Related
Guardian Project Installer V1.0 Beta
Many thanks to the people at www.guardianproject.info for their hard work!
What is this?
This is a flashable zip (tested with CWM) that installs most of the apps from the Guardian Project. The guardian project is a non-profit organization that is building apps and tools to help users and whistle-blowers alike to stay safe and anonymous in this day and age. This is a faster way to setup a secure/private device. I also encourage enabling Full Disk Encryption in ICS/JB settings. Quote from the site:
How Guardian Helps
While we think that a secure, privacy-enhanced mobile phone is a good thing for just about anybody going about their daily lives, we like to also consider the extreme cases, where this technology might change the course of someones life.
Click to expand...
Click to collapse
Source: https://guardianproject.info/home/use-cases/
What apps are installed?
Orbot: TOR (Anonymous Web Browsing) for Android
Gibberbot: Secure Encrypted IM using Google Talk
ObscuraCam: Secure Camera that obscures faces
InTheClear: Data Wipe (“Poison Pill”) Wipes phone on command
Android Privacy Guard: Public Key Crypto (GPG) for Android
TextSecure: *****REMOVED**** See HERE for details.
DroidWall: Firewall that uses IPTables to prevent data leaks and Network attacks.
FDroid: Alternative to Google Playstore. All apps are FOSS.
ORweb: Privacy oriented web browser that works automatically with Orbot (TOR). [ADDED: 08//19/2012]
OSTel: Encrypted VOIP phone calls using ZRTP. The app is based on CSipSimple For more info go here to create a free acount go here. NOTE: This service & app are in public beta status. [ADDED: 08/20/2012]
K-9 Mail: Open Source E-mail app that works with APG for sending encrypted E-mails. Has lots of powerful options. [ADDED: 08/21/2012]
CaCertMan: Manage the list of Certificate Authorities on you phone. Let's you revoke any CA's you distrust. ROOT Needed. [ADDED: 08/21/2012]
CryptFS Password Manager - Allows you to have one password for encryption and a shorter one for lockscreen. see here. [ADDED: 09/08/2012]
NoteCipher - Allows you to store messages in a AES256bit Encrypted SQL database. [ADDED: 09/12/2012]
GnuPG - GPG encryption for android (Uses busybox) [ADDED: 05/19/2013]
How To
Download the zip bellow
Copy the zip to the sdcard
Boot into recovery
flash the zip from the sdcard
Reboot
Done
WARNINGS
Please note: THIS IS BETA. I AM NOT RESPONSIBLE IF THIS BRICKS YOUR DEVICE. FLASH AT YOUR OWN RISK.
With that said I have successfully used this multiple (10) times on three different devices. Please report any bugs and issues.
Known Working Roms
CM9 Official
CM10 JellyBro
CM10 EuroSkank AOSP
Rasbean
Tested on CM9 Motorola Atrix 4G
androidme aosp light v.1.1
Codename Android JellyBean 3.3.0
HTC One S Stock Rooted.
Nexus S GSM CM9
Galaxy S
Galaxy Note N7000 CM9 Stable
Known Bugs
Not working on Nexus 7 - Can someone test If it installs fine with TWRP on any device?
Comming soon & Downloads
More apps will be added along the way. I will also be trying to get aroma set up so you can select what apps are installed.
All of these apps are released Open Source under their respective licences. All Credit goes to the developers of the apps. I have only bundled them into an easily installable zip file.
UPDATE: Thanks to Volk the installer is now Aroma! You can now select what apps you want installed and if you want to uninstall the old ones.
Mirrors:
Latest Versions:
GPI Version 0.9.1
Signature
New: Updated all binaries, added GnuPG
Changes: Minor bug fixes. added GnuPG.
Please check your download against the checksum on the page. For security please check the signature against the public key . To check the signature place both the ZIP and .sig file in the same folder and use any PGP/GPG program to import the public key and verify the signature. PM me for some suggested programs if you are unsure.
Depreciated - No Longer Available.:
Old versions have been pulled due to possible security issues.
Please mirror this download if you can. Also Any feedback is greatly appreciated. If this helps you please press thanks!
I also highly recomend you read this presentation to see what inspired me to do this.
