FUTO Keyboard
Keyboard being developed, forked from the AOSP keyboard.
The goal is to create a good, customizable keyboard that doesn't sacrifice on privacy or freedoms.
If you're testing this, please join either the Discord server or the FUTO chat. Your feedback is valuable during this testing period
https://keyboard.futo.org
https://gitlab.futo.org/alex/keyboard-wiki/-/wikis/FUTO-Keyboard
https://github.com/futo-org/android-keyboard/issues
Solving #Google's #Keyboard Privacy Issue: Introducing Offline #voice to text & #keyboard from #FUTO
https://odysee.com/solving-google's-keyboard-privacy-issue#7b51783c3bb27a967223ac3a7c3eb756267b1594
https://github.com/abb128/LiveCaptions
https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
https://youtu.be/r09Hm2zd2lY
https://www.youtube.com/watch?v=_vWAF13KigI
π Rossmann chat: https://matrix.to/#/#rossmannrepair:matrix.org
#futo #android #keyboard
Keyboard being developed, forked from the AOSP keyboard.
The goal is to create a good, customizable keyboard that doesn't sacrifice on privacy or freedoms.
If you're testing this, please join either the Discord server or the FUTO chat. Your feedback is valuable during this testing period
https://keyboard.futo.org
https://gitlab.futo.org/alex/keyboard-wiki/-/wikis/FUTO-Keyboard
https://github.com/futo-org/android-keyboard/issues
https://app.futo.org/fdroid/repo?fingerprint=39D47869D29CBFCE4691D9F7E6946A7B6D7E6FF4883497E6E675744ECDFA6D6DSolving #Google's #Keyboard Privacy Issue: Introducing Offline #voice to text & #keyboard from #FUTO
https://odysee.com/solving-google's-keyboard-privacy-issue#7b51783c3bb27a967223ac3a7c3eb756267b1594
https://github.com/abb128/LiveCaptions
https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
https://youtu.be/r09Hm2zd2lY
https://www.youtube.com/watch?v=_vWAF13KigI
π Rossmann chat: https://matrix.to/#/#rossmannrepair:matrix.org
#futo #android #keyboard
GitLab
FUTO Keyboard Β· Wiki Β· keyboard / keyboard-wiki Β· GitLab
GitLab Enterprise Edition
π25β€6π₯4β‘3π2π2π©1
Rush
#Android app to search, save and share #lyrics like spotify! π«
https://github.com/shub39/Rush
Features π
Search Lyrics
Download Lyrics
Share Lyrics
Customisations
Auto-fill current playing song in search
Synced Lyrics
Download
β’ https://f-droid.org/packages/com.shub39.rush/
β’ https://apt.izzysoft.de/packages/com.shub39.rush/latest
β’ https://github.com/shub39/Rush/releases
#Android app to search, save and share #lyrics like spotify! π«
https://github.com/shub39/Rush
Features π
Search Lyrics
Download Lyrics
Share Lyrics
Customisations
Auto-fill current playing song in search
Synced Lyrics
Download
β’ https://f-droid.org/packages/com.shub39.rush/
β’ https://apt.izzysoft.de/packages/com.shub39.rush/latest
β’ https://github.com/shub39/Rush/releases
GitHub
GitHub - shub39/Rush: β¨ App to search, save and share lyrics like spotify!
β¨ App to search, save and share lyrics like spotify! - GitHub - shub39/Rush: β¨ App to search, save and share lyrics like spotify!
π11β€10
Sharing
Share files and apps on android to other devices using browser
Share files and apps over HTTP.
You need the other device to be connected to the same network. just toggle on the server and scan the QR Code on other device and you're good to go. Files sent from browser to the app can be found in Sharing/ folder in your internal storage. You can always disable uploads in the app settings.
https://github.com/Ammar64/Sharing
ββ¬Download
https://github.com/Ammar64/Sharing/releases/latest
https://f-droid.org/packages/com.ammar.sharing/
#share #file #Transfer #Android #qr
Share files and apps on android to other devices using browser
Share files and apps over HTTP.
