file to readable text file
convertCmd := exec.Command("tshark", "-r", CAP_PATH)
convertOutput, err := convertCmd.Output()
if err != nil {
log.Fatal("Error converting pcap file to text:", err)
}
err = os.WriteFile(CAP_TEXT, convertOutput, 0644)
if err != nil {
log.Fatal("Error writing text file:", err)
}
fmt.Println("[+] Pcap file successfully converted to text.")
// Check if Telegram traffic is present in the text file
if strings.Contains(string(convertOutput), "STUN 106") {
fmt.Println("[+] Telegram traffic found.")
// Extract the IP address from the text
extractCmd := exec.Command("cat", CAP_TEXT, "|", "grep", "STUN 106", "|", "sed", "'s/^.*XOR-MAPPED-ADDRESS: //'", "|", "awk", "'{match($0,/[0-9]+\\.[0-9]+\\.[0-9]+\\.[0-9]+/); ip = substr($0,RSTART,RLENGTH); print ip}' | awk '!seen[$0]++'")
extractOutput, err := extractCmd.Output()
if err != nil {
log.Fatal("Error extracting IP address:", err)
}
TG_OUT := strings.TrimSpace(string(extractOutput))
IP_1 := strings.Fields(TG_OUT)[0]
IP_2 := strings.Fields(TG_OUT)[1]
var IP string
// Check if the IP address is ours or the recipient's
if MY_IP == IP_1 {
IP = IP_2
} else if MY_IP == IP_2 {
IP = IP_1
} else {
IP = "[-] Sorry. IP address not found."
os.Exit(1)
}
// Get host information for the IP address
hostCmd := exec.Command("host", IP)
hostOutput, err := hostCmd.Output()
if err != nil {
log.Fatal("Error getting host information:", err)
}
fmt.Println("[+]")
fmt.Println("[+] IP Address:", IP)
fmt.Println("[+] Host:", strings.TrimSpace(string(hostOutput)))
fmt.Println("[+]")
// Clean up temporary files
err = os.Remove(CAP_PATH)
if err != nil {
log.Fatal("Cleanup error:", err)
}
err = os.Remove(CAP_TEXT)
if err != nil {
log.Fatal("Cleanup error:", err)
}
fmt.Println("[+] Cleanup completed.")
} else {
fmt.Println("[-] Telegram traffic not found.")
fmt.Println("[!]")
fmt.Println("[!] Run this script only >>>AFTER<<< the response.")
fmt.Println("[!]")
os.Exit(1)
}
fmt.Println("[?]")
fmt.Print("[?] Run whois", IP, "? (Y/N): ")
// Check if the user wants to run the whois command
var answer string
fmt.Scanln(&answer)👍2❤1
Continuation:
Source: Internet :)
if strings.ToUpper(answer) == "Y" {
whoisCmd := exec.Command("whois", IP)
whoisOutput, err := whoisCmd.Output()
if err != nil {
log.Fatal("Error running whois command:", err)
}
fmt.Println(string(whoisOutput))
} else {
fmt.Println("[+] Goodbye!")
os.Exit(0)
}
}Source: Internet :)
Telegram Maltego
a free set of Transforms for Maltego that enables OSINT investigations in the Telegram messenger.
Initially designed solely to simplify de-anonymization through stickers/emojis, it has since expanded far beyond its original functionality, allowing for more advanced investigations.
Features:
Getting Telegram profile by phone number
Getting a linked Telegram channel group
Getting a list of Telegram group administrators
Getting a list of authors of a Telegram channel
Collect all forwarded & similar channels by Channel
Search for deleted posts and generate links to view them
Indexing of all stickers/emoji in Telegram channel
Identification of the creator of a set of stickers/emoji
https://github.com/vognik/maltego-telegram
#tg #telegram
a free set of Transforms for Maltego that enables OSINT investigations in the Telegram messenger.
Initially designed solely to simplify de-anonymization through stickers/emojis, it has since expanded far beyond its original functionality, allowing for more advanced investigations.
