Disable the Hamper Analytics patches

Rely on the HOSTS to do any blocking.
With the last update this causes app crashes, due to boolean/string mismatch.
Need to figure out exactly how string in manifest can become a boolean when wanted.

Signed-off-by: Tad <tad@spotco.us>
This commit is contained in:
Tad 2022-01-23 16:55:23 -05:00
parent 8004a11c52
commit 6329922104
7 changed files with 29 additions and 29 deletions

View File

@ -48,6 +48,7 @@ Documentation
https://documentation.accengage.com/sdk/android/3.6/migration/
https://firebase.google.com/docs/analytics/configure-data-collection
https://firebase.google.com/docs/crashlytics/customize-crash-reports
https://github.com/bugsnag/bugsnag-android
https://github.com/mapbox/mapbox-events-android/pull/77/files
https://github.com/mixpanel/mixpanel-android/blob/master/src/main/java/com/mixpanel/android/mpmetrics/MPConfig.java
https://help.batch.com/en/articles/5204072-how-to-integrate-batch-into-my-cmp
@ -66,39 +67,40 @@ Currently Implemented
data.putString("com.ad4screen.advertiser_id", "false");
data.putString("com.ad4screen.no_geoloc", "true");
data.putString("com.ad4screen.tracking_mode", "Restricted");
data.putString("com.bugsnag.android.AUTO_CAPTURE_SESSIONS", "false");
data.putString("com.bugsnag.android.AUTO_DETECT_ERRORS", "false");
data.putString("com.bugsnag.android.AUTO_TRACK_SESSIONS", "false");
data.putString("com.bugsnag.android.DETECT_ANR", "false");
data.putString("com.bugsnag.android.DETECT_NDK_CRASHES", "false");
data.putString("com.bugsnag.android.ENABLE_EXCEPTION_HANDLER", "false");
data.putString("com.bugsnag.android.PERSIST_USER_BETWEEN_SESSIONS", "false");
data.putString("com.bugsnag.android.PERSIST_USER", "false");
data.putString("com.bugsnag.android.SEND_THREADS", "NEVER");
data.putBoolean("com.bugsnag.android.AUTO_CAPTURE_SESSIONS", false);
data.putBoolean("com.bugsnag.android.AUTO_DETECT_ERRORS", false);
data.putBoolean("com.bugsnag.android.AUTO_TRACK_SESSIONS", false);
data.putBoolean("com.bugsnag.android.DETECT_ANR", false);
data.putBoolean("com.bugsnag.android.DETECT_NDK_CRASHES", false);
data.putBoolean("com.bugsnag.android.ENABLE_EXCEPTION_HANDLER", false);
data.putBoolean("com.bugsnag.android.PERSIST_USER_BETWEEN_SESSIONS", false);
data.putBoolean("com.bugsnag.android.PERSIST_USER", false);
//data.putString("com.bugsnag.android.SEND_THREADS", "NEVER");
data.putBoolean("com.bugsnag.android.SEND_THREADS", false);
data.putString("com.facebook.sdk.AdvertiserIDCollectionEnabled", "false");
data.putString("com.facebook.sdk.AutoInitEnabled", "false");
data.putString("com.facebook.sdk.AutoLogAppEventsEnabled", "false");
data.putString("com.followanalytics.message.inapp.enable", "false");
data.putString("com.followanalytics.message.push.enable", "false");
data.putString("com.google.android.gms.ads.AD_MANAGER_APP", "false");
data.putString("com.google.android.gms.ads.DELAY_APP_MEASUREMENT_INIT", "true");
data.putBoolean("com.google.android.gms.ads.AD_MANAGER_APP", false);
data.putBoolean("com.google.android.gms.ads.DELAY_APP_MEASUREMENT_INIT", true);
data.putString("com.mapbox.EnableEvents", "false");
data.putString("com.microsoft.engagementinsights.autoCapture", "false");
data.putString("com.mixpanel.android.MPConfig.AutoCheckForSurveys", "false");
data.putString("com.mixpanel.android.MPConfig.AutoShowMixpanelUpdates", "false");
data.putString("com.mixpanel.android.MPConfig.DisableAppOpenEvent", "true");
data.putString("com.mixpanel.android.MPConfig.DisableDecideChecker", "true");
data.putString("com.mixpanel.android.MPConfig.DisableExceptionHandler", "true");
data.putString("com.mixpanel.android.MPConfig.DisableFallback", "true");
data.putString("com.mixpanel.android.MPConfig.DisableViewCrawler", "true");
data.putString("com.mixpanel.android.MPConfig.TestMode", "true");
data.putString("com.mixpanel.android.MPConfig.UseIpAddressForGeolocation", "false");
data.putBoolean("com.mixpanel.android.MPConfig.AutoCheckForSurveys", false);
data.putBoolean("com.mixpanel.android.MPConfig.AutoShowMixpanelUpdates", false);
data.putBoolean("com.mixpanel.android.MPConfig.DisableAppOpenEvent", true);
data.putBoolean("com.mixpanel.android.MPConfig.DisableDecideChecker", true);
data.putBoolean("com.mixpanel.android.MPConfig.DisableExceptionHandler", true);
data.putBoolean("com.mixpanel.android.MPConfig.DisableFallback", true);
data.putBoolean("com.mixpanel.android.MPConfig.DisableViewCrawler", true);
data.putBoolean("com.mixpanel.android.MPConfig.TestMode", true);
data.putBoolean("com.mixpanel.android.MPConfig.UseIpAddressForGeolocation", false);
data.putString("com.sprooki.LOCATION_SERVICES", "disable");
data.putString("com.webengage.sdk.android.location_tracking", "false");
data.putString("firebase_analytics_collection_deactivated", "true");
data.putString("firebase_analytics_collection_enabled", "false");
data.putString("firebase_crash_collection_enabled", "false");
data.putString("firebase_crashlytics_collection_enabled", "false");
data.putBoolean("firebase_crashlytics_collection_enabled", false);
data.putString("firebase_performance_collection_deactivated", "true");
data.putString("google_analytics_adid_collection_enabled", "false");
data.putString("google_analytics_automatic_screen_reporting_enabled", "false");

