Related
I notice there's always a system process called ADCP running, I think it stood for Amazon Device Control Program. Anyone investigated what it does and what happens if you disable it? I'm wondering if it's involved in any way with the OTA updates, and also what ramification disabling it has, like will the various Amazon programs not work right? I've not been adventurous enough to experiment with, in fact I've got my wifi off for now until it's clear whether the OTA update can be blocked by the methods discussed here.
jb0ne said:
I notice there's always a system process called ADCP running, I think it stood for Amazon Device Control Program. Anyone investigated what it does and what happens if you disable it? I'm wondering if it's involved in any way with the OTA updates, and also what ramification disabling it has, like will the various Amazon programs not work right? I've not been adventurous enough to experiment with, in fact I've got my wifi off for now until it's clear whether the OTA update can be blocked by the methods discussed here.
Click to expand...
Click to collapse
check this out
http://forum.xda-developers.com/showpost.php?p=20166149&postcount=1
essentially it connects the amazon apps to the kindle registration
I'm suspicious, I suspect it does more, and is the thing responsible for the OTA updates everyone is getting no matter what they do....
I really want to try and freeze it, but too afraid that it might actually be necessary...
Well I installed Droidwall and didn't give permissions to ADCP and so far my device is still registered and I can watch videos and use my books, can use the Amazon App Store (I gave it permissions, I don't think it's the program responsible). I've effectively disabled ADCP by not allowing it to connect to the internet, but it's still running in case it does, say, DRM services or something. All good and still on 6.2 (and I did do the other suggestions previously).
jb0ne said:
Well I installed Droidwall and didn't give permissions to ADCP and so far my device is still registered and I can watch videos and use my books, can use the Amazon App Store (I gave it permissions, I don't think it's the program responsible). I've effectively disabled ADCP by not allowing it to connect to the internet, but it's still running in case it does, say, DRM services or something. All good and still on 6.2 (and I did do the other suggestions previously).
Click to expand...
Click to collapse
Glad it worked for someone else too. I am not sure which process is actually responsible for downloading and installing the update though.
EDIT: Oh, I didn't post about DroidWall in this forum. I figured out DroidWall last night and we posted on Gizmodo about it.
An important element I overlooked, even after adding apps to the whitelist, you have to go back to Menu and enable firewall. It's NOT enabled by default even if you change whitelist apps. Even though I had it not running firewall until 10 minutes ago, I hadn't received update. Maybe moving otacerts.zip stopped it....
jb0ne said:
I'm suspicious, I suspect it does more, and is the thing responsible for the OTA updates everyone is getting no matter what they do....
Click to expand...
Click to collapse
I installed ADCP on CM7 when I was trying to find a way to get amazon video working. It brings up the page to register your kindle, but it never seemed to work right on CM7. There's a different apk for the OTA update, if I remember correctly.
You could put /system/etc/security/otacerts.zip back in and see if ADCP then lets your register your kindle.
Hey there! I put together a complete video walkthrough for converting your FireTV to an XBMC box.
This includes:
Root
Preventing Amazon updates
Making XBMC the launcher
Installing apps to XBMC homepage
Demo of Mupen64+(N64 emulator) and Reflector (Airplay)
Remember, if you are buying a new FireTV, make sure to follow the instructions here to make sure it doesn't update to an unrootable version. In short, either block access at the router level, or disconnect wifi / ethernet right after you start the device and connect to the network, before the download of the new version can finish.
Enjoy! Let me know if you'd like me to do video walkthroughs of anything else, like using stickmount, connecting to Windows computers over the network, etc.
hotterpop said:
Hey there! I put together a complete video walkthrough for converting your FireTV to an XBMC box. This includes:
Root
Preventing Amazon updates
Making XBMC the launcher
Installing apps to XBMC homepage
Demo of Mupen64+(N64 emulator) and Reflector (Airplay)
Remember, if you are buying a new FireTV, make sure to follow the instructions here to make sure it doesn't update to an unrootable version. In short, either block access at the router level, or disconnect wifi / ethernet right after you start the device and connect to the network, before the download of the new version can finish.
