Libreware
6.18K subscribers
362 photos
26 videos
113 files
719 links
Libreware Software Library

πŸ“‘ t.iss.one/Libreware

β˜… Send us your suggestions and menaces here:
https://t.iss.one/joinchat/nMOOE4YJPDFhZjZk
Download Telegram
Payload-Dumper-Android

A Powerful #OTA Extractor App for #Android
You can extract images (boot, vendor_boot...) from a OTA.zip without a PC, directly on Android, without root access.

https://github.com/rajmani7584/Payload-Dumper-Android

Download
https://github.com/rajmani7584/Payload-Dumper-Android/releases/
πŸ”₯27✍4❀1
SmartTube

Advanced player for set-top boxes and tvs running Android OS

Features
No Ads
Designed for TV screens
Up to 8K video resolution
Login into your account
Cast from the phone
Support tv box remote controller
Support external software keyboard
Support devices without Google Services
Open source

https://smarttubeapp.github.io

https://github.com/yuliskov/SmartTube

https://github.com/yuliskov/SmartTube/releases

WARNING NOT FULLY OPEN SOURCE
There are at least 5 proprietary libraries in the app.
https://github.com/yuliskov/SmartTube/issues/471

* Crashlytics (/com/crashlytics): Tracking
* Firebase Data Transport (/com/google/android/datatransport): NonFreeNet
* Google Mobile Services (/com/google/android/gms): NonFreeDep
* Firebase (/com/google/firebase): NonFreeNet,NonFreeDep
* Firebase Analytics (/com/google/firebase/analytics): Tracking

IzzySoft:
The 5 offenders are not permitted at F-Droid (and before you ask: I wouldn't take it into my repo either unless at least Crashlytics and Firebase Analytics are removed; 5 non-free libraries is a bit much for free/libre software).

#video #yt #androidtv
πŸ”₯14πŸ‘7❀1πŸ₯°1
🚨 Your Android is watching you!

Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it won’t stop it because it reinstalls automatically.
The only way to stop it is to disable it, preventing Google Play from reinstalling or updating it without your consent.

πŸ” Why Does This Matter?
It may be scanning all your media files.

In October 2024, Google introduced "Sensitive Content Warnings" in Google Messages, which scan images on-device to detect nudity. Since SafetyCore is linked to Google’s content moderation systems, it’s likely scanning files to classify content without your knowledge.
Uninstalling is useless.

Even if you remove it, Google Play reinstalls it automatically.
No transparency from Google.

There’s no clear explanation on what else it does or why it reinstalls itself.

Honorable mention: it requires 2GB RAM 😳

πŸ”’ How to disable it?
ㅀㅀㅀㅀㅀㅀ⭐ Non-Root

1️⃣ Enable USB Debugging
(Settings > Developer options).
2️⃣ Download & install ADB on your PC.
3️⃣ Connect your phone to a PC.
4️⃣ Open a terminal and run:

🌌 Windows Command Prompt:
adb shell pm disable-user --user 0 com.google.android.safetycore


πŸ”Ÿ Windows PowerShell:
.\adb shell pm disable-user --user 0 com.google.android.safetycore


🐧 Mac/Linux Terminal:
./adb shell pm disable-user --user 0 com.google.android.safetycore


γ…€γ…€γ…€γ…€γ…€γ…€γ…€γ…€πŸŽ­ Root

1️⃣ Download & install Termux on your phone.
2️⃣ Open Termux and run:
su -c pm disable com.google.android.safetycore


Take control of your device. Disable it now.

πŸ“±π— π—˜π—’π—ͺ 𝗗𝗨𝗠𝗣
❀33πŸ‘12πŸ”₯2πŸ€“1
Libreware
🚨 Your Android is watching you! Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it won’t stop it because it reinstalls automatically. The only way to stop it is to disable it, preventing Google Play…
https://support.google.com/product-documentation/answer/16001929

https://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html

Android System SafetyCore (com.google.android.safetycore) provides common infrastructure that apps can use to protect users from unwanted content. The classification of content runs exclusively on your device and the results aren’t shared with Google.

As a system service, SafetyCore is only active when an application integrates with SafetyCore and specifically requests content to be classified. SafetyCore performs the classification on the device itself and doesn’t send identifiable data or any of the classified content or results to Google servers


For now there is no app that uses it. In future any app can use it to avoid setting up his system not on device.

Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a β€œspeed bump” that contains help-finding resources and options, including to view the content.

Also only if you have play store it get installed automatically so is only for people that already trust google and have no problem using it. So far only know use will be an option to keep NSFW images distorted instead of automatically being displayed in messages app, if if the user don't want it can disable the option or change message app.
There is similar feat on TG too, some images are blurred before being manually shown.