You need the other device to be connected to the same network. just toggle on the server and scan the QR Code on other device and you're good to go. Files sent from browser to the app can be found in Sharing/ folder in your internal storage. You can always disable uploads in the app settings.
https://github.com/Ammar64/Sharing
ββ¬Download
https://github.com/Ammar64/Sharing/releases/latest
https://f-droid.org/packages/com.ammar.sharing/
#share #file #Transfer #Android #qr
GitHub
GitHub - Ammar64/Sharing: Share files and apps on android to other devices using browser
Share files and apps on android to other devices using browser - Ammar64/Sharing
π8β€4π€2π1
#Unlock #bootloader #xiaomi #Android
HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/
MiUnlockTool
Retrieve encryptData (token) for Xiaomi devices to unlock bootloader, it is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool
termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
HyperSploit
Bypass HyperOS restrictions on bootloader unlocking
https://github.com/TheAirBlow/HyperSploit/
https://xdaforums.com/t/hypersploit-bypass-hyperos-bootloader-unlocking-restrictions.4668775/
MiUnlockTool
Retrieve encryptData (token) for Xiaomi devices to unlock bootloader, it is compatible with all platforms.
https://github.com/offici5l/MiUnlockTool
termux-miunlock
A program that can be used to retrieve the bootloader unlock token for Xiaomi devices (and unlock the bootloader) using Termux
https://github.com/RohitVerma882/termux-miunlock/
GitHub
GitHub - TheAirBlow/HyperSploit: Bypasses HyperOS restrictions on bootloader unlocking
Bypasses HyperOS restrictions on bootloader unlocking - TheAirBlow/HyperSploit
π24π₯12β€7π€―3
Fossify Launcher
Fast, personalized, and privacy-first home screen experience. No ads, no bloat β just a smooth, efficient launcher designed to fit your unique style and preferences.
π Links:
- Download from: Github or IzzySoft
- Screenshots
- Features
- Source Code
π @popmodsnetwork
π Donate to our admins
π· Tags: #Android #Customization #Fossify #Launcher
Fast, personalized, and privacy-first home screen experience. No ads, no bloat β just a smooth, efficient launcher designed to fit your unique style and preferences.
π Links:
- Download from: Github or IzzySoft
- Screenshots
- Features
- Source Code
π @popmodsnetwork
π Donate to our admins
π· Tags: #Android #Customization #Fossify #Launcher
π21β€6π€3β‘1
#Android #web #browsers
Ungoogled Chromium (forked from cromite) with Bromite patches and additional codecs
https://github.com/macchrome/droidchrome/releases
https://chromium.woolyss.com/#android
Cromite is another example of ungoogled chromium without the extra codecs from the above link, but cromite includes more patches as noted at github.
https://github.com/uazo/cromite
Fdroid repo
For an Android Firefox based browser, use IronFox
https://gitlab.com/ironfox-oss/IronFox/-/releases
Fdroid repo
These can be added to Obtainium to download the latest release when they are available
https://github.com/ImranR98/Obtainium
Ungoogled Chromium (forked from cromite) with Bromite patches and additional codecs
https://github.com/macchrome/droidchrome/releases
https://chromium.woolyss.com/#android
Cromite is another example of ungoogled chromium without the extra codecs from the above link, but cromite includes more patches as noted at github.
https://github.com/uazo/cromite
Fdroid repo
https://www.cromite.org/fdroid/repo?fingerprint=49f37e74dee483dca2b991334fb5a0200787430d0b5f9a783dd5f13695e9517bFor an Android Firefox based browser, use IronFox
https://gitlab.com/ironfox-oss/IronFox/-/releases
Fdroid repo
https://fdroid.ironfoxoss.org/fdroid/repo?fingerprint=c5e291b5a571f9c8cd9a9799c2c94e02ec9703948893f2ca756d67b94204f904These can be added to Obtainium to download the latest release when they are available
https://github.com/ImranR98/Obtainium
GitHub
Releases Β· macchrome/droidchrome
Contribute to macchrome/droidchrome development by creating an account on GitHub.
