MetaMask

MetaMask

0xa8461472cEB637C1103D5cC74caaf5EC05c0d66f

Zanimaju li vas novi NFT-ovi ili nezamjenjivi tokeni, ali ne znate odakle početi? Zanimaju vas kriptovalute, ali novčanici su za vas previΕ‘e komplicirani ili djeluju zastraΕ‘ujuΔ‡e? MetaMask je kripto i NFT novčanik koji radi kao mobilna aplikacija ili proΕ‘irenje preglednika, kada MetaMask moΕΎe posluΕΎiti kao jednostavan i pristupačan ulazak u svijet blockchain aplikacija i imovine.

Ε to je to MetaMask?
MetaMask sebe naziva β€œvaΕ‘om vezom s novim internetom” i dizajniran je da sluΕΎi kao novčanik i identifikacija ili ID za online aplikacije temeljene na blockchainu, izgraΔ‘ene na Ethereumu. Osim Ε‘to korisnicima daje pristup kripto i NFT-ovima, obeΔ‡ava sigurnije i privatnije iskustvo preglednika. Jedina začkoljica je u tome Ε‘to kada korisnici drΕΎe sve svoje podatke, ne mogu si priuΕ‘titi da ih izgube ili daju sami.

MetaMask radi kao besplatna mobilna aplikacija za iOS i Android, ali može raditi i kao proőirenje za preglednike Google Chromea, Firefoxa, Bravea i Edgea za računala. Ako koristite Firefox, Brave ili Edge, posjetite stranicu za preuzimanje MetaMask, pomaknite se prema dolje do Podržani preglednici i odaberite ikonu za željeni preglednik. Odatle je instalirajte kao bilo koju drugu aplikaciju ili proőirenje.

Snimke zaslona razlikuju se ovisno o tome koji internetski preglednik koristite, pa ako slijedite zajedno s aplikacijom ili alternativnim proőirenjem preglednika, stvari mogu izgledati malo drugačije na vaőem zaslonu.

Započinjanje s MetaMask korisničkim računom?
U svojoj srΕΎi, MetaMask je kripto novčanik. Ako ΕΎelite prednosti interakcije s blockchain aplikacijama putem MetaMask računa, moΕΎda se pitate moΕΎete li povezati svoje postojeΔ‡e novčanike. Odgovor je β€œmoΕΎda moΕΎete”.

Kada se prvi put prijavljujete, postoji stranica za povezivanje postojeΔ‡eg novčanika s novim MetaMask računom unosom fraze za oporavak. Tijekom pisanja ovog članka unesena je fraza za oporavak postojeΔ‡eg novčanika blockchain.com, ali MetaMask je nije prepoznao. Uobičajene recenzije aplikacija kaΕΎu da MetaMask ne radi sa svim tvrdim novčanicima, tako da bi ovo mogao biti samo problem s MetaMaskom.

Izrada novog MetaMask računa kao proőirenja preglednika je brza i jednostavna. Najteži dio je s vaőom početnom frazom, koja postaje vaőa fraza oporavka. Ako ste upoznati s kripto novčanicima, upoznati ste s ovim konceptom. Ako je MetaMask vaő prvi kripto novčanik, sve őto trebate znati objaőnjeno je u kratkom videu.

Kako osigurati MetaMask novčanik?
U biti, vaΕ‘a fraza za oporavak od dvanaest riječi sluΕΎi kao rezerva u slučaju da se ne moΕΎete prijaviti na svoj račun. BuduΔ‡i da MetaMask sebe vidi kao temelj vaΕ‘eg identiteta na novom internetu, ako netko drugi ulazi u vaΕ‘ račun to znači da se taj netko drugi ΕΎeli dočepati vaΕ‘eg broja socijalnog osiguranja, ne samo vaΕ‘eg novca i kartica. Stranice za postavljanje preporučuju da zapiΕ‘ete svoj izraz ili lozinku za oporavak i čuvate je na sigurnom mjestu ili koristite pouzdanog upravitelja lozinkama.

Nakon őto dobijete frazu za oporavak, morate redom odabrati riječi iz banke riječi kako biste bili sigurni da ste je ispravno kopirali. Nakon őto je ovaj mali test obavljen, stranica za potvrdu vam govori da ste spremni za početak koriőtenja MetaMaska.

Ostvarivanje pristupa MetaMask korisničkom računu?
Nakon őto je vaőe MetaMask proőirenje preglednika postavljeno, možete mu pristupiti tako da se vratite na MetaMask web mjesto i prijavite se. Naravno, budući da je to proőirenje preglednika, možete također odabrati MetaMask logotip na alatnoj traci proőirenja pored trake za pretraživanje na vrhu prozora preglednika.

Pristup MetaMasku s vaΕ‘e alatne trake proΕ‘irenja pokazuje vam na kojoj mreΕΎi MetaMask radi i brzi pregled vaΕ‘ih sredstava. TakoΔ‘er vam pokazuje je li vaΕ‘ MetaMask račun povezan sa web mjestom na kojem se nalazite. NaΕΎalost, u trenutku pisanja ovog teksta, nema puno stranica koje rade s MetaMaskom. Ako ga pronaΔ‘ete, gumb na stranici omoguΔ‡it Δ‡e vam povezivanje računa.