View File

@ -101,7 +101,7 @@ git revert --no-edit 0326bb5e41219cf502727c3aa44ebf2daa19a5b3; #Re-enable doze o
applyPatch "$DOS_PATCHES/android_frameworks_base/248599.patch"; #Make SET_TIME_ZONE permission match SET_TIME
applyPatch "$DOS_PATCHES/android_frameworks_base/0001-Reduced_Resolution.patch"; #Allow reducing resolution to save power TODO: Add 800x480
#applyPatch "$DOS_PATCHES/android_frameworks_base/0007-Connectivity.patch"; #Change connectivity check URLs to ours
applyPatch "$DOS_PATCHES/android_frameworks_base/0008-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
#applyPatch "$DOS_PATCHES/android_frameworks_base/0008-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0001-Browser_No_Location.patch"; #Don't grant location permission to system browsers (GrapheneOS)
applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0003-SUPL_No_IMSI.patch"; #Don't send IMSI to SUPL (MSe1969)
if [ "$DOS_SENSORS_PERM" = true ]; then applyPatch "$DOS_PATCHES/android_frameworks_base/0009-Sensors-P1.patch"; fi; #Permission for sensors access (MSe1969)

View File

@ -100,7 +100,7 @@ fi;
if enterAndClear "frameworks/base"; then
#applyPatch "$DOS_PATCHES/android_frameworks_base/0005-Connectivity.patch"; #Change connectivity check URLs to ours
applyPatch "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
#applyPatch "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0001-Browser_No_Location.patch"; #Don't grant location permission to system browsers (GrapheneOS)
applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0003-SUPL_No_IMSI.patch"; #Don't send IMSI to SUPL (MSe1969)
applyPatch "$DOS_PATCHES_COMMON/android_frameworks_base/0004-Fingerprint_Lockout.patch"; #Enable fingerprint lockout after three failed attempts (GrapheneOS)