Enjoy! Let me know if you'd like me to do video walkthroughs of anything else, like using stickmount, connecting to Windows computers over the network, etc.
Click to expand...
Click to collapse
Sweet, nice!
Great walk through wish I could use the whole lot.
Mainly using xbmc and its a great improvement on my Pi but as I am in UK no root so a "here's what you can do with unrooted AFTV" vid would nice, having said that the llama trick for short cut works great and I don't think I need much more
Great Effort. You should do another tutorial using FireTVUtility. I would be easier, w/o any commands to type directly in adb shell.
Legolas2 said:
Great Effort. You should do another tutorial using FireTVUtility. I would be easier, w/o any commands to type directly in adb shell.
Click to expand...
Click to collapse
I'll look into it. It doesn't look like it really needs any help though- I haven't used this program in particular, but my experience with pc-side all in one solutions is that if they work, they work, and if they don't, there's not much the user can do to fix it. It also seems that the developer is pretty active, so any video I make may be out of date rather quickly. That being said, if other folks agree that there should be a tutorial for this, I'll put it together.
Thanks for passing this utility on, though. Tools like this were essential to me when I started messing with cm 10 on an old phone of mine last year, which extended its useful life until I got my (glorious) OnePlus in July. My experience there really hit me with the modding bug, and I have been messing with android since. The purpose of the video was to help introduce people to the idea that android is open and ready to tinker with, in addition to taking advantage of the FireTV's potential with Kodi. If you have any more requests though, I'd love to hear them, and I'll do my best to fulfill them as time permits
Launcher
Hey, Thx for the awesome Video. Just a question....How do you get it to automatically boot into XBMC? I want to use XBMC as my home screen/launcher like you have shown in your video. I really appreciate it! Thanks!
Correction: HDExposed section
Kdurahm said:
Hey, Thx for the awesome Video. Just a question....How do you get it to automatically boot into XBMC? I want to use XBMC as my home screen/launcher like you have shown in your video. I really appreciate it! Thanks!
Click to expand...
Click to collapse
Hey there,
Sorry about the confusion. Looks like in my hasty editing I accidentally cut out a step. I've added an annotation to the video that addresses this, so you should be set if you re-watch minutes 21-25 of the video. I accidentally forgot to include that you need to go into the Modules section of HDExposed and, using a mouse, check the two boxes there as well before you reboot.
Thanks for pointing that out!
This is a great tutorial! Thank you
I have a couple of other fire TVs to root that I'm going to pass off to my friends. If
I complete the root and disable the ota updates at my house, when they plug it in their home, the firetvs won't loose the root right? Should they still add the 2 sites to block
On their router?
Berrybare said:
This is a great tutorial! Thank you
I have a couple of other fire TVs to root that I'm going to pass off to my friends. If
I complete the root and disable the ota updates at my house, when they plug it in their home, the firetvs won't loose the root right? Should they still add the 2 sites to block
On their router?
Click to expand...
Click to collapse
Hey there!
Glad you like my walkthrough. If you use the router-level blocking method, it will need to be applied to any and every network the FireTV connects to. This is a great way to guarantee that the FireTV does not update, but should only be considered a temporary method until you can disable updating permanently on the device itself. If you go to around minute 14 of my video, you'll see how to disable the update function on the device itself. This is the only way to guarantee that the device won't update in the future, no matter what it connects to.
Because of the issue with devices connecting and automatically updating to an unrootable version, I'd recommend you do the network-level update blocker (like it sounds like you've already done) and then use the device-level root prevention I described in the video.
Please let me know if you have any questions
Berrybare said:
This is a great tutorial! Thank you
I have a couple of other fire TVs to root that I'm going to pass off to my friends. If
I complete the root and disable the ota updates at my house, when they plug it in their home, the firetvs won't loose the root right? Should they still add the 2 sites to block
On their router?
Click to expand...