Test+Mirror
Awesome! Now booting again....
Mirror: http://www.4shared.com/zip/vDiK6V4K/Guardian_Project_Installer_Alp.html
Edit!: Tested and working on Jellybro cm10
Thatgrass said:
Awesome! Now booting again....
Edit!: Tested and working on Jellybro cm10
Click to expand...
Click to collapse
Awesome! Thanks for the feedback! I will post that it worked in the OP.
Really nice idea!
Good and original work
Great!
Great!
Really inovative !
Good luck for your project !
Looks awesome.Tnx dude!
Works with rasbean
Sent from my Galaxy Nexus using xda premium
Thanks all for the feedback! I will be updating the addon in a bit and adding on some more stuff. :good:
This is absolutely fantastic, I was wondering when something like this would be put together! The guardians are absolutely right when they say the mobile platform is the least secure, anything that can be done to change this is beyond welcomed.
Anyone tested on CNA?
Sent from my Galaxy Nexus using Tapatalk 2
New versions are up!!
EDIT: I also want to reccomend FuguMod Kernel nikademus did a great job incorporating PaX and Stack Protector into his kernel to increase security.
Using this on androidme aosp light v.1.1, works great. Thank you for this!
Sent from my Galaxy Nexus using xda premium
Mo_Nexus said:
Using this on androidme aosp light v.1.1, works great. Thank you for this!
Sent from my Galaxy Nexus using xda premium
Click to expand...
Click to collapse
Thanks added to the OP.
Gucci.Nexus said:
Anyone tested on CNA?
Sent from my Galaxy Nexus using Tapatalk 2
Click to expand...
Click to collapse
Tested. Confimed working over here on my GSM Galaxy Nexus.
UPDATED: New versions are up. Added in Ostel for encrypt Voice calls. Also tested new devices (posted in OP).
Thanks for providing this package, works great, would love to see more added to this or maybe a complete privacy/secure ROM.
Sent from my Galaxy Nexus using Tapatalk 2
defconoi said:
Thanks for providing this package, works great, would love to see more added to this or maybe a complete privacy/secure ROM.
Sent from my Galaxy Nexus using Tapatalk 2
Click to expand...
Click to collapse
I'm glad you like it! I am currently working on a version of CM10 that will incorporate these features/apps as well as a more secure kernel. I should (hopefully) have Alpha builds out this week.
x942 said:
I'm glad you like it! I am currently working on a version of CM10 that will incorporate these features/apps as well as a more secure kernel. I should (hopefully) have Alpha builds out this week.
Click to expand...
Click to collapse
See if u can prebundle the repo of guardian project of https://guardianproject.info/repo/ as well.
Sent from my Galaxy Nexus using Tapatalk 2
defconoi said:
See if u can prebundle the repo of guardian project of https://guardianproject.info/repo/ as well.
Sent from my Galaxy Nexus using Tapatalk 2
Click to expand...
Click to collapse
I will add it to the list I will have to take a look at the resource files and see where FDroid stores the repos.
hey, thanks for this. I got here from the Guardian Project mailing list, and I just posted this feedback there.
The full zip installs fine on a Samsung Galaxy S i9000, running CM10 nightly 20120820 and Semaphore 2.0.6 kernel. The progress bar didn't go all the way across, so I thought it might've bailed, but it looks all good now.
So far tried I've Orbot and TextSecure, which I assume were reinstalled, and my settings+data remained. Ostel kept my login info, too, but going into settings I get incredible lags (which may be the new CM10, and the funky partitions that the dev/device maintainer used to work around our space limitations and NAND speeds). Also tried ObscuraCam and opened Panic, looks OK. New toys that I've never played with yet.
Before flashing this, though, I tried installing the update zip, in the hopes I'd add Orweb, ObscuraCam, etc., and not lose data+settings with the apps I already had. The flash said it completed (again, despite that the progress bar didn't go all the way across), but when I rebooted, I had no new apps. Then a weird quirk: I opened a data connection and Orbot, and it connected fine, but a check with Firefox Beta said I had no net connection. Checking mail in K9 gave me errors, but Twitter with Tor proxies set loaded fine. According to IP Track, I had no external IP. I turned off Orbot, turned it on again, and then all was working as expected. Strange.