View File

@ -106,7 +106,7 @@ fi;
if enterAndClear "frameworks/base"; then
#applyPatch "$DOS_PATCHES/android_frameworks_base/0005-Connectivity.patch"; #Change connectivity check URLs to ours
applyPatch "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
#applyPatch "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
applyPatch "$DOS_PATCHES/android_frameworks_base/0007-Always_Restict_Serial.patch"; #Always restrict access to Build.SERIAL (GrapheneOS)
applyPatch "$DOS_PATCHES/android_frameworks_base/0008-Browser_No_Location.patch"; #Don't grant location permission to system browsers (GrapheneOS)
applyPatch "$DOS_PATCHES/android_frameworks_base/0009-SystemUI_No_Permission_Review.patch"; #Allow SystemUI to directly manage Bluetooth/WiFi (GrapheneOS)

View File

@ -97,10 +97,9 @@ patchWorkspace() {
touch DOS_PATCHED_FLAG;
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
source build/envsetup.sh;
#source build/envsetup.sh;
#repopick -it ten-firewall;
#repopick -i 318916; #Fix kernel build with glibc 2.34
repopick -it Q_asb_2022-01;
sh "$DOS_SCRIPTS/Patch.sh";
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";

View File

@ -73,7 +73,6 @@ sed -i '75i$(my_res_package): PRIVATE_AAPT_FLAGS += --auto-add-overlay' core/aap
sed -i 's/messaging/Silence/' target/product/aosp_base_telephony.mk target/product/gsi_common.mk; #Replace the Messaging app with Silence
awk -i inplace '!/updatable_apex.mk/' target/product/mainline_system.mk; #Disable APEX
sed -i 's/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 23/PLATFORM_MIN_SUPPORTED_TARGET_SDK_VERSION := 28/' core/version_defaults.mk; #Set the minimum supported target SDK to Pie (GrapheneOS)
sed -i 's/2021-12-05/2022-01-05/' core/version_defaults.mk; #Bump Security String #Q_asb_2022-01 #XXX
fi;
if enterAndClear "build/soong"; then
@ -102,7 +101,7 @@ if [ "$DOS_GRAPHENE_MALLOC" = true ]; then applyPatch "$DOS_PATCHES/android_fram
fi;
if enterAndClear "frameworks/base"; then
applyPatch "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
#applyPatch "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
applyPatch "$DOS_PATCHES/android_frameworks_base/0007-Always_Restict_Serial.patch"; #Always restrict access to Build.SERIAL (GrapheneOS)
applyPatch "$DOS_PATCHES/android_frameworks_base/0008-Browser_No_Location.patch"; #Don't grant location permission to system browsers (GrapheneOS)
applyPatch "$DOS_PATCHES/android_frameworks_base/0009-SystemUI_No_Permission_Review.patch"; #Allow SystemUI to directly manage Bluetooth/WiFi (GrapheneOS)

View File

@ -84,7 +84,7 @@ if [ "$DOS_WEBVIEW_LFS" = true ]; then git lfs pull; fi; #Ensure the objects are
fi;
if enterAndClear "frameworks/base"; then
applyPatch "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
#applyPatch "$DOS_PATCHES/android_frameworks_base/0006-Disable_Analytics.patch"; #Disable/reduce functionality of various ad/analytics libraries
applyPatch "$DOS_PATCHES/android_frameworks_base/0007-Always_Restict_Serial.patch"; #Always restrict access to Build.SERIAL (GrapheneOS)
applyPatch "$DOS_PATCHES/android_frameworks_base/0008-Browser_No_Location.patch"; #Don't grant location permission to system browsers (GrapheneOS)
applyPatch "$DOS_PATCHES/android_frameworks_base/0009-SystemUI_No_Permission_Review.patch"; #Allow SystemUI to directly manage Bluetooth/WiFi (GrapheneOS)