Warning for #Android gapps traitors:
Uninstall the application:
https://play.google.com/store/apps/details?id=com.google.android.safetycore
Be careful on GrapheneOS too if you have Google services installed.
While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.
https://grapheneos.org/releases
https://discuss.grapheneos.org/d/19193-android-system-safety-core
If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.
Locating the App
Go to Settings โ Apps (or Apps & Notifications) โ Show system apps. Look for โAndroid System SafetyCore.โ
Check whether the app has any special permissions (e.g., internet access).
Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.
This is client side scanning. It's a way to spy on your device before it's encrypted.
Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/
Uninstall the application:
Android System SafetyCore, which has been automatically installed on most devices. It is used by Google to scan your data, just like Apple has been doing on iOS, but you have the choice to uninstall it. If you don't have it yet, watch out for it being installed silently over the next few days!https://play.google.com/store/apps/details?id=com.google.android.safetycore
Be careful on GrapheneOS too if you have Google services installed.
While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.
Sandboxed Google Play compatibility layer: stop Play Store from attempting to auto-install some system component packages, such as "Android System SafetyCore" (com.google.android.safetycore) and "Android System Key Verifier" (com.google.android.contactkeys)
https://grapheneos.org/releases
The phone is asking me to install this app, anyone knows information about if its truly need it or not? Im with the Google Play Services sandbox install
https://discuss.grapheneos.org/d/19193-android-system-safety-core
If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.
Locating the App
Go to Settings โ Apps (or Apps & Notifications) โ Show system apps. Look for โAndroid System SafetyCore.โ
Check whether the app has any special permissions (e.g., internet access).
Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.
This is client side scanning. It's a way to spy on your device before it's encrypted.
Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/
๐33โค2๐1๐1
The functionality provided by Google's new Android System SafetyCore app available through the Play Store is covered here:
https://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html
Neither this app or the Google Messages app using it are part of GrapheneOS and neither will be, but GrapheneOS users can choose to install and use both. Google Messages still works without the new app.
The app doesn't provide client-side scanning used to report things to Google or anyone else. It provides on-device machine learning models usable by applications to classify content as being spam, scams, malware, etc. This allows apps to check content locally without sharing it with a service and mark it with warnings for users.
It's unfortunate that it's not open source and released as part of the Android Open Source Project and the models also aren't open let alone open source. It won't be available to GrapheneOS users unless they go out of the way to install it.
We'd have no problem with having local neural network features for users, but they'd have to be open source. We wouldn't want anything saving state by default. It'd have to be open source to be included as a feature in GrapheneOS though, and none of it has been so it's not included.
Google Messages uses this new app to classify messages as spam, malware, nudity, etc. Nudity detection is an optional feature which blurs media detected as having nudity and makes accessing it require going through a dialog.
Apps have been able to ship local AI models to do classification forever. Most apps do it remotely by sharing content with their servers. Many apps have already have client or server side detection of spam, malware, scams, nudity, etc.
Classifying things like this is not the same as trying to detect illegal content and reporting it to a service. That would greatly violate people's privacy in multiple ways and false positives would still exist. It's not what this is and it's not usable for it.
GrapheneOS has all the standard hardware acceleration support for neural networks but we don't have anything using it. All of the features they've used it for in the Pixel OS are in closed source Google apps. A lot is Pixel exclusive. The features work if people install the apps.
https://xcancel.com/GrapheneOS/status/1888280836426084502
https://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html
Neither this app or the Google Messages app using it are part of GrapheneOS and neither will be, but GrapheneOS users can choose to install and use both. Google Messages still works without the new app.
The app doesn't provide client-side scanning used to report things to Google or anyone else. It provides on-device machine learning models usable by applications to classify content as being spam, scams, malware, etc. This allows apps to check content locally without sharing it with a service and mark it with warnings for users.
It's unfortunate that it's not open source and released as part of the Android Open Source Project and the models also aren't open let alone open source. It won't be available to GrapheneOS users unless they go out of the way to install it.
We'd have no problem with having local neural network features for users, but they'd have to be open source. We wouldn't want anything saving state by default. It'd have to be open source to be included as a feature in GrapheneOS though, and none of it has been so it's not included.
Google Messages uses this new app to classify messages as spam, malware, nudity, etc. Nudity detection is an optional feature which blurs media detected as having nudity and makes accessing it require going through a dialog.
Apps have been able to ship local AI models to do classification forever. Most apps do it remotely by sharing content with their servers. Many apps have already have client or server side detection of spam, malware, scams, nudity, etc.
