darth not working for me. I flash your lk image, reboot, adb shell, su, mount, rm, reboot and Chromium is still there. What am I doing wrong?

I'm not sure. Here is the mmc utility I was using: [Login to see the link]
Does it show only groups 0-1 as power-on write protection?

Gflip6_TF:/data/local/tmp # ./mmc writeprotect user get /dev/block/mmcblk0
Write Protect Group size in blocks/bytes: 16384/8388608
Write Protect Groups 0-1 (Blocks 0-32767), Power-on Write Protection
Write Protect Groups 2-924 (Blocks 32768-15155199), No Write Protection
Write Protect Groups 925-925 (Blocks 15155200-15171583), Permanent Write Protection
Write Protect Groups 926-931 (Blocks 15171584-15269887), No Write Protection

    How well does voice access Click?
    i am thinking of try options for mouse

    1. Edit virreshs app to use the same clicking Method as voice access. I don't know how to do this but i would Take a shot if i have time.
    2. With root maybe we can make the mouse click with adb input tap. But i don't think root is a good idea in a kosher firmware. Maybe something that uses the same trick as ladb. But that seems far off.

    darth Yes its strange that button mapper wont detect the extra keys. I have another app (key event display) which I used to test the buttons id number and it also wont detect the extra keys.

    Looks like framework will need some patching. These keys are hardcoded in services.jar PhoneWindowManager interceptKeyBeforeQueueing()

    Biden2020prez we also want to remove fm Radio and maybe hotspot.

    Did one of these versions have an FmRadio App? Can I get a copy? I do see fm radio driver.

    My T408DL does not have an FM radio app.

    Seems like not. In general we like to remove Radio, That's why i mentioned it.
    I Did not actually check.

    can someone please try naming an app package name org.chromium.chrome and see if a cursor enters the app automatically?

    • darthLevel 6 - Platinum Elite Member

      neutronscott This is what I get:

      Gflip6_TF:/data/local/tmp # ./mmc writeprotect user get /dev/block/mmcblk0
      Write Protect Group size in blocks/bytes: 16384/8388608
      Write Protect Groups 0-1 (Blocks 0-32767), Power-on Write Protection
      Write Protect Groups 2-924 (Blocks 32768-15155199), No Write Protection
      Write Protect Groups 925-925 (Blocks 15155200-15171583), Permanent Write Protection
      Write Protect Groups 926-931 (Blocks 15171584-15269887), No Write Protection

      • NNECLevel 1 - Junior Member

        • Edited

        a couple of points i noticed. number 1 - there is no need to rename/resign apps. ALL apps are installable.
        number 2, running adb shell settings --user 0 put system keyboard_pointer_enable 1 does enable a mouse but pressing the power button cancels it. have no idea how to get this to stay.

          lgexalter1 So if anyone has any ideas how to permanently disable avb/dm-verity please share!

          Could you briefly say what method you used? I manually edited my system_root on-device which should be equivalent. I just now booted to recovery and did a factory reset. The device came up and after enabling adb again things look good. I believe I did these hoping to fix my recovery boot-loops - it did not, but I'm sure fixes this problem:

          fastboot --disable-verity --disable-verification vbmeta vbmeta.bin
          fastboot --disable-verity --disable-verification vbmeta_system vbmeta_system.bin
          fastboot --disable-verity --disable-verification vbmeta_vendor vbmeta_vendor.bin

          Retrieved the partitions in adb shell su with dd.

          Biden2020prez Does Anyone know how to implement microg?

          I can try it. I used MagiskGapps but this looks suitable.

          NEC wow nice. perhaps we can just make our own button trigger that sets this. I'd like to modify the services.jar. I extracted the class files with dex2jar but haven't had success putting it back together. I'd just replace the hardcoded * key to this I think.

          • NEC replied to this.

            NEC Your contribution is great. How did you find this setting?

            It seems lk doesn't need hacked. I found this in /vendor/bin/write_protect:

            echo -n "DISABLE_POWP" | dd of=/dev/block/platform/bootdevice/by-name/oembin seek=30720 bs=1 conv=notrunc

            I was just waiting on super to flash (I broke it) and looking in vendor.img for "prot" to see about network unlock stuff and there it was.

            EDIT: Tested and working. I'm removing my modified lk since this is better.

              neutronscott I think you can maybe network unlock form protect1, but don't know how. You can email of if you are interested about that.

              Anyone know a way to restrict all app installation to a special signing key?

              lgexalter1 So far I only flashed stock super.img with fastboot and did in-place edits. No issues after wiping though.

              Here is a quick shell script to enable/disable mouse by following logcat output. Since the messages are the same for keyUp and keyDown it ignores the stream for 2 seconds. If you don't set a quick dial then it should be fine to steal this key.

              [Login to see the link]

              Certainly not for production use but for now while messing with apps..