6. Was lässt sich jetzt tun?
Kurzfristig geht es vor allem darum, Apps aus möglichst nachvollziehbaren Quellen zu installieren – etwa direkt von der offiziellen Projektseite oder aus dem F-Droid-Hauptrepo. Wer bisher schon vorsichtig war und keine APKs aus dubiosen Download-Portalen nutzt, muss seine Gewohnheiten nicht grundlegend ändern. Wichtig ist lediglich, im Blick zu behalten, ob eine App plötzlich nicht mehr aktualisiert werden kann. Tritt dieser Fall ein, könnte die fehlende Entwickler-Verifizierung der Grund sein. Dann lohnt es sich, nach Hinweisen im Projekt oder bei F-Droid zu schauen, wie es weitergeht.
Mittelfristig braucht es stärkere Unterstützung für Projekte wie F-Droid. Das kann durch Spenden geschehen, durch Mithilfe bei Übersetzungen oder durch Beteiligung an Diskussionen in den Foren. Auch Entwickler profitieren, wenn ihnen Vorlagen und Werkzeuge zur Verfügung stehen, die den Veröffentlichungsprozess vereinfachen und reproduzierbare Builds erleichtern. Ebenso wichtig ist eine bessere Aufklärung für Nutzer: Schritt-für-Schritt-Anleitungen, die in verständlicher Sprache erklären, wie freie Apps auf zertifizierten Geräten installiert werden können und welche Einschränkungen zu erwarten sind, helfen mehr als technische Detailhinweise.
Langfristig wird entscheidend sein, Abhängigkeiten von Google zu verringern. Für manche bedeutet das den Umstieg auf Android-Varianten ohne Google-Zertifizierung wie bspw. GrapheneOS. Darüber hinaus braucht es politische Leitplanken: Wenn Google Verifizierungszwang mit dem (Schein-)Argument Sicherheit einführt, müssen Kriterien, Widerspruchswege und Transparenz rechtlich abgesichert werden. Nur so lässt sich verhindern, dass die Maßnahme als Vorwand genutzt wird, um unliebsame Software auszusperren. Stärken sollte man außerdem Projekte, die reproduzierbare Builds anbieten, da sie Vertrauen schaffen – unabhängig davon, ob Google sie akzeptiert oder nicht.
Kurzfristig geht es vor allem darum, Apps aus möglichst nachvollziehbaren Quellen zu installieren – etwa direkt von der offiziellen Projektseite oder aus dem F-Droid-Hauptrepo. Wer bisher schon vorsichtig war und keine APKs aus dubiosen Download-Portalen nutzt, muss seine Gewohnheiten nicht grundlegend ändern. Wichtig ist lediglich, im Blick zu behalten, ob eine App plötzlich nicht mehr aktualisiert werden kann. Tritt dieser Fall ein, könnte die fehlende Entwickler-Verifizierung der Grund sein. Dann lohnt es sich, nach Hinweisen im Projekt oder bei F-Droid zu schauen, wie es weitergeht.
Mittelfristig braucht es stärkere Unterstützung für Projekte wie F-Droid. Das kann durch Spenden geschehen, durch Mithilfe bei Übersetzungen oder durch Beteiligung an Diskussionen in den Foren. Auch Entwickler profitieren, wenn ihnen Vorlagen und Werkzeuge zur Verfügung stehen, die den Veröffentlichungsprozess vereinfachen und reproduzierbare Builds erleichtern. Ebenso wichtig ist eine bessere Aufklärung für Nutzer: Schritt-für-Schritt-Anleitungen, die in verständlicher Sprache erklären, wie freie Apps auf zertifizierten Geräten installiert werden können und welche Einschränkungen zu erwarten sind, helfen mehr als technische Detailhinweise.
Langfristig wird entscheidend sein, Abhängigkeiten von Google zu verringern. Für manche bedeutet das den Umstieg auf Android-Varianten ohne Google-Zertifizierung wie bspw. GrapheneOS. Darüber hinaus braucht es politische Leitplanken: Wenn Google Verifizierungszwang mit dem (Schein-)Argument Sicherheit einführt, müssen Kriterien, Widerspruchswege und Transparenz rechtlich abgesichert werden. Nur so lässt sich verhindern, dass die Maßnahme als Vorwand genutzt wird, um unliebsame Software auszusperren. Stärken sollte man außerdem Projekte, die reproduzierbare Builds anbieten, da sie Vertrauen schaffen – unabhängig davon, ob Google sie akzeptiert oder nicht.