Classifying things like this is not the same as trying to detect illegal content and reporting it to a service. That would greatly violate people's privacy in multiple ways and false positives would still exist. It's not what this is and it's not usable for it.
GrapheneOS has all the standard hardware acceleration support for neural networks but we don't have anything using it. All of the features they've used it for in the Pixel OS are in closed source Google apps. A lot is Pixel exclusive. The features work if people install the apps.
https://xcancel.com/GrapheneOS/status/1888280836426084502
Google Online Security Blog
5 new protections on Google Messages to help keep you safe
Posted by Jan Jedrzejowicz, Director of Product, Android and Business Communications; Alberto Pastor Nieto, Sr. Product Manager Google Messa...
๐12๐3โค2
#Systemd Adding The Ability to Boot Directly Into A Disk Image Downloaded Via HTTP
https://www.phoronix.com/news/systemd-disk-image-boot-HTTP
#Linux #backdoor
https://www.phoronix.com/news/systemd-disk-image-boot-HTTP
#Linux #backdoor
Phoronix
Systemd Adding The Ability to Boot Directly Into A Disk Image Downloaded Via HTTP
Systemd lead developer Lennart Poettering has been working on adding the ability to let systemd boot directly into a disk image downloaded via HTTP within the initial RAM disk (initrd) during the Linux boot process.
๐ฅ9๐4๐คฃ3๐1๐คฎ1
Krita
Free and open source digital painting application. It is for artists who want to create professional work from start to end. Krita is used by comic book artists, illustrators, concept artists, matte and texture painters and in the digital VFX industry.
https://krita.org
https://invent.kde.org/graphics/krita
Download
https://cdn.kde.org/ci-builds/graphics/krita/
#AI plugin
https://kritaaidiffusion.com
#krita #image #editor #paint
Free and open source digital painting application. It is for artists who want to create professional work from start to end. Krita is used by comic book artists, illustrators, concept artists, matte and texture painters and in the digital VFX industry.
https://krita.org
https://invent.kde.org/graphics/krita
Download
https://cdn.kde.org/ci-builds/graphics/krita/
#AI plugin
https://kritaaidiffusion.com
#krita #image #editor #paint
GitLab
Graphics / Krita ยท GitLab
Krita is a free and open source cross-platform application that offers an end-to-end solution for creating digital art files from scratch built on the KDE and Qt frameworks.
๐ฅ10๐7โค6๐1๐1๐คก1
kitty
The fast, feature-rich, GPU based #terminal emulator
Uses GPU and SIMD vector CPU instructions for best in class
Uses threaded rendering for absolutely minimal latency
Performance tradeoffs can be tuned
Capable Scriptable Composable Cross-platform Innovative
To get started see Quickstart.
https://sw.kovidgoyal.net/kitty/
With software, such as "Kitty", it is possible to read documents, images and other graphical formats with these software:
https://github.com/dsanson/termpdf.py
http://www.kraxel.org/blog/linux/fbida/
https://github.com/itsjunetime/tdf
It means, that we no longer need GTK+ (which dropped support for X11), Qt and other graphical toolkits in order to have a full operational computer.
The fast, feature-rich, GPU based #terminal emulator
Uses GPU and SIMD vector CPU instructions for best in class
Uses threaded rendering for absolutely minimal latency
Performance tradeoffs can be tuned
Capable Scriptable Composable Cross-platform Innovative
To get started see Quickstart.
https://sw.kovidgoyal.net/kitty/
With software, such as "Kitty", it is possible to read documents, images and other graphical formats with these software:
https://github.com/dsanson/termpdf.py
http://www.kraxel.org/blog/linux/fbida/
https://github.com/itsjunetime/tdf
It means, that we no longer need GTK+ (which dropped support for X11), Qt and other graphical toolkits in order to have a full operational computer.
kitty
If you live in the terminal, kitty is made for YOU! The fast, feature-rich, GPU based terminal emulator. Fast Uses GPU and SIMD vector CPU instructions for best in class performance, Uses threaded ...
