Mishaal's Android News Feed
13.2K subscribers
2.2K photos
100 videos
8 files
1.94K links
Android news from an Android nerd
Download Telegram
Samsung is starting to roll out the stable release of One UI 6.0 (based on Android 14) to the Galaxy S23 series, as reported by Sam Mobile.

With Android 14 now reaching Samsung's flagships, we should start seeing a noticeable uptick in the number of users on the latest Android OS release.
πŸ”₯55πŸ₯±13❀6😱6πŸ‘3πŸ₯°1
Porsche has announced that it's integrating Android Automotive with Google Automotive Services into its future infotainment systems. Production of this updated infotainment system will start "in the middle of the decade".

"This integration of the Google ecosystem will include Google Maps, Google Assistant, and a wide variety of apps available through the Google Play Store."

Porsche says that the UI of its Porsche Communication Management (PCM) system will remain familiar to existing customers, and that in the future, "ecosystems from different providers that are relevant for customers will be integrated directly into the vehicle via standardized interfaces and platforms."
πŸ‘60❀9🀑4πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Google has provided an update on the status of RISC-V support in Android.

- Work on a fully optimized backend for the Android Runtime (ART) is still a work in progress

- AOSP, external projects, and compilers haven't generated fully optimized, reduced code that also takes advantage of the latest ratified extensions, such as the one for vectors.

- Later this year, Google expects to have the NDK ABI finalized and canary builds made available on Android's public CI soon, as well as RISC-V on x86-64 & ARM64 available for easier testing of riscv64 Android apps on a host machine.

- By 2024, the plan is to have emulators available publicly with a full feature set to test apps for various device form factors. Wearables are expected to be the first form factor available (see: Google and Qualcomm's recent announcement).

- Google is working with the community and the RISC-V Software Ecosystem (RISE) Project to provide a way to accelerate the availability of software for high-performance and power-efficient RISC-V processor cores running high-level operating systems. Google is also continuing to invest in RISC-V International.

If you're interested in contributing, you can go to the android-riscv64 GitHub project to discuss, submit issues, and stay up-to-date on the current progress. You can also subscribe to the RISC-V Android SIG mailing list. Finally, you can also build, test, and run an Android RISC-V image as a CVD. Just select the aosp_cf_riscv64_phone-userdebug target in the lunch menu.
πŸ‘45πŸ€”9❀4πŸ”₯3
Google has once again updated the Android version distribution statistics shown to developers in Android Studio to reflect data up to October 1, 2023.

Here's how the % of (GMS Android) devices has changed since May 30, 2023 when the stats were last publicly updated.

- Android 13: 15% -> 22.4%
- Android 12: 16.3% -> 15.8%
- Android 11: 23.1% -> 21.6%
- Android 10: 17.8% -> 16.1%
- Android 9: 11.9% -> 10.5%
- Android 8.1: 6.1% -> 5.4%
- Android 8: 2.2% -> 1.9%
- Android 7.1: 1.5% -> 1.3%
- Android 7: 1.5% -> 1.3%
- Android 6: 2.3% -> 1.9%
- Android 5.1: 1.5% -> 1.2%
- Android 5: 0.3% -> 0.2%
- Android 4.4: 0.5% -> 0.4%

Android 13 leaps from 15% to 22.4% of all devices. The Android OS version with the second highest install base is now Android 11 at 21.6% followed by Android 10 at 16.1%. Android 12 is installed on 15.8% of all devices.

The % of devices running an Android OS version that Google actively supports through security patch backports (ie. Android 11+) is 59.8%, up from 54.4%.

H/T GizChina
πŸ‘89❀14πŸ‘Ž3
The Pixel's car crash detection feature is now available in 5 new countries, including Austria, Belgium, India, Portugal, and Switzerland.

Google updated its support page to include these countries sometime this month, and several users from India told me they're now able to turn this feature on.

Thanks to Yuval for the tip!
πŸ‘79❀15πŸ™5πŸ”₯4πŸ€”2
Android is preparing to add better support for Apple pkpass files. PKPass is a file type that holds pass data that can be imported into Apple Wallet.

Android currently maps the .pkpass and .pkpasses file extensions to the application/octet-stream MIME type. A MIME type is a string that consists of a "type/subtype" representing the kind of data contained within the file. Mapping .pkpass and .pkpasses to application/octet-stream means they're treated as generic binary data.

