I had an older phone and only a couple apps that would need it. I think it intentionally didn’t schedule anything to save power because the phone “can’t handle it” anymore.
Yup
Except the API non-neutrality.
Only Apple applications are allowed to operate in the background. Element (Matrix chat application) actually had to disable its app showing up in the share context menu because the encryption method breaks when it was used.
I don’t know what features Apple photos or files have, but other apps wouldn’t be able to do background downloads (downloading files added to a folder by another device,) on-device photo digestion (apple photos classifies what is in your photos and what text is in them in the background for privacy reasons,) and similar things.
Edit: and yes I know that there’s a background refresh toggle, but it doesn’t work. It just straight up doesn’t work. That feature is entirely up to the OS when it wants to schedule that “background refresh”. In my experience it never does.
Edit 2: Also, only Apple storage integrates directly with the photos app and files app. And that only one comes preinstalled.
Id rather kill myself (/s)
Excellent article.
I don’t use wireguard because it breaks my firewall rules.
How so?
As I understand it, even though after Reboot the OS looks like its in about the same state with the wallpaper and same password to unlock, the fact that it hasn’t been unlocked yet means that certain attacks don’t work as well. I don’t know why specifically. I think it’s because the attack may still work but doesn’t reveal any sensitive data because it’s just the ROM, wallpaper, sim, etc.
There’s a stock ticker for this thing?
You can adjust the time.
Or risk what?
Or at the very fucking least require specific versions with checksums, like golang.
This is why Android TV, supposedly. But then the ROM is closed source, stops getting updates after a few years, the bootloader is locked, and GPlay has minimum target SDKs anyway. So it doesn’t at all solve the problem.
Rclone
Inter-app communication can go around it. And most OSes don’t block localhost connections either.
That’s not how that works. There were likely ads on the page which brings in Google cookies and shows the page the user is on.
OP make sure all third party cookies are blocked. They’re not needed anymore.
MBAs
It actually allows the app to run as the OS itself.
Fuck off. Google Play != Android