Telefon partner uk

Smartphone Hardening Privacy non-root Guide 2.0 (for normal people)

2020.08.18 13:23 TheAnonymouseJoker Smartphone Hardening Privacy non-root Guide 2.0 (for normal people)

I forgot to post it here, might be valuable as it debloats phones of Google and other corporation software in general. The guide is nearly fully FOSS supported, and the only non FOSS XDA app does not require internet to function.
NOTE (June) 15/06/2020: r_privacy moderator trai_dep revengefully deleted my highly gilded 1.0 guide post before.
UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. This guide is nearly FOSS supported now.
UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.
Hello! I am the founder of /privatelife . Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious.
A kind request to share this guide to any privacy seeker.

User and device requirement

  • ANY Android 9+ device
  • knowledge of how to copy-paste commands in Linux or Mac Terminal/MS-DOS Command Prompt (for ADB, it is very simple, trust me)

Why not Apple devices?

iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was discovered in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable.
17/9/2020: Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire.
Also, they recently dropped plan for encrypting iCloud backups after FBI complained. They also collect and sell data quite a lot. Siri still records conversations 9 months after Apple promised not to do it. Apple Mail app is vulnerable, yet Apple stays in denial.
Also, Apple sells certificates to third-party developers that allow them to track users, The San Ferdandino shooter publicity stunt was completely fraudulent, and Louis Rossmann dismantled Apple's PR stunt "repair program".
Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far cheaper to do than Android.

LET'S GO!!!

ALL users must follow these steps before "for nerdy users" section.
Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.
NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/
  • Make DIY camera covers, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). My rear camera cover
  • Install F-Droid app store from here
  • Install NetGuard app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS]
NOTE: NetGuard with Energized Ultimate HOSTS file with any one of the above mentioned DNS providers is the ultimate solution.
NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS
  • In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below:
  1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED
  2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
  3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135
Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu.

LIST OF APPS TO GET

  • Get Firefox Beta web browser from F-Droid (install uBlock Origin addon inside (if technically advanced, try doing this)). Also get Firefox Klar if you like a separate incognito browser.
  • Get Aurora Store from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in
  • for 3rd party APKs source them only from APKMirror OR APKPure OR APKMonk, quite trusted, BUT TRY AND AVOID IT IF POSSIBLE
  • Get Privacy Indicator from F-Droid for iOS 14 like camera/mic dot indicator feature
  • Get OSMAnd+ from F-Droid or Qwant Maps inside web browser for maps and/or print physical maps if you live and travel in one or two states or districts.
NOTE: Qwant Maps has better search results than OSMAnd+
  • Get PilferShush Jammer from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking)
  • Get OpenBoard (user friendly) OR AnySoftKeyboard (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware
  • Get FTP Server (Free) from F-Droid and FileZilla on computer for computer-to-phone internet less file sharing
NOTE: for phone-computer sync or sharing, can TRY KDE Connect, available for Android, Windows, Linux
  • Get TrebleShot instead of SHAREIt for phone to phone file sharing
  • Get K-9 Mail or FairEmail as e-mail client
  • Get NewPipe for YouTube watching, or YouTube in Firefox Preview/Klar
  • Get QKSMS from F-Droid as SMS client app
  • Get Shelter from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal)
  • Get SuperFreezZ from F-Droid to freeze any apps from running in background
  • Get Librera Pro from F-Droid for PDF reader
  • Get ImgurViewer from F-Droid for opening reddit/imguother image links without invasive tracking
  • Get InstaGrabber from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is here, thanks u/sad_plan )
  • Get GreenTooth from F-Droid to set Bluetooth to disable after you have used it
  • Get Material Files or Simple File Manager from F-Droid for file manager app
  • Get ImagePipe from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date)
  • Get Note Crypt Pro from F-Droid for encrypted note taking app
  • Get Vinyl Music Player from F-Droid for music player
  • Get VLC from F-Droid for video player

CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING

I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things.
AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us.
Now that you would have set up your phone with installing apps, now is a good time to perform this procedure.
Step 1: Install AppOpsX from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/)
Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide)
Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app.
Step 4: On computer, type commands in order:
adb devices
adb tcpip 5555
adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &
Step 5: Now open "AppOpsX" app, and:
  • disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al.
NOTE: Most apps that have text field to copy/paste text require this permission.
  • disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitostack special apps.
  • disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+)
  • disable "calendar" for every app except your calendar and email app
  • disable "read contacts", "modify contacts" and "get contacts" for every app except your "Phone", "Phone Services", "Phone/Messaging Storage", contacts and messenger apps
  • disable all "send/receive/view messages" permissions for every app except "Phone", "Phone Services", "Phone/Messaging Storage", QKSMS, contacts, dialler and messenger apps
  • disable "body sensors" and "recognise physical activity" for every app except games needing gyroscope, or any compass dependent app like camera or bubble leveling app
  • disable "camera" for every app except your camera and messenger apps
  • disable "record audio" for every app except camera, recorder, dialler and messenger apps
  • disable all "Phone" permissions for apps except your SMS app (like QKSMS) and Contacts, Dialler and call recorder apps
  • disable "change WiFi state" for every app except file sharing apps (like TrebleShot)
  • disable "display over other apps" for any third party app not from F-Droid
  • disable "read storage" and "write storage" for apps except file manager, file sharing app and messenger apps
  • enable all permissions for "Phone", "Phone Services" and "Phone/Messaging Storage" system apps, critical for cell radio calling and sending SMS
Step 6: Profit! Now you can plug off phone from computer.
NOTE: Remember to use AppOpsX everytime you install a new app outside of F-Droid store, which is done not too often by people.

FOR NERDY USERS

  • Get App Manager from Izzy's F-Droid repo (here) to inspect app's manifest, trackers, activities, receivers, services and even signatures via Exodus Privacy built-in, all without root
  • Get Warden from Izzy's F-Droid repo (here) for checking loggers (rest app is inferior to App Manager)

HOW TO USE NETGUARD

By default, all apps will be blacklisted from WiFi and mobile data access.
If not, go to Settings via 3 dot menu --> Defaults (white/blacklist) --> Toggle on "Block WiFi", "Block mobile" and "Block roaming"
Whitelist your web browsers, messengers (WhatsApp, Zoom et al), file sharing apps, download managers, "Aurora Store" app and any game if needs internet and give them WiFi and mobile data access.
Also, whitelist "Downloads" and "Download Manager" as these are system apps that allow web browsers and other apps without built-in downloader to download files. Whitelisting this will keep apps and system stable.

WHICH PHONE BRANDS ARE GOOD AND BAD? (FACTS)