Soon, though, Android may map these file extensions to application/vnd.apple.pkpass and application/vnd.apple.pkpasses respectively, which would allow Apple Wallet PKPass files to be resolved correctly.

What does this actually mean for Android, though? Well, it doesn't mean that apps like Google Wallet will all of a sudden be able to import .pkpass files, nor does it mean that apps couldn't already recognize or parse .pkpass files already. For example, the Pass2Pay app already lets you import .pkpass files.

What this does mean is that it'll be easier for apps to set up a handler for .pkpass files. Pass2Pay, for example, uses some messy regex in its Manifest to handle .pkpass files. Hopefully Google Wallet adds .pkpass import support soon, especially now that it just added generic pass photo import.
πŸ‘62πŸ—Ώ4
This media is not supported in your browser
VIEW IN TELEGRAM
The latest loophole that third-party file manager apps were using to get access to files and folders under /Android/data and /Android/obb has been patched.

As part of Android 11's Scoped Storage restrictions, apps that use the Storage Access Framework (SAF) to launch the documents picker are not supposed to be able to get access to files and folders under the /Android/data or /Android/obb directories.

However, third-party file managers figured out that if they set the initial directory when launching the documents picker to either /Android/data or /Android/obb, the documents picker lets the user grant the app full access to directories. This loophole was patched in Android 13, but then another loophole was discovered that got around this.

Since Android 13 only blocked apps from setting /Android/data or /Android/obb as the initial directory when launching the documents picker, it was quickly discovered that you could set the initial directory to one of the subdirectories under /Android/data or /Android/obb, thus the user could grant access to individual subdirectories one-by-one.

However, this latest loophole was patched with a recent Google Play System Update. The latest version of the DocumentsUI app, the Project Mainline module that comprises the documents picker, now restricts the initial location for the ACTION_OPEN_DOCUMENT/_TREE intent so that apps cannot request the initial location to be one of /Android/data, /Android/sandbox, /Android/obb, or one of their subdirectories.

If the DocumentsUI app (AKA 'Files' app) on your device is on version 14-10492947 (version code 340916000), then this loophole is patched.

β€”-

If you still want to read/write files under /Android/data or /Android/obb, there are no restrictions if you connect your phone to a PC or use ADB shell commands.

The AOSP Files app also lets you browse files in those directories, though you're limited in how much you can modify.
πŸ‘Ž97πŸ‘38πŸ’”8😁2🀑2
scrcpy just keeps getting better and better. Version 2.2 was just released with support for camera mirroring. This lets you mirror the device camera instead of the device screen.

I tried it out, and it worked pretty well at 1080p even when connected wirelessly.
❀92πŸ‘14πŸ‘7❀‍πŸ”₯6πŸ”₯6
Google has announced that the new Telecom Jetpack library is now in alpha. This library is aimed at voice and/or video calling apps and provides a variety of features, including:

* Platform synchronization: Makes the platform "aware" of your VoIP call so that other surfaces (like watches) can show information like who the caller is as well as actions to answer, decline, hang up, or mute your call. Also, if other calls such as a PTSN/SIM-based call comes through, you can give the user a chance to hold the call they're currently on.

* Dedicated foreground support. Android 14 requires apps to specify foreground service types. The Jetpack Telecom library takes care of that requirement for you.

* Audio routing: The Telecom library can list all available endpoints to your app for streaming audio to/from, so you don't have to use the audio manager API to track state, focus, and obtain a list of audio devices yourself.

* Backwards compatibility: This library works on devices that support Android's Telecom stack (PackageManager.FEATURE_TELECOM) running Android 8.0 Oreo or later.

Coming soon:

* Expanded support for VoIP Call actions: Being able to locally mute the VoIP app for the specific call and display the name of the speaker on another surface like Android Auto.

* Transfer VoIP calls: Users will be able to transfer ongoing VoIP calls between their phones and tablets.

Version 1.0.0-alpha01 was released on May 10 at Google I/O 2023, but alpha02 was released on October 4.
πŸ‘58❀11πŸ‘2πŸ€”1πŸ‘€1
Here are the most important Google System updates that rolled out in October 2023.

* "[Phone] Support to connect your watch to multiple phones seamlessly" (available with Google Play Services v23.39+). It's not exactly clear what this means.