GOS team stated they analized it and found out it does nothing more than what is described, for now (local scan, no data sent...).
Also on their sandboxes play services the auto-installation is blocked so is up to the user to choose what to do with it.

Another solution:
Uninstall the app and then install this placeholder app

https://github.com/daboynb/Safetycore-placeholder
πŸ‘8πŸ”₯8❀1
@NoGoolag #browser #alternatives with mitigations, patches etc.
Alpha version release March 6, 2025

FireFox browser options
- Tor Browser (all)
- Mullvad Browser (Desktop)
- IronFox (Android) Read the Known Issues section on the gitlab.
- LibreWolf (mentally ill devs)

Make your own #Firefox with mitigations etc...
- Phoenix / wiki
- Arkenfox user.js / wiki / gui / user-tool / mobile
- Narsil / Narsil Mobile
- Betterfox / Betterfox Mobile
- pyllyukko
- Compare some of the user.js files

Chromium based browser Options
- Ungoogled Chromium (all)
- Cromite (Android, Linux, Windows)

Browser extensions
- uBlacklist
- uBlock Origin or uMatrix (never both)
- LibRedirect (setup your instances for each service in the settings)

Links to block lists...
- Yokoffing
- Celenity/Phoenix
- FilterLists

Set your default search engine to a search proxy
- 4get instances
- Searx instances

Why your favorite browser is not recommended
- Celenity Firefox browser comparisons
- How to choose a browser for everyday use?
- is your browser spyware?
- Choose your browser carefully
- Browsers and the connections they make compared
- Fake Privacy and security

Additional reading...
- Wiki about extensions
- Multiple Extension Conflicts
- uMatrix for beginners
- Firefox user.js install guide
- Arch Linux Firefox Privacy wiki
- Bromite (for knowledge purposes)

Testing your browser
- Fingerprint.com
- How to test browsers for spyware
- Privacytests browser comparison
- Mullvad check
- Bromite fingerprint testing
- IP Leak
- List of test sites A
- List of test sites B


* Thunderbird users should consider taking a look at Dove - Phoenix's sister project.
πŸ‘28❀2πŸ”₯1πŸ‘1
Stop #Cloudflare

β€œThe Great Cloudwall” is Cloudflare Inc., the U.S. company. It is providing CDN(content delivery network) services, DDoS mitigation, Internet security, and distributed DNS(domain name server) services. Cloudflare is the world's largest MITM proxy (reverse proxy). Cloudflare owns more than 80% of CDN market share and the number of cloudflare users are growing each day. They have expanded their network to more than 100 countries. Cloudflare serves more web traffic than Twitter, Amazon, Apple, Instagram, Bing & Wikipedia combined. Cloudflare is offering free plan and many people are using it instead of configuring their servers properly. They traded privacy over convenience. Cloudflare sits between you and origin web server, acting like a border patrol agent. You are not able to conn

https://0xacab.org/dCF/deCloudflare/-/blob/master/readme/en.md
πŸ”₯20πŸ‘6
Flatseal

Graphical utility for #Linux to review and modify permissions from your #Flatpak applications.

Simply launch Flatseal, select an application and modify its permissions. Restart the application after making the changes. If anything goes wrong just press the reset button.

Get it
https://flathub.org/apps/details/com.github.tchx84.Flatseal

For more details please visit the documentation page
https://github.com/tchx84/Flatseal/blob/master/DOCUMENTATION.md

https://github.com/tchx84/flatseal
πŸ‘14❀‍πŸ”₯7πŸ’©2
Obtainium

Get
#Android App Updates Directly From the Source.

Tired of waiting for updates in the Play Store? Obtainium lets you install and update Android apps directly from their source (like GitHub release pages) and notifies you about new releases. Cut out the middleman and stay up-to-date!

Key Features:

*   Direct Updates: Install and update apps directly from release pages.
*   Notifications: Get notified when new versions of your apps are available.
*   Open Source: Built by the community, for the community.

Learn More:

*   Video Tutorial: Obtainium 101
*   README: GitHub
*   Wiki: obtainium.imranr.dev

Recommended Tools:

*   AppVerifier: GitHub - Verify app authenticity.

Community Resources:

*   Crowdsourced App Configs: apps.obtainium.imranr.dev

Why Use Obtainium?

See the original motivation: Side Of Burritos - You should use this instead of F-Droid | How to use app RSS feed

Project Links:

*   Website: obtainium.imranr.dev
*   Source Code: GitHub

#apk
πŸ‘23πŸ”₯4❀2πŸ‘Ž2