π9β€6π₯4π₯°2
Warning for #Android gapps traitors:
Uninstall the application:
https://play.google.com/store/apps/details?id=com.google.android.safetycore
Be careful on GrapheneOS too if you have Google services installed.
While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.
https://grapheneos.org/releases
https://discuss.grapheneos.org/d/19193-android-system-safety-core
If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.
Locating the App
Go to Settings β Apps (or Apps & Notifications) β Show system apps. Look for βAndroid System SafetyCore.β
Check whether the app has any special permissions (e.g., internet access).
Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.
This is client side scanning. It's a way to spy on your device before it's encrypted.
Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/
Uninstall the application:
Android System SafetyCore, which has been automatically installed on most devices. It is used by Google to scan your data, just like Apple has been doing on iOS, but you have the choice to uninstall it. If you don't have it yet, watch out for it being installed silently over the next few days!https://play.google.com/store/apps/details?id=com.google.android.safetycore
Be careful on GrapheneOS too if you have Google services installed.
While GrapheneOS will stop it from auto installing, it can nag you about installing it. And it won't tell you what it really is. Nor will most online resources.
Sandboxed Google Play compatibility layer: stop Play Store from attempting to auto-install some system component packages, such as "Android System SafetyCore" (com.google.android.safetycore) and "Android System Key Verifier" (com.google.android.contactkeys)
https://grapheneos.org/releases
The phone is asking me to install this app, anyone knows information about if its truly need it or not? Im with the Google Play Services sandbox install
https://discuss.grapheneos.org/d/19193-android-system-safety-core
If you don't have GrapheneOS, it's going to automatically install itself again at some point after uninstalling it.
Locating the App
Go to Settings β Apps (or Apps & Notifications) β Show system apps. Look for βAndroid System SafetyCore.β
Check whether the app has any special permissions (e.g., internet access).
Uninstalling or Disabling
In many cases, you can uninstall an update or at least disable the app. Check the available options in the app info.
This is client side scanning. It's a way to spy on your device before it's encrypted.
Other information on the topic:
https://www.androidauthority.com/google-messages-nudes-3499420/
https://www.androidauthority.com/android-system-key-verifier-3499353/
π33β€2π1π1
Payload-Dumper-Android
A Powerful #OTA Extractor App for #Android
You can extract images (boot, vendor_boot...) from a OTA.zip without a PC, directly on Android, without root access.
https://github.com/rajmani7584/Payload-Dumper-Android
Download
https://github.com/rajmani7584/Payload-Dumper-Android/releases/
A Powerful #OTA Extractor App for #Android
You can extract images (boot, vendor_boot...) from a OTA.zip without a PC, directly on Android, without root access.
https://github.com/rajmani7584/Payload-Dumper-Android
Download
https://github.com/rajmani7584/Payload-Dumper-Android/releases/
π₯26β4β€1
ReVanced
https://revanced.app
Download
https://github.com/ReVanced/revanced-manager/releases
ReVanced Documentation
https://github.com/ReVanced/revanced-documentation
Patches
https://revanced.app/patches
https://github.com/revanced
https://xn--r1a.website/app_revanced
Revanced magisk module
https://github.com/j-hc/revanced-magisk-module
https://xn--r1a.website/rvc_magisk
#revanced #vanced #video #yt #android
https://revanced.app
Download
https://github.com/ReVanced/revanced-manager/releases
ReVanced Documentation
https://github.com/ReVanced/revanced-documentation
Patches
https://revanced.app/patches
https://github.com/revanced
https://xn--r1a.website/app_revanced
Revanced magisk module
https://github.com/j-hc/revanced-magisk-module
https://xn--r1a.website/rvc_magisk
#revanced #vanced #video #yt #android
revanced.app
Continuing the legacy of Vanced.
