Libreware
6.01K subscribers
351 photos
26 videos
113 files
711 links
Libreware Software Library

πŸ“‘ t.me/Libreware

β˜… Send us your suggestions and menaces here:
https://xn--r1a.website/joinchat/nMOOE4YJPDFhZjZk
Download Telegram
FUTO Keyboard

Keyboard being developed, forked from the AOSP keyboard.
The goal is to create a good, customizable keyboard that doesn't sacrifice on privacy or freedoms.
If you're testing this, please join either the Discord server or the FUTO chat. Your feedback is valuable during this testing period

https://keyboard.futo.org

https://gitlab.futo.org/alex/keyboard-wiki/-/wikis/FUTO-Keyboard

https://github.com/futo-org/android-keyboard/issues

https://app.futo.org/fdroid/repo?fingerprint=39D47869D29CBFCE4691D9F7E6946A7B6D7E6FF4883497E6E675744ECDFA6D6D

Solving #Google's #Keyboard Privacy Issue: Introducing Offline #voice to text & #keyboard from #FUTO
https://odysee.com/solving-google's-keyboard-privacy-issue#7b51783c3bb27a967223ac3a7c3eb756267b1594

https://github.com/abb128/LiveCaptions
https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
https://youtu.be/r09Hm2zd2lY
https://www.youtube.com/watch?v=_vWAF13KigI

πŸ‘‰ Rossmann chat: https://matrix.to/#/#rossmannrepair:matrix.org

#futo #android #keyboard
πŸ‘25❀6πŸ”₯4⚑3πŸ‘Ž2πŸŽ‰2πŸ’©1
Sharing

Share files and apps on android to other devices using browser

Share files and apps over HTTP.
You need the other device to be connected to the same network. just toggle on the server and scan the QR Code on other device and you're good to go. Files sent from browser to the app can be found in Sharing/ folder in your internal storage. You can always disable uploads in the app settings.

https://github.com/Ammar64/Sharing

Download
https://github.com/Ammar64/Sharing/releases/latest

https://f-droid.org/packages/com.ammar.sharing/

#share #file #Transfer #Android #qr
πŸ‘8❀4πŸ€”2🍌1
#Unlock #bootloader #xiaomi #Android

HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/

MiUnlockTool
Retrieve encryptData (token) for Xiaomi devices to unlock bootloader, it is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool

termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
πŸ‘24πŸ”₯12❀7🀯3
Fossify Launcher

Fast, personalized, and privacy-first home screen experience. No ads, no bloat – just a smooth, efficient launcher designed to fit your unique style and preferences.

πŸ”— Links:
- Download from: Github or IzzySoft
- Screenshots
- Features
- Source Code

🌐 @popmodsnetwork
🎁 Donate to our admins
🏷 Tags: #Android #Customization #Fossify #Launcher
πŸ‘21❀6πŸ€”3⚑1
#Android #web #browsers

Ungoogled Chromium (forked from cromite) with Bromite patches and additional codecs
https://github.com/macchrome/droidchrome/releases
https://chromium.woolyss.com/#android

Cromite is another example of ungoogled chromium without the extra codecs from the above link, but cromite includes more patches as noted at github.
https://github.com/uazo/cromite
Fdroid repo
https://www.cromite.org/fdroid/repo?fingerprint=49f37e74dee483dca2b991334fb5a0200787430d0b5f9a783dd5f13695e9517b

For an Android Firefox based browser, use IronFox
https://gitlab.com/ironfox-oss/IronFox/-/releases
Fdroid repo
https://fdroid.ironfoxoss.org/fdroid/repo?fingerprint=c5e291b5a571f9c8cd9a9799c2c94e02ec9703948893f2ca756d67b94204f904

These can be added to Obtainium to download the latest release when they are available
https://github.com/ImranR98/Obtainium
πŸ‘9❀6πŸ”₯4πŸ₯°2
Warning for #Android gapps traitors:

Uninstall the application: Android System SafetyCore, which has been automatically installed on most devices. It is used by Google to scan your data, just like Apple has been doing on iOS, but you have the choice to uninstall it. If you don't have it yet, watch out for it being installed silently over the next few days!
https://play.google.com/store/apps/details?id=com.google.android.safetycore

Be careful on GrapheneOS too if you have Google services installed.

While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.

Sandboxed Google Play compatibility layer: stop Play Store from attempting to auto-install some system component packages, such as "Android System SafetyCore" (com.google.android.safetycore) and "Android System Key Verifier" (com.google.android.contactkeys)

https://grapheneos.org/releases


The phone is asking me to install this app, anyone knows information about if its truly need it or not? Im with the Google Play Services sandbox install

https://discuss.grapheneos.org/d/19193-android-system-safety-core

If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.