Now we will need to evaluate what manufacturers are relatively safe, no appeasing, I will be blunt. I will make tier lists to help. I will give explanation for each, so read before jumping with pitchforks.
NOTE: If you have anti-Chinese political allergy, kindly read facts, or choose the other non-Chinese options listed.
Tier 1: Huawei/Honor, Asus, Nokia, Motorola, Sony, LG, FairPhone
Tier 2: Samsung, OnePlus, Oppo, Vivo, Xiaomi, Realme
Tier NOPE NOT AT ALL: Google
FairPhone: Clean software, ethical, recyclable components, good phone but bit extra price for midrange hardware. Status: good.
Huawei: (still no evidence by US government after one year of market protectionism ban, contrary to what Sinophobic US propaganda and condemned joke research papers (refer to this for why), may make you believe, all countries except US, Australia, Japan and UK are allowing them for 5G participation, there is absolutely ZERO EVIDENCE against specifically Huawei (does not count other Chinese companies), earlier ironically audited by UK GCHQ to be safe and on any of their global devices, to date there has been no telemetry found IFF you do NOT use Huawei ID account or Huawei AppGallery store (as instructed above). I have an OpenKirin rooted unlocked Honor 6X, and now a locked P30 Lite to confirm this.
If Huawei's CEO is a former PLA technician, so do plenty US companies. What does it prove?
NOTE: Real reason for this propaganda ban is USA could not monopolise 5G unlike it did 4G, and so they are playing their cards to put China out of commission. And Huawei did not steal 5G from USA, since USA does not even have a proper 5G vendor yet.
To add, for the rest of world outside China it is better to own a device from a country which has no jurisdiction over them, and you can use their phones without Huawei and Google accounts very safely. BONUS: baseband modem not associated with NSA. Also, good cameras, battery, display and performance in general. Status: good.
Asus, Sony, Motorola: their software is nearly stock, and as such quite beneficial and peace of mind assuring. Status: good.
LG: less stock-y software, still good. Good cameras. display too. Status: good.
Nokia: a bit of skepticism here with them helping spy with nexus with Russia's MTS and recently found Chinese telemetry as well, but nothing that NetGuard cannot stop by blocking domains via HOSTS from interacting with your device. Status: Potential issues, can be mitigated.
Samsung: Multiple issues with Qihoo 360 on phones with IMEI MAC sent over HTTP, Samsung Pay selling user data with no optout till now, Replicant devs discovering backdoors, Knox hardware blackbox with no idea what microcode it runs, certification from NSA even worrying, lockscreen and notification ads in OneUI, ads on Smart TVs, this all accounts to being quite shady company, but Blokada or NetGuard can mitigate it. Status: avoid for other brands if possible.
Xiaomi: They have quite a bit of telemetry in their MIUI skin, similar to Samsung. Now they have tracking in Incognito Mode in their Browser as well. Status: avoid unless you implement my guide properly.
OnePlus, Oppo, Vivo: They have considerably less telemetry and ads, better than Samsung and Xiaomi. But they will start doing the same thing as Realme which I will mention below soon. Status: potential but passable for now.
Realme: They are implementing ads into their UI, which will soon come to Oppo and Vivo phones too, a bit of an issue. This allows for telemetry and tracking concerns. Status: avoid if possible.
Google: In general an evil megacorp, Titan M security chip is self-claimed to be great on Pixels, but there is no way to verify if the microcode it contains is the same as that open sourced by Google. Having faith in Google's promise of their proprietary closed source chip being clean is like having faith in cyanide not killing a person. Moreover, they are known as:
  • NSA partner and collecting data and spy on users in googolplex capacity
  • AI used by US military for drone bombing in foreign countries based on metadata Google collects on smartphones
  • use dark patterns in their software to make users accept their TOS to spy
  • repeated lies about how their data collection works claiming anonymity
  • forcing users to use their Play Services which is spyware and scareware
  • monopolising the web and internet via AMP
  • use of non standard web browser libraries and known attempts to cripple lone standing ethical competitors like Firefox and Gecko web engine (now with Microsoft making their default Edge Chromium-based too)
TL;DR there is no summary, privacy is an indepth topic and you must take a couple of hours to go through this simple guide, as long as it looks it should clear all your concerns with smartphone privacy.
This is the best you can do without rooting or modding a phone, and it is working for me since almost a year now, personally tested and verified on my locked P30 Lite.
I have a history of rooting and modding phones, one being an Honor 6X before Huawei disabled unlocking policy, one being a Xiaomi and one being a Lenovo before that. Also, one Samsung Galaxy S2 long time ago.
Credit to w1nst0n for the Universal Android Debloater (authorised me to use his tool). Hope this guide serves as a great tool for any privacy seeker.
submitted by TheAnonymouseJoker to degoogle [link] [comments]


2020.08.08 13:24 TheAnonymouseJoker Smartphone Hardening non-root Guide 2.0 (for normal people)

NOTE (June) 15/06/2020: r_privacy moderator trai_dep revengefully deleted my highly gilded 1.0 guide post before.
UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. This guide is nearly FOSS supported now.
UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.
Hello! I am the founder of /privatelife . Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious.
A kind request to share this guide to any privacy seeker.

User and device requirement

Why not Apple devices?

iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was discovered in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable.
17/9/2020: Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire.
Also, they recently dropped plan for encrypting iCloud backups after FBI complained. They also collect and sell data quite a lot. Siri still records conversations 9 months after Apple promised not to do it. Apple Mail app is vulnerable, yet Apple stays in denial.
Also, Apple sells certificates to third-party developers that allow them to track users, The San Ferdandino shooter publicity stunt was completely fraudulent, and Louis Rossmann dismantled Apple's PR stunt "repair program".
Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far cheaper to do than Android.

LET'S GO!!!

ALL users must follow these steps before "for nerdy users" section.
Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.
NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/
  • Make DIY camera covers, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). My rear camera cover
  • Install F-Droid app store from here
  • Install NetGuard app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS]
NOTE: NetGuard with Energized Ultimate HOSTS file with any one of the above mentioned DNS providers is the ultimate solution.
NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS
  • In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below:
  1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED
  2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
  3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135
Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu.

LIST OF APPS TO GET

  • Get Firefox Beta web browser from F-Droid (install uBlock Origin addon inside (if technically advanced, try doing this)). Also get Firefox Klar if you like a separate incognito browser.
  • Get Aurora Store from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in
  • for 3rd party APKs source them only from APKMirror OR APKPure OR APKMonk, quite trusted, BUT TRY AND AVOID IT IF POSSIBLE
  • Get Privacy Indicator from F-Droid for iOS 14 like camera/mic dot indicator feature
  • Get OSMAnd+ from F-Droid or Qwant Maps inside web browser for maps and/or print physical maps if you live and travel in one or two states or districts.
NOTE: Qwant Maps has better search results than OSMAnd+
  • Get PilferShush Jammer from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking)
  • Get OpenBoard (user friendly) OR AnySoftKeyboard (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware
  • Get FTP Server (Free) from F-Droid and FileZilla on computer for computer-to-phone internet less file sharing
NOTE: for phone-computer sync or sharing, can TRY KDE Connect, available for Android, Windows, Linux
  • Get TrebleShot instead of SHAREIt for phone to phone file sharing
  • Get K-9 Mail or FairEmail as e-mail client
  • Get NewPipe for YouTube watching, or YouTube in Firefox Preview/Klar
  • Get QKSMS from F-Droid as SMS client app
  • Get Shelter from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal)
  • Get SuperFreezZ from F-Droid to freeze any apps from running in background
  • Get Librera Pro from F-Droid for PDF reader
  • Get ImgurViewer from F-Droid for opening reddit/imguother image links without invasive tracking
  • Get InstaGrabber from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is here, thanks u/sad_plan )
  • Get GreenTooth from F-Droid to set Bluetooth to disable after you have used it
  • Get Material Files or Simple File Manager from F-Droid for file manager app
  • Get ImagePipe from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date)
  • Get Note Crypt Pro from F-Droid for encrypted note taking app
  • Get Vinyl Music Player from F-Droid for music player
  • Get VLC from F-Droid for video player

CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING

I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things.
AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us.
Now that you would have set up your phone with installing apps, now is a good time to perform this procedure.
Step 1: Install AppOpsX from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/)
Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide)
Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app.
Step 4: On computer, type commands in order:
adb devices
adb tcpip 5555
adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &
Step 5: Now open "AppOpsX" app, and:
  • disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al.
NOTE: Most apps that have text field to copy/paste text require this permission.
  • disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitostack special apps.
  • disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+)
  • disable "calendar" for every app except your calendar and email app
  • disable "read contacts", "modify contacts" and "get contacts" for every app except your "Phone", "Phone Services", "Phone/Messaging Storage", contacts and messenger apps
  • disable all "send/receive/view messages" permissions for every app except "Phone", "Phone Services", "Phone/Messaging Storage", QKSMS, contacts, dialler and messenger apps
  • disable "body sensors" and "recognise physical activity" for every app except games needing gyroscope, or any compass dependent app like camera or bubble leveling app
  • disable "camera" for every app except your camera and messenger apps
  • disable "record audio" for every app except camera, recorder, dialler and messenger apps
  • disable all "Phone" permissions for apps except your SMS app (like QKSMS) and Contacts, Dialler and call recorder apps
  • disable "change WiFi state" for every app except file sharing apps (like TrebleShot)
  • disable "display over other apps" for any third party app not from F-Droid
  • disable "read storage" and "write storage" for apps except file manager, file sharing app and messenger apps
  • enable all permissions for "Phone", "Phone Services" and "Phone/Messaging Storage" system apps, critical for cell radio calling and sending SMS
Step 6: Profit! Now you can plug off phone from computer.
NOTE: Remember to use AppOpsX everytime you install a new app outside of F-Droid store, which is done not too often by people.

FOR NERDY USERS

  • Get App Manager from Izzy's F-Droid repo (here) to inspect app's manifest, trackers, activities, receivers, services and even signatures via Exodus Privacy built-in, all without root
  • Get Warden from Izzy's F-Droid repo (here) for checking loggers (rest app is inferior to App Manager)

HOW TO USE NETGUARD

By default, all apps will be blacklisted from WiFi and mobile data access.
If not, go to Settings via 3 dot menu --> Defaults (white/blacklist) --> Toggle on "Block WiFi", "Block mobile" and "Block roaming"
Whitelist your web browsers, messengers (WhatsApp, Zoom et al), file sharing apps, download managers, "Aurora Store" app and any game if needs internet and give them WiFi and mobile data access.
Also, whitelist "Downloads" and "Download Manager" as these are system apps that allow web browsers and other apps without built-in downloader to download files. Whitelisting this will keep apps and system stable.