π13π₯10β2β€1
Obtainium
Get #Android App Updates Directly From the Source.
Tired of waiting for updates in the Play Store? Obtainium lets you install and update Android apps directly from their source (like GitHub release pages) and notifies you about new releases. Cut out the middleman and stay up-to-date!
Key Features:
* Direct Updates: Install and update apps directly from release pages.
* Notifications: Get notified when new versions of your apps are available.
* Open Source: Built by the community, for the community.
Learn More:
* Video Tutorial: Obtainium 101
* README: GitHub
* Wiki: obtainium.imranr.dev
Recommended Tools:
* AppVerifier: GitHub - Verify app authenticity.
Community Resources:
* Crowdsourced App Configs: apps.obtainium.imranr.dev
Why Use Obtainium?
See the original motivation: Side Of Burritos - You should use this instead of F-Droid | How to use app RSS feed
Project Links:
* Website: obtainium.imranr.dev
* Source Code: GitHub
#apk
Get #Android App Updates Directly From the Source.
Tired of waiting for updates in the Play Store? Obtainium lets you install and update Android apps directly from their source (like GitHub release pages) and notifies you about new releases. Cut out the middleman and stay up-to-date!
Key Features:
* Direct Updates: Install and update apps directly from release pages.
* Notifications: Get notified when new versions of your apps are available.
* Open Source: Built by the community, for the community.
Learn More:
* Video Tutorial: Obtainium 101
* README: GitHub
* Wiki: obtainium.imranr.dev
Recommended Tools:
* AppVerifier: GitHub - Verify app authenticity.
Community Resources:
* Crowdsourced App Configs: apps.obtainium.imranr.dev
Why Use Obtainium?
See the original motivation: Side Of Burritos - You should use this instead of F-Droid | How to use app RSS feed
Project Links:
* Website: obtainium.imranr.dev
* Source Code: GitHub
#apk
YouTube
Obtainium 101 - How to get Android app Updates Straight from the Source
Learn how to use Obtainium, an Android app "updater" that lets you install and update apps straight from Web sources - no app stores, no middlemen.
Obtainium Wiki:
- https://wiki.obtainium.imranr.dev
Obtainium GitHub (source code, issue tracker, discussions):β¦
Obtainium Wiki:
- https://wiki.obtainium.imranr.dev
Obtainium GitHub (source code, issue tracker, discussions):β¦
π22π₯4β€2π2
Zapstore
Permissionless and social app store built on the #nostr protocol
For #Android #Linux and #Mac
https://zapstore.dev
Download
https://zapstore.dev/download/
Sources
https://github.com/zapstore
Secure by default
Everything you install comes from trusted sources and is cryptographically verified. Not satisfied with the default? Choose your own curators, or mix and match! Censorship has no place in our world.
Relevant to you
Supercharged by the nostr open protocol, recommendations come right from your social connections β or use it in totally private way. With our growing catalog, you will never run out of great apps.
Support your devs
Connect with your favorite developers: send them direct feedback, request features and support them through micropayments, all without any middlemen.
#apk #store
Permissionless and social app store built on the #nostr protocol
For #Android #Linux and #Mac
https://zapstore.dev
Download
https://zapstore.dev/download/
Sources
https://github.com/zapstore
Secure by default
Everything you install comes from trusted sources and is cryptographically verified. Not satisfied with the default? Choose your own curators, or mix and match! Censorship has no place in our world.
Relevant to you
Supercharged by the nostr open protocol, recommendations come right from your social connections β or use it in totally private way. With our growing catalog, you will never run out of great apps.
Support your devs
Connect with your favorite developers: send them direct feedback, request features and support them through micropayments, all without any middlemen.
#apk #store
π₯10β‘7β€1
Snap Safe
The camera that doesnβt rat you out.
Snap Safe is an #Android #camera app that keeps every pixelβand every byte of dataβexactly where it belongs: on YOUR device.