Anyway, thanks; this is a great project. I also want to ask: Any chances of including RedPhone? It's open source now, but unavailable on Play where I am; I think it's limited to only the US. I used Market Unlocker to get it, and will be testing it here soon. Nathan of Guardian Project was saying that outside of the US, it may have push/wake problems. I'll find out soon here, but if it's not too buggy, it'd be great for everyone outside the US.
edit: also, what about adding MD5 checksums, or a GPG signature?
Hello everyone,
I have installed androidx86 on my old netbook and google play says most of the apps isn't compatible with that.I've looked into some topics and i understand that my build.prop file is not giving any info to google play and google play isn't giving me the apps.so im gonna use some info from note 10.1 and lie to google play.with your help of course.for simple : can anyone send me his build.prop file ?
Here u GO!!!!!!!!
txtmikhail said:
Here u GO!!!!!!!!
Click to expand...
Click to collapse
thanks buddy
okb1100 said:
I have installed androidx86 on my old netbook and google play says most of the apps [aren't] compatible with that. I've looked into some topics and i understand that my build.prop file is not giving any info to google play ...
Click to expand...
Click to collapse
Changing your build.prop (and more exactly, your build information) won't really help you too much in this case; you're running an Intel-chip Android build, and most of the apps in the Play Store expect an ARM-chip based Android build. While the majority of the Apps rely on only Java (which is cross-platform) for their main code, if they need any ARM-only Native Code libraries they simply won't link on an Intel-based Android.
Now that you have a GNote build.prop (and you REALLY shouldn't change any of the lines except the ones that start with "ro.build."), please report back and let us know if my suspicions are correct, though.
kcrudup said:
Changing your build.prop (and more exactly, your build information) won't really help you too much in this case; you're running an Intel-chip Android build, and most of the apps in the Play Store expect an ARM-chip based Android build. While the majority of the Apps rely on only Java (which is cross-platform) for their main code, if they need any ARM-only Native Code libraries they simply won't link on an Intel-based Android.
Now that you have a GNote build.prop (and you REALLY shouldn't change any of the lines except the ones that start with "ro.build."), please report back and let us know if my suspicions are correct, though.
Click to expand...
Click to collapse
You were right.Some apps worked but not much.For example dropbox worked but chrome didn`t.I think i will stop right here and install ubuntu.
Edit : Of course i didn`t changed any of these lines except ro.build.
Introduction
Though CyanogenMod always claimed to be open-source, there were only few versions that had an open userspace (Some drivers and firmware have always been proprietary, but it's not CMs fault).
The first CM version I ever installed on a device was CM7 and it contains koush's proprietary ROM Manager app. CyanogenMod 9 seemed to have no proprietary parts, but since CM10 they included Google Analytics Client library (libGoogleAnalyticsV2.jar) within cmstats in the settings app (so it's not even possible to disable it). In CyanogenMod 10.1 CMAccount was included. It relies heavily on Google's Cloud Messaging service and includes the proprietary Google Play Services Client library (google-play-services.jar).
There are some people here at xda (including myself) that installed CyanogenMod because it does not ship GAPPS and is a fully (except vendor files) open-source and free rom. Since i noticed it's not, i started building CM without these closed-source stuff, but it's a pity to do so. That's when the idea of freecyngn started.
What is freecyngn
freecyngn is a tool you can run from recovery, that removes some known proprietary things (or apps relying on proprietary extensions) from CyanogenMod. At the moment this is Google Analytics (from CMStats in CM10/11), CMAccount, LockClock, SetupWizard, Voice+, VoiceDialer and WhisperPush.
Installation Instructions
Copy or download the zip file to the sdcard of your android device
Boot your device into recovery.
If not already done, install CyanogenMod as usual from recovery - DO NOT REBOOT
Install freecyngn as if it was a rom, but DO NOT WIPE /system before
CyanogenMod 12/12.1The version for CyanogenMod 12 should not be used on nightlies before July 9, 2015!
