Biden2020prezLevel 6 - Platinum Elite Member
darth Sounds like there is no point because we can remove system apps. I am not sure what's causing your issues maybe try a factory reset.
darth Sounds like there is no point because we can remove system apps. I am not sure what's causing your issues maybe try a factory reset.
darth not working for me. I flash your lk image, reboot, adb shell, su, mount, rm, reboot and Chromium is still there. What am I doing wrong?
I'm not sure. Here is the mmc utility I was using: [Login to see the link]
Does it show only groups 0-1 as power-on write protection?
Gflip6_TF:/data/local/tmp # ./mmc writeprotect user get /dev/block/mmcblk0
Write Protect Group size in blocks/bytes: 16384/8388608
Write Protect Groups 0-1 (Blocks 0-32767), Power-on Write Protection
Write Protect Groups 2-924 (Blocks 32768-15155199), No Write Protection
Write Protect Groups 925-925 (Blocks 15155200-15171583), Permanent Write Protection
Write Protect Groups 926-931 (Blocks 15171584-15269887), No Write Protection
How well does voice access Click?
i am thinking of try options for mouse
lgexalter1 I haven't had any luck with SP Flash Tool. Here's just enough info to flash super I think.
If you get SP Tools to download let me know how
neutronscott are you using default download agent?
darth Yes its strange that button mapper wont detect the extra keys. I have another app (key event display) which I used to test the buttons id number and it also wont detect the extra keys.
Looks like framework will need some patching. These keys are hardcoded in services.jar PhoneWindowManager interceptKeyBeforeQueueing()
Biden2020prez we also want to remove fm Radio and maybe hotspot.
Did one of these versions have an FmRadio App? Can I get a copy? I do see fm radio driver.
My T408DL does not have an FM radio app.
Seems like not. In general we like to remove Radio, That's why i mentioned it.
I Did not actually check.
can someone please try naming an app package name org.chromium.chrome and see if a cursor enters the app automatically?
neutronscott This is what I get:
Gflip6_TF:/data/local/tmp # ./mmc writeprotect user get /dev/block/mmcblk0
Write Protect Group size in blocks/bytes: 16384/8388608
Write Protect Groups 0-1 (Blocks 0-32767), Power-on Write Protection
Write Protect Groups 2-924 (Blocks 32768-15155199), No Write Protection
Write Protect Groups 925-925 (Blocks 15155200-15171583), Permanent Write Protection
Write Protect Groups 926-931 (Blocks 15171584-15269887), No Write Protection
Does Anyone know how to implement microg?
a couple of points i noticed. number 1 - there is no need to rename/resign apps. ALL apps are installable.
number 2, running adb shell settings --user 0 put system keyboard_pointer_enable 1
does enable a mouse but pressing the power button cancels it. have no idea how to get this to stay.
lgexalter1 So if anyone has any ideas how to permanently disable avb/dm-verity please share!
Could you briefly say what method you used? I manually edited my system_root on-device which should be equivalent. I just now booted to recovery and did a factory reset. The device came up and after enabling adb again things look good. I believe I did these hoping to fix my recovery boot-loops - it did not, but I'm sure fixes this problem:
fastboot --disable-verity --disable-verification vbmeta vbmeta.bin
fastboot --disable-verity --disable-verification vbmeta_system vbmeta_system.bin
fastboot --disable-verity --disable-verification vbmeta_vendor vbmeta_vendor.bin
Retrieved the partitions in adb shell su with dd.
Biden2020prez Does Anyone know how to implement microg?
I can try it. I used MagiskGapps but this looks suitable.
NEC wow nice. perhaps we can just make our own button trigger that sets this. I'd like to modify the services.jar. I extracted the class files with dex2jar but haven't had success putting it back together. I'd just replace the hardcoded *
key to this I think.
neutronscott bit above my level. i'm just following the conversation and enjoying the benefits!
NEC Your contribution is great. How did you find this setting?
It seems lk doesn't need hacked. I found this in /vendor/bin/write_protect:
echo -n "DISABLE_POWP" | dd of=/dev/block/platform/bootdevice/by-name/oembin seek=30720 bs=1 conv=notrunc
I was just waiting on super to flash (I broke it) and looking in vendor.img for "prot" to see about network unlock stuff and there it was.
EDIT: Tested and working. I'm removing my modified lk since this is better.
neutronscott I think you can maybe network unlock form protect1, but don't know how. You can email of if you are interested about that.
Anyone know a way to restrict all app installation to a special signing key?
lgexalter1 So far I only flashed stock super.img with fastboot and did in-place edits. No issues after wiping though.