WHICH PHONE BRANDS ARE GOOD AND BAD? (FACTS)

Now we will need to evaluate what manufacturers are relatively safe, no appeasing, I will be blunt. I will make tier lists to help. I will give explanation for each, so read before jumping with pitchforks.
NOTE: If you have anti-Chinese political allergy, kindly read facts, or choose the other non-Chinese options listed.
Tier 1: Huawei/Honor, Asus, Nokia, Motorola, Sony, LG, FairPhone
Tier 2: Samsung, OnePlus, Oppo, Vivo, Xiaomi, Realme
Tier NOPE NOT AT ALL: Google
FairPhone: Clean software, ethical, recyclable components, good phone but bit extra price for midrange hardware. Status: good.
Huawei: (still no evidence by US government after one year of market protectionism ban, contrary to what Sinophobic US propaganda and condemned joke research papers (refer to this for why), may make you believe, all countries except US, Australia, Japan and UK are allowing them for 5G participation, there is absolutely ZERO EVIDENCE against specifically Huawei (does not count other Chinese companies), earlier ironically audited by UK GCHQ to be safe and on any of their global devices, to date there has been no telemetry found IFF you do NOT use Huawei ID account or Huawei AppGallery store (as instructed above). I have an OpenKirin rooted unlocked Honor 6X, and now a locked P30 Lite to confirm this.
If Huawei's CEO is a former PLA technician, so do plenty US companies. What does it prove?
NOTE: Real reason for this propaganda ban is USA could not monopolise 5G unlike it did 4G, and so they are playing their cards to put China out of commission. And Huawei did not steal 5G from USA, since USA does not even have a proper 5G vendor yet.
To add, for the rest of world outside China it is better to own a device from a country which has no jurisdiction over them, and you can use their phones without Huawei and Google accounts very safely. BONUS: baseband modem not associated with NSA. Also, good cameras, battery, display and performance in general. Status: good.
Asus, Sony, Motorola: their software is nearly stock, and as such quite beneficial and peace of mind assuring. Status: good.
LG: less stock-y software, still good. Good cameras. display too. Status: good.
Nokia: a bit of skepticism here with them helping spy with nexus with Russia's MTS and recently found Chinese telemetry as well, but nothing that NetGuard cannot stop by blocking domains via HOSTS from interacting with your device. Status: Potential issues, can be mitigated.
Samsung: Multiple issues with Qihoo 360 on phones with IMEI MAC sent over HTTP, Samsung Pay selling user data with no optout till now, Replicant devs discovering backdoors, Knox hardware blackbox with no idea what microcode it runs, certification from NSA even worrying, lockscreen and notification ads in OneUI, ads on Smart TVs, this all accounts to being quite shady company, but Blokada or NetGuard can mitigate it. Status: avoid for other brands if possible.
Xiaomi: They have quite a bit of telemetry in their MIUI skin, similar to Samsung. Now they have tracking in Incognito Mode in their Browser as well. Status: avoid unless you implement my guide properly.
OnePlus, Oppo, Vivo: They have considerably less telemetry and ads, better than Samsung and Xiaomi. But they will start doing the same thing as Realme which I will mention below soon. Status: potential but passable for now.
Realme: They are implementing ads into their UI, which will soon come to Oppo and Vivo phones too, a bit of an issue. This allows for telemetry and tracking concerns. Status: avoid if possible.
Google: In general an evil megacorp, Titan M security chip is self-claimed to be great on Pixels, but there is no way to verify if the microcode it contains is the same as that open sourced by Google. Having faith in Google's promise of their proprietary closed source chip being clean is like having faith in cyanide not killing a person. Moreover, they are known as:
  • NSA partner and collecting data and spy on users in googolplex capacity
  • AI used by US military for drone bombing in foreign countries based on metadata Google collects on smartphones
  • use dark patterns in their software to make users accept their TOS to spy
  • repeated lies about how their data collection works claiming anonymity
  • forcing users to use their Play Services which is spyware and scareware
  • monopolising the web and internet via AMP
  • use of non standard web browser libraries and known attempts to cripple lone standing ethical competitors like Firefox and Gecko web engine (now with Microsoft making their default Edge Chromium-based too)
TL;DR there is no summary, privacy is an indepth topic and you must take a couple of hours to go through this simple guide, as long as it looks it should clear all your concerns with smartphone privacy.
This is the best you can do without rooting or modding a phone, and it is working for me since almost a year now, personally tested and verified on my locked P30 Lite.
I have a history of rooting and modding phones, one being an Honor 6X before Huawei disabled unlocking policy, one being a Xiaomi and one being a Lenovo before that. Also, one Samsung Galaxy S2 long time ago.
Credit to w1nst0n for the Universal Android Debloater (authorised me to use his tool). Hope this guide serves as a great tool for any privacy seeker.
submitted by TheAnonymouseJoker to opensource [link] [comments]


2020.08.08 13:22 TheAnonymouseJoker Smartphone Hardening non-root Guide 2.0 (for normal people)

NOTE (June) 15/06/2020: r_privacy moderator trai_dep revengefully deleted my highly gilded 1.0 guide post before.
UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. This guide is nearly FOSS supported now.
UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.
Hello! I am the founder of /privatelife . Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious.
A kind request to share this guide to any privacy seeker.

User and device requirement

Why not Apple devices?

iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was discovered in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable.
17/9/2020: Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire.
Also, they recently dropped plan for encrypting iCloud backups after FBI complained. They also collect and sell data quite a lot. Siri still records conversations 9 months after Apple promised not to do it. Apple Mail app is vulnerable, yet Apple stays in denial.
Also, Apple sells certificates to third-party developers that allow them to track users, The San Ferdandino shooter publicity stunt was completely fraudulent, and Louis Rossmann dismantled Apple's PR stunt "repair program".
Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far cheaper to do than Android.

LET'S GO!!!

ALL users must follow these steps before "for nerdy users" section.
Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.
NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/
  • Make DIY camera covers, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). My rear camera cover
  • Install F-Droid app store from here
  • Install NetGuard app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS]
NOTE: NetGuard with Energized Ultimate HOSTS file with any one of the above mentioned DNS providers is the ultimate solution.
NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS
  • In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below:
  1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED
  2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
  3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135
Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu.

LIST OF APPS TO GET

  • Get Firefox Beta web browser from F-Droid (install uBlock Origin addon inside (if technically advanced, try doing this)). Also get Firefox Klar if you like a separate incognito browser.
  • Get Aurora Store from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in
  • for 3rd party APKs source them only from APKMirror OR APKPure OR APKMonk, quite trusted, BUT TRY AND AVOID IT IF POSSIBLE
  • Get Privacy Indicator from F-Droid for iOS 14 like camera/mic dot indicator feature
  • Get OSMAnd+ from F-Droid or Qwant Maps inside web browser for maps and/or print physical maps if you live and travel in one or two states or districts.
NOTE: Qwant Maps has better search results than OSMAnd+
  • Get PilferShush Jammer from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking)
  • Get OpenBoard (user friendly) OR AnySoftKeyboard (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware
  • Get FTP Server (Free) from F-Droid and FileZilla on computer for computer-to-phone internet less file sharing
NOTE: for phone-computer sync or sharing, can TRY KDE Connect, available for Android, Windows, Linux
  • Get TrebleShot instead of SHAREIt for phone to phone file sharing
  • Get K-9 Mail or FairEmail as e-mail client
  • Get NewPipe for YouTube watching, or YouTube in Firefox Preview/Klar
  • Get QKSMS from F-Droid as SMS client app
  • Get Shelter from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal)
  • Get SuperFreezZ from F-Droid to freeze any apps from running in background
  • Get Librera Pro from F-Droid for PDF reader
  • Get ImgurViewer from F-Droid for opening reddit/imguother image links without invasive tracking
  • Get InstaGrabber from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is here, thanks u/sad_plan )
  • Get GreenTooth from F-Droid to set Bluetooth to disable after you have used it
  • Get Material Files or Simple File Manager from F-Droid for file manager app
  • Get ImagePipe from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date)
  • Get Note Crypt Pro from F-Droid for encrypted note taking app
  • Get Vinyl Music Player from F-Droid for music player
  • Get VLC from F-Droid for video player

CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING

I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things.
AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us.
Now that you would have set up your phone with installing apps, now is a good time to perform this procedure.
Step 1: Install AppOpsX from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/)
Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide)
Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app.
Step 4: On computer, type commands in order:
adb devices
adb tcpip 5555
adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &
Step 5: Now open "AppOpsX" app, and:
  • disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al.
NOTE: Most apps that have text field to copy/paste text require this permission.
  • disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitostack special apps.
  • disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+)
  • disable "calendar" for every app except your calendar and email app
  • disable "read contacts", "modify contacts" and "get contacts" for every app except your "Phone", "Phone Services", "Phone/Messaging Storage", contacts and messenger apps
  • disable all "send/receive/view messages" permissions for every app except "Phone", "Phone Services", "Phone/Messaging Storage", QKSMS, contacts, dialler and messenger apps
  • disable "body sensors" and "recognise physical activity" for every app except games needing gyroscope, or any compass dependent app like camera or bubble leveling app
  • disable "camera" for every app except your camera and messenger apps
  • disable "record audio" for every app except camera, recorder, dialler and messenger apps
  • disable all "Phone" permissions for apps except your SMS app (like QKSMS) and Contacts, Dialler and call recorder apps
  • disable "change WiFi state" for every app except file sharing apps (like TrebleShot)
  • disable "display over other apps" for any third party app not from F-Droid
  • disable "read storage" and "write storage" for apps except file manager, file sharing app and messenger apps
  • enable all permissions for "Phone", "Phone Services" and "Phone/Messaging Storage" system apps, critical for cell radio calling and sending SMS
Step 6: Profit! Now you can plug off phone from computer.
NOTE: Remember to use AppOpsX everytime you install a new app outside of F-Droid store, which is done not too often by people.

FOR NERDY USERS

  • Get App Manager from Izzy's F-Droid repo (here) to inspect app's manifest, trackers, activities, receivers, services and even signatures via Exodus Privacy built-in, all without root
  • Get Warden from Izzy's F-Droid repo (here) for checking loggers (rest app is inferior to App Manager)

HOW TO USE NETGUARD

By default, all apps will be blacklisted from WiFi and mobile data access.
If not, go to Settings via 3 dot menu --> Defaults (white/blacklist) --> Toggle on "Block WiFi", "Block mobile" and "Block roaming"
Whitelist your web browsers, messengers (WhatsApp, Zoom et al), file sharing apps, download managers, "Aurora Store" app and any game if needs internet and give them WiFi and mobile data access.
Also, whitelist "Downloads" and "Download Manager" as these are system apps that allow web browsers and other apps without built-in downloader to download files. Whitelisting this will keep apps and system stable.

WHICH PHONE BRANDS ARE GOOD AND BAD? (FACTS)

Now we will need to evaluate what manufacturers are relatively safe, no appeasing, I will be blunt. I will make tier lists to help. I will give explanation for each, so read before jumping with pitchforks.
NOTE: If you have anti-Chinese political allergy, kindly read facts, or choose the other non-Chinese options listed.
Tier 1: Huawei/Honor, Asus, Nokia, Motorola, Sony, LG, FairPhone
Tier 2: Samsung, OnePlus, Oppo, Vivo, Xiaomi, Realme
Tier NOPE NOT AT ALL: Google
FairPhone: Clean software, ethical, recyclable components, good phone but bit extra price for midrange hardware. Status: good.
Huawei: (still no evidence by US government after one year of market protectionism ban, contrary to what Sinophobic US propaganda and condemned joke research papers (refer to this for why), may make you believe, all countries except US, Australia, Japan and UK are allowing them for 5G participation, there is absolutely ZERO EVIDENCE against specifically Huawei (does not count other Chinese companies), earlier ironically audited by UK GCHQ to be safe and on any of their global devices, to date there has been no telemetry found IFF you do NOT use Huawei ID account or Huawei AppGallery store (as instructed above). I have an OpenKirin rooted unlocked Honor 6X, and now a locked P30 Lite to confirm this.
If Huawei's CEO is a former PLA technician, so do plenty US companies. What does it prove?
NOTE: Real reason for this propaganda ban is USA could not monopolise 5G unlike it did 4G, and so they are playing their cards to put China out of commission. And Huawei did not steal 5G from USA, since USA does not even have a proper 5G vendor yet.
To add, for the rest of world outside China it is better to own a device from a country which has no jurisdiction over them, and you can use their phones without Huawei and Google accounts very safely. BONUS: baseband modem not associated with NSA. Also, good cameras, battery, display and performance in general. Status: good.
Asus, Sony, Motorola: their software is nearly stock, and as such quite beneficial and peace of mind assuring. Status: good.
LG: less stock-y software, still good. Good cameras. display too. Status: good.
Nokia: a bit of skepticism here with them helping spy with nexus with Russia's MTS and recently found Chinese telemetry as well, but nothing that NetGuard cannot stop by blocking domains via HOSTS from interacting with your device. Status: Potential issues, can be mitigated.
Samsung: Multiple issues with Qihoo 360 on phones with IMEI MAC sent over HTTP, Samsung Pay selling user data with no optout till now, Replicant devs discovering backdoors, Knox hardware blackbox with no idea what microcode it runs, certification from NSA even worrying, lockscreen and notification ads in OneUI, ads on Smart TVs, this all accounts to being quite shady company, but Blokada or NetGuard can mitigate it. Status: avoid for other brands if possible.
Xiaomi: They have quite a bit of telemetry in their MIUI skin, similar to Samsung. Now they have tracking in Incognito Mode in their Browser as well. Status: avoid unless you implement my guide properly.
OnePlus, Oppo, Vivo: They have considerably less telemetry and ads, better than Samsung and Xiaomi. But they will start doing the same thing as Realme which I will mention below soon. Status: potential but passable for now.
Realme: They are implementing ads into their UI, which will soon come to Oppo and Vivo phones too, a bit of an issue. This allows for telemetry and tracking concerns. Status: avoid if possible.
Google: In general an evil megacorp, Titan M security chip is self-claimed to be great on Pixels, but there is no way to verify if the microcode it contains is the same as that open sourced by Google. Having faith in Google's promise of their proprietary closed source chip being clean is like having faith in cyanide not killing a person. Moreover, they are known as:
  • NSA partner and collecting data and spy on users in googolplex capacity
  • AI used by US military for drone bombing in foreign countries based on metadata Google collects on smartphones
  • use dark patterns in their software to make users accept their TOS to spy
  • repeated lies about how their data collection works claiming anonymity
  • forcing users to use their Play Services which is spyware and scareware
  • monopolising the web and internet via AMP
  • use of non standard web browser libraries and known attempts to cripple lone standing ethical competitors like Firefox and Gecko web engine (now with Microsoft making their default Edge Chromium-based too)
TL;DR there is no summary, privacy is an indepth topic and you must take a couple of hours to go through this simple guide, as long as it looks it should clear all your concerns with smartphone privacy.
This is the best you can do without rooting or modding a phone, and it is working for me since almost a year now, personally tested and verified on my locked P30 Lite.
I have a history of rooting and modding phones, one being an Honor 6X before Huawei disabled unlocking policy, one being a Xiaomi and one being a Lenovo before that. Also, one Samsung Galaxy S2 long time ago.
Credit to w1nst0n for the Universal Android Debloater (authorised me to use his tool). Hope this guide serves as a great tool for any privacy seeker.
submitted by TheAnonymouseJoker to fossdroid [link] [comments]


2020.08.08 13:19 TheAnonymouseJoker Smartphone Hardening non-root Guide 2.0 (for normal people)

NOTE (June) 15/06/2020: r_privacy moderator trai_dep revengefully deleted my highly gilded 1.0 guide post before.
UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. This guide is nearly FOSS supported now.
UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.
Hello! Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious.
A kind request to share this guide to any privacy seeker.

User and device requirement

Why not Apple devices?

iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was discovered in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable.
17/9/2020: Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire.
Also, they recently dropped plan for encrypting iCloud backups after FBI complained. They also collect and sell data quite a lot. Siri still records conversations 9 months after Apple promised not to do it. Apple Mail app is vulnerable, yet Apple stays in denial.
Also, Apple sells certificates to third-party developers that allow them to track users, The San Ferdandino shooter publicity stunt was completely fraudulent, and Louis Rossmann dismantled Apple's PR stunt "repair program".
Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far cheaper to do than Android.

LET'S GO!!!

ALL users must follow these steps before "for nerdy users" section.
Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.
NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/
  • Make DIY camera covers, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). My rear camera cover
  • Install F-Droid app store from here
  • Install NetGuard app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS]
NOTE: NetGuard with Energized Ultimate HOSTS file with any one of the above mentioned DNS providers is the ultimate solution.
NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS
  • In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below:
  1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED
  2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
  3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135
Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu.