Click to collapse
Ultimate protection is having CWM aka custom recovery install. On top of the disabled OTA Update. Both done very easily with the AFTV Utility app mentioned above... Everybody should keep their routers blocking the IP's. Specially if you are going to be working on non-rooted AFTV's. But you can run an CWM'd AFTV on an unblocking router if it can't be helped.
hotterpop said:
Hey there!
Glad you like my walkthrough. If you use the router-level blocking method, it will need to be applied to any and every network the FireTV connects to. This is a great way to guarantee that the FireTV does not update, but should only be considered a temporary method until you can disable updating permanently on the device itself. If you go to around minute 14 of my video, you'll see how to disable the update function on the device itself. This is the only way to guarantee that the device won't update in the future, no matter what it connects to.
Because of the issue with devices connecting and automatically updating to an unrootable version, I'd recommend you do the network-level update blocker (like it sounds like you've already done) and then use the device-level root prevention I described in the video.
Please let me know if you have any questions
Click to expand...
Click to collapse
Although I would wait for the next release of both apss (adbFire & AFTV Utility) since so much has change the last 24 hours (unlock bootloader + new CWM). I would love to see a video using the AFTV Utility app to take care of all including the new options. Including the Mount external USB storage script.... It would be massive but all encompassing. I think the only thing waiting for an update is RBox's [XPosed] Mod's... Specifically the menu items part...
Sounds great. Post here when the new software is ready and I will get recording!
hotterpop said:
Sounds great. Post here when the new software is ready and I will get recording!
Click to expand...
Click to collapse
Great.. Will let you know when it gets posted..
hotterpop said:
Hey there!
If you go to around minute 14 of my video, you'll see how to disable the update function on the device itself. This is the only way to guarantee that the device won't update in the future, no matter what it connects to.
Click to expand...
Click to collapse
Is there an adb command to verify the "pm disable com.amazon.dcp" status. I ran this command months ago and have had no unwanted updates ruin root on the Fire TV. Perhaps, it is not necessary but just looking to be sure.
mjbxx said:
Is there an adb command to verify the "pm disable com.amazon.dcp" status. I ran this command months ago and have had no unwanted updates ruin root on the Fire TV. Perhaps, it is not necessary but just looking to be sure.
Click to expand...
Click to collapse
I don't know, but if you don't have router level blocking and you haven't received any updates, you are safe. Usually the update occurs quite quickly.
hotterpop said:
I don't know, but if you don't have router level blocking and you haven't received any updates, you are safe. Usually the update occurs quite quickly.
Click to expand...
Click to collapse
Sorry for bumping, I just wondered if there was any advance on the new software/video?
I have an untouched UK AFTV and just waiting for this video with new software for the complete start to finish setup before i do something wrong!
Let me know if im better off just following your first video if this new software stuff is not going to be released for a while.
Thanks
My recommendation is always to code by hand. That's how I learned, and I feel like it's a great way to learn about how Android really works. That being said, it's not for everyone, and I understand any nervousness you may have.
I'll probably have the video using the tool by the end of the week.
hotterpop said:
My recommendation is always to code by hand. That's how I learned, and I feel like it's a great way to learn about how Android really works. That being said, it's not for everyone, and I understand any nervousness you may have.
I'll probably have the video using the tool by the end of the week.
Click to expand...
Click to collapse
Unfortunately im not very technically minded, and would end up messing up unless I followed a guide from someone who knows their stuff!!
I will keep it in the wrapper until you can bring out the new video, id feel a lot safer and not end up bricking it or non rootable forever!
If i can make one request, I really will just want to use the AFTV for XBMC and maybe some emulators... So if its possible to include how to have the quickest access to XBMC from boot, id really appreciate it. Not sure how easily that is done with a non rootable AFTV?
swiss_lis said:
Unfortunately im not very technically minded, and would end up messing up unless I followed a guide from someone who knows their stuff!!
I will keep it in the wrapper until you can bring out the new video, id feel a lot safer and not end up bricking it or non rootable forever!
If i can make one request, I really will just want to use the AFTV for XBMC and maybe some emulators... So if its possible to include how to have the quickest access to XBMC from boot, id really appreciate it. Not sure how easily that is done with a non rootable AFTV?
