🚧 Work in Progress
This content is currently being updated and improved. Please check back later for the complete version.
This page is for “Android Phones”
Commentary
Over the years, I have used various Android phones including Google Pixel series (4a, 6a, 9a, 10 Pro), Samsung Galaxy S10e, Motorola Moto G series, and Google Nexus 4. This page covers general Android phone usage, applications, and tips that apply across different Android devices and manufacturers.
Technical Specs
Operating System: Android (various versions)
Display: Various sizes and types (LCD, OLED, AMOLED)
Processor: Various chipsets (Snapdragon, Exynos, Tensor, MediaTek)
Theft Detection Lock: Automatic lock when theft is detected
Enhanced App Isolation: Improved sandboxing
Advanced Biometric Security: Enhanced fingerprint and face unlock
Network Security: Enhanced VPN and network protection
⚠️ Important Caveat: Advanced security features may block non-Google Play Store apps. This means apps from F-Droid like GadgetBridge, alternative app stores, and sideloaded applications may not function properly or may be blocked entirely.
GrapheneOS - Hardened Android
GrapheneOS is a privacy and security-focused Android distribution that provides significant hardening over stock Android:
Enhanced Privacy: Removes Google services and tracking
Security Hardening: Additional security features and patches
Sandboxed Google Play: Optional Google services in isolated environment
Verified Boot: Enhanced boot security and integrity checking
Network Security: Advanced firewall and network isolation
App Isolation: Improved app sandboxing and permission controls
Note: GrapheneOS requires compatible devices and may have limited app compatibility due to its security-focused approach.
Specific Use Cases
Call Recording
CubeACR - Automated call recording with advanced features
⚠️ Caution: Newer Android versions require helper apps or accessibility services which can be risky as they have broad system access
Consider privacy implications and legal requirements in your jurisdiction
Two-Factor Authentication
Aegis Authenticator - Open-source 2FA authenticator with backup/export features
FreeOTP - Simple, open-source TOTP authenticator
App Management
Bouncer - Grant temporary permissions to apps, automatically revoking them after use
Solid Explorer - Advanced file manager with cloud storage support and encryption
Device Integration
KDE Connect - Connect Android device with Linux desktop for file sharing, notifications, and remote control
Tips and Tricks
Enable Developer Options for advanced features
Use ADB for debugging and file transfer
Set up Google Assistant for voice commands
Use Google Photos for automatic backup
Enable Find My Device for location tracking
Use split-screen for multitasking
Customize home screen with widgets
Regularly review app permissions and remove unused apps
Use VPN for public WiFi connections
Enable automatic security updates
Reference Material
Security Articles
Security Issues in Android Custom ROMs
This comprehensive paper examines security misconfigurations in Android custom ROMs that could lead to device compromise. It covers various attack vectors including USB debugging vulnerabilities, ADB shell root access, system partition permissions, and custom recovery security issues. The paper provides detailed analysis of how these misconfigurations can be exploited and offers protection recommendations for both general users and ROM developers. This is essential reading for anyone considering custom ROMs or working with rooted Android devices.
This article explores the world of NFC (Near Field Communication) technology, particularly focusing on NFC visiting cards and their security implications. It discusses the recent trend of NFC business cards, their functionality, and potential security concerns. The piece provides practical insights into NFC technology, including how these cards work, their limitations, and security considerations for users who might be considering adopting this technology for business or personal use.