Features:
Getting Telegram profile by phone number
Getting a linked Telegram channel group
Getting a list of Telegram group administrators
Getting a list of authors of a Telegram channel
Collect all forwarded & similar channels by Channel
Search for deleted posts and generate links to view them
Indexing of all stickers/emoji in Telegram channel
Identification of the creator of a set of stickers/emoji
https://github.com/vognik/maltego-telegram
#tg #telegram
GitHub
GitHub - vognik/maltego-telegram: 🔎 OSINT Maltego Transforms for investigating Telegram channels, groups, and users, including…
🔎 OSINT Maltego Transforms for investigating Telegram channels, groups, and users, including deanonymization via stickers, forwarded messages, similar channels, deleted posts, and more. - vognik/ma...
😱20👀6🔥2👍1
#NewPipe on #Linux, Using Android_translation_layer
https://flathub.org/apps/net.newpipe.NewPipe
Comments
https://news.ycombinator.com/item?id=41963932
#yt
https://flathub.org/apps/net.newpipe.NewPipe
Comments
https://news.ycombinator.com/item?id=41963932
#yt
flathub.org
Install NewPipe (unofficial port) on Linux | Flathub
Free and lightweight YouTube frontend for Android
❤30🤯5👍4🔥4
Home Assistant Voice Preview Edition
Open, local, and private #voice #assistant
https://www.home-assistant.io/voice-pe/
Resources
https://voice-pe.home-assistant.io/resources/
https://github.com/esphome/home-assistant-voice-pe
Community
https://community.home-assistant.io/
Specs
SoC ESP32-S3 SoC with 16 MB of FLASH storage 8 MB octal PSRAM
Audio Processing XMOS XU316
Featuring:
Echo cancellation
Stationary noise removal
Auto gain control
Dedicated I2S lines for audio in and out
Power / data USB-C, 5 V DC, 2 A
Radios 2.4 GHz Wi-Fi
Bluetooth 5.0
Audio output 3.5 mm (⅛”) stereo headphone jack
Digital to analog converter (DAC): TI AIC3202
48 kHz sampling rate
Software
ESPHome preloaded
Fully open-source firmware for both the ESP32 and XMOS chip
#iot #homeassistant
Open, local, and private #voice #assistant
https://www.home-assistant.io/voice-pe/
Resources
https://voice-pe.home-assistant.io/resources/
https://github.com/esphome/home-assistant-voice-pe
Community
https://community.home-assistant.io/
Specs
SoC ESP32-S3 SoC with 16 MB of FLASH storage 8 MB octal PSRAM
Audio Processing XMOS XU316
Featuring:
Echo cancellation
Stationary noise removal
Auto gain control
Dedicated I2S lines for audio in and out
Power / data USB-C, 5 V DC, 2 A
Radios 2.4 GHz Wi-Fi
Bluetooth 5.0
Audio output 3.5 mm (⅛”) stereo headphone jack
Digital to analog converter (DAC): TI AIC3202
48 kHz sampling rate
Software
ESPHome preloaded
Fully open-source firmware for both the ESP32 and XMOS chip
#iot #homeassistant
Home Assistant
Home Assistant Voice Preview Edition
Bring choice to voice - the best way to get started with voice
👍10🔥1
Very sadly DivestOS come to the end 😱😭
Anniversary and Final Update¶
Notes from Tavi
December marks 10 years of #DivestOS!
There were over 7,000 git commits created in this time.
I believe the projects were highly successful in their goals, however this month will mark the end.
DivestOS and its apps will not receive any further updates.
Hypatia and Carrion will no longer receive database updates.
The non-mobile Divested projects (eg. Brace, D-WRT, real-ucode, and DNS blocklists) will continue to be maintained.
Most of our forum threads will be closed and the DivestOS XMPP chat rooms will also be turned off.
Donations will no longer be accepted and all recurring donations will be cancelled.
Thank you to all the users, contributors, and donors for this time. -Tavi
https://divestos.org/pages/news#end
Anniversary and Final Update¶
Notes from Tavi
December marks 10 years of #DivestOS!
There were over 7,000 git commits created in this time.
I believe the projects were highly successful in their goals, however this month will mark the end.
DivestOS and its apps will not receive any further updates.
Hypatia and Carrion will no longer receive database updates.
The non-mobile Divested projects (eg. Brace, D-WRT, real-ucode, and DNS blocklists) will continue to be maintained.
Most of our forum threads will be closed and the DivestOS XMPP chat rooms will also be turned off.