* "[Phone] Content received over Nearby Share is stored in a new location" (available with Google Play Services v23.40+). Files you receive via Nearby Share are now saved in the "Nearby Share" folder under "Download" rather than the "Download" folder itself.


* "[Phone] Nearby Share is disabled in work profiles" (available with Google Play Services 23.41+). Some have speculated that this was done to mitigate theft (intentional or not) of corporate data, but I heard this was disabled simply because it just didn't work properly and there isn't enough bandwidth to fix the issues.

* "[Phone] You can now decide if Google Play can update an app that was installed by a different app store" (available with Google Play Store v38.2+). This may be Google Play implementing support for Android 14's update ownership API, or it might not be. Either way, this is a welcome change for users who sideload and/or install apps from alternative sources.

* "[Wear] Users can now install and set watch faces directly from the Play store listing and opt in to always automatically set watchfaces upon install" (available with Google Play Store v38.2+). This hasn't rolled out on my Pixel Watch 2 yet, so I don't have a screenshot to share.

* "[Phone] Support adding Wallet passes from images containing barcodes or QR codes" (available with Google Play Services v23.42+). Google Wallet now lets you create a pass using a photo or screenshot of a barcode or QR code. This was announced as part of the September 2023 Android Feature Drop.

(1/2)
❀31πŸ‘17
Mishaal's Android News Feed
Here are the most important Google System updates that rolled out in October 2023. * "[Phone] Support to connect your watch to multiple phones seamlessly" (available with Google Play Services v23.39+). It's not exactly clear what this means. * "[Phone] Content…
There are a couple of other minor changes, such as:

* "[Phone] New design on the app details page to help you discover and learn about apps for your non-phone devices" (available with Google Play Store v37.8+). On the Play Store listing for apps that are available on multiple form factors, you might see a chip beneath the "install" button that lets you change which form factor's screenshots are shown.

* "[Wear] Warning messages are now visible on detail pages for apps that are prone to crashes" (available with Google Play Store v38.2+). This brings a feature that is already available in the Play Store for phones over to watches.

As a reminder, the Google System Updates changelog is comprised of Google Play System Updates (ie. Project Mainline updates) plus updates to a variety of Google system apps like the Google Play Store, Google Play Services, and more recently Android WebView and Android System Intelligence.

(2/2)
πŸ‘32❀12
Mishaal's Android News Feed
After updating to Android 14, some users with a Pixel 6 and later who have multiple users or profiles set up have been unable to access any of their media storage on the primary user. Google now says they "have already pushed out a Google Play system update"…
Important: Google has followed up on this issue!

Google says that, starting in the next two weeks, they'll roll out an OTA update for impacted users that will return their devices to a working state. However, this update may not enable data to be recovered for devices that are repeatedly rebooting.

If you'd rather not wait for this update to roll out, you can sign up to test the update ahead of its release. This update may help remedy the issue without clearing your device's data. All you have to do is fill out this Google Form to receive the test update.

Several users who received the OTA update already commented on the Issue Tracker that full functionality (including secondary users) was restored after updating.

For those devices that are repeatedly rebooting, the only workaround that is currently known to recover them is to do a Factory Data Reset (FDR). This will obviously clear all your phone's data, so only do this if you've backed your data up. You can perform a FDR using your phone's buttons by following these steps.
πŸ‘52🀑7
You may have seen articles about how the Flipper Zero can be used to easily spam iOS, Windows, and Android devices with bogus Bluetooth device connection requests, which in the case of iOS 17, can crash them. Here's how to protect your Android device from these spam attacks.

Many outlets are telling users to disable Nearby Share on Android to block these spam attacks, but that's the wrong setting to disable. Instead, you need to go to Settings --> Google --> Devices & sharing --> Devices and turn off "Scan for nearby devices". Above is a graphic that shows these steps.

This is the setting that controls the Google Fast Pair Service (GFPS), or Fast Pair for short, which is Google's Bluetooth device pairing request feature these DoS attacks are spamming.

Fortunately, Fast Pair seems to have some built-in protection against this kind of attack. According to mobile-hacker, Fast Pair seems to ignore excessive pairing requests. Thus, it may not be necessary to disable this feature, so only do this if you really want to be safe.

Note: Some OEMs have their own Fast Pair-like implementations that need to be disabled separately to mitigate this kind of attack. It may not be possible to disable these without turning off Bluetooth entirely, though.
πŸ‘86πŸ”₯6❀3πŸ‘2