Changelog
v1.0: First release for CM12
Downloads
Latest release (v1.0): https://github.com/mar-v-in/freecyngn/releases/download/v1.0/freecyngn-flashable-cm12.zip
All releases: https://github.com/mar-v-in/freecyngn/releases
Source: https://github.com/mar-v-in/freecyngn
CyanogenMod 10/11
Changelog
v0.5: Latest fixes, better logs
v0.4.1: Remove LockClock (uses Google Play Services)
v0.4: Adapt to latest changes, remove VoiceDialer as well
v0.3.1: addon.d based auto repatching
v0.3: fixed logging
v0.2: Now creating logfile: /system/freecyngn/log
Downloads
Latest release (v0.5): https://github.com/mar-v-in/freecyngn/releases/download/v0.5/freecyngn-flashable-cm1011.zip
All releases: https://github.com/mar-v-in/freecyngn/releases
Source: https://github.com/mar-v-in/freecyngn
How it works (technical stuff)
freecyngn disassembles (using [bak]smali) the CyanogenMod settings app and removes the proprietary Google Analytics component. It then replaces it with NoAnalytics, so that existing bindings from cmstats do not break and reassembles the settings app.
FAQ
Q: My recovery hangs while flashing?
Q: Why is this script so slow?
A: freecyngn need plenty of time and is sometimes even slower than flashing the rom itself. This is bcause most recoverys underclock the cpu, which is no problem for just copying files from zip to partition or format a partition, but it is a problem for disassembling and reassembling, which are cpu intensive tasks.
Q: Do I need to apply the patch after every update?
A: Since v0.3.1 this is no longer needed. Patching is done automatically.
Q: What's about other custom ROMs?
A: AOKP is patchable with freecyngn as well. Paranoid contains Google Analytics in the proprietary ParanoidSettings app instead of the system settings and thus does not work with this patch. OmniROM does not contain Google Analytics. Note that some slimmed-down CM/AOKP-custom-builds will not work with freecyngn. If you use such, check the log file /system/freecyngn/log after flashing.
XDA:DevDB Information
freecyngn, Tool/Utility for the Android General
Contributors
MaR-V-iN
Source Code: https://github.com/mar-v-in/freecyngn
Version Information
Status: Stable
Current Stable Version: v1.0
Stable Release Date: 2014-08-07
Created 2013-12-01
Last Updated 2016-07-02
Its work in android 4.4 kitkat Ah?
Pretty interesting stuff, I didn't knew you could assemble/disassemble dex files on the device. Anyways, I wanted to tell you, you can just boot the cpu freq to make it faster.
just grep cpuinfo_max_freq and use that number for scaling_max_freq
This is really cool... definitely going to try this out,
Subscribed
Flashed on cm10.2 on evo3d. Only took about 3seconds for me. Thanks
Sent from my Evo 3D CDMA using XDA Premium 4 mobile app
MaR-V-iN said:
Introduction
What is freecyngn
freecyngn is a tool you can run from recovery, that removes some known proprietary things (or apps relying on proprietary extensions) from CyanogenMod. At the moment this is Google Analytics (from CMStats), CMAccount and Voice+.
Click to expand...
Click to collapse
I always remove CMAccount and Voice+ as they are system apps but isn't removing CMStats the same as disabling About Phone>CyanogenMod Statistics>Enable Reporting?
ela1103 said:
Its work in android 4.4 kitkat Ah?
Click to expand...
Click to collapse
I'm on beanstalk 4.4 and worked fine.
Sent from my GT-N7105 using Tapatalk 4
Thanks, will try this now!
jdstrydom
thank for u reply
Sir what is the use of it
I.mean by removing the google support what will we get
And how is this useful
Please tell me sir
ela1103 said:
Its work in android 4.4 kitkat Ah?
Click to expand...
Click to collapse
I tried it on the CM11 build for mako, so I highly assume it's working on all CM11 based roms.
broodplank1337 said:
just grep cpuinfo_max_freq and use that number for scaling_max_freq
Click to expand...
Click to collapse
I'm aware of this method, but I don't think it's a good idea in general, because on some overclocked kernels cpuinfo_max_freq could be really unstable.
jbonetwo said:
I always remove CMAccount and Voice+ as they are system apps but isn't removing CMStats the same as disabling About Phone>CyanogenMod Statistics>Enable Reporting?
Click to expand...