LIST OF APPS TO GET

  • Get Firefox Beta web browser from F-Droid (install uBlock Origin addon inside (if technically advanced, try doing this)). Also get Firefox Klar if you like a separate incognito browser.
  • Get Aurora Store from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in
  • for 3rd party APKs source them only from APKMirror OR APKPure OR APKMonk, quite trusted, BUT TRY AND AVOID IT IF POSSIBLE
  • Get Privacy Indicator from F-Droid for iOS 14 like camera/mic dot indicator feature
  • Get OSMAnd+ from F-Droid or Qwant Maps inside web browser for maps and/or print physical maps if you live and travel in one or two states or districts.
NOTE: Qwant Maps has better search results than OSMAnd+
  • Get PilferShush Jammer from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking)
  • Get OpenBoard (user friendly) OR AnySoftKeyboard (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware
  • Get FTP Server (Free) from F-Droid and FileZilla on computer for computer-to-phone internet less file sharing
NOTE: for phone-computer sync or sharing, can TRY KDE Connect, available for Android, Windows, Linux
  • Get TrebleShot instead of SHAREIt for phone to phone file sharing
  • Get K-9 Mail or FairEmail as e-mail client
  • Get NewPipe for YouTube watching, or YouTube in Firefox Preview/Klar
  • Get QKSMS from F-Droid as SMS client app
  • Get Shelter from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal)
  • Get SuperFreezZ from F-Droid to freeze any apps from running in background
  • Get Librera Pro from F-Droid for PDF reader
  • Get ImgurViewer from F-Droid for opening reddit/imguother image links without invasive tracking
  • Get InstaGrabber from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is here, thanks u/sad_plan )
  • Get GreenTooth from F-Droid to set Bluetooth to disable after you have used it
  • Get Material Files or Simple File Manager from F-Droid for file manager app
  • Get ImagePipe from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date)
  • Get Note Crypt Pro from F-Droid for encrypted note taking app
  • Get Vinyl Music Player from F-Droid for music player
  • Get VLC from F-Droid for video player

CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING

I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things.
AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us.
Now that you would have set up your phone with installing apps, now is a good time to perform this procedure.
Step 1: Install AppOpsX from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/)
Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide)
Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app.
Step 4: On computer, type commands in order:
adb devices
adb tcpip 5555
adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &
Step 5: Now open "AppOpsX" app, and:
  • disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al.
NOTE: Most apps that have text field to copy/paste text require this permission.
  • disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitostack special apps.
  • disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+)
  • disable "calendar" for every app except your calendar and email app
  • disable "read contacts", "modify contacts" and "get contacts" for every app except your "Phone", "Phone Services", "Phone/Messaging Storage", contacts and messenger apps
  • disable all "send/receive/view messages" permissions for every app except "Phone", "Phone Services", "Phone/Messaging Storage", QKSMS, contacts, dialler and messenger apps
  • disable "body sensors" and "recognise physical activity" for every app except games needing gyroscope, or any compass dependent app like camera or bubble leveling app
  • disable "camera" for every app except your camera and messenger apps
  • disable "record audio" for every app except camera, recorder, dialler and messenger apps
  • disable all "Phone" permissions for apps except your SMS app (like QKSMS) and Contacts, Dialler and call recorder apps
  • disable "change WiFi state" for every app except file sharing apps (like TrebleShot)
  • disable "display over other apps" for any third party app not from F-Droid
  • disable "read storage" and "write storage" for apps except file manager, file sharing app and messenger apps
  • enable all permissions for "Phone", "Phone Services" and "Phone/Messaging Storage" system apps, critical for cell radio calling and sending SMS
Step 6: Profit! Now you can plug off phone from computer.
NOTE: Remember to use AppOpsX everytime you install a new app outside of F-Droid store, which is done not too often by people.

FOR NERDY USERS

  • Get App Manager from Izzy's F-Droid repo (here) to inspect app's manifest, trackers, activities, receivers, services and even signatures via Exodus Privacy built-in, all without root
  • Get Warden from Izzy's F-Droid repo (here) for checking loggers (rest app is inferior to App Manager)

HOW TO USE NETGUARD

By default, all apps will be blacklisted from WiFi and mobile data access.
If not, go to Settings via 3 dot menu --> Defaults (white/blacklist) --> Toggle on "Block WiFi", "Block mobile" and "Block roaming"
Whitelist your web browsers, messengers (WhatsApp, Zoom et al), file sharing apps, download managers, "Aurora Store" app and any game if needs internet and give them WiFi and mobile data access.
Also, whitelist "Downloads" and "Download Manager" as these are system apps that allow web browsers and other apps without built-in downloader to download files. Whitelisting this will keep apps and system stable.

WHICH PHONE BRANDS ARE GOOD AND BAD? (FACTS)

Now we will need to evaluate what manufacturers are relatively safe, no appeasing, I will be blunt. I will make tier lists to help. I will give explanation for each, so read before jumping with pitchforks.
NOTE: If you have anti-Chinese political allergy, kindly read facts, or choose the other non-Chinese options listed.
Tier 1: Huawei/Honor, Asus, Nokia, Motorola, Sony, LG, FairPhone
Tier 2: Samsung, OnePlus, Oppo, Vivo, Xiaomi, Realme
Tier NOPE NOT AT ALL: Google
FairPhone: Clean software, ethical, recyclable components, good phone but bit extra price for midrange hardware. Status: good.
Huawei: (still no evidence by US government after one year of market protectionism ban, contrary to what Sinophobic US propaganda and condemned joke research papers (refer to this for why), may make you believe, all countries except US, Australia, Japan and UK are allowing them for 5G participation, there is absolutely ZERO EVIDENCE against specifically Huawei (does not count other Chinese companies), earlier ironically audited by UK GCHQ to be safe and on any of their global devices, to date there has been no telemetry found IFF you do NOT use Huawei ID account or Huawei AppGallery store (as instructed above). I have an OpenKirin rooted unlocked Honor 6X, and now a locked P30 Lite to confirm this.
If Huawei's CEO is a former PLA technician, so do plenty US companies. What does it prove?
NOTE: Real reason for this propaganda ban is USA could not monopolise 5G unlike it did 4G, and so they are playing their cards to put China out of commission. And Huawei did not steal 5G from USA, since USA does not even have a proper 5G vendor yet.
To add, for the rest of world outside China it is better to own a device from a country which has no jurisdiction over them, and you can use their phones without Huawei and Google accounts very safely. BONUS: baseband modem not associated with NSA. Also, good cameras, battery, display and performance in general. Status: good.
Asus, Sony, Motorola: their software is nearly stock, and as such quite beneficial and peace of mind assuring. Status: good.
LG: less stock-y software, still good. Good cameras. display too. Status: good.
Nokia: a bit of skepticism here with them helping spy with nexus with Russia's MTS and recently found Chinese telemetry as well, but nothing that NetGuard cannot stop by blocking domains via HOSTS from interacting with your device. Status: Potential issues, can be mitigated.
Samsung: Multiple issues with Qihoo 360 on phones with IMEI MAC sent over HTTP, Samsung Pay selling user data with no optout till now, Replicant devs discovering backdoors, Knox hardware blackbox with no idea what microcode it runs, certification from NSA even worrying, lockscreen and notification ads in OneUI, ads on Smart TVs, this all accounts to being quite shady company, but Blokada or NetGuard can mitigate it. Status: avoid for other brands if possible.
Xiaomi: They have quite a bit of telemetry in their MIUI skin, similar to Samsung. Now they have tracking in Incognito Mode in their Browser as well. Status: avoid unless you implement my guide properly.
OnePlus, Oppo, Vivo: They have considerably less telemetry and ads, better than Samsung and Xiaomi. But they will start doing the same thing as Realme which I will mention below soon. Status: potential but passable for now.
Realme: They are implementing ads into their UI, which will soon come to Oppo and Vivo phones too, a bit of an issue. This allows for telemetry and tracking concerns. Status: avoid if possible.
Google: In general an evil megacorp, Titan M security chip is self-claimed to be great on Pixels, but there is no way to verify if the microcode it contains is the same as that open sourced by Google. Having faith in Google's promise of their proprietary closed source chip being clean is like having faith in cyanide not killing a person. Moreover, they are known as:
  • NSA partner and collecting data and spy on users in googolplex capacity
  • AI used by US military for drone bombing in foreign countries based on metadata Google collects on smartphones
  • use dark patterns in their software to make users accept their TOS to spy
  • repeated lies about how their data collection works claiming anonymity
  • forcing users to use their Play Services which is spyware and scareware
  • monopolising the web and internet via AMP
  • use of non standard web browser libraries and known attempts to cripple lone standing ethical competitors like Firefox and Gecko web engine (now with Microsoft making their default Edge Chromium-based too)
TL;DR there is no summary, privacy is an indepth topic and you must take a couple of hours to go through this simple guide, as long as it looks it should clear all your concerns with smartphone privacy.
This is the best you can do without rooting or modding a phone, and it is working for me since almost a year now, personally tested and verified on my locked P30 Lite.
I have a history of rooting and modding phones, one being an Honor 6X before Huawei disabled unlocking policy, one being a Xiaomi and one being a Lenovo before that. Also, one Samsung Galaxy S2 long time ago.
Credit to w1nst0n for the Universal Android Debloater (authorised me to use his tool). Hope this guide serves as a great tool for any privacy seeker.
submitted by TheAnonymouseJoker to privatelife [link] [comments]