Click to expand...
Click to collapse
I understand your concern. However, I would definitely consider rooting the device. While you can use XBMC and play emulators on the FTV without root, it is pretty inconvenient. Rooting isn't hard, and shouldn't be something that scares you at all.
If you are willing, my video shows you exactly what to type every step of the way. There's lots of support if you get lost, and you can always ask me questions here- I don't mind looking up documentation for you if you need it. If you have access to your router, once you have blocked the update sites there, you will be safe to take as long as you need to.
I'll try to have the other videos done soon. I wish I had more time in my life right now for stuff like that, but you know we all have to make a living somehow
I'll be sure to post in here when the tutorials are done.
swiss_lis said:
Sorry for bumping, I just wondered if there was any advance on the new software/video?
I have an untouched UK AFTV and just waiting for this video with new software for the complete start to finish setup before i do something wrong!
Let me know if im better off just following your first video if this new software stuff is not going to be released for a while.
Thanks
Click to expand...
Click to collapse
swiss_lis said:
Unfortunately im not very technically minded, and would end up messing up unless I followed a guide from someone who knows their stuff!!
I will keep it in the wrapper until you can bring out the new video, id feel a lot safer and not end up bricking it or non rootable forever!
If i can make one request, I really will just want to use the AFTV for XBMC and maybe some emulators... So if its possible to include how to have the quickest access to XBMC from boot, id really appreciate it. Not sure how easily that is done with a non rootable AFTV?
Click to expand...
Click to collapse
Those that bought their FTV's in the UK or GER & did not import US FTV's. The best you can hope for right now is block the two IP's so it doesn't keep auto updating. In case there is ever a new rooting option. UK & GER FTV's can not be rooted. You should setup your FTV with XBMC & anything else you would like within the unrooted options.
Once you have properly blocked update IP's & boot up & check your FW version which 99.99% chance it will be 51.1.4.0_user_514006420 (Unrootable) . You should feel safe to play with your FTV...
What router do you have ?? This link just shows you pictures of different IP blocking router interfaces like Tomato, DD-WRT, Asus, NetGear, Untangle, OpenDNS..
http://www.aftvnews.com/how-to-block-amazon-fire-tv-update-to-ensure-rooting/
This one tells you what to block now...
http://www.aftvnews.com/how-to-setup-a-new-fire-tv-without-blocking-root/
Method 1: Domain blocking with Router – Recommended Method
1. Before powering on the Fire TV, go into your router’s settings and block access to the following two domains:
amzdigitaldownloads.edgesuite.net
softwareupdates.amazon.com
If you do not know how to do this, you can refer to my guide or search the internet for instruction for your particular router.
NOTE: Do NOT block firs-ta-g7g.amazon.com as it is unnecessary for blocking updates and will cause problems during the initial setup if blocked.
Click to expand...
Click to collapse
Start enjoying your FTV as soon as you block those IP's correctly after verifying the FW you's came with...
Want to thank you both for good indepth responses.
I will be giving it a go tomorrow hopefully. Hoping that if i block updates for now then a root option may become available somewhere down the line, but till then i will enjoy the improvement of XBMC on the FTV rather than my rather slow raspberry Pi.
Many thanks guys
I have a Shield TV arriving later today. On my previous Android box I setup a VPN with a kill switch via AFWall+. This involved the installation of the OpenVPN connect application with my VPN provider details, then I used AFWall+ to prevent any data that didn't originate via a VPN connection, effectively making this a kill switch. This involved allowing both the OpenVPN application and Android's VPN api full access. It's the latter I'm enquiring about, does this api exist on the Shield TV? I've heard that native VPN isn't possible as the normal VPN settings aren't present. But does that include the vpn service api itself?
No one?