Iz sučelja web stranice ili sučelja proΕ‘irenja takoΔ‘er moΕΎete kupiti, prodati ili zamijeniti imovinu u svom novčaniku. MoΕΎete kupovati putem bankovnog prijenosa ili kreditnog ili debitnog računa. TakoΔ‘er moΕΎete prenijeti ETH iz drugog novčanika ili zamijeniti ETH na svom računu za druge podrΕΎane tokene. U bilo kojem trenutku moΕΎete kopirati svoju javnu adresu novčanika u meΔ‘uspremnik klikom na naziv svog računa. BuduΔ‡i da je MetaMask jako velik po pitanju sigurnosti, morat Δ‡ete se ponovno prijaviti na svoj račun kada ponovno pokrenete preglednik.

Kako personalizirati MetaMask korisnički račun?
Svojem računu moΕΎete pristupiti iz proΕ‘irenja ili sučelja web stranice klikom na ikonu naslaganih točaka u gornjem desnom kutu i odabirom Pojedinosti o računu iz izbornika koji se pojavi. Time se prikazuje QR kod i tekstualna verzija vaΕ‘e javne adrese. TakoΔ‘er moΕΎete kliknuti ikonu olovke desno od naziva računa da biste ga promijenili u bilo kojem trenutku.

Iz bilo kojeg sučelja takoΔ‘er moΕΎete promijeniti mreΕΎu koju MetaMask koristi tako da moΕΎe podrΕΎavati dodatne lance blokova. Pritisnite polje Ethereum Mainnet (zadana MetaMask mreΕΎa) da biste otvorili padajuΔ‡i izbornik ostalih podrΕΎanih mreΕΎa. Donja stavka, Custom RPC, omoguΔ‡uje vam dodavanje mreΕΎa koje nisu dio standardnog popisa podrΕ‘ke.

KoriΕ‘tenje MetaMask-a
MetaMask nije takozvana ”putovnica” za internet kakvom ΕΎeli biti. Barem ne joΕ‘. Ovdje postoji jako puno posla koji se mora obaviti, kako bi MetaMask postao u potpunosti jednoga dana ono Ε‘to ΕΎeli postati. MetaMask je rano doΕ‘ao u novo polje internetskog dizajna. Jednog dana bi doista mogao rijeΕ‘iti naΕ‘e probleme identiteta, sigurnosti i financija na internetu.

To Ε‘to MetaMask joΕ‘ ne radi sve te stvari ne znači da ga se joΕ‘ ne isplati imati. Čak i dok čekamo sljedeΔ‡u generaciju interneta, MetaMask je veΔ‡ pristupačan novčanik jednostavan za koriΕ‘tenje, koji vam daje sve Ε‘to vam je potrebno da uronite u buduΔ‡nost blockchaina i decentraliziranih aplikacija. Sve je stvar u tome Ε‘to korisnici ΕΎele i kakve su im preference. Sukladno tomu, MetaMask bi se mogao razvijati sukladno onome Ε‘to korisnici od ove platforme ΕΎele.

METAS DOESNT LIKE THEIR PACKAGE NOT USING

FB now started force,
i mean if u want to use FB/INSTA/THREADS ,
now u must enable or defrost mettas packages,
“`
package:com.facebook.katana
package:com.facebook.system
package:com.facebook.appmanager
package:com.facebook.services
“`
when u click FB link inside INSTA app,
pop-up msg say that u need to enable “Meet Installer”
when i didnt neeed them before but now FB app no thx…

when u click that Go to settings that link forwards u to;

Meet Install, now.lets take a look permissions:

FB relation pckages are these:

and these mettas apps are huge analytics, monitors,
spy silenty/logging sending app which learn ur device behavir…
and u dont even feel sumthin wrong…

but what SAMSUNG do with their preinstalled app its so shameless…
evry samsung app got backdoor allwayw available no matter how much they try.to patch all …

CVE’S penetrater in evry single samsung app…
which now.look like swiss chesse …
i allready frozzen 130+ samsung app n blootwares…
far far away from samsung app…
it better to use google service on samsung deviced…

my SCUMSUNG BLOOTWARES LIST:

xDD

SCUMSUNG.vulnerability.cve

vulnerabilityΒ 

11-2023/2024

SVE-2023-0774(CVE-2024-20825, CVE-2024-20824, CVE-2024-20823, CVE-2024-20822): Implicit intent hijacking vulnerability in Galaxy Store

Resolved version: 4.5.63.6
Reported on: May 4, 2023
Description: Implicit intent hijacking vulnerability in Galaxy Store prior to version 4.5.63.6 allows local attackers to access sensitive information via implicit intent.

Samsung Gallery

SVE-2023-1781(CVE-2024-20827): Improper access control vulnerability in Samsung Gallery

Description: Improper access control vulnerability in Samsung Gallery prior to version 14.5.04.4 allows physical attackers to access the picture using physical keyboard on the lockscreen.
The patch prevents menu access by physical keyboard in locked device

Samsung Internet

SVE-2023-2275(CVE-2024-20828): Improper authorization verification vulnerability in Samsung Internet

Description: Improper authorization verification vulnerability in Samsung Internet prior to version 24.0 allows physical attackers to access files downloaded in SecretMode without proper authentication.
The patch adds proper authorization verification logic to prevent unauthorized access.

