Bootloader unlocking: Difference between revisions

Reform (talk | contribs)
m Added more clarification. Then added some extra examples of privacy-preserving components and made a bulleted list out of the existing examples. Also added an extra comment about how we shouldn