Android Phone

🚧 Work in Progress
This content is currently being updated and improved. Please check back later for the complete version.

This page is for “Android Phones”

Commentary

Over the years, I have used various Android phones including Google Pixel series (4a, 6a, 9a, 10 Pro), Samsung Galaxy S10e, Motorola Moto G series, and Google Nexus 4. This page covers general Android phone usage, applications, and tips that apply across different Android devices and manufacturers.

Technical Specs

Useful Applications

Productivity

Development

Security & Privacy

Security

Basic Security Settings

Essential Security Measures

Android 15+ Advanced Security

⚠️ Important Caveat: Advanced security features may block non-Google Play Store apps. This means apps from F-Droid like GadgetBridge, alternative app stores, and sideloaded applications may not function properly or may be blocked entirely.

GrapheneOS - Hardened Android

GrapheneOS is a privacy and security-focused Android distribution that provides significant hardening over stock Android:

Note: GrapheneOS requires compatible devices and may have limited app compatibility due to its security-focused approach.

Specific Use Cases

Call Recording

Two-Factor Authentication

App Management

Device Integration

Tips and Tricks

Reference Material

Security Articles

Security Issues in Android Custom ROMs

This comprehensive paper examines security misconfigurations in Android custom ROMs that could lead to device compromise. It covers various attack vectors including USB debugging vulnerabilities, ADB shell root access, system partition permissions, and custom recovery security issues. The paper provides detailed analysis of how these misconfigurations can be exploited and offers protection recommendations for both general users and ROM developers. This is essential reading for anyone considering custom ROMs or working with rooted Android devices.

Security Issues in Android Custom ROMs

Playing with NFC Cards

This article explores the world of NFC (Near Field Communication) technology, particularly focusing on NFC visiting cards and their security implications. It discusses the recent trend of NFC business cards, their functionality, and potential security concerns. The piece provides practical insights into NFC technology, including how these cards work, their limitations, and security considerations for users who might be considering adopting this technology for business or personal use.

Playing with NFC Cards