Locating the App
Go to Settings β†’ Apps (or Apps & Notifications) β†’ Show system apps. Look for β€œAndroid System SafetyCore.”
Check whether the app has any special permissions (e.g., internet access).

Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.

This is client side scanning. It's a way to spy on your device before it's encrypted.

Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/
πŸ‘33❀2πŸ‘Ž1πŸ‘Œ1
Payload-Dumper-Android

A Powerful #OTA Extractor App for #Android
You can extract images (boot, vendor_boot...) from a OTA.zip without a PC, directly on Android, without root access.

https://github.com/rajmani7584/Payload-Dumper-Android

Download
https://github.com/rajmani7584/Payload-Dumper-Android/releases/
πŸ”₯26✍4❀1
Obtainium

Get
#Android App Updates Directly From the Source.

Tired of waiting for updates in the Play Store? Obtainium lets you install and update Android apps directly from their source (like GitHub release pages) and notifies you about new releases. Cut out the middleman and stay up-to-date!

Key Features:

*   Direct Updates: Install and update apps directly from release pages.
*   Notifications: Get notified when new versions of your apps are available.
*   Open Source: Built by the community, for the community.

Learn More:

*   Video Tutorial: Obtainium 101
*   README: GitHub
*   Wiki: obtainium.imranr.dev

Recommended Tools:

*   AppVerifier: GitHub - Verify app authenticity.

Community Resources:

*   Crowdsourced App Configs: apps.obtainium.imranr.dev

Why Use Obtainium?

See the original motivation: Side Of Burritos - You should use this instead of F-Droid | How to use app RSS feed

Project Links:

*   Website: obtainium.imranr.dev
*   Source Code: GitHub

#apk
πŸ‘22πŸ”₯4❀2πŸ‘Ž2
Zapstore

Permissionless and social app store built on the #nostr protocol
For #Android #Linux and #Mac

https://zapstore.dev

Download
https://zapstore.dev/download/

Sources
https://github.com/zapstore

Secure by default
Everything you install comes from trusted sources and is cryptographically verified. Not satisfied with the default? Choose your own curators, or mix and match! Censorship has no place in our world.

Relevant to you
Supercharged by the nostr open protocol, recommendations come right from your social connections β€” or use it in totally private way. With our growing catalog, you will never run out of great apps.

Support your devs
Connect with your favorite developers: send them direct feedback, request features and support them through micropayments, all without any middlemen.

#apk #store
πŸ”₯10⚑7❀1
Snap Safe

The camera that doesn’t rat you out.   
Snap Safe is an #Android #camera app that keeps every pixelβ€”and every byte of dataβ€”exactly where it belongs: on YOUR device.

Key Features:
β€’ Zero‑Leak Design – The manifest skips android.permission.INTERNET; nothing leaves your device.
β€’ Fully Encrypted – Shots are written to encrypted, app‑private storage.
β€’ Metadata Scrub‑A‑Dub – EXIF and other identifiers are wiped the instant you hit Share.
β€’ PIN‑Locked Gallery – A separate PIN stands between curious thumbs and your photos.
β€’ Secure Sharing – When you do share, we hand the file off via Android's native share sheetβ€”no detours.
β€’ Granular Location – Add coarse, fine, or zero location dataβ€”your call.
β€’ 100% Open Source – Auditable code in plain sight.
β€’ Poison Pill – Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
β€’ Decoy Photos – Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.

Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tell‑tale metadata automatically.

We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.

Privacy Policy: We collect nothing.

Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest

https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
πŸ‘19❀2πŸ€”2πŸ‘Ž1😁1πŸ™1
#bootloader unlock wall of shame

https://github.com/melontini/bootloader-unlock-wall-of-shame

updated guide, check it before buying a #phone

Over the past few years, a suspicious number of companies have started to "take care of your data", aka block/strictly limit your ability to unlock the bootloader on your own devices.

While this may not affect you directly, it sets a bad precedent. You never know what will get the axe next: Shizuku? ADB? Sideloading? I thought it might be a good idea to keep track of bad companies and workarounds.

#android
πŸ”₯21πŸ‘10❀6πŸ‘3❀‍πŸ”₯1πŸ‘€1πŸ—Ώ1
ChatterUI - A simple app for LLMs

https://github.com/Vali-98/ChatterUI

https://xn--r1a.website/chatterui

ChatterUI is a native mobile frontend for LLMs.
Run LLMs on device or connect to various commercial or open source APIs. ChatterUI aims to provide a mobile-friendly interface with fine-grained control over chat structuring.