Forwarded from Wild Kernels Bot
Wild_KSU_v0.0.150_13955-release.apk
17.4 MB
🔧 CI Manager (TEST BUILD) #ci_3755
📝 ci: add pull request conditions to workflow steps and handle skipped generate-version
🔗 Commit: https://github.com/WildKernels/Wild_KSU/commit/b347e9e6ad90b28cd06732e8b8e8ca0757e7ec35
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18159100396
📝 ci: add pull request conditions to workflow steps and handle skipped generate-version
🔗 Commit: https://github.com/WildKernels/Wild_KSU/commit/b347e9e6ad90b28cd06732e8b8e8ca0757e7ec35
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18159100396
Wild_KSU_v0.0.150-spoofed_13955-release.apk
17.4 MB
🔧 Spoofed Manager (TEST BUILD) #spoofed_3755
📝 ci: add pull request conditions to workflow steps and handle skipped generate-version
🔗 Commit: https://github.com/WildKernels/Wild_KSU/commit/b347e9e6ad90b28cd06732e8b8e8ca0757e7ec35
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18159100396
📝 ci: add pull request conditions to workflow steps and handle skipped generate-version
🔗 Commit: https://github.com/WildKernels/Wild_KSU/commit/b347e9e6ad90b28cd06732e8b8e8ca0757e7ec35
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18159100396
Forwarded from KernelSU Next Bot
KernelSU_Next_v1.1.1-23-g300a13f6_12874-release.apk
16.9 MB
CI Manager (TEST BUILD)
#ci_2674
Commit
Workflow run
#ci_2674
kernel: handle throned UID change if manager is reinstall or changed
drop old UID and throne the new one when the manager is reinstalled or changed
Commit
Workflow run
KernelSU_Next_v1.1.1-23-g300a13f6-spoofed_12874-release.apk
16.9 MB
CI Manager (SPOOFED BUILD)
#ci_2674
Commit
Workflow run
#ci_2674
kernel: handle throned UID change if manager is reinstall or changed
drop old UID and throne the new one when the manager is reinstalled or changed
Commit
Workflow run
Forwarded from Nagram X CI
NagramX-v12.0.1-25f9110(1219)-arm64-v8a.apk
48.4 MB
Test version.
Commit Message:
See commit details 25f9110
Commit Message:
feat: add retry for voice transcription and better inline translation
See commit details 25f9110
https://github.com/mikropsoft/StevenBlock
🚫 Advanced Ad-Blocking Module for Android | Compatible with Magisk, KernelSU, and APatch 🔒
🚫 Advanced Ad-Blocking Module for Android | Compatible with Magisk, KernelSU, and APatch 🔒
GitHub
GitHub - mikropsoft/StevenBlock: 🚫 Advanced Ad-Blocking Module for Android | Compatible with Magisk, KernelSU, and APatch 🔒
🚫 Advanced Ad-Blocking Module for Android | Compatible with Magisk, KernelSU, and APatch 🔒 - mikropsoft/StevenBlock
No deleted account found from
87 scanned users from this group 🚫👻Forwarded from Wild Kernels Bot
Wild_KSU_v0.0.159_13964-release.apk
17.4 MB
🔧 CI Manager (TEST BUILD) #ci_3764
📝 Exclude settings SharedPreferences from Android auto backup
🔗 Commit: https://github.com/WildKernels/Wild_KSU/commit/b63528331cba441d1da4f4117eb74da628a5f9b6
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18190275429
📝 Exclude settings SharedPreferences from Android auto backup
🔗 Commit: https://github.com/WildKernels/Wild_KSU/commit/b63528331cba441d1da4f4117eb74da628a5f9b6
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18190275429
Wild_KSU_v0.0.159-spoofed_13964-release.apk
17.4 MB
🔧 Spoofed Manager (TEST BUILD) #spoofed_3764
📝 Exclude settings SharedPreferences from Android auto backup
🔗 Commit: https://github.com/WildKernels/Wild_KSU/commit/b63528331cba441d1da4f4117eb74da628a5f9b6
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18190275429
📝 Exclude settings SharedPreferences from Android auto backup
🔗 Commit: https://github.com/WildKernels/Wild_KSU/commit/b63528331cba441d1da4f4117eb74da628a5f9b6
🏃 Workflow: https://github.com/WildKernels/Wild_KSU/actions/runs/18190275429
Forwarded from Morgan Weedman, Wild Kernels Owner (DMs OPEN)
Hey there!