Click to collapse
It's not removing CMStats completely but only the Google Analytics part. Sending stats to stats.cyanogenmod.org will still work.
Moreover, you can't really say if Google Analytics is disabled. Due to it being proprietary code, it could do nearly anything and the class initializer code is called, even if CMStats is disabled. (I assume they're not doing this, but you can;t know and they always could add this in a future version)
aditya rathee said:
I.mean by removing the google support what will we get
And how is this useful
Click to expand...
Click to collapse
First: This does not remove Google Support in general. You could still install GAPPS afterwards, but it would be kind of senseless.
Second: Some people think, that Google is not this "don't be evil" company they're proposing to be. And some people like the idea of privacy and not getting totally tracked by Google, so they do not install GAPPS. If this is not the case for you, then this is just not targeting you. I'm not going to try to convince anyone that privacy is a good thing
MaR-V-iN said:
I tried it on the CM11 build for mako, so I highly assume it's working on all CM11 based roms.
I'm aware of this method, but I don't think it's a good idea in general, because on some overclocked kernels cpuinfo_max_freq could be really unstable.
It's not removing CMStats completely but only the Google Analytics part. Sending stats to stats.cyanogenmod.org will still work.
Moreover, you can't really say if Google Analytics is disabled. Due to it being proprietary code, it could do nearly anything and the class initializer code is called, even if CMStats is disabled. (I assume they're not doing this, but you can;t know and they always could add this in a future version)
First: This does not remove Google Support in general. You could still install GAPPS afterwards, but it would be kind of senseless.
Second: Some people think, that Google is not this "don't be evil" company they're proposing to be. And some people like the idea of privacy and not getting totally tracked by Google, so they do not install GAPPS. If this is not the case for you, then this is just not targeting you. I'm not going to try to convince anyone that privacy is a good thing
Click to expand...
Click to collapse
ok ok
now i am gonna flash it
MaR-V-iN said:
It's not removing CMStats completely but only the Google Analytics part. Sending stats to stats.cyanogenmod.org will still work.
Moreover, you can't really say if Google Analytics is disabled. Due to it being proprietary code, it could do nearly anything and the class initializer code is called, even if CMStats is disabled. (I assume they're not doing this, but you can;t know and they always could add this in a future version)
Click to expand...
Click to collapse
Thank you for the info. I would not have thought to look at the Settings app for undesirable activities.
Found the following activities for Settings in Sys Tuner:
UsageStats
Settings$AnonymousStatsActivity
DeviceInfo$StatsReportReceiver
cmstats.ReportingService
Will be flashing your zip for a 'cleaner' solution than sys tuner in the near future.
And yes google is evil . Their handling of adblock and similar apps shows they're motivated by money and I wouldn't give a corp like that free reign over my device. But that's just me...
Ran this script on my rooted stock KitKat ROM @ Nexus 4 & 7, so far no abnormal activity observed on my devices...
So if we run this app, can we still use gapps or is that considered one of the tracking apps that will be removed?
flashed it on my 4xHD, will see how it will behave
i had really quick install of the zip file, like i would install kernel
that is normal or ?
because in op you say that install will take some time
Do you know if this will work on all cm based roms or only actual cyanogen?
Sent from my SCH-I545 using XDA Premium 4 mobile app
pr0di9y said:
Ran this script on my rooted stock KitKat ROM @ Nexus 4 & 7, so far no abnormal activity observed on my devices...
Click to expand...
Click to collapse
rrrrrrredbelly said:
Do you know if this will work on all cm based roms or only actual cyanogen?
Click to expand...
Click to collapse
This is only for CM-based roms that contain CMStats. The Script does nothing useful on Nexus stock or not-CM-based ROMs, these do not include Google Analytics in the Settings app (yes that's right: CM+GAPPS does more Google tracking than Google's stock)
The new v0.2 release creates a log file in /system/freecyngn so you can make sure everything worked great.
MaR-V-iN said:
This is only for CM-based roms that contain CMStats. The Script does nothing useful on Nexus stock or not-CM-based ROMs, these do not include Google Analytics in the Settings app (yes that's right: CM+GAPPS does more Google tracking than Google's stock)
The new v0.2 release creates a log file in /system/freecyngn so you can make sure everything worked great.