Samsung Email

SVE-2023-0956(CVE-2024-20807): Implicit intent hijacking vulnerability in Samsung Email

Description: Implicit intent hijacking vulnerability in Samsung Email prior to version 6.1.90.16 allows attacker to get sensitive information.
The patch change the implicit intent to explicit intent.

SVE-2023-1990(CVE-2024-20808): Improper access control vulnerability in Nearby device scanning

SVE-2023-2339(CVE-2024-20841): Improper Handling of Insufficient Privileges in Samsung Account

SVE-2023-2250(CVE-2024-20840): Improper Access Control in Samsung Voice Recorder

SVE-2024-0210(CVE-2024-20852): Improper verification of intent by broadcast receiver vulnerability in SmartThings

SVE-2023-2372(CVE-2024-20851): Improper access control vulnerability in Samsung Data Store

SVE-2023-2086(CVE-2024-20850): Use of Implicit Intent for Sensitive Communication in Samsung Pay

SVE-2023-2191(CVE-2024-20854): Improper handling of insufficient privileges vulnerability in Samsung Camera

SVE-2024-0405(CVE-2024-20853): Improper verification of intent by broadcast receiver vulnerability in ThemeStore

SVE-2024-0210(CVE-2024-20852): Improper verification of intent by broadcast receiver vulnerability in SmartThings

SVE-2023-1416(CVE-2023-42544): Improper access control vulnerability in Quick Share

SVE-2023-1414(CVE-2023-42543): Improper verification of intent by broadcast receiver vulnerability in Bixby Voice

SVE-2023-1287(CVE-2023-42541): Improper authorization in Samsung Push Service

SVE-2023-0668(CVE-2023-42539): PendingIntent hijacking vulnerability in Samsung Health

SVE-2023-1503(CVE-2023-42552): Implicit intent hijacking vulnerability in Firewall application

SVE-2023-1454(CVE-2023-42545): Use of implicit intent for sensitive communication vulnerability in Phone

source:
https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=02

Windows 7 Services List that can be Disabled Safely

Windows 7 Services List that can be Disabled Safely

We have posted service configuration guides forΒ Windows XPΒ andΒ Windows VistaΒ in past and now its turn of Windows 7. In this tutorial we’ll learn about the Windows services which are not essential and can be safely disabled or set to MANUAL to speed up your Windows 7 computer system:

STEP 1.Β Right-click onΒ ComputerΒ icon on desktop and selectΒ Manage, it’ll open a new window. Now go toΒ Services & Applications -> Services. You can also open the same fromΒ Administrative ToolsΒ ->Β Computer Management. Or you can directly open β€œServices” list by providingΒ services.mscΒ command in RUN or Start Menu search box.

STEP 2.Β Now you can set the unnecessary services to DISABLED or MANUAL. Just double-click on any service and select the desired option inΒ Startup typeΒ list box.

NOTE 1:Β Always set the service to MANUAL, never disable it, so that whenever Windows needs to start a service, it can easily start and use it. If you set any service to DISABLED, Windows will not be able to start it and will give some error messages.

NOTE 2:Β You can setΒ Remote RegistryΒ service to DISABLED for Security purposes.

Here is a list of services that can be safely set to MANUAL/DISABLED:

β€’ Computer BrowserΒ (If your computer is not connected to any network)
β€’ Desktop Window Manager Session ManagerΒ (If you don’t use Aero glass theme)
β€’ Diagnostic Policy Service
β€’ Distributed Link Tracking ClientΒ (If your computer is not connected to any network)
β€’ IP HelperΒ (If you don’t use IPv6 connection)
β€’ Offline Files
β€’ Portable Device Enumerator Service
β€’ Print SpoolerΒ (If you don’t have a Printer)
β€’ Protected Storage
β€’ Remote Registry
β€’ Secondary Logon
β€’ Security Center
β€’ ServerΒ (If your computer is not connected to any network)
β€’ Tablet PC Input Service
β€’ TCP/IP NetBIOS HelperΒ (If you are not in a workgroup network)
β€’ ThemesΒ ( If you use Windows Classic theme)
β€’ Windows Error Reporting Service
β€’ Windows Media Center Service Launcher
β€’ Windows SearchΒ (If you don’t use Windows Search feature frequently)

PS:Β You can see the details of each service to determine whether you should disable it or not.

ADB (Android Debug Bridge)

NAME
adb CLI Client for ADB (Android Debug Bridge) Server.

SYNOPSIS
adb [GLOBAL_OPTIONS] command [COMMAND_OPTIONS]

DESCRIPTION
Connects to the ADB Server via its smart socket interface. Allows sending requests, receives responses and manages lifecycle of the adb server.

Tasks are performed via commands. Some commands are fulfilled directly by the server while others are “forwarded over to the adbd(ADB daemon) running on the device.
(more…)

ANDROID SDK

Android SDK Platform Tools refer to a collection of tools that are required to develop and test Android apps. The two most commonly used tools in this package are Android Debug Bridge (ADB) and Fastboot.

  • ADB is a command-line tool that enables communication between an Android device and a computer, allowing developers to perform various tasks, such as transferring files, debugging apps, and installing or uninstalling apps.
  • Fastboot is a protocol for flashing new firmware onto Android devices. It allows developers to flash custom recoveries, bootloaders, and kernels onto Android devices.

Both ADB and Fastboot are important tools for Android developers, as they provide access to the low-level functionality of Android devices and enable them to perform various tasks and debug their apps.