โค5
Payload-Dumper-Android
A Powerful #OTA Extractor App for #Android
You can extract images (boot, vendor_boot...) from a OTA.zip without a PC, directly on Android, without root access.
https://github.com/rajmani7584/Payload-Dumper-Android
Download
https://github.com/rajmani7584/Payload-Dumper-Android/releases/
A Powerful #OTA Extractor App for #Android
You can extract images (boot, vendor_boot...) from a OTA.zip without a PC, directly on Android, without root access.
https://github.com/rajmani7584/Payload-Dumper-Android
Download
https://github.com/rajmani7584/Payload-Dumper-Android/releases/
๐ฅ26โ4โค1
SmartTube
Advanced player for set-top boxes and tvs running Android OS
Features
No Ads
Designed for TV screens
Up to 8K video resolution
Login into your account
Cast from the phone
Support tv box remote controller
Support external software keyboard
Support devices without Google Services
Open source
https://smarttubeapp.github.io
https://github.com/yuliskov/SmartTube
https://github.com/yuliskov/SmartTube/releases
WARNING NOT FULLY OPEN SOURCE
There are at least 5 proprietary libraries in the app.
https://github.com/yuliskov/SmartTube/issues/471
* Crashlytics (/com/crashlytics): Tracking
* Firebase Data Transport (/com/google/android/datatransport): NonFreeNet
* Google Mobile Services (/com/google/android/gms): NonFreeDep
* Firebase (/com/google/firebase): NonFreeNet,NonFreeDep
* Firebase Analytics (/com/google/firebase/analytics): Tracking
IzzySoft:
The 5 offenders are not permitted at F-Droid (and before you ask: I wouldn't take it into my repo either unless at least Crashlytics and Firebase Analytics are removed; 5 non-free libraries is a bit much for free/libre software).
#video #yt #androidtv
Advanced player for set-top boxes and tvs running Android OS
Features
No Ads
Designed for TV screens
Up to 8K video resolution
Login into your account
Cast from the phone
Support tv box remote controller
Support external software keyboard
Support devices without Google Services
Open source
https://smarttubeapp.github.io
https://github.com/yuliskov/SmartTube
https://github.com/yuliskov/SmartTube/releases
WARNING NOT FULLY OPEN SOURCE
There are at least 5 proprietary libraries in the app.
https://github.com/yuliskov/SmartTube/issues/471
* Crashlytics (/com/crashlytics): Tracking
* Firebase Data Transport (/com/google/android/datatransport): NonFreeNet
* Google Mobile Services (/com/google/android/gms): NonFreeDep
* Firebase (/com/google/firebase): NonFreeNet,NonFreeDep
* Firebase Analytics (/com/google/firebase/analytics): Tracking
IzzySoft:
The 5 offenders are not permitted at F-Droid (and before you ask: I wouldn't take it into my repo either unless at least Crashlytics and Firebase Analytics are removed; 5 non-free libraries is a bit much for free/libre software).
#video #yt #androidtv
SmartTube (Official Site)
Home
Free premium app for Android boxes and tvs
๐ฅ13๐7โค1๐ฅฐ1
ReVanced
https://revanced.app
Download
https://github.com/ReVanced/revanced-manager/releases
ReVanced Documentation
https://github.com/ReVanced/revanced-documentation
Patches
https://revanced.app/patches
https://github.com/revanced
https://t.me/app_revanced
Revanced magisk module
https://github.com/j-hc/revanced-magisk-module
https://t.me/rvc_magisk
#revanced #vanced #video #yt #android
https://revanced.app
Download
https://github.com/ReVanced/revanced-manager/releases
ReVanced Documentation
https://github.com/ReVanced/revanced-documentation
Patches
https://revanced.app/patches
https://github.com/revanced
https://t.me/app_revanced
Revanced magisk module
https://github.com/j-hc/revanced-magisk-module
https://t.me/rvc_magisk
#revanced #vanced #video #yt #android
revanced.app
Continuing the legacy of Vanced.
๐13๐ฅ10โ2โค1
๐จ Your Android is watching you!
Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it wonโt stop it because it reinstalls automatically.
The only way to stop it is to disable it, preventing Google Play from reinstalling or updating it without your consent.
In October 2024, Google introduced "Sensitive Content Warnings" in Google Messages, which scan images on-device to detect nudity. Since SafetyCore is linked to Googleโs content moderation systems, itโs likely scanning files to classify content without your knowledge.
Even if you remove it, Google Play reinstalls it automatically.
Thereโs no clear explanation on what else it does or why it reinstalls itself.
Honorable mention: it requires 2GB RAM ๐ณ
1๏ธโฃ Enable USB Debugging
(Settings > Developer options).
2๏ธโฃ Download & install ADB on your PC.
3๏ธโฃ Connect your phone to a PC.
4๏ธโฃ Open a terminal and run:
1๏ธโฃ Download & install Termux on your phone.
2๏ธโฃ Open Termux and run:
Take control of your device. Disable it now.
๐ฑ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it wonโt stop it because it reinstalls automatically.
The only way to stop it is to disable it, preventing Google Play from reinstalling or updating it without your consent.