Click to expand...
Click to collapse
Does this explain why they have these stats on hand?
developer.android.com/about/dashboards/index.html
Hi all,
As you already know, in the last quarter of 2016 bug/vulnerability was explored called "DirtyCow" which was in Linux Kernel for 9 years
Google fixed the vulnerability in upstream devices with latest security bulletins but the vulnerability is still affecting billions of devices (from android 2.3 to android 7.1) unfortunatly
And with "DirtyCow" new rot techniques were developed, (e.g LG V20 rooter and universal rom debloater)
*** And if you wonder "DirtyCow" vulnerability affects your device or not here it is, you can check it yourself by using this simple app "DirtyCow Checker" :good:
Google Play Store: https://play.google.com/store/apps/details?id=com.oguzhan.mordred.testdirty
No root is required, no ads, its free, if you like my work , you can support me by rating app in here and playstore thanx
EDIT: google strangely removed my app from playstore (i explained better in the above replies, you can look) here is the apk file of latest build: http://www.mediafire.com/file/6tjakn1nn33i1sv/Dirtcow-Checker.apk
I did my review!
Sent from my A0001 using Tapatalk
sir mordred said:
Hi all,
As you already know, in the last quarter of 2016 bug/vulnerability was explored called "DirtyCow" which was in Linux Kernel for 9 years
Google fixed the vulnerability in upstream devices with latest security bulletins but the vulnerability is still affecting billions of devices (from android 2.3 to android 7.1) unfortunatly
And with "DirtyCow" new rot techniques were developed, (e.g LG V20 rooter and universal rom debloater)
*** And if you wonder "DirtyCow" vulnerability affects your device or not here it is, you can check it yourself by using this simple app "DirtyCow Checker" :good:
Google Play Store: https://play.google.com/store/apps/details?id=com.oguzhan.mordred.testdirty
No root is required, no ads, its free, if you like my work , you can support me by rating app in here and playstore thanx
Click to expand...
Click to collapse
I will definitely rate, thanks for this. Wanted to know if support was possible but the script wasn't working for me. Thanks again .
So... Link is dead?
DrVladson said:
So... Link is dead?
Click to expand...
Click to collapse
Hi,
Yep, i was strugling with Google play team in past week, they removed my app from playstore for unknown reasons, they said they are not allowing to exploit vulnerability in device(even if it is just to test/check vulnerability that my app does) :/
and strangely they allowed same kind of vulnerability test app which developed by NortonMobile https://play.google.com/store/apps/details?id=com.symantec.android.nfr
and they are still refusing my app...... probably my fault is to be not high prestige company enough....
Here is the apk file of latest build: http://www.mediafire.com/file/6tjakn1nn33i1sv/Dirtcow-Checker.apk
Enjoy
wow. no single comment here? what's going on
have to try and remember how to connect to adb over wifi cause it's been 2 years and then let's see where i get with this.
sir mordred said:
Hi all,
As you already know, in the last quarter of 2016 bug/vulnerability was explored called "DirtyCow" which was in Linux Kernel for 9 years
Google fixed the vulnerability in upstream devices with latest security bulletins but the vulnerability is still affecting billions of devices (from android 2.3 to android 7.1) unfortunatly
And with "DirtyCow" new rot techniques were developed, (e.g LG V20 rooter and universal rom debloater)
*** And if you wonder "DirtyCow" vulnerability affects your device or not here it is, you can check it yourself by using this simple app "DirtyCow Checker" :good:
Google Play Store: https://play.google.com/store/apps/details?id=com.oguzhan.mordred.testdirty
No root is required, no ads, its free, if you like my work , you can support me by rating app in here and playstore thanx
EDIT: google strangely removed my app from playstore (i explained better in the above replies, you can look) here is the apk file of latest build: http://www.mediafire.com/file/6tjakn1nn33i1sv/Dirtcow-Checker.apk
Click to expand...
Click to collapse
Tried this and it shows my device is vulnerable.
So, I tried using dirty cow exploit to gain root access but getting the below error. Any help will be appreciated.