This package only supports the Windows platform:

Android SDK Platform Tools 34.0.4 (Windows)

MANIFESTO.dll

 

 

 

ObezbjeΔ‘enje za zdrav Internet

Otvoreni, globalni internet najmoΔ‡niji je resurs za komunikaciju i suradnju koji smo ikada vidjeli. Utjelovljuje neke od naΕ‘ih najdubljih nada u ljudski napredak. OmoguΔ‡uje nove moguΔ‡nosti učenja, izgradnju osjeΔ‡aja zajedničke ljudskosti i rjeΕ‘avanje goruΔ‡ih problema s kojima se ljudi svugdje suočavaju.

Tijekom posljednjeg desetljeΔ‡a vidjeli smo da se ovo obeΔ‡anje ispunjava na viΕ‘e načina. Vidjeli smo i snagu interneta koja se koristi za poveΔ‡anje podjele, poticanje na nasilje, promicanje mrΕΎnje i namjerno manipuliranje činjenicama i stvarnoΕ‘Δ‡u. Saznali smo da bismo trebali eksplicitnije iznijeti svoje teΕΎnje za ljudskim iskustvom na internetu. To radimo sada.

ZalaΕΎemo se za internet koji uključuje sve narode zemlje β€” gdje demografske karakteristike osobe ne odreΔ‘uju njihov mreΕΎni pristup, moguΔ‡nosti ili kvalitetu iskustva.

ZalaΕΎemo se za internet koji promiče graΔ‘anski diskurs, ljudsko dostojanstvo i individualni izraz.

Zalažemo se za internet koji uzdiže kritičko razmiőljanje, argumentirane argumente, zajedničko znanje i provjerljive činjenice.

ZalaΕΎemo se za internet koji katalizira suradnju različitih zajednica koje rade zajedno za opΔ‡e dobro.


Internet je sastavni dio modernog ΕΎivota β€” ključna komponenta u obrazovanju, komunikaciji, suradnji, poslu, zabavi i druΕ‘tvu u cjelini.


Internet je globalni javni resurs koji mora ostati otvoren i dostupan.


Internet mora obogatiti živote pojedinih ljudskih bića.


Pojedinci ’ sigurnost i privatnost na Internetu temeljni su i ne smiju se tretirati kao neobavezni.

#5
Pojedinci moraju imati sposobnost oblikovanja interneta i vlastitog iskustva s njim.

#5
Učinkovitost interneta kao javnog resursa ovisi o interoperabilnosti (protokoli, formati podataka, sadržaju), inovacijama i decentraliziranom sudjelovanju őirom svijeta.

#6
Besplatan i open source softver potiče razvoj interneta kao javnog resursa.

#7
Transparentni procesi utemeljeni u zajednici promiču sudjelovanje, odgovornost i povjerenje.


Povećavanje aspekata javne koristi Interneta važan je cilj, dostojan vremena, pažnje i predanosti.

Elon Musk planira naplatiti nove 𝕏 korisnike kako bi omoguΔ‡io slanje poruka

𝕏 (ranije Twitter)

Elon Musk planira novim X korisnicima naplatiti malu naknadu kako bi omogućio postavljanje na druőtvenu mrežu i suzbio bot problem.

Kao odgovor na X račun koji je objavio promjene na X-ovoj web stranici, Musk je rekao da je naplaΔ‡ivanje male naknade na nove račune β€œ samo način ” da se zaustavi β€œ unos botova. ”

Trenutni AI (i farme trolova) mogu s lakoΔ‡om proΔ‡i β€˜ jesi li bot ’, rekao je Musk, pozivajuΔ‡i se na alate poput CAPTCHA.

SAMSUNG DEBLOADERS PART 1

Samsung android devices comes with so many pre-installed system app…
It can be over 400+ these system apss… lol thats pretty too much for one devices.. oO
so u can safely remove sum… i preffere all which associated with samsung can be removed..
u can use google acc n store without any probs…

using ADB shell command:

pm uninstall -k --user 0 "packagename"

example:
pm uninstall -k --user 0 com.sec.android.app.dexonpc


com.sec.android.app.dexonpc \
com.samsung.android.lool \
com.google.android.apps.turbo \
com.google.android.apps.tachyon \
com.google.android.tts \
com.samsung.android.bixby.wakeup \
com.samsung.android.app.spage \
com.samsung.android.app.routines \
com.samsung.android.bixby.service \
com.samsung.android.visionintelligence \
com.samsung.android.bixby.agent \
com.samsung.android.bixby.agent.dummy \
com.samsung.android.bixbyvision.framework \
com.dsi.ant.sample.acquirechannels \
com.dsi.ant.service.socket \
com.dsi.ant.server \
com.dsi.ant.plugins.antplus \
com.android.egg \
com.sec.android.easyonehand \
com.sec.android.widgetapp.samsungapps \
com.samsung.android.mateagent \
com.sec.android.easyMover.Agent \
com.samsung.android.app.watchmanagerstub \
com.sec.android.daemonapp \
com.samsung.android.app.social \
com.samsung.android.samsungpassautofill \
com.samsung.android.authfw \
com.samsung.android.samsungpass \
com.samsung.android.spay \
com.samsung.android.spayfw \
com.samsung.android.aremoji \
com.google.ar.core \
flipboard.boxer.app \
com.samsung.android.wellbeing \
com.samsung.android.da.daagent \
com.samsung.android.service.livedrawing \
com.sec.android.mimage.avatarstickers \
com.facebook.katana \
com.facebook.system \
com.facebook.appmanager \
com.facebook.services \
com.samsung.android.drivelink.stub \
com.android.bips \
com.google.android.printservice.recommendation \
com.android.printspooler \
com.samsung.android.email.provider \
com.wsomacp \
com.samsung.android.game.gamehome \
com.enhance.gameservice \
com.samsung.android.game.gametools \
com.samsung.android.game.gos \
com.samsung.android.gametuner.thin \
com.sec.android.app.sbrowser \
com.samsung.android.app.sbrowseredge \
com.samsung.android.hmt.vrsvc \
com.samsung.android.app.vrsetupwizardstub \
com.samsung.android.hmt.vrshell \
com.google.vr.vrcore \
com.samsung.android.kidsinstaller \
com.samsung.android.app.camera.sticker.facearavatar.preload \
com.samsung.android.service.peoplestripe \
com.sec.android.desktopmode.uiservice \
com.samsung.desktopsystemui \
com.sec.android.app.desktoplauncher \