Key Features:
β’ ZeroβLeak Design β The manifest skips android.permission.INTERNET; nothing leaves your device.
β’ Fully Encrypted β Shots are written to encrypted, appβprivate storage.
β’ Metadata ScrubβAβDub β EXIF and other identifiers are wiped the instant you hit Share.
β’ PINβLocked Gallery β A separate PIN stands between curious thumbs and your photos.
β’ Secure Sharing β When you do share, we hand the file off via Android's native share sheetβno detours.
β’ Granular Location β Add coarse, fine, or zero location dataβyour call.
β’ 100% Open Source β Auditable code in plain sight.
β’ Poison Pill β Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
β’ Decoy Photos β Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tellβtale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
The camera that doesnβt rat you out.
Snap Safe is an #Android #camera app that keeps every pixelβand every byte of dataβexactly where it belongs: on YOUR device.
Key Features:
β’ ZeroβLeak Design β The manifest skips android.permission.INTERNET; nothing leaves your device.
β’ Fully Encrypted β Shots are written to encrypted, appβprivate storage.
β’ Metadata ScrubβAβDub β EXIF and other identifiers are wiped the instant you hit Share.
β’ PINβLocked Gallery β A separate PIN stands between curious thumbs and your photos.
β’ Secure Sharing β When you do share, we hand the file off via Android's native share sheetβno detours.
β’ Granular Location β Add coarse, fine, or zero location dataβyour call.
β’ 100% Open Source β Auditable code in plain sight.
β’ Poison Pill β Set a special PIN, that when entered, appears to work normally but actually deletes your existing
photos.
β’ Decoy Photos β Select innocuous decoy photos, these will be preserved when your Poison Pill is activated. That way
your Gallery is not suspiciously empty.
Why Snap Safe?
We capture photos locally, encrypt everything in private storage, let YOU decide if GPS tags are added (precision optional), and strip out tellβtale metadata automatically.
We NEVER phone home or talk to servers, slurp analytics or usage stats, sprinkle ads or trackers in the code, or read files outside our sandbox.
Privacy Policy: We collect nothing.
Newest version on github
https://github.com/SecureCamera/SecureCameraAndroid/releases/latest
https://f-droid.org/packages/com.darkrockstudios.app.securecamera/
Photos posted on F-droid page.
π19β€2π€2π1π1π1
β οΈHackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability.
https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device
https://cybersecuritynews.com/hackers-could-gain-full-control-rooted-android-devices/
#Android #root #ksu #magisk
https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device
https://cybersecuritynews.com/hackers-could-gain-full-control-rooted-android-devices/
#Android #root #ksu #magisk
Zimperium
The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device
true
π9π5π±3π€1π1π₯΄1
#bootloader unlock wall of shame
https://github.com/melontini/bootloader-unlock-wall-of-shame
updated guide, check it before buying a #phone
Over the past few years, a suspicious number of companies have started to "take care of your data", aka block/strictly limit your ability to unlock the bootloader on your own devices.
While this may not affect you directly, it sets a bad precedent. You never know what will get the axe next: Shizuku? ADB? Sideloading? I thought it might be a good idea to keep track of bad companies and workarounds.
#android
https://github.com/melontini/bootloader-unlock-wall-of-shame
updated guide, check it before buying a #phone
Over the past few years, a suspicious number of companies have started to "take care of your data", aka block/strictly limit your ability to unlock the bootloader on your own devices.
While this may not affect you directly, it sets a bad precedent. You never know what will get the axe next: Shizuku? ADB? Sideloading? I thought it might be a good idea to keep track of bad companies and workarounds.
#android
GitHub
GitHub - zenfyrdev/bootloader-unlock-wall-of-shame: Keeping track of companies that "care about your data π₯Ί"
Keeping track of companies that "care about your data π₯Ί" - zenfyrdev/bootloader-unlock-wall-of-shame
π₯21π10β€6π3β€βπ₯1π1πΏ1
ChatterUI - A simple app for LLMs
https://github.com/Vali-98/ChatterUI
https://xn--r1a.website/chatterui
ChatterUI is a native mobile frontend for LLMs.