C:\platform-tools_r33.0.3-windows\platform-tools>adb shell /data/local/tmp/dcow /data/local/tmp/run-as /system/bin/run-as dcow /data/local/tmp/run-as /system/bin/run-as
/system/bin/sh: /data/local/tmp/dcow: can't execute: Permission denied
XDA form member @Zacharee1 created an app name "RCTD Remover for LG" and released it on XDA Labs at https://labs.xda-developers.com/store/app/com.zacharee1.rctdremoverforlg . Unfortunately, the software is no longer available on XDA Labs due to the host suddenly being shut down.
I seek and request the latest version of the app. The last versions available on XDA Labs had the following characteristics:
Display Name: RCTD Remover for LGPackage Name: com.zacharee1.rctdremoverforlgVersion: 10
Ascii3 said:
XDA form member @Zacharee1 created an app name "RCTD Remover for LG" and released it on XDA Labs at https://labs.xda-developers.com/store/app/com.zacharee1.rctdremoverforlg . Unfortunately, the software is no longer available on XDA Labs due to the host suddenly being shut down.
I seek and request the latest version of the app. The last versions available on XDA Labs had the following characteristics:
Display Name: RCTD Remover for LGPackage Name: com.zacharee1.rctdremoverforlgVersion: 10
Click to expand...
Click to collapse
This is the lastest one I found/have. Dont work for me personally (may for you just fine) because it says I need Android kitchen installed.
Mysticblaze347 said:
This is the lastest one I found/have. Dont work for me personally (may for you just fine) because it says I need Android kitchen installed.
Click to expand...
Click to collapse
Thanks Mysticblaze347. However, the version you posted appears to be much older than the current version. My impression is that it is the initial release version of the software.
@Zacharee1 has the next version, version "7" available at his Android File Host repository space at https://androidfilehost.com/?fid=745849072291699579 . Newer versions, unfortunately, seemed only provided an XDA Labs (which is gone).
Ascii3 said:
Thanks Mysticblaze347. However, the version you posted appears to be much older than the current version. My impression is that it is the initial release version of the software.
@Zacharee1 has the next version, version "7" available at his Android File Host repository space at https://androidfilehost.com/?fid=745849072291699579 . Newer versions, unfortunately, seemed only provided an XDA Labs (which is gone).
Click to expand...
Click to collapse
Gotcha. Maybe this version for me at least will not have error I had. I will look further tho. If I find I will post.
Mysticblaze347 said:
Gotcha. Maybe this version for me at least will not have error I had. I will look further tho. If I find I will post.
Click to expand...
Click to collapse
It appears that version "8" is embedded within the Oreo ALPHA OMEGA ROM "A-O_US996_UNIVERSAL_20F_1.0.2.zip" flash file ( https://androidfilehost.com/?fid=11410963190603909837 ). I still would rather have newer versions.
Ascii3 said:
It appears that version "8" is embedded within the Oreo ALPHA OMEGA ROM "A-O_US996_UNIVERSAL_20F_1.0.2.zip" flash file ( https://androidfilehost.com/?fid=11410963190603909837 ). I still would rather have newer versions.
Click to expand...
Click to collapse
I tried looking and v 10 seems impossible to find so I re wrote a script (.sh) that can be ran via a script manager to apply on boot. It stops the rct.d service
I don't know what version this one is, but I got this one from XDA labs back in August 2018. Didn't think too many people would care about this since I'm assuming all recent custom ROMs have some form of it already built in.
C D said:
I don't know what version this one is, but I got this one from XDA labs back in August 2018.
Click to expand...
Click to collapse
Thank you C D. The version you are provided is "10" and the one sought.
C D said:
Didn't think too many people would care about this since I'm assuming all recent custom ROMs have some form of it already built in.
Click to expand...
Click to collapse
My impression is that the main complaint about LG Root Checker Tool with LG V20 is that it was rather buggy on LG Android Nougat firmware and could result in severe performance problems. The problem does not appear to manifest on LG Android Oreo on my LG V20 US996 using the US99620f firmware (Android Security Patch level is November 1, 2018).
The RCTD Remover for LG software is supposed to work also on other LG devices, and not just the LG V20 family, and should also remove other things such as Triton (not sure what that is) for devices that use it, so its might be more valuable for other devices. I think it a good idea to retain a copy of it should one need it.