Doesnt mean u diseable all of them but read evry one…
list just shows which one safe to remove..

SAMSUNG DEBLOADS ANDROID

Did u kno that Samsung android phones got like cca 160+ system preload apps?
And with others like google, n others,
Samsung phones got 400+ system preload app??
What these chineze doing ?

lets see…

pm list package | grep 'samsung'

package:com.samsung.android.svcagent
package:com.samsung.android.visionintelligence
package:com.samsung.oda.service
package:com.samsung.android.widget.pictureframe
package:com.samsung.android.app.camera.sticker.facearavatar.preload
package:com.samsung.android.calendar
package:com.samsung.android.inputshare
package:com.samsung.android.app.telephonyui.esimclient
package:com.samsung.android.providers.factory
package:com.samsung.android.vtcamerasettings
package:com.samsung.android.app.aodservice
package:com.samsung.android.dsms
package:com.samsung.android.mcfds
package:com.samsung.android.app.appsedge
package:com.samsung.android.smartface.overlay
package:com.samsung.android.knox.kpecore
package:com.samsung.android.app.spage
package:com.samsung.android.lool
package:com.samsung.android.app.settings.bixby
package:com.samsung.android.app.galaxyfinder
package:com.samsung.android.net.wifi.wifiguider
package:com.samsung.android.app.sharelive
package:com.samsung.ipservice
package:com.samsung.android.localeoverlaymanager
package:com.samsung.android.spayfw
package:com.samsung.android.accessibility.talkback
package:com.samsung.android.incallui
package:com.samsung.android.allshare.service.mediashare
package:com.samsung.android.wifi.softapwpathree.resources
package:com.samsung.android.samsungpass
package:com.samsung.android.sdk.handwriting
package:com.samsung.android.bixby.agent
package:com.samsung.android.knox.attestation
package:com.samsung.android.smartcallprovider
package:com.samsung.android.networkdiagnostic
package:com.samsung.app.newtrim
package:com.samsung.android.bixby.wakeup
package:com.samsung.advp.imssettings
package:com.samsung.android.peripheral.framework
package:com.samsung.android.biometrics.app.setting
package:com.samsung.crane
package:com.samsung.android.mdx
package:com.samsung.android.mdm
package:com.samsung.android.ConnectivityUxOverlay
package:com.samsung.knox.securefolder
package:com.samsung.android.smartface
package:com.samsung.android.providers.contacts
package:com.samsung.ucs.agent.ese
package:com.samsung.android.cidmanager
package:com.samsung.android.bbc.bbcagent
package:com.samsung.android.shortcutbackupservice
package:com.samsung.android.mcfserver
package:com.samsung.android.scloud
package:com.samsung.accessibility
package:com.samsung.android.game.gametools
package:com.samsung.android.mtp
package:com.samsung.android.beaconmanager
package:com.samsung.android.appseparation
package:com.samsung.android.app.cocktailbarservice
package:com.samsung.android.sdk.ocr
package:com.samsung.android.privateshare
package:com.samsung.android.video
package:com.samsung.android.audiomirroring
package:com.samsung.gpuwatchapp
package:com.samsung.android.incall.contentprovider
package:com.samsung.android.knox.pushmanager
package:com.samsung.android.app.watchmanagerstub
package:com.samsung.android.brightnessbackupservice
package:com.samsung.android.app.soundpicker
package:com.samsung.clipboardsaveservice
package:com.samsung.android.app.omcagent
package:com.samsung.android.wifi.softap.resources
package:com.samsung.SMT
package:com.samsung.android.aircommandmanager
package:com.samsung.cmh
package:com.samsung.android.networkstack
package:com.samsung.android.singletake.service
package:com.samsung.android.app.clipboardedge
package:com.samsung.android.callbgprovider
package:com.samsung.android.aware.service
package:com.samsung.android.container
package:com.samsung.android.bluelightfilter
package:com.samsung.android.smartsuggestions
package:com.samsung.android.wcmurlsnetworkstack
package:com.samsung.android.app.reminder
package:com.samsung.android.mdx.quickboard
package:com.samsung.android.service.tagservice
package:com.samsung.android.videolist
package:com.samsung.android.app.telephonyui
package:com.samsung.android.keycustomizationinfobackupservice
package:com.samsung.android.scs
package:com.samsung.android.setting.multisound
package:com.samsung.android.networkstack.tethering.overlay
package:com.samsung.android.sm.devicesecurity
package:com.samsung.android.app.taskedge
package:com.samsung.android.provider.filterprovider
package:com.samsung.android.dck.timesync
package:com.samsung.android.app.dressroom
package:com.samsung.android.samsungpositioning
package:com.samsung.android.honeyboard
package:com.samsung.android.server.wifi.mobilewips
package:com.samsung.safetyinformation
package:com.samsung.android.emergency
package:com.samsung.android.smartswitchassistant
package:com.samsung.android.knox.analytics.uploader
package:com.samsung.android.wallpaper.res
package:com.samsung.android.dqagent
package:com.samsung.android.arzone
package:com.samsung.android.fmm
package:com.samsung.android.allshare.service.fileshare
package:com.samsung.sec.android.application.csc
package:com.samsung.aasaservice
package:com.samsung.android.secsoundpicker
package:com.samsung.cmfa.AuthTouch
package:com.samsung.android.easysetup
package:com.samsung.android.dynamiclock
package:com.samsung.android.stickercenter
package:com.samsung.android.privacydashboard
package:com.samsung.faceservice
package:com.samsung.android.location
package:com.samsung.android.app.routines
package:com.samsung.android.dialer
package:com.samsung.rcs
package:com.samsung.android.samsungpassautofill
package:com.samsung.ims.smk
package:com.samsung.android.visualars
package:com.samsung.android.app.updatecenter
package:com.samsung.android.bixbyvision.framework
package:com.samsung.android.knox.containercore
package:com.samsung.android.sdm.config
package:com.samsung.android.themecenter
package:com.samsung.android.aremoji
package:com.samsung.android.forest
package:com.samsung.android.messaging
package:com.samsung.android.mapsagent
package:com.samsung.android.mobileservice
package:com.samsung.android.service.stplatform
package:com.samsung.android.smartmirroring
package:com.samsung.android.authfw
package:com.samsung.storyservice
package:com.samsung.android.sume.nn.service
package:com.samsung.android.ipsgeofence
package:com.samsung.android.mateagent
package:com.samsung.android.photoremasterservice
package:com.samsung.android.game.gos
package:com.samsung.android.app.smartcapture
package:com.samsung.android.ConnectivityOverlay
package:com.samsung.android.service.peoplestripe
package:com.samsung.adaptivebrightnessgo
package:com.samsung.klmsagent
package:com.samsung.android.fast
package:com.samsung.android.kidsinstaller
package:com.samsung.android.mdecservice
package:com.samsung.android.hdmapp
package:com.samsung.android.game.gamehome
package:com.samsung.android.ardrawing
package:com.samsung.android.providers.media
package:com.samsung.android.mdx.kit
package:com.samsung.android.app.dofviewer
package:com.samsung.android.da.daagent
package:com.samsung.android.rubin.app
package:com.samsung.android.kgclient
package:com.samsung.android.gru
package:com.samsung.android.cmfa.framework
package:com.samsung.android.scpm