Donations will no longer be accepted and all recurring donations will be cancelled.
Thank you to all the users, contributors, and donors for this time. -Tavi
https://divestos.org/pages/news#end
😢50😱5🫡4😨1
microG GMSCore v0.3.6.244735 has been released on 2024-12-23.
UPDATE HIGHLIGHTS:
This is a feature and bugfix/compatibility update. There is at least one report of a new issue with this release.
If you have critical reliance on your device you may want to wait a week or two until more user reports are in before updating to this. (UNLESS you are still on 0.2.27 for UNLP reasons. Scroll to the bottom of this doc for more info before installing.)
New Features Overview
Initial Support for Play Integrity
If you need this, you probably already know what it is. We doubt this is going to be some magic solution as Google is always targeting to block custom ROM users with this tool, but it may improve compatibility for some users. Let us know how it works for you.
Add support in the Self-Check Page to show compatibility with Google’s new app signing regime
Google recently broke compatibility with Google Apps and future apps downloaded from Google Play by changing their app signing scheme.
This requires a change in your app signature spoofing solution, either inside your ROM or in an external add-on. This change will show you if your ROM or signature spoofing solution has updated to support this Google change.
Other improvements
Improve Google Play Games compatibility, general compatibility improvements, various bugfixes, language translation updates.
For a full changelog, see the links below.
Github release page
Includes release notes overview
https://github.com/microg/GmsCore/releases/tag/v0.3.6.244735
DETAILED changelogs with code commits:
0.3.5 —> 0.3.6
https://github.com/microg/GmsCore/compare/v0.3.5.240913...v0.3.6.244735
========
UPDATING:
* This has been flagged as a PREVIEW release on the microG website and F-droid repo.
Since this is a “Preview” release, it will NOT be suggested to you as a new update unless you have your client configured to offer "unstable” software versions, or select the new version manually in the “Versions” dropdown at the bottom of the app page on F-droid.
The most straightforward way to update the microG core module for most people is by using the F-droid client, with the special microG F-droid repo added. (See our “f-droid-repo” group note here)
You can also update microG on an existing installation by downloading the new APK from the official microG Github download page or website, and install it like any other standalone APK.
REMEMBER THAT THERE ARE TWO MAIN MICROG COMPONENTS: GmsCore and microG Companion. Always update both together, and ensure the version numbers match.
If you use a ROM which bundles microG and the above update methods do not work, you may have to wait for your ROM to update to the new microG version. Ask your ROM developer.
For new installs, the 3rd-party installer bundles will be updated as per each developer's workflow.
UPDATE HIGHLIGHTS:
This is a feature and bugfix/compatibility update. There is at least one report of a new issue with this release.
If you have critical reliance on your device you may want to wait a week or two until more user reports are in before updating to this. (UNLESS you are still on 0.2.27 for UNLP reasons. Scroll to the bottom of this doc for more info before installing.)
New Features Overview
Initial Support for Play Integrity
If you need this, you probably already know what it is. We doubt this is going to be some magic solution as Google is always targeting to block custom ROM users with this tool, but it may improve compatibility for some users. Let us know how it works for you.
Add support in the Self-Check Page to show compatibility with Google’s new app signing regime
Google recently broke compatibility with Google Apps and future apps downloaded from Google Play by changing their app signing scheme.
This requires a change in your app signature spoofing solution, either inside your ROM or in an external add-on. This change will show you if your ROM or signature spoofing solution has updated to support this Google change.
Other improvements
Improve Google Play Games compatibility, general compatibility improvements, various bugfixes, language translation updates.
For a full changelog, see the links below.
Github release page
Includes release notes overview
https://github.com/microg/GmsCore/releases/tag/v0.3.6.244735
DETAILED changelogs with code commits:
0.3.5 —> 0.3.6
https://github.com/microg/GmsCore/compare/v0.3.5.240913...v0.3.6.244735
========
UPDATING:
* This has been flagged as a PREVIEW release on the microG website and F-droid repo.
Since this is a “Preview” release, it will NOT be suggested to you as a new update unless you have your client configured to offer "unstable” software versions, or select the new version manually in the “Versions” dropdown at the bottom of the app page on F-droid.