GKI Users:
Anyone of you waiting for 1.5.10 WKSU GKI, sorry for the wait, susfs added new commits that are being tested, not all branches are in sync yet. There may be problems with these commits making hiding worse, so im going to wait for fixes.
When we build we use the latest susfs commits, not the 1.5.9 tag... so in reality you are using 1.5.10 beta.
Most of the time when Simon (Susfs Dev) updates version for example 1.5.9 -> 1.5.10 all he updates is the number 9 -> 10, all of the 1.5.10 commits are already done before the tags.
If you are on my latest kernel, you are updated to the best hiding you can get so just wait!
if this doesnt make sense im sorry, tag me and i can maybe explain better!
Thanks everyone!
If you like my work and would like to support me!
Donations:
https://t.me/WildKernels/90170/90171
GKI Users:
Anyone of you waiting for 1.5.10 WKSU GKI, sorry for the wait, susfs added new commits that are being tested, not all branches are in sync yet. There may be problems with these commits making hiding worse, so im going to wait for fixes.
When we build we use the latest susfs commits, not the 1.5.9 tag... so in reality you are using 1.5.10 beta.
Most of the time when Simon (Susfs Dev) updates version for example 1.5.9 -> 1.5.10 all he updates is the number 9 -> 10, all of the 1.5.10 commits are already done before the tags.
If you are on my latest kernel, you are updated to the best hiding you can get so just wait!
if this doesnt make sense im sorry, tag me and i can maybe explain better!
Thanks everyone!
If you like my work and would like to support me!
Donations:
https://t.me/WildKernels/90170/90171
Privacy + Secure Tech Corner Channel 🛡️
I've had issues with restore my backup data, no 4g+ only for data EDGE and GSM for calling 🤪 I've tested some what I reader, but not helped me 🤷♂️ That's was the goal Reset mobile network settings and Reset Bluetooth & Wi-Fi That helped me, thx Android…
YouTube
How to Fix Calling Issues in any GSI ROM [4G/5G/LTE/NR/VoLTE/VoNR]
Guide: https://droidwin.com/how-to-fix-calling-issues-in-gsi-rom/
In this video, we will show you the steps to fix calling issues in any GSI ROM.
In this video, we will show you the steps to fix calling issues in any GSI ROM.
### 1. What is verifiedBootKey
* This is the public key used to sign the boot image (boot/recovery/system, etc.).
* It is stored in the firmware and acts as the root of trust when verifying system integrity.
* The device manufacturer “burns” it into the Trusted Execution Environment (TEE) or processor fuses (eFuse/OTP).
* If the key doesn’t match the expected one, the system considers the boot process unsafe.
In simple terms:
verifiedBootKey = who signed the firmware (root of trust).
---
### 2. What is verifiedBootHash (or boothash)
* This is a hash (SHA256, etc.) of the boot partition contents (or a set of partitions, depending on AVB).
* It is calculated at boot time and compared with the reference value from the manifest.
* If the hash is different → the partition has been modified (e.g., custom kernel or ramdisk).
In simple terms:
verifiedBootHash = what exactly was loaded (the actual boot state).
---
### 3. Connection and difference
* BootKey determines whether we trust *the signer of the firmware*.
* BootHash determines whether *the boot partition itself has been modified*.
Analogy:
* Key (verifiedBootKey) = the manufacturer’s official stamp.
* Hash (verifiedBootHash) = the fingerprint of the specific paper that has the stamp.