= 165 lines

pm kill –samungs debloads

ANDROID BINS & VARS

art_boot
/apex/com.android.art/bin/art_boot

art_exec
/apex/com.android.art/bin/art_exec

artd
/apex/com.android.art/bin/artd

awk
/system/bin/awk

cat
/system/bin/cat

chcon
/system/bin/chcon

chgrp
/system/bin/chgrp

chmod
/system/bin/chmod

chown
/system/bin/chown

chroot
/system/bin/chroot

chrt
/system/bin/chrt

cksum
/system/bin/cksum

clear
/system/bin/clear

cmd
/system/bin/cmd

cmp
/system/bin/cmp

cp
/system/bin/cp

crash_dump32
/apex/com.android.runtime/bin/crash_dump32

crash_dump64
/apex/com.android.runtime/bin/crash_dump64

curl
/system/bin/curl

cut
/system/bin/cut

dalvikvm
/apex/com.android.art/bin/dalvikvm

dalvikvm32
/apex/com.android.art/bin/dalvikvm32

dalvikvm64
/apex/com.android.art/bin/dalvikvm64

date
/system/bin/date

dd
/system/bin/dd

devmem
/system/bin/devmem

dex2oat
/apex/com.android.art/bin/dex2oat

dex2oat32
/apex/com.android.art/bin/dex2oat32

dex2oat64
/apex/com.android.art/bin/dex2oat64

dexdump
/apex/com.android.art/bin/dexdump

dexlist
/apex/com.android.art/bin/dexlist

dexoptanalyzer
/apex/com.android.art/bin/dexoptanalyzer

df
/system/bin/df

diff
/system/bin/diff

dirname
/system/bin/dirname

dumpsys
/system/bin/dumpsys

echo
/system/bin/echo

file
/system/bin/file

find
/system/bin/find

fmt
/system/bin/fmt

getconf
/system/bin/getconf

getprop
/system/bin/getprop

grep
/system/bin/grep

groups
/system/bin/groups

gzip
/system/bin/gzip

head
/system/bin/head

hostname
/system/bin/hostname

id
/system/bin/id

ifconfig
/system/bin/ifconfig

ime
/system/bin/ime

install
/system/bin/install

ip
/system/bin/ip

ip6tables
/system/bin/ip6tables

iptables
/system/bin/iptables

kill
/system/bin/kill

linker
/apex/com.android.runtime/bin/linker

linker64
/apex/com.android.runtime/bin/linker64

linker_asan
/apex/com.android.runtime/bin/linker_asan

linker_asan64
/apex/com.android.runtime/bin/linker_asan64

linkerconfig
/apex/com.android.runtime/bin/linkerconfig

ln
/system/bin/ln

log
/system/bin/log logcat /system/bin/logcat

ls
/system/bin/ls

lsof
/system/bin/lsof

md5sum
/system/bin/md5sum

mkdir
/system/bin/mkdir

monkey /system/bin/monkey

more
/system/bin/more

mount
/system/bin/mount

mv
/system/bin/mv

nc
/system/bin/nc

ndc
/system/bin/ndc

netstat
/system/bin/netstat

nice
/system/bin/nice

oatdump
/apex/com.android.art/bin/oatdump

odrefresh
/apex/com.android.art/bin/odrefresh

ping
/system/bin/ping

ping6
/system/bin/ping6

profman
/apex/com.android.art/bin/profman

ps
/system/bin/ps

pwd
/system/bin/pwd

reboot
/system/bin/reboot

rm
/system/bin/rm

rmdir
/system/bin/rmdir

rmmod
/system/bin/rmmod

setprop
/system/bin/setprop

settings
/system/bin/settings

sh
/system/bin/sh

sleep
/system/bin/sleep

start
/system/bin/start

stat
/system/bin/stat

stop
/system/bin/stop

swapoff
/system/bin/swapoff

swapon
/system/bin/swapon

tail
/system/bin/tail

time
/system/bin/time

top
/system/bin/top

touch
/system/bin/touch

unlink
/system/bin/unlink

unzip
/system/bin/unzip

uptime
/system/bin/uptime

vmstat