2020.03.06 15:27 CuteBananaMuffin Turkey - A Criminal State, a NATO State

Turkey - A Criminal State, a NATO State
by Eric Draitser December 24, 2015 from NewEasternOutlook Website

Eric Draitser is an independent geopolitical analyst based in New York City, he is the founder of StopImperialism.org and OP-ed columnist for RT, exclusively for the online magazine "New Eastern Outlook".


https://preview.redd.it/eqip55s0b2l41.jpg?width=450&format=pjpg&auto=webp&s=3622752ad8f3a116fc8101d51c8f5f46f5e62dc9
It is now openly discussed even in mainstream media
the fact that Turkey has been intimately involved
in fomenting and supporting the war on Syria,
with its ultimate goal of the overthrow of the Syrian government
and its replacement by a compliant proxy aligned
with Turkish President Erdogan
and the Muslim Brotherhood.
That this is no longer a 'conspiracy theory'
but a conspiracy fact not only vindicates my analysis
over the last four years, but it also brings to the fore
the nefarious role of a NATO member
in stoking a brutal and bloody war for its own ends.

Beyond just the war itself, Turkey has been implicated in a wide variety of crimes (some constituting war crimes) which cast Ankara in a very bad light:
a supporter of terrorism a criminal government engaging in acts of aggression against its neighbors and other world powers the repression of journalists and others who have brought the truth to the light of day,
...among many others.
Taken in total, it becomes clear that under Recep Tayyip Erdogan Turkey has become a belligerent actor with delusions of hegemony and a complete disregard for human rights and sovereignty.
But how exactly has this transformation happened?
What has been proven regarding Turkish government actions that make it so clear that the regime in Ankara is criminal in nature?
Cataloguing Turkish Crimes
The criminality of the Erdogan government can be roughly broken down into the following categories:
aggression against sovereign states material support for international terrorism systematic violation of human rights
Naturally, there are many other crimes that would also be included in a full and completing accounting of Ankara's illegal actions including, but not limited to,
corruption promoting and tacitly supporting fascist gangs,
...and many others.
But it is the support for international terrorism that rises above all others to thrust Turkey into the spotlight as one of the single most important supporters of the global scourge of terrorism.

https://preview.redd.it/itcx5xn4b2l41.jpg?width=450&format=pjpg&auto=webp&s=676d161e1ba0a04e76e02242f85d125474f1fe32
Turkey's central role in each and every aspect of terrorism in Syria must be the starting point of any analysis of Turkey's grave crimes.
President Erdogan has not been shy about calling for regime change in Syria, but his position has been far more than merely rhetorical; Erdogan's government has played a very direct role in the sponsorship, arming, facilitation and military backing of everyone from the Free Syrian Army to Jabhat al-Nusra (Al Qaeda in Syria) and the Islamic State (ISIS/ISIL/Daesh).
In 2012, the New York Times confirmed that the CIA was sending weapons and other military materiel into the hands of anti-Assad forces from the Turkish side of the border, using their connections with the Muslim Brotherhood to do so.
However, it has also come to light that Turkish intelligence has been front and center in the ongoing campaign to arm and resupply the terror groups such as the al-Nusra Front and others.
This fact was exposed by Can Dündar, the editor-in-chief of the Cumhuriyet, who now faces a potential life sentence at the behest of President Erdogan, who himself called for Dündar to receive multiple life sentences.
What is the reason for the attack on Dündar and other opposition journalists?
The Cumhuriyet, one of the most widely read Turkish dailies, published video footage confirming the widespread allegations that Turkish trucks, ostensibly loaded with humanitarian supplies, were actually filled with arms bound for terror groups fighting against Assad, and that those trucks were operated by Turkey's National Intelligence Organization (MİT).
But it goes much further than that....
Turkey has been directly involved on the ground in Syria both in active military and support roles.
In fact, transcripts of wiretaps obtained by Cumhuriyet, and presented in Turkish courts, along with shocking video footage (below), have confirmed what numerous eyewitnesses have stated:
Turkish security forces have been directly involved in shelling and support operations for Nusra front and other jihadi groups in and around Kassab, Syria, among other sites.


VIDEO Cumhuriyet publishes video for weaponry in lorries affiliated to Turkish intelligence



This is a crucial piece of information because it explains just why those terror groups were able to successfully capture that region in 2014, and recapture it this year.
Eyewitnesses in Kassab have confirmed what Syrian soldiers speaking on condition of anonymity had reported, namely that Turkish helicopters and heavy artillery were used in support of Nusra and the other terror groups during both the 2014 and the current campaign.
Of course this policy of alliance with anti-Assad terrorists has been part of Turkey's modus operandi since the beginning of the conflict.
In 2012, Reuters revealed that Turkey,
"set up a secret base with allies Saudi Arabia and Qatar to direct vital military and communications aid to Syria's rebels from a city near the border…
'It's the Turks who are militarily controlling it. Turkey is the main coordinatofacilitator. Think of a triangle, with Turkey at the top and Saudi Arabia and Qatar at the bottom,' said a Doha-based source."
This information was confirmed by Vice President Joe Biden in his spectacular foot-in-mouth speech at Harvard University where he stated:
Our allies in the region were our largest problem in Syria. The Turks were great friends… [and] the Saudis, the Emirates, etcetera. What were they doing?…
They poured hundreds of millions of dollars and tens of tons of weapons into anyone who would fight against Assad - except that the people who were being supplied, [they] were al-Nusra, and al-Qaeda, and the extremist elements of jihadis who were coming from other parts of the world.
But one must guard against the false notion that somehow Turkey's role has been merely as auxiliary in Syria, as a supporter, but not leader, of the terrorist factions wreaking havoc on the Syrian battlefield.
Instead, it is now an inescapable fact, even acknowledged by some high-ranking military and intelligence officials, that Turkey has been the principal financier and supporter of the Islamic State and the other jihadist groups.
According to the UK Independent, President Erdogan's son Bilal Erdogan, along with a number of other close associates, have been directly benefitting from the illicit oil trade with the Islamic State.
The paper noted that,
"Bilal Erdogan… is one of three equal partners in the BMZ group, a major Turkish oil and marine shipping company, which both the Russian and Syrian governments have accused of purchasing oil from ISIS…
Bilal Erdogan has been directly involved in the oil trade with ISIS… Turkey downed a Russian jet on 24 November specifically to protect his oil smuggling business."
In fact, Syria's Information Minister Omran al-Zoabi explained that,
"All of the oil was delivered to a company that belongs to the son of Recep [Tayyip] Erdogan.
This is why Turkey became anxious when Russia began delivering airstrikes against the IS infrastructure and destroyed more than 500 trucks with oil already.
They're importing not only oil, but wheat and historic artefacts [sic] as well."

https://preview.redd.it/d8n8x4kbb2l41.jpg?width=450&format=pjpg&auto=webp&s=8e260436e109b46555e809c4e83f115e8fbc2b84
So it seems that Erdogan and his clique are involved not simply in fomenting war and terrorism in Syria, but also in its plunder, with complex smuggling networks being directly tied to the Turkish President himself.
Indeed, just such smuggling networks have been uncovered throughout Asia, tying Turkey into the broader international architecture of terrorism trafficking.
In late 2014 and early 2015, a human trafficking ring was exposed by Chinese authorities. It was revealed that at least ten Turks were responsible for organizing and facilitating the border crossings of a number of Uighurs (Chinese Muslims from Xinjiang), at least one of whom was a wanted Uighur terrorist with others being "radicalized potential terrorists."
These individuals were likely part of a previously documented trend of Uighur extremists traveling to the Middle East to train and fight with the Islamic State and/or other terror groups.
In fact, precisely this trend was exposed two months earlier in September 2014 when Reuters reported that Beijing formally accused militant Uighurs from Xinjiang of having traveled to Islamic State-controlled territory to receive training.
Further corroborating these accusations, the Jakarta Post of Indonesia reported that four Chinese Uighur jihadists had been arrested in Indonesia after having travelled from Xinjiang through Malaysia.
Other similar reports have also surfaced in recent months, painting a picture of a concerted campaign to help Uighur extremists travel throughout Asia, communicating and collaborating with transnational terror groups such as IS.