---
### 4. In the context of Key Attestation
In Android Key Attestation the TEE signs a report that contains:
*
*
* Together they allow external services to verify that the device is booting in a trusted and unmodified environment.
* This is the public key used to sign the boot image (boot/recovery/system, etc.).
* It is stored in the firmware and acts as the root of trust when verifying system integrity.
* The device manufacturer “burns” it into the Trusted Execution Environment (TEE) or processor fuses (eFuse/OTP).
* If the key doesn’t match the expected one, the system considers the boot process unsafe.
In simple terms:
verifiedBootKey = who signed the firmware (root of trust).
---
### 2. What is verifiedBootHash (or boothash)
* This is a hash (SHA256, etc.) of the boot partition contents (or a set of partitions, depending on AVB).
* It is calculated at boot time and compared with the reference value from the manifest.
* If the hash is different → the partition has been modified (e.g., custom kernel or ramdisk).
In simple terms:
verifiedBootHash = what exactly was loaded (the actual boot state).
---
### 3. Connection and difference
* BootKey determines whether we trust *the signer of the firmware*.
* BootHash determines whether *the boot partition itself has been modified*.
Analogy:
* Key (verifiedBootKey) = the manufacturer’s official stamp.
* Hash (verifiedBootHash) = the fingerprint of the specific paper that has the stamp.
---
### 4. In the context of Key Attestation
In Android Key Attestation the TEE signs a report that contains:
*
verifiedBootKey — shows which key the device trusts.*
verifiedBootHash — shows what was actually loaded.* Together they allow external services to verify that the device is booting in a trusted and unmodified environment.
Forwarded from GSMArena (IFTTT)
DJI’s new sub-250g drone brings a massive upgrade – the DJI Mini 5 Pro has a 1” sensor
https://ift.tt/ZWciFlq
https://ift.tt/ZWciFlq
GSMArena.com
DJI’s new sub-250g drone brings a massive upgrade – the DJI Mini 5 Pro has a 1” sensor
The new model has forward-facing LiDAR and a rotating camera gimbal. It can fly faster and further than the Mini 4 Pro too.
Forwarded from Above Phone Announcements
🔥 Above Phone's 24-hour Fall Flash Sale is LIVE!
Dive into the best deal ever on the Pixel 6a and experience premium technology at an unbeatable price. Whether it’s for personal use, business, or a gift, this is your moment to shine! ✨
What You'll Love:
* Record low pricing on the Above Phone Pixel 6a
* Easy, flexible payment options
* Free support call to ensure seamless setup
📱 But hurry—supplies are limited, and this deal is only here for 24 hours! Shop now and secure your spot in the Above Phone family. It's time to experience freedom like never before.
👉 https://above.sh/ZDwKng
Dive into the best deal ever on the Pixel 6a and experience premium technology at an unbeatable price. Whether it’s for personal use, business, or a gift, this is your moment to shine! ✨
What You'll Love:
* Record low pricing on the Above Phone Pixel 6a
* Easy, flexible payment options
* Free support call to ensure seamless setup
📱 But hurry—supplies are limited, and this deal is only here for 24 hours! Shop now and secure your spot in the Above Phone family. It's time to experience freedom like never before.
👉 https://above.sh/ZDwKng
Above Phone
Above | Privacy phones, laptops, and tablets
Above provides privacy-first phones, laptops, and tablets designed to protect your data and secure your digital freedoms.
Forwarded from XiaomiTime: Xiaomi & HyperOS News (IFTTT)
"Xiaomi is set to launch the Redmi Pad 2 Pro!- Qualcomm 7s Gen 4 processor- 12.1-inch display with 120Hz refresh rate- 6GB RAM, 128GB storage- 12,000 mAh battery with 33W fast charging- Graphite Gray color- Includes 3.5mm headphone jackStay tuned!"
🔗 Check More
🔗 Check More
XiaomiTime
REDMI Pad 2 Pro Leaked: Xiaomi’s Got Something Cooking - XiaomiTime
Xiaomi appears ready to reinforce its position in the tablet market with the imminent release of the Redmi Pad 2 Pro. Recent leaks have shared official