/system/bin/vmstat

watch
/system/bin/watch

WC
/system/bin/wc

which
/system/bin/which

whoami
/system/bin/whoami

xargs
/system/bin/xargs

ANDROID_ART_ROOT
/apex/com.android.art

ANDROID_ASSETS
/system/app

ANDROID_BOOTLOGO
1

ANDROID_DATA
/data

ANDROID_118N_ROOT
/apex/com.android.i18n

ANDROID_ROOT
/system

ANDROID_SOCKET_usap_pool_primary
23

ANDROID_SOCKET_zygote
22

ANDROID_STORAGE
/storage

ANDROID_TZDATA_ROOT
/apex/com.android.tzdata

ASEC_MOUNTPOINT
/mnt/asec

BOOTCLASSPATH
/apex/com.android.art/javalib/core-oj.jar:/apex/
com.android.art/javalib/core-libart.jar:/apex/
com.android.art/javalib/okhttp.jar:/apex/com.android.art/

DEX20ATBOOTCLASSPATH
/apex/com.android.art/javalib/core-oj.jar:/apex/
com.android.art/javalib/core-libart.jar:/apex/
com.android.art/javalib/okhttp.jar:/apex/com.android.art/

DOWNLOAD_CACHE
/data/cache

ENC_EMULATED_STORAGE_TARGET
/storage/enc_emulated

EXTERNAL_STORAGE
/sdcard

KNOX_STORAGE
/data/knox/ext_sdcard

PATH
/product/bin:/apex/com.android.runtime/bin:/apex/
com.android.art/bin:/system_ext/bin:/system/bin:/system/
xbin:/odm/bin:/vendor/bin:/vendor/xbin

STANDALONE_SYSTEMSERVER_JARS
/apex/com.android.btservices/javalib/
service-bluetooth.jar:/apex/com.android.os.statsd/javalib/
service-statsd.jar:/apex/com.android.scheduling/javalib/

SYSTEMSERVERCLASSPATH
/system/framework/com.android.location.provider.jar:/ system/framework/knoxanalyticssdk.jar:/system/
framework/services.jar:/system/framework/ssrm.jar:/

TMPDIR
/data/user/0/com.ddm.qute/cache

How to set up Shizuku with the wireless debugging feature

Starting with Android 11, Google added the wireless debugging feature to the developer options, which allows you to execute ADB commands over Wi-Fi. Before this, the only other option was connecting your Android device to a computer via a USB cable.

The learning curve with the ADB interface is steep enough to prevent the average user from trying it out for themselves. However, the on-device wireless debugging feature makes it easy for anyone to use ADB commands. No computer or complicated steps are required. Shizuku relies on this feature to keep the setup process as simple as possible.

Pair your device with Shizuku
The next part involves getting a unique pairing code and linking your device with the Shizuku app. The process is simple. When you complete this step, you won’t have to do it again unless something changes.

You can use Shizuku with the wireless debugging feature by doing the following:

Open the Shizuku app.
Scroll down to the Start via Wireless debugging section.
Tap the Pairing button.
Tap Developer options at the bottom.
Scroll down until you find the Wireless debugging option.
Tap the Use wireless debugging button.
Check the Always allow on this network checkbox.
Tap Allow to turn on the feature.
Tap Pair device with pairing code to bring up the Pair with device popup.
Enter the pairing code and activate the Shizuku service
Now that you have the pairing code for linking Shizuku with your device, type or paste that code into the appropriate text field.