Beefheart said:
I have a Shield TV arriving later today. On my previous Android box I setup a VPN with a kill switch via AFWall+. This involved the installation of the OpenVPN connect application with my VPN provider details, then I used AFWall+ to prevent any data that didn't originate via a VPN connection, effectively making this a kill switch. This involved allowing both the OpenVPN application and Android's VPN api full access. It's the latter I'm enquiring about, does this api exist on the Shield TV? I've heard that native VPN isn't possible as the normal VPN settings aren't present. But does that include the vpn service api itself?
Click to expand...
Click to collapse
i have the exact same setup on all my devices, including shield tv, although ive only had to allow the openvpn app, wifi/data/vpn access for things to work, ive never had to allow androids vpn ........is their a specific reason you grant android vpn access?does it not work otherwise?
I use the other openvpn app, by the way
I originally set it up on the tutorial in the link below, which mentions that the VPN Networking service needs to have full access. Is that service present on the Shield?
https://www.privateinternetaccess.c...otection-on-android-with-afwall-requires-root
Beefheart said:
I originally set it up on the tutorial in the link below, which mentions that the VPN Networking service needs to have full access. Is that service present on the Shield?
https://www.privateinternetaccess.c...otection-on-android-with-afwall-requires-root
Click to expand...
Click to collapse
I just checked for you, and yes, its there, mind you, im using zulu's full rom, not sure about stock rom but as with all my devices, i havent needed to allow this for vpn to work.
Unless theres a specific reason to do so, try without on your current devices, i suspect, vpn networking may only apply if you use androids inbuilt vpn found in settings
Edit
By the way, i dont know how far you wanna take it, but afwall has tasker plugin support, which i use to apply an afwall profile, i named "secure", that denies everything when screen turns off......aswell as other things in the same vain
Edit
I do it a little differently then what youre link suggests, i only allow the bare minimum of apps, those that i actually need internet for.......if an app has internet capability, but i have no need for that side of it, its denied, i dont whitelist ALL apps for vpn as your link suggests
I also suspect that guide was written for privateinternets method of using vpn on android, so maybe vpn networking applies if using private internet, but as for my openvpn app, its not needed.......neither is "GPS"
Cheers. Everything set up and working perfectly in stock, no DNS leaks. A combination of AFWall+, VPN and Xprivacy has the device locked down pretty well.
And what a device, the speed is in another league compared to other similar boxes and worth the extra money. I'm glad I returned my newly purchased Minix Neo U1, this thing is so much faster and not as restricted as I was lead to believe. With a bit of work the Shield TV, even on stock, can do as much as any other Android based TV box, even one based on vanilla.
Beefheart said:
Cheers. Everything set up and working perfectly in stock, no DNS leaks. A combination of AFWall+, VPN and Xprivacy has the device locked down pretty well.
And what a device, the speed is in another league compared to other similar boxes and worth the extra money. I'm glad I returned my newly purchased Minix Neo U1, this thing is so much faster and not as restricted as I was lead to believe. With a bit of work the Shield TV, even on stock, can do as much as any other Android based TV box, even one based on vanilla.
Click to expand...
Click to collapse
Yep, ive said it before and ill say it again, the shields an impressive piece of kit for sure
Xprivacy.........snap
We seem to have a very similar setup........believe me, if you wanna take it further at some point in the future.......tasker.........although, fair warning, theres a learning curve
Just some of the more basic things i automate with tasker with plugins like afwalls
When screen goes off, tasker......