The most straightforward way to update the microG core module for most people is by using the F-droid client, with the special microG F-droid repo added. (See our “f-droid-repo” group note here)
You can also update microG on an existing installation by downloading the new APK from the official microG Github download page or website, and install it like any other standalone APK.
REMEMBER THAT THERE ARE TWO MAIN MICROG COMPONENTS: GmsCore and microG Companion. Always update both together, and ensure the version numbers match.
If you use a ROM which bundles microG and the above update methods do not work, you may have to wait for your ROM to update to the new microG version. Ask your ROM developer.
For new installs, the 3rd-party installer bundles will be updated as per each developer's workflow.
👍10🔥4😁1😨1
Google Apps update
If you're having problems with various Google Apps not working properly starting within the last 2 weeks or so, check this out:
Google recently changed the method used to create app signatures on all Google Apps, and will be rolling these changes out to ALL apps distributed via Google Play starting next year.
This requires all app signature spoofing methods (either embedded within your ROM or used as an external patch) to be updated to continue to support apps distributed via Google Play on a device running microG.
The Github comment linked below contains a list of which ROMs and signature spoofing patches have imported the changes necessary to support the new Google Play app signing mechanism.
We advise you to NOT do any updates of apps sourced from Google Play - especially paid apps or any app that does license-checking - until you have these fixes applied on your devices or those apps may stop working!
(I do not know if the linked post will be continuously updated to reflect news about other ROMs etc but it is correct as of the time of posting. Most ROMs based on LOS should get these patches eventually. Please check with your ROM maintainer.)
https://github.com/microg/GmsCore/issues/2680#issuecomment-2548579352
Here's a summary of the situation:
FakeGApps (fix merged) - v6.5 or higher contains the fixes
LineageOS 19.1/20/21/22 (fix merged) - All builds from 2024/12/17 onwards contain the fix
LineageOS for microG (fix auto-included from upstream) - All builds from 2024/12/17 onwards contain the fix
/e/OS (fix merged) - v2.6.3 or higher contains the fix
crDroid (fix merged) - v15.0-20241225 or higher contains the fix
CalyxOS 6.2.2 and 5.14.1 (fix merged) - New versions in the works
IodéOS v5.8 or higher (fix included)
DivestOS (no info yet)
If you're having problems with various Google Apps not working properly starting within the last 2 weeks or so, check this out:
Google recently changed the method used to create app signatures on all Google Apps, and will be rolling these changes out to ALL apps distributed via Google Play starting next year.
This requires all app signature spoofing methods (either embedded within your ROM or used as an external patch) to be updated to continue to support apps distributed via Google Play on a device running microG.
The Github comment linked below contains a list of which ROMs and signature spoofing patches have imported the changes necessary to support the new Google Play app signing mechanism.
We advise you to NOT do any updates of apps sourced from Google Play - especially paid apps or any app that does license-checking - until you have these fixes applied on your devices or those apps may stop working!
(I do not know if the linked post will be continuously updated to reflect news about other ROMs etc but it is correct as of the time of posting. Most ROMs based on LOS should get these patches eventually. Please check with your ROM maintainer.)
https://github.com/microg/GmsCore/issues/2680#issuecomment-2548579352
Here's a summary of the situation:
FakeGApps (fix merged) - v6.5 or higher contains the fixes
LineageOS 19.1/20/21/22 (fix merged) - All builds from 2024/12/17 onwards contain the fix
LineageOS for microG (fix auto-included from upstream) - All builds from 2024/12/17 onwards contain the fix
/e/OS (fix merged) - v2.6.3 or higher contains the fix
crDroid (fix merged) - v15.0-20241225 or higher contains the fix
CalyxOS 6.2.2 and 5.14.1 (fix merged) - New versions in the works
IodéOS v5.8 or higher (fix included)
DivestOS (no info yet)
👍13😨3❤1💩1
IronFox
IronFox is a fork of DivestOS's Mull Browser based on #Firefox that has been discontinued. Our goal is to continue the legacy of #Mull to provide a secure, hardened and privacy-oriented #browser for daily use.
And add the release link to Obtainium: https://gitlab.com/ironfox-oss/IronFox/-/releases
Don't forget to use extensions uBlock Origin and Libredirect only. Adding more extensions will cause fingerprinting and most are false security.
- uBlock Origin
-- add the ai blocklist to uBO
- LibRedirect
-- setup all the sites you want to redirect to and choose your mirrors for them.