To pair your device with Shizuku and finish the setup, check out the following:

Enter the unique six-digit Wi-Fi pairing code exactly as it appears into the Shizuku Pairing code notification textbox. If needed, swipe down on your status bar to the Shizuku notification, then tap Enter pairing code.
Enter your Wi-Fi pairing code and tap the Send button on the right to confirm. You’ll see a Pairing successful message if the pairing code is correct.
Your device is now synced with the Shizuku app.
Start the Shizuku service
Now that your device has been synched with the Shizuku app, it’s time to start the Shizuku background service.

To start the Shizuku service, do the following:

Tap the back arrow or gesture a few times until you return to the Shizuku app main screen. You might have to swipe away the Pairing successful notification before you can do that.
Under the Start via Wireless debugging section, tap the Start button.
The Shizuku service automatically starts on a new screen. It closes once the process is complete.
Scroll back to the top, and you’ll see the Shizuku is running status with a version number followed by adb.
If you’re stuck at the Searching for wireless debugging service message when activating Shizuku, follow these steps:

Tap Developer options in the message popup.
Turn off the Wireless debugging toggle switch.
Turn on the Wireless debugging toggle switch.
Tap the back arrow to return to the Shizuku app, and it starts the service immediately after that.
Now that the Shizuku service is ready and waiting on your device, you can use it for any app or mod that supports it. You must start the service again after every reboot, so keep that in mind.

How to set up Shizuku with ADB commands on a computer
The wireless debugging feature is the best non-root method for most Shizuku users. However, some might prefer to use the ADB interface through a computer. The setup process involves more than the on-device wireless debugging feature introduced with Android 11. Once you get past the initial setup phase, it becomes easier to use.

Download the platform-tools folder and start the setup process
In this part, you’ll download the platform-tools folder, which has everything you need to run ADB commands from your computer.

To start Shizuku with ADB commands on a computer, do the following:

Download the latest Android SDK platform-tools and extract the folder to your desktop for easy access.

Install the Google USB drivers if needed (for Windows users).
Turn on USB debugging on your Android device.
Open the Settings app, then go to System > Developer options.
Scroll down and tap the USB debugging option.
Tap OK to activate it.
Finish the ADB setup process and activate Shizuku
Now that the platform-tools folder is ready to go and USB debugging has been activated, you’ll link your computer with your phone. From there, you’ll run a specific ADB command to start the Shizuku service on your phone.

To finish the setup process and activate Shizuku, do the following:

Connect your phone to your computer via a USB cable.
On your Android device, confirm the fingerprint key for the computer by pressing Allow when required. Check the Always allow from this computer box to avoid potential connection issues.

Open a command window or terminal in the platform-tools folder. If you use Windows, click the address bar in the platform-tools folder, type cmd, and press Enter. This opens a new command window in the platform-tools folder

To double-check that your device is connected through ADB properly, type adb devices in the command window or terminal, then press Enter. Initiating the ADB command asks you to confirm your computer’s fingerprint key if it didn’t appear earlier.
You’ll see a unique device identifier number under List of devices attached, letting you know it’s connected and recognized by the ADB interface.
Copy and paste adb shell sh /sdcard/Android/data/moe.shizuku.privileged.api/start.sh into the command window or terminal, then press Enter. On some platforms (especially Mac and Linux), enter ADB commands with “./” minus the quotes at the beginning for them to work correctly.
The command starts the Shizuku service on your Android device, showing an exit with 0 status within a few seconds. If you see this at the end, you’re good to go. The service was successfully started

Check your Shizuku app at the top, and you’ll see the Shizuku is running status with a version number followed by adb.
As with the wireless debugging feature, you must reactivate the Shizuku service each time you reboot your device. These two methods rely on the ADB interface, which only makes temporary changes to your device without root access. Since you don’t need to reboot that often these days, it shouldn’t be an issue for most.

How to use Shizuku in a terminal (optional)
If you want to use Shizuku in a terminal environment on Android, follow the in-app instructions by tapping Use Shizuku in terminal apps. It asks you to export and edit two files with the package name of your terminal app. Move them to a place where the terminal can find them. This is an advanced feature for people who like working with a command-line interface

How to set up Shizuku with full root access
You don’t need root access to use Shizuku on your Android device. However, it’s the fastest route you can take to activate the service. The setup is as simple as pressing a button, and you can keep the Shizuku service activated after a reboot.

If you want to use Shizuku with full root access, do the following:

Open the Shizuku app, then go to the Start (for rooted devices) section.
Tap the Start button to begin the process.
Tap Grant to give the proper root permissions when requested.
The Shizuku service starts within a few seconds on a new screen and then automatically closes when it’s finished.
Scroll to the top and check that the Shizuku is running status with a version number followed by root.
If you don’t want to reactivate the Shizuku service after every reboot, follow these steps:

Tap the Settings cogwheel icon in the upper-right corner.
Turn on the Start on boot (root) option.
Once you do that, the Shizuku service stays activated after you reboot your device, making it easier for you to manage.

Shizuku makes on-device rootless mods a reality
Now that you know how to set up Shizuku, you can test different mods for yourself. Root access isn’t needed to benefit from its features. Soon, we should see more unique apps and mods with built-in support for the Shizuku service.

You might want to check out how to restore your device after a factory reset using Shizuku to make your life easier. We walk you through the steps and explain how using Shizuku to back up and restore your device is beneficial.