Features:
Run LLMs on-device in Local Mode
Connect to various APIs in Remote Mode
Chat with characters. (Supports the Character Card v2 specification.)
Create and manage multiple chats per character.
Customize Sampler fields and Instruct formatting
Integrates with your device’s text-to-speech (TTS) engine

Usage
Download and install latest APK from the releases page.
iOS is Currently unavailable due to lacking iOS hardware for development

Local Mode
ChatterUI uses a llama.cpp under the hood to run gguf files on device. A custom adapter is used to integrate with react-native: cui-llama.rn
To use on-device inferencing, first enable Local Mode, then go to Models > Import Model / Use External Model and choose a gguf model that can fit on your device's memory. The importing functions are as follows:
Import Model: Copies the model file into ChatterUI, potentially speeding up startup time.
Use External Model: Uses a model from your device storage directly, removing the need to copy large files into ChatterUI but with a slight delay in load times.
After that, you can load the model and begin chatting!
Note: For devices with Snapdragon 8 Gen 1 and above or Exynos 2200+, it is recommended to use the Q4_0 quantization for optimized performance.

Remote Mode
Remote Mode allows you to connect to a few common APIs from both commercial and open source projects.

Open Source Backends:
koboldcpp
text-generation-webui
Ollama

Dedicated API:
OpenAI
Claude (with ability to use a proxy)
Cohere
Open Router
Mancer
AI Horde

Generic backends:
Generic Text Completions
Generic Chat Completions
These should be compliant with any Text Completion/Chat Completion backends such as Groq or Infermatic.

Custom APIs:
Is your API provider missing? ChatterUI allows you to define APIs using its template system.
Read more about it here!

#ai #Android
πŸ’©7❀6πŸ‘2⚑1
Dicio assistant

Dicio is a free and open source #voice #assistant running on #Android. It supports many different skills and input/output methods, and it provides both speech and graphical feedback to a question. It interprets user input and (when possible) generates user output entirely on-device, providing privacy by design. It has multilanguage support, and is currently available in these languages: Czech, English, French, German, Greek, Italian, Polish, Russian, Slovenian, Spanish, Swedish and Ukrainian. Open to contributions :-D

https://github.com/Stypox/dicio-android

Download
https://f-droid.org/packages/org.stypox.dicio
https://github.com/Stypox/dicio-android/releases
https://play.google.com/store/apps/details?id=org.stypox.dicio

Skills
Currently Dicio answers questions about:
search: looks up information on DuckDuckGo (and in the future more engines) - Search for Dicio
weather: collects weather information from OpenWeatherMap - What's the weather like?
lyrics: shows Genius lyrics for songs - What's the song that goes we will we will rock you?
open: opens an app on your device - Open NewPipe
calculator: evaluates basic calculations - What is four thousand and two times three minus a million divided by three hundred?
telephone: view and call contacts - Call Tom
timer: set, query and cancel timers - Set a timer for five minutes
current time: query current time - What time is it?
navigation: opens the navigation app at the requested position - Take me to New York, fifteenth avenue
media: play, pause, previous, next song

Speech to text
Dicio uses Vosk as its speech to text (#STT) engine. In order to be able to run on every phone small models are employed, weighing ~50MB. The download from here starts automatically whenever needed, so the app language can be changed seamlessly.
❀24⚑3πŸ‘3
How to run #ADB and #fastboot in #Termux without root to unlock #bootloader, run ADB commands, remove #bloatware, flash ROM, or even root another #Android

https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:

1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the app’s private storage β€” including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the app’s private data to be backed up via ADB β€” again, even on non-rooted devices.

Android, use termux-adb command instead of adb
https://github.com/nohajc/termux-adb

Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation

https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation/blob/main/resources/assets/uad_lists.json

#debloat
❀16πŸ”₯8πŸ€”4πŸ™1
Universal Android Debloater Next Generation

https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation

This is a detached fork of the UAD project, which aims to improve privacy and battery performance by removing unnecessary and obscure system apps. This can also contribute to improving security by reducing (but not eliminating) the attack surface. Read the wiki for more details on getting started. Whilst UAD-ng can remove system apps, it cannot detect or remove potentially malicious system services or drivers baked into the firmware of your device by various vendors; some vendor-specific apps are only UI front-ends to vendor-provided system services, and as such disabling/uninstalling those apps will not stop a service from running. Additional information can be found in package descriptions inside the Universal Android Debloater Next Generation application.

#Android #debloat #UADNG
πŸ”₯20❀4πŸ‘3πŸ™3🀣1