https://preview.redd.it/7stuwg8db2l41.jpg?width=450&format=pjpg&auto=webp&s=f4031a6407e88e384554ed7fab11279037fe7d7d
Now, with these latest revelations regarding Turkish nationals being involved in the trafficking of extremists, it seems an invaluable piece of the terrorist transit infrastructure has been exposed.
Indeed my assertions above (initially made here in early February 2015) have been substantiated by Syria's ambassador to China, quoted at length by Pulitzer Prize-winning journalist Seymour Hersh in his piece Military to Military which notes the following:
[Syria's ambassador to China Imad Moustapha explained that], 'China regards the Syrian crisis from three perspectives,' he said: international law and legitimacy; global strategic positioning; and the activities of jihadist Uighurs, from Xinjiang province in China's far west. Xinjiang borders eight nations… and, in China's view, serves as a funnel for terrorism around the world and within China.
Many Uighur fighters now in Syria are known to be members of the East Turkestan Islamic Movement - an often violent separatist organization that seeks to establish an Islamist Uighur state in Xinjiang. 'The fact that they have been aided by Turkish intelligence to move from China into Syria through Turkey has caused a tremendous amount of tension between the Chinese and Turkish intelligence,' Moustapha said.
'China is concerned that the Turkish role of supporting the Uighur fighters in Syria may be extended in the future to support Turkey's agenda in Xinjiang. We are already providing the Chinese intelligence service with information regarding these terrorists and the routes they crossed from on travelling into Syria'.
Moustapha's concerns were echoed by a Washington foreign affairs analyst who has closely followed the passage of jihadists through Turkey and into Syria.
The analyst, whose views are routinely sought by senior government officials, told me that,
'Erdoğan has been bringing Uighurs into Syria by special transport while his government has been agitating in favor of their struggle in China.
Uighur and Burmese Muslim terrorists who escape into Thailand somehow get Turkish passports and are then flown to Turkey for transit into Syria.'
He added that there was also what amounted to another 'rat line' that was funnelling Uighurs - estimates range from a few hundred to many thousands over the years - from China into Kazakhstan for eventual relay to Turkey, and then to IS territory in Syria.
'US intelligence,' he said, 'is not getting good information about these activities because those insiders who are unhappy with the policy are not talking to them.'
He also said it was 'not clear' that the officials responsible for Syrian policy in the State Department and White House 'get it'.
IHS-Jane's Defence Weekly estimated in October that as many as five thousand Uighur would-be fighters have arrived in Turkey since 2013, with perhaps two thousand moving on to Syria.
Moustapha said he has information that,
'up to 860 Uighur fighters are currently in Syria.'
It has become clear that Turkey is now unmistakably a major supporter of international terrorism, with Syria being merely the proving ground for a stable of terror groups directly or indirectly working with Erdogan's government.
This is further evidenced by the now documented and verified fact that the Erdogan government was directly involved in the transfer of chemical weapons into the hands of ISIS.
As Turkish MP Eren Erdem explained before the Turkish parliament and to international media,
"There is data in this indictment. Chemical weapon materials are being brought to Turkey and being put together in Syria in camps of ISIS which was known as Iraqi Al Qaeda during that time."
Erdem noted that according to an investigation launched (and abruptly closed) by the General Prosecutor's Office in Adana, Turkish citizens with ties to the intelligence community took part in negotiations with ISIS-linked and Al-Qaeda-linked militants to sell sarin gas for use in Syria.
The evidence of these allegations came in the form of wiretapped phone conversations similar to those published earlier this year by Cumhuriyet.
Taken in total, the case against Erdogan's government is damning. At the same time, one must also note Erdogan's grave crimes against his own people.
As noted already, Can Dündar and his colleagues at Cumhuriyet have been targeted by Erdogan's state for their disclosure of Ankara's dealings with the terrorists of Syria.
Just a few weeks ago Dündar, along with Cumhuriyet's Ankara bureau chief Erdem Gul, were charged in a Turkish court with "spying" and "divulging state secrets."
This should not come as a surprise to anyone familiar with Turkey's track record when it comes to opposition journalism.
In fact, in December 2014, the Turkish police raided the offices of the Zaman newspaper, one of the most popular in the country, alleging that Zaman was responsible for "launching an armed terror organization."
The authorities detained the Zaman Editor-in-Chief Ekrem Dumanlı, as well as the head of the Samanyolu Media Group, Hidayet Karaca, along with a producer, scriptwriter and director.
The Turkish Journalists Association (TGC) and the Turkey Journalists' Labor Union (TGS) released a joint statement in condemnation of the raids and the ongoing repression of journalists by the Erdogan government, noting that,
"Almost 200 journalists were previously held in prison on charges of being a member of a terror organization, violating their right to a fair trial. Journalists are now being detained once again.
These developments mean that freedom of the press and opinion is punished in Turkey, which takes its place in the class of countries where the press is not free."
International organizations too expressed their outrage at this blatant violation of freedom of the press.
The International Federation of Journalists (IFJ), and its regional group the European Federation of Journalists (EFL), stated that,
"We are appalled by this brazen assault on press freedom and Turkish democracy…
One year after the exposure of corruption at the heart of government, the authorities appear to be exacting their revenge by targeting those who express opposing views…
This latest act demonstrates that the authorities' contempt for journalism has not diminished."

https://preview.redd.it/a0p3mbyfb2l41.jpg?width=450&format=pjpg&auto=webp&s=5984a7e9de0923c39595fe9c153ca84e6676cd36
Of course, Ankara's war on freedom of speech, and the media generally, is not relegated to established media outlets such as Zaman and Cumhuriyet, but also to citizen media and social media as well.
In response to the leaking of recordings on Twitter documenting corruption among Erdogan cronies and political elites within his Justice and Development Party (AKP), Erdogan attacked the social media platform, and his government immediately moved to restrict access to Twitter.
Erdogan even went so far as to suggest a total ban on all social media sites, including Facebook and YouTube, saying that,
"The international community can say this, can say that. I don't care at all. Everyone will see how powerful the Republic of Turkey is."
This sort of megalomaniacal rhetoric has become the norm for Erdogan, who sees himself as less a president and more a sultan or absolute monarch.
The famous words of the International Military Tribunal at Nuremburg succinctly and matter-of-factly state that the waging of aggressive war is,
"essentially an evil thing… to initiate a war of aggression… is not only an international crime; it is the supreme international crime, differing only from other war crimes in that it contains within itself the accumulated evil of the whole."
This is undeniably true.
But,
What happens when one is engaged in an international campaign to destroy a neighboring country through war? What happens when one country enables and participates in the destruction of another? What happens when one country will stop at nothing to come out victorious in a war it is not officially involved in, but covertly manages, and from which it directly benefits? Are these not simply different forms of the same crime, the supreme crime, as it were?
Let's face it, Turkey is now a mafia state ruled by a criminal regime. It is also a NATO member state.
Perhaps now the pernicious illusion of NATO as military alliance 'defending' justice, human rights, and the rule of law can finally be put to rest.
While the propagandists will continue the charade, Turkey has permanently exposed the US-NATO-GCC-Israel for the warmongers they are in Syria and around the world.
Let's just hope the world notices...
submitted by CuteBananaMuffin to conspiracy [link] [comments]


2016.03.07 21:44 Neudious The big European pre-order thread

Hi there! I tought it might be a good idea to put all the info about pre-orders in one spot. Things such as links, asked and answered questions, etc. This way, we have everything in one spot and this makes things a lot more easy to find. Feel free to comment/PM me to add links, answers to questions, etc. I'll credit you, don't worry!
Anyways, let's do this!

Alright, Today is the 4th of June. Some of you might have noticed that I'm not replying half as quickly as I used to. I'll try replying to all of the comments I have missed as soon as possible!

On a other note, this thread will not be updated anymore starting from today. If you still need to get an SE, you may want to check the comment section, as plenty of awesome people still manage to find stores that sell them :)

I thank you all for sticking along this wild ride! I'll see you guys when FE15 comes out :)

Special Edition’s that are currently up. Check the new comments to see if any new ones have gone up that I haven’t been able to add yet. Last time updated/checked for new links on [27-5-2016, 13:46 CET] (I'll only change this timestamp when new links are added or when some are removed.)