Turns off wifi/3g
Turns of bluetooth
Afwall secure profile
Greenify all preselected apps
turn off "unknown sources" for extra measure, as tasker turns this off after it detects an apk install anyway
Turn of "debugging", incase i turn it on one day out of need and forget to turn off
Media volume set to 4 edit:this ones a bit out of place
Aplly afwall profiles depending on what app you happen to be using
Many possibilities with tasker, VERY usefull for many things
Non security related....kinda......... could potentially be used for such if modified
I have a small bluetooth media remote which has the numbers 1 to ten, with tasker and xposed additions module, i fooled around with it, pressing 1 connects the shields bluetooth to the bedroom speakers, long pressing 1 connects to the living room speakers..........i can imagine my self doing some neat stuff with these combination of apps and future accesories
Also, i use it to turn the shields light led to dim to let me now at a glance if the shields on or asleep, without having to change the channel
food for thought for those with similar setups
Edit
By the way, you mention dns leak, i assume you used a test site to check for the leak, any chance of a link? Incase its something very new
This ones the one i use,
https://ipleak.net/
Detects webrtc leaks on the specific browser you happen to be using at the time
Edit
For those interested
More on webrtc here
https://www.privateinternetaccess.c...ome-and-mozilla-firefox-while-using-private-i
If you use firefox or chrome, you can disable manually following this guide
https://www.purevpn.com/blog/disable-webrtc-in-chrome-and-firefox-to-protect-anonymity/
I think there are addons aswell
Edit
"and not as restricted as I was lead to believe"
Yep, i had the same thoughts, just my own assumption really, that android tv was completely different, internally, to "standard" android , pleasantly surprised, no incompatibilities so far............................good to know that stock is like that too :good:
Cheers, I'll read into all that.
One issue I'm finding at the moment is that, on a reboot, AFWall+ doesn't apply as default on the Shield and has to be done manually. This doesn't happen on my Note 3 running Lollipop. I'm sure there is a simple explanation, I'll look into it a bit more.
That website is the one I user to check leaks but there are numerous others too.
Beefheart said:
Cheers, I'll read into all that.
One issue I'm finding at the moment is that, on a reboot, AFWall+ doesn't apply as default on the Shield and has to be done manually. This doesn't happen on my Note 3 running Lollipop. I'm sure there is a simple explanation, I'll look into it a bit more.
That website is the one I user to check leaks but there are numerous others too.
Click to expand...
Click to collapse
Im not sure i understand fully, afwall is not enabled? Or, afwall IS enabled, but your prefered profile is not "applied"?
On full android at least, afwall is enabled upon reboot i havent had any issues in that regard, (saw your other post) i dont need init.d script (usefull to have though, if/when possible)
Have you tried reverting all afwalls settings to default, to rule out that likely suspect
Another likely suspect, xprivacy, but that depends if you restrict everything like i do, including system apps , if so, have you checked xprivacies usage data for afwall and global apps?
Another suspect, could be stock firmware, but i have my doubts about that one
Assuming im understanding the issue correctly
Edit
I dont have "fix startup data leak" checked(as we dont have init.d), nor ipv6 support checked as your link described
Hello Fire Folk,
I decided to go ahead take the plunge and let my 2017 Fire HD tablets do their thing and update to 5.6.2.0. Well, the too-good-to-be-true advertising lulled me in anyway ("Show Mode!? You mean I can finally use my Fire Tablet for multi-room audio? And I can stop calling half the Alexa devices in the house "Alexa" while I call the others "Computer" and we can all live as one big happy, desegregated family?! And I can play Spotify on any of the devices and make drop in calls until my heart's content!??" Well, we're not quite there yet...
Anyway, the purpose of my post... Is anyone else noticing the annoying "Ghost" notifications (where it's just a blank white bar at the top, popping up regularly, but if you tap on it/long-touch it enough it eventually reveals its true self) appearing more frequently now? I have three HD 8s and one HD 10 and the background app is running rampant on all of them, resulting in super-frustrating and function-impairing crumminess. Fortunately, the 10 has root and on that tablet I can put this resource-gobbling ghost in its place. However, I'm at a loss on the Fire 8s. In the past I've tried various "no root" app freezing applications but I've never really found one that truly is capable of doing what it claims to be able to accomplish. Does anyone have any tips? I know for a while we could run that one script and make magic happen but can no longer use that trick. :-/
The background ghost app is "Tachyon Calling App" and I gather it's part of the messaging system that is supposed to make the Fire, post 5.6.2.0 update, more "Show"-like. But it runs wiiiild. I'll grabbed a few screenshots which tell a little more about this background pest and will include them below. If you've upgraded to the latest OS and haven't noticed this yet, I hope you never do, but I'd be surprised should you not soon become well-acquainted.