Run LLMs on device or connect to various commercial or open source APIs. ChatterUI aims to provide a mobile-friendly interface with fine-grained control over chat structuring.
Features:
Run LLMs on-device in Local Mode
Connect to various APIs in Remote Mode
Chat with characters. (Supports the Character Card v2 specification.)
Create and manage multiple chats per character.
Customize Sampler fields and Instruct formatting
Integrates with your deviceβs text-to-speech (TTS) engine
Usage
Download and install latest APK from the releases page.
iOS is Currently unavailable due to lacking iOS hardware for development
Local Mode
ChatterUI uses a llama.cpp under the hood to run gguf files on device. A custom adapter is used to integrate with react-native: cui-llama.rn
To use on-device inferencing, first enable Local Mode, then go to Models > Import Model / Use External Model and choose a gguf model that can fit on your device's memory. The importing functions are as follows:
Import Model: Copies the model file into ChatterUI, potentially speeding up startup time.
Use External Model: Uses a model from your device storage directly, removing the need to copy large files into ChatterUI but with a slight delay in load times.
After that, you can load the model and begin chatting!
Note: For devices with Snapdragon 8 Gen 1 and above or Exynos 2200+, it is recommended to use the Q4_0 quantization for optimized performance.
Remote Mode
Remote Mode allows you to connect to a few common APIs from both commercial and open source projects.
Open Source Backends:
koboldcpp
text-generation-webui
Ollama
Dedicated API:
OpenAI
Claude (with ability to use a proxy)
Cohere
Open Router
Mancer
AI Horde
Generic backends:
Generic Text Completions
Generic Chat Completions
These should be compliant with any Text Completion/Chat Completion backends such as Groq or Infermatic.
Custom APIs:
Is your API provider missing? ChatterUI allows you to define APIs using its template system.
Read more about it here!
#ai #Android
https://github.com/Vali-98/ChatterUI
https://xn--r1a.website/chatterui
ChatterUI is a native mobile frontend for LLMs.
Run LLMs on device or connect to various commercial or open source APIs. ChatterUI aims to provide a mobile-friendly interface with fine-grained control over chat structuring.
Features:
Run LLMs on-device in Local Mode
Connect to various APIs in Remote Mode
Chat with characters. (Supports the Character Card v2 specification.)
Create and manage multiple chats per character.
Customize Sampler fields and Instruct formatting
Integrates with your deviceβs text-to-speech (TTS) engine
Usage
Download and install latest APK from the releases page.
iOS is Currently unavailable due to lacking iOS hardware for development
Local Mode
ChatterUI uses a llama.cpp under the hood to run gguf files on device. A custom adapter is used to integrate with react-native: cui-llama.rn
To use on-device inferencing, first enable Local Mode, then go to Models > Import Model / Use External Model and choose a gguf model that can fit on your device's memory. The importing functions are as follows:
Import Model: Copies the model file into ChatterUI, potentially speeding up startup time.
Use External Model: Uses a model from your device storage directly, removing the need to copy large files into ChatterUI but with a slight delay in load times.
After that, you can load the model and begin chatting!
Note: For devices with Snapdragon 8 Gen 1 and above or Exynos 2200+, it is recommended to use the Q4_0 quantization for optimized performance.
Remote Mode
Remote Mode allows you to connect to a few common APIs from both commercial and open source projects.
Open Source Backends:
koboldcpp
text-generation-webui
Ollama
Dedicated API:
OpenAI
Claude (with ability to use a proxy)
Cohere
Open Router
Mancer
AI Horde
Generic backends:
Generic Text Completions
Generic Chat Completions
These should be compliant with any Text Completion/Chat Completion backends such as Groq or Infermatic.
Custom APIs:
Is your API provider missing? ChatterUI allows you to define APIs using its template system.
Read more about it here!