Special Edition placeholders. Keep a close eye on them!

Special Edition’s that are currently sold out, but might receive a restock.

Note: This EBGames pre-order is intended for the second shipment in June, so you will get it later then everybody else! Keep this in mind when ordering.
I have no doubts that I missed links here, and I appreciate your patience for dealing with somebody as chaotic as me haha. I’ll try getting the thread complete ASAP! (And feel free to point out the links I missed, that way I will be able to add them :) ) And now, onto the current situation/FAQ!

The current situation with the Special Editions:

The Netherlands:
Nedgame was the first store to start taking SE pre-orders, and they were sold out after just 4 hours. Bol.com expected the pre-orders to go up at the end of the week, but they put it up this morning which took everybody by surprise. Bol.com's stock lasted for about 2 - 3 hours before it selling out.
Gamemania has such a limited stock that they aren't even able to supply the SE, and they will call customers in chronilogical order to ask if they want to convert their Birthright/Conquest order to the Special Edition.
Smaller stores are popping up with the SE and the 3DS now, but Amazon still hasn't gotten either of them up for order. Other electronic/gaming chains in the Netherlands such as Bart Smit and Media Markt don't seem to be getting any stock.
Bart Smit will let you fill in a form, and inform you if they do get it (which they aren't expecting to happen) and Media Markt actually can't even confirm if they are getting the regular versions (Conquest/Birthright)
TL;DR: Most retailers sold out in stock very quickly, and some retailers like Media Markt and Bart Smit aren’t even sure that they will get the game. But Intertoys has confirmed on their twitter that they will be selling SE’s on their website, so keep a eye on that! Link
France:
According to a few sources, France seems to be getting only about 7000 SE's of which 1400 are reserved to MicroMania (French webstore). On the other hand, France seems to be getting about 40000 copies of birthright and conquest each which totals to a whopping amount of 80000 copies.
Here are the sources: 1and 2
AU/NZ: According to this source, Nintendo will be printing a second round of limited SE's. This is planned to be stocked around the end of May. Still no confirmation for a EU reprint, but we can always hope that it will be announced later.

Asked and Answered Questions

Q: I preordered the Fire Emblem (Special Edition) from Nedgame, but it says Fire Emblem Birthright (Special Edition). Could this result in a faulty pre-order?
A: No. Or, it shouldn't result in a faulty pre-order. The only thing that changed was the product name, which was most likely entered faulty. It was fixed, but if you ordered before the fix then the name won't be changed.
Q: Can I cancel pre-orders at nedgame.nl?
A: Yes, you should be able to do so through customer service (calling or mailing them. You can't do it yourself.) Just make sure you cancel it before the product ships!
Q: When will I receive my pre-order at nedgame.nl?
A: If the pre-ordered products are in stock and recieved, then nedgame will aim to send them on the 19th of May so that you will recieve it on the release date. I'm unsure how this works with pre-orders in Belgium/other EU countries besides the Netherlands, as the shipping takes longer. * *Q: Has nedgame.nl oversold? Is my pre-order safe? **
*A: Nobody knows, but the SE is offline now meaning that they atleast had a indication that it was sold out.
Everything that is pre-ordered is guaranteed. We work differently from other websites , we have a limit on what can be pre-ordered. Nintendo has informed us of how much copies we are receiving on release and that is the maximum of pre-orders we will retain." *
Link to the original letter that confirmed this (Dutch)
Q: Will the EU version have Japanese voice acting? A: No. There will be no Japanse voice acting.
Q: Are the SE's different depending on what country I order from?
*A: Cited from mr_silverstrike. Thank you for supplying this information!
I pre-ordered the limited edition being sold at computeruniverse since I missed it at Bol.com but I was a bit annoyed at the possibility of the box being German only -- so I went investigating... On the page of computeruniverse, you can find the EAN number (barcode); it's 0045496472344. Same on Bol.com's page. I also looked up Birthright... It seems that local versions differ in their EAN number per country. For example, Fire Emblem Fates: Birthright on Bol.com has an EAN number of 0045496472481. The German version has an EAN number of 0045496472542, leading me to believe that the Limited Edition we're dealing with are the same, yet their regular versions are different based on the country. The one that's listed at Bol.com and notably it states at Bol.com's page that all of it is in English, leading me to believe that there is only one international, European release for the Limited Edition.
Additional evidence: The Limited Edition box seen in in the official video has references to... Germany (German ratings), the UK (English title), France ("Edition Limitée") so it seems to be one universal edition for all of Europe. Also notable: there seems to be no text of any kind on the map of in the art book, according to the video.
TL;DR: Probably one single version of the LE for Europe (even though it says German edition on the computeruniverse page). As we get to know more I guess we might know more.*
Q: Does gamezone.no ship internationally? *A: Quoted from pageantfool, thank you for supplying a translation!
"KAN JEG BESTILLE TIL UTLANDET? Vi leverer pakker til hele verden. Land velges når man registrerer konto på gamezone.no. Dersom du har en allerede eksisterende konto registrert med norsk adresse, og ønsker å endre til utenlandsk adresse, ta kontakt med oss på telefon telefon 38 17 83 13. Du kan også sende oss en mail på [email protected]."
A quick and dirty translation: "CAN I ORDER FROM ABROAD? We deliver packages worldwide. You choose your country when you register an account at gamezone.no. If you already have an existing account registered with a Norwegian address, and would like to change it to an address abroad, please contact us by phone or send us an email."

Tips and Tricks:

Have enough money on your card/bank account!
Imagine you saw a pre-order go up, you grab your card only to have it declined because you are out of credit. Don't let that happen to you! Make sure you keep about € 80-90 saved (Or more, depending if you want the 3DS), so that you can pre-order once it's up.)
Set one-click-buy up in advance and use it if available! (Amazon orders)
Here's more info on how to set it up, and how it works! One Click Buy may just be the tool you need to snatch that final SE. It's really quick, and it only requires one click! (See what I did there?) It requires less time then using your credit card details/logging in with paypal/other payment methods. That way, it improves the odds of getting a SE!
(This only applies to Amazon orders!)
For people without a paypal account or valid creditcard, consider buying a Amazon giftcard to pay for your purchase!
It's possible that Amazon doesn't offer your preferred payment method (Such as IDEAL in The Netherlands) and what is a really good alternative for this is buying the giftcard with ideal so that you can use it with Amazon.This is a link to a Dutch website, you will need to google a alternative for your country yourself! KEEP IN MIND THE FOLLOWING: You can only use the card for the Amazon you bought it for. A Amazon.it card won't work with Amazon.co.uk and vice versa. You cannot refund them, so be sure to buy them only if you are almost certain you will be able to snag one!

Hall of Honor, without these awesome redditor’s this whole thread would not have been possible!

(In no particular order!)
much_fun
Leth09
auratux
Manneratvag
imrail
JD_D2
ZRoosty
Jokke0093
Woolong15
AlexEah
Gadafro
LeminaAusa
squaremum
asebist
Rhyman96
Refleza
Keylimeblade
pageantfool
Daredawk
Krystalla
Athenos
Xen0morph
Snorepub
mr_silverstrike
JoanSM1996
Tundran_Grunt
Ahyler
Gadaii
Marcoscb
yungasami
Eokozz
FikkieHo
Spizor_
Pikappa1993
BlameNintendo
fates-fan
OldGeneralCrash
Remiscan
CurtisManning
armin666
Ythnay
Srslywtfdood
sevensilvercats
Saki777
sevensilvercats
itzatrap2
StarAtlas
xZPFxBarteq
STUX_115
StoneCold70
Dingerzat
Misaka9982
raffo1
Shnuzze
Fireburd55
Bakelith
Ephriam1
JDubYes
H3llycat
perchtopunk
konohanashuffler
Jonnyc9870
Karothzor
bearpen1
Lato57
FikkieHoe
OharaLibarianArtur
Lukey140701
iiAaronXiX
Brimlad
Mike_H07
JustTooNerdy
rajstopa
Alteyra
shan780
Thank you all so much! You guys/girls are the best :) ! (And I know this is going to be really stupid, but so many people helped out that it's very possible I forgot a few. If this is the case, let me know! I really want to thank all of you! )

Well, that’s it for the thread. As mentioned above, feel free to comment with links and I’ll try adding them ASAP! Keep in mind that I’m just human though, so it might take a while for the thread to be updated. Keep a close eye on the comment section, as most SE’s that go up will be posted there first!

If you need help with translating a Dutch website (or a German one since I know a few words of that language), feel free to ask! I don’t bite :)

submitted by Neudious to fireemblem [link] [comments]