Set your default search to 4get
(Captcha) https://4get.ca/web?s=%s
(No captcha) https://4get.ch/web?s=%s
Finally, go through all the ironfox settings and set them how you would prefer them.
Read the gitlab page. Specifically...
Known Issues
Please see the list of known issues and workarounds before opening an issue!
You should also see here for a list of websites with known issues due to hardening, and what you may need to do to fix them. This list is maintained by Phoenix - so while it isn't specific to IronFox or Mull, many of these problems do still apply.
Ironfox has Phoenix already, but this can be added to other browsers on Android and desktop.
IronFox is a fork of DivestOS's Mull Browser based on #Firefox that has been discontinued. Our goal is to continue the legacy of #Mull to provide a secure, hardened and privacy-oriented #browser for daily use.
And add the release link to Obtainium: https://gitlab.com/ironfox-oss/IronFox/-/releases
Don't forget to use extensions uBlock Origin and Libredirect only. Adding more extensions will cause fingerprinting and most are false security.
- uBlock Origin
-- add the ai blocklist to uBO
- LibRedirect
-- setup all the sites you want to redirect to and choose your mirrors for them.
Set your default search to 4get
(Captcha) https://4get.ca/web?s=%s
(No captcha) https://4get.ch/web?s=%s
Finally, go through all the ironfox settings and set them how you would prefer them.
Read the gitlab page. Specifically...
Known Issues
Please see the list of known issues and workarounds before opening an issue!
Issues inherited from Mull that still apply to IronFox *(contents adapted from DivestOS's website)*
You should also see here for a list of websites with known issues due to hardening, and what you may need to do to fix them. This list is maintained by Phoenix - so while it isn't specific to IronFox or Mull, many of these problems do still apply.
Ironfox has Phoenix already, but this can be added to other browsers on Android and desktop.
GitLab
Releases · IronFox OSS / IronFox · GitLab
Private, secure, user first web browser for Android. https://ironfoxoss.org/
👏20❤14👍13🔥3🤮2😁1🙏1
Forwarded from Aurora OSS
AuroraStore_4.6.4.apk
7.1 MB
Changelog : v4.6.4 (65)
• Fixed issues with shared library installation for apps like Chrome and WebView
• Support for login into personal account using microG
• Fixed an issue with auth verification
• Translation updates; Additional strings localized
• Fixed issues with shared library installation for apps like Chrome and WebView
• Support for login into personal account using microG
• Fixed an issue with auth verification
• Translation updates; Additional strings localized
🎉10👍6🆒3
#Android #web #browsers
Ungoogled Chromium (forked from cromite) with Bromite patches and additional codecs
https://github.com/macchrome/droidchrome/releases
https://chromium.woolyss.com/#android
Cromite is another example of ungoogled chromium without the extra codecs from the above link, but cromite includes more patches as noted at github.
https://github.com/uazo/cromite
Fdroid repo
For an Android Firefox based browser, use IronFox
https://gitlab.com/ironfox-oss/IronFox/-/releases
Fdroid repo
These can be added to Obtainium to download the latest release when they are available
https://github.com/ImranR98/Obtainium
Ungoogled Chromium (forked from cromite) with Bromite patches and additional codecs
https://github.com/macchrome/droidchrome/releases
https://chromium.woolyss.com/#android
Cromite is another example of ungoogled chromium without the extra codecs from the above link, but cromite includes more patches as noted at github.
https://github.com/uazo/cromite
Fdroid repo
https://www.cromite.org/fdroid/repo?fingerprint=49f37e74dee483dca2b991334fb5a0200787430d0b5f9a783dd5f13695e9517bFor an Android Firefox based browser, use IronFox
https://gitlab.com/ironfox-oss/IronFox/-/releases
Fdroid repo
https://fdroid.ironfoxoss.org/fdroid/repo?fingerprint=c5e291b5a571f9c8cd9a9799c2c94e02ec9703948893f2ca756d67b94204f904These can be added to Obtainium to download the latest release when they are available
https://github.com/ImranR98/Obtainium
GitHub
Releases · macchrome/droidchrome
Contribute to macchrome/droidchrome development by creating an account on GitHub.
👍9❤6🔥4🥰2