#ai #Android
GitHub
GitHub - Vali-98/ChatterUI: Simple frontend for LLMs built in react-native.
Simple frontend for LLMs built in react-native. Contribute to Vali-98/ChatterUI development by creating an account on GitHub.
π©7β€6π2β‘1
Tor Project Releases Experimental #Tor #VPN Beta for #Android with Per-App Routing and Privacy Tools
https://ift.tt/boRFLGe
@reclaimthenet
The Tor Project has launched its own VPN β but it's not the finished product yet
https://www.tomsguide.com/computing/vpns/the-tor-project-has-launched-its-own-vpn-but-its-not-the-finished-product-yet
https://gitlab.torproject.org/tpo/applications/vpn
https://ift.tt/boRFLGe
@reclaimthenet
The Tor Project has launched its own VPN β but it's not the finished product yet
https://www.tomsguide.com/computing/vpns/the-tor-project-has-launched-its-own-vpn-but-its-not-the-finished-product-yet
https://gitlab.torproject.org/tpo/applications/vpn
Reclaim The Net
Tor Project Releases Experimental Tor VPN Beta for Android with Per-App Routing and Privacy Tools
Itβs a major step for Tor on mobile, even if the software is still rough around the edges.
π23π6β€4π€2π€¨1
Dicio assistant
Dicio is a free and open source #voice #assistant running on #Android. It supports many different skills and input/output methods, and it provides both speech and graphical feedback to a question. It interprets user input and (when possible) generates user output entirely on-device, providing privacy by design. It has multilanguage support, and is currently available in these languages: Czech, English, French, German, Greek, Italian, Polish, Russian, Slovenian, Spanish, Swedish and Ukrainian. Open to contributions :-D
https://github.com/Stypox/dicio-android
Download
https://f-droid.org/packages/org.stypox.dicio
https://github.com/Stypox/dicio-android/releases
https://play.google.com/store/apps/details?id=org.stypox.dicio
Skills
Currently Dicio answers questions about:
search: looks up information on DuckDuckGo (and in the future more engines) - Search for Dicio
weather: collects weather information from OpenWeatherMap - What's the weather like?
lyrics: shows Genius lyrics for songs - What's the song that goes we will we will rock you?
open: opens an app on your device - Open NewPipe
calculator: evaluates basic calculations - What is four thousand and two times three minus a million divided by three hundred?
telephone: view and call contacts - Call Tom
timer: set, query and cancel timers - Set a timer for five minutes
current time: query current time - What time is it?
navigation: opens the navigation app at the requested position - Take me to New York, fifteenth avenue
media: play, pause, previous, next song
Speech to text
Dicio uses Vosk as its speech to text (#STT) engine. In order to be able to run on every phone small models are employed, weighing ~50MB. The download from here starts automatically whenever needed, so the app language can be changed seamlessly.
Dicio is a free and open source #voice #assistant running on #Android. It supports many different skills and input/output methods, and it provides both speech and graphical feedback to a question. It interprets user input and (when possible) generates user output entirely on-device, providing privacy by design. It has multilanguage support, and is currently available in these languages: Czech, English, French, German, Greek, Italian, Polish, Russian, Slovenian, Spanish, Swedish and Ukrainian. Open to contributions :-D
https://github.com/Stypox/dicio-android
Download
https://f-droid.org/packages/org.stypox.dicio
https://github.com/Stypox/dicio-android/releases
https://play.google.com/store/apps/details?id=org.stypox.dicio
Skills
Currently Dicio answers questions about:
search: looks up information on DuckDuckGo (and in the future more engines) - Search for Dicio
weather: collects weather information from OpenWeatherMap - What's the weather like?
lyrics: shows Genius lyrics for songs - What's the song that goes we will we will rock you?
open: opens an app on your device - Open NewPipe
calculator: evaluates basic calculations - What is four thousand and two times three minus a million divided by three hundred?
telephone: view and call contacts - Call Tom
timer: set, query and cancel timers - Set a timer for five minutes
current time: query current time - What time is it?
navigation: opens the navigation app at the requested position - Take me to New York, fifteenth avenue
media: play, pause, previous, next song
Speech to text
Dicio uses Vosk as its speech to text (#STT) engine. In order to be able to run on every phone small models are employed, weighing ~50MB. The download from here starts automatically whenever needed, so the app language can be changed seamlessly.
