#adb

tom_s@friendica.ambag.es

Scrcpy – Display and Control Your Android Device via Linux Desktop

Scrcpy (pronounced “screen copy“) is a free, #open-source, and cross-platform application used to display and control an #Android device from your #Linux desktop computer. It works on Linux, #Windows, and #macOS, and allows you to control a device connected via a #USB or #wirelessly (over TCP/IP).

It features mirroring with Android device screen off, configurable screen display quality, recording, copy and paste in both directions, using an Android device as a webcam (Linux only), physical keyboard and mouse simulation, #OTG mode, and much more.

To use #scrcpy, your Android device must have at least API 21 (Android 5.0), and it must also have #adb (Android Debug Bridge) debugging (USB debugging) enabled. But, it does not require root user access on Linux.

https://www.tecmint.com/scrcpy-connect-android-linux/

caos@anonsys.net

📲 "Datensparsames Android mit der Android Debug Bridge" & "Google-Apps und weitere Bloatware loswerden mit dem 'Universal Android Debloater Next Generation'"

Für diejenigen, die Android-Geräte betreiben, bei denen sie kein Custom ROM installieren können (oder wollen), hier zwei gnulinux.ch-Artikel, in denen es darum geht, wie auch ein Stock-Android ohne Root weitgehend datensparsam betrieben werden kann und wie Google-Apps und weitere Bloatware entfernt werden können:

Im ersten Teil der Artikelreihe "Datensparsames Android mit der Android Debug Bridge" beschreibt Matthias "den Versuch, unter Android durch Umbau mittels der Android Debug Bridge (ADB), ohne Root soweit wie möglich an das Datenschutzniveau besserer Android Custom ROMs heranzukommen. Es ist der erste Teil einer voraussichtlich dreiteiligen Serie. Im ersten Teil wird der Ansatz für ein aktuelles Samsung Android (Stock-ROM) mit Android 14 demonstriert." und zeigt "wie mit Hilfe der Android Debug Bridge (ADB) und weniger Apps zur Geräteadministration auch ein vorinstalliertes Stock-ROM mehr oder weniger datenschutzfreundlich umgebaut werden kann".

Google-Dienste sind in Shelter eingefrostet

Ergänzend dazu habe ich im Artikel "Google-Apps und weitere Bloatware loswerden mit dem Universal Android Debloater Next Generation" noch eins der Tools vorgestellt, mit dessen Hilfe Funktionen der "Android Debug Bridge" über ein grafisches Frontend genutzt werden. So können auf relativ einfachem Weg auf vergoogelten Androids Google-Apps und weitere Bloatware wie Hersteller- und Werbeapps entfernt werden.

Oberfläche des Universal Android Debloaters

#Android #Google #Datenschutz #Privacy #Samsung #ADB #Bloatware #UniversalAndroidDebloater #FDroid #CustomROM #RethinkDNS #Shelter

@Datenschutz - Privacy - Digitale Selbstverteidigung

danie10@squeet.me

ADB tips and tricks: Commands that every Android power user should know about

Title caption: ADB Tips and Tricks
If you’ve been an Android enthusiast lurking in the modding scene, or an app developer for any length of time, sooner or later, you will stumble upon a neat tool called the Android Debug Bridge, or ADB for short. It’s extensively used in Android Studio as a command line companion utility. Android developers also use it as a standalone solution to manually install and test apps on Android smartphones as well as emulated Android devices.

But there’s a lot ADB can do, and most of it isn’t only useful to developers. Even if you aren’t a developer, and you’re reading this article, there’s a good chance you’ve probably used ADB once or twice to sideload an app or tweak a permission. But that isn’t all ADB can be used for. Keep reading for some tips and tricks for using ADB you might not have known about.

Especially useful are the APK install, disabling of system apps, backing up and restoring application data.

See https://www.xda-developers.com/adb-tips-tricks/
#Blog, #adb, #android, #technology

danie10@squeet.me

How to use Shizuku for ADB rootless mods on any Android device

Bild/Foto
Today it’s mostly power users who still mod their devices, but that’s only because it requires full root access to make it happen. The Shizuku app changes that, and will hopefully bring some new and old modders back onto the scene.

Shizuku uses a unique service that allows third-party apps access to system-level Application Programming Interfaces (APIs). It achieves this through the Android Debug Bridge (ADB) interface. ADB commands are somewhat limited by nature; however, combining them with system APIs gives you a significant amount of control. You also don’t have to bother learning about the Android rooting process to start using Shizuku.

Just as with the wireless debugging feature, you must reactivate the Shizuku service each time you reboot your device (if your phone is not rooted). These two methods rely on the ADB interface, which only makes temporary changes to your device without root access. Since you don’t need to reboot that often these days, it likely won’t be an issue for most.

Yes only four apps are listed right now at https://shizuku.rikka.app/apps/ but it will likely grow if this becomes popular.

See https://www.androidpolice.com/how-to-use-shizuku-for-adb-rootless-mods-on-any-android-device/

#technology #android #mods #Shizuku #adb
#Blog, ##adb, ##android, ##modding, ##shizuku, ##technology

danie10@squeet.me

How to install and use ADB for Android devices on Windows, Mac, Linux, Android, Chromebooks, or even in a browser

Bild/Foto
If you want to do any number of things that require access to the so-called Android Debug Bridge (ADB) or the fastboot tools for Android — sideloading apps, installing custom ROMs, taking screenshots in apps that forbid it, or accessing certain hidden features — you’ll need to get ADB up and running on your platform of choice first. Fortunately, doing so is possible virtually on any device at this point — you can even start ADB from another Android phone, or a web browser.

See https://www.androidpolice.com/install-and-use-adb-on-windows-mac-linux-android-chromebooks-browser/

#technology #android #adb
#Blog, ##adb, ##android, ##technology