Oh also, my tablets all have Play Store et al. installed and I'm using Action Launcher, if that might have any impact on why I'm experiencing this conflict.
Thanks all! I've been lurking in the Fire section for a long time now and decided to finally make a profile, interact, etc. I am very appreciative to many people here for sharing the awesome findings/discoveries/techniques you've brought forward. I am still holding out hope - some day - even if it's 2046 and these tablets are beyond obsolete/somehow still manage to exist in physical form somewhere in the world, that we will get root access on HD 8! ??????
Screenshots w. additional details:
https://forum.xda-developers.com/album.php?albumid=15035
Having this same problem on a Fire 8 that's got the Play Store loaded. Also my model doesn't even have a sim card, does yours?
This is a new one. Never heard of or seen this app in any Amazon tablet I own (and I own several from the Fire 7 all the way to 10). Just from doing a general search, it appears it belongs to tachyon Mobility. At least that's the most likely culprit. For whatever reason it's on a device I have no idea unless you own a Samsung phone or tablet. I've seen other Samsung apps and Hardware configurations on Motorola devices but never on an Amazon device. If you don't mind uploading a copy of the APK, I can decompile it and take a look inside and see what it actually does or at least try. For now disable it by changing the file name to: appname.apk_ because some system apps like that may become useful in the future. By the way if you are rooted on the HD 10 Google 'rooted activity launcher'. Download the APK from the GitHub source. You can use that activity launcher to launch almost every system app that has a user interface. If this application does you can launch it with rooted activity launcher and see what it does.
Hello
Bought HD 2021, no ads version
In short:
1. Need to block the updates. How do I go about it? I have a router, so blocking the traffic to Amazon maybe?
2. I'd love to completely disconnect the tablet from Amazon. I wish to gain maximum intrussion on my privacy, so I'd love to get rid of Alexa etc. But if there's something which improves the chances of increasing compability with older apps installed from a pre-downloaded files, not from Google Play etc. I'd like that too. Basically "what would you do in the first place". Aside from the looks. I don't really care how my icons arrangement looks like or if I can get somewhere in 2 clicks instead of 3. Not sure if the launcher swap is for me then.
After spending some time googling, I found that there's no way to install LineageOS on this one. And people talk about bad 7.3.2.2 update. (I have 7.3.2.1)
So, please help a noob with some simple step-by-step advise on what should I do (no need to tell me the actual steps of each procedure, I can google, but keep in mind I'm a total noob to Android and PC-Android apps, so please don't use shortcuts which prelong my future googling by 1000x, thanks )
I just powered it on, checked the firmware version, and didn't connect the internet to it yet.
OK, so I needlessly worried after finding a 5 method list of removing the auto updates and comments about none working, and thought Toolbox is mainly for changing launchers.
To answer most of my questions:
- Toobox allows to disable the updates, has ALL the options nicely explained and you can just read through all the menu items to learn what to do and what's what. It allows to remove the spying Amazon crap (Alexa), allows to sideload apps without using any stores (not even google account required, I guess ), restores Google Play access and gives direct access to the filesysem for easy file transfer. Among other.
Awesome thing. I didn't finish using the Toolbox yet, but seems like I'll be able to use the tablet now.
I have a new question though. If my OS version is from 2021, and I don't want the new updates, what about security vulnerabilities? Am I now an easy target?
edit: Still have Alexa
Amazon Alexa is one service
and
Alexa - is the name of second service
Also, how do I disable the Google Assistant after replacing Alexa with it?
Lastly. I have only 1.3GB of 3GB RAM free? Or is this under developer settings in Android settings menu, not properly displayed?
Welcome here! I hope you'll take this discussion over to the Toolbox thread to benefit more readers:
[WINDOWS][TOOL]Fire Toolbox V30.2
Fire Toolbox V30.2 All-In-One Toolbox for Fire Tablets! The Fire Toolbox is a collection of useful ADB (Android Debug Bridge) tweaks that can be applied to Amazon's Fire Tablets. The Toolbox project aims to help users fully customize and...
forum.xda-developers.com