GitHub
GitHub - Stypox/dicio-android: Dicio assistant app for Android
Dicio assistant app for Android. Contribute to Stypox/dicio-android development by creating an account on GitHub.
β€24β‘3π3
How to run #ADB and #fastboot in #Termux without root to unlock #bootloader, run ADB commands, remove #bloatware, flash ROM, or even root another #Android
https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:
1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the appβs private storage β including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the appβs private data to be backed up via ADB β again, even on non-rooted devices.
Android, use termux-adb command instead of adb
https://github.com/nohajc/termux-adb
Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation/blob/main/resources/assets/uad_lists.json
#debloat
https://www.mobile-hacker.com/2025/06/16/how-to-run-adb-and-fastboot-on-a-non-rooted-android-smartphone-using-termux/:
1. It supports debloating of various manufacturers and mobile carriers such as LG, Samsung, Xiaomi, Huawei, Oppo, Realme, Vivo, ZTE, OnePlus, Nokia, Sony, Asus, Google, Fairphone, Motorola, Tecno, Unihertz.
2. Full access to the appβs private storage β including databases, tokens, cached credentials, config files, or even offline user data.
3. Another common issue in AndroidManifest.xml is this flag: When enabled (which it is by default unless explicitly disabled), Android allows the appβs private data to be backed up via ADB β again, even on non-rooted devices.
Android, use termux-adb command instead of adb
https://github.com/nohajc/termux-adb
Android debloater for pc and debloat lists
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation/blob/main/resources/assets/uad_lists.json
#debloat
Mobile Hacker
How to Run ADB and Fastboot on a Non-Rooted Android Smartphone Using Termux
Thanks to Termux and the clever termux-adb project, you can run ADB and Fastboot directly from your phone β no computer needed. This guide breaks down how to install it, how it works, and practical use cases.
β€16π₯8π€4π1
Universal Android Debloater Next Generation
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
This is a detached fork of the UAD project, which aims to improve privacy and battery performance by removing unnecessary and obscure system apps. This can also contribute to improving security by reducing (but not eliminating) the attack surface. Read the wiki for more details on getting started. Whilst UAD-ng can remove system apps, it cannot detect or remove potentially malicious system services or drivers baked into the firmware of your device by various vendors; some vendor-specific apps are only UI front-ends to vendor-provided system services, and as such disabling/uninstalling those apps will not stop a service from running. Additional information can be found in package descriptions inside the Universal Android Debloater Next Generation application.
#Android #debloat #UADNG
https://github.com/Universal-Debloater-Alliance/universal-android-debloater-next-generation
This is a detached fork of the UAD project, which aims to improve privacy and battery performance by removing unnecessary and obscure system apps. This can also contribute to improving security by reducing (but not eliminating) the attack surface. Read the wiki for more details on getting started. Whilst UAD-ng can remove system apps, it cannot detect or remove potentially malicious system services or drivers baked into the firmware of your device by various vendors; some vendor-specific apps are only UI front-ends to vendor-provided system services, and as such disabling/uninstalling those apps will not stop a service from running. Additional information can be found in package descriptions inside the Universal Android Debloater Next Generation application.
#Android #debloat #UADNG
GitHub
GitHub - Universal-Debloater-Alliance/universal-android-debloater-next-generation: Cross-platform GUI written in Rust using ADBβ¦
Cross-platform GUI written in Rust using ADB to debloat non-rooted Android devices. Improve your privacy, the security and battery life of your device. - Universal-Debloater-Alliance/universal-andr...
π₯20β€4π3π3π€£1