Natanael

joined 1 year ago
[–] [email protected] 3 points 1 year ago

Random fractal cloth patches for an irrational n

[–] [email protected] 3 points 1 year ago

It's trivial to circumvent automatic detection

[–] [email protected] 3 points 1 year ago (2 children)

They probably do, but a very hardened version

[–] [email protected] 3 points 1 year ago

I see what you did there

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago)
[–] [email protected] 1 points 1 year ago (2 children)

It depends on what you're mimicking. Just registrering the URL scheme? Any app can do that. Mimicking a signed APK with full package name? Can't do that without root and privacy plugins for Magisk.

[–] [email protected] 1 points 1 year ago (2 children)

You can circumvent it using Intent intercept apps, so unless Whatsapp specifically looks for the APK and call it directly (and just use normal intent URL schemes) then you can simply redirect that request.

[–] [email protected] 1 points 1 year ago (1 children)

If it's IP blocked it still won't work, but most aren't

[–] [email protected] 6 points 1 year ago

Samsung Xcover has all but a popup camera. Marketed for industrial use.

[–] [email protected] 8 points 1 year ago (5 children)

You need to add encryption on top with OTR plugins or equivalent

Or use Matrix where it's on by default

[–] [email protected] 11 points 1 year ago (1 children)

Lots of services are both paid and still show ads. Like cable TV

view more: ‹ prev next ›