๐ Why Does This Matter?It may be scanning all your media files.
In October 2024, Google introduced "Sensitive Content Warnings" in Google Messages, which scan images on-device to detect nudity. Since SafetyCore is linked to Googleโs content moderation systems, itโs likely scanning files to classify content without your knowledge.
Uninstalling is useless.
Even if you remove it, Google Play reinstalls it automatically.
No transparency from Google.
Thereโs no clear explanation on what else it does or why it reinstalls itself.
Honorable mention: it requires 2GB RAM ๐ณ
๐ How to disable it?ใ คใ คใ คใ คใ คใ คโญ Non-Root
1๏ธโฃ Enable USB Debugging
(Settings > Developer options).
2๏ธโฃ Download & install ADB on your PC.
3๏ธโฃ Connect your phone to a PC.
4๏ธโฃ Open a terminal and run:
๐ Windows Command Prompt:adb shell pm disable-user --user 0 com.google.android.safetycore
๐ Windows PowerShell:.\adb shell pm disable-user --user 0 com.google.android.safetycore
๐ง Mac/Linux Terminal:./adb shell pm disable-user --user 0 com.google.android.safetycore
ใ คใ คใ คใ คใ คใ คใ คใ ค๐ญ Root
1๏ธโฃ Download & install Termux on your phone.
2๏ธโฃ Open Termux and run:
su -c pm disable com.google.android.safetycoreTake control of your device. Disable it now.
๐ฑ๐ ๐๐ข๐ช ๐๐จ๐ ๐ฃ
Google Play
Android System SafetyCore - Apps on Google Play
Provides safety features for Android devices.
โค32๐12๐ฅ2๐ค1
Libreware
๐จ Your Android is watching you! Google has silently installed Android System SafetyCore on your phone without permission, and uninstalling it wonโt stop it because it reinstalls automatically. The only way to stop it is to disable it, preventing Google Playโฆ
โญโฌโญโฌโญโฌhttps://support.google.com/product-documentation/answer/16001929
https://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html
Android System SafetyCore (com.google.android.safetycore) provides common infrastructure that apps can use to protect users from unwanted content. The classification of content runs exclusively on your device and the results arenโt shared with Google.
As a system service, SafetyCore is only active when an application integrates with SafetyCore and specifically requests content to be classified. SafetyCore performs the classification on the device itself and doesnโt send identifiable data or any of the classified content or results to Google servers
For now there is no app that uses it. In future any app can use it to avoid setting up his system not on device.
Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a โspeed bumpโ that contains help-finding resources and options, including to view the content.
Also only if you have play store it get installed automatically so is only for people that already trust google and have no problem using it. So far only know use will be an option to keep NSFW images distorted instead of automatically being displayed in messages app, if if the user don't want it can disable the option or change message app.
There is similar feat on TG too, some images are blurred before being manually shown.
GOS team stated they analized it and found out it does nothing more than what is described, for now (local scan, no data sent...).
Also on their sandboxes play services the auto-installation is blocked so is up to the user to choose what to do with it.
Another solution:
Uninstall the app and then install this placeholder app
https://github.com/daboynb/Safetycore-placeholder
https://security.googleblog.com/2024/10/5-new-protections-on-google-messages.html
Android System SafetyCore (com.google.android.safetycore) provides common infrastructure that apps can use to protect users from unwanted content. The classification of content runs exclusively on your device and the results arenโt shared with Google.
As a system service, SafetyCore is only active when an application integrates with SafetyCore and specifically requests content to be classified. SafetyCore performs the classification on the device itself and doesnโt send identifiable data or any of the classified content or results to Google servers
For now there is no app that uses it. In future any app can use it to avoid setting up his system not on device.
Sensitive Content Warnings is an optional feature that blurs images that may contain nudity before viewing, and then prompts with a โspeed bumpโ that contains help-finding resources and options, including to view the content.
Also only if you have play store it get installed automatically so is only for people that already trust google and have no problem using it. So far only know use will be an option to keep NSFW images distorted instead of automatically being displayed in messages app, if if the user don't want it can disable the option or change message app.
There is similar feat on TG too, some images are blurred before being manually shown.
GOS team stated they analized it and found out it does nothing more than what is described, for now (local scan, no data sent...).
Also on their sandboxes play services the auto-installation is blocked so is up to the user to choose what to do with it.
Another solution:
Uninstall the app and then install this placeholder app
https://github.com/daboynb/Safetycore-placeholder
Google
Understanding Android System SafetyCore - Help
What is SafetyCore? Android System SafetyCore is a Google system service for Android 9+ devices. You may have noticed it in the list of services installed on your device. It provides privacy-preservi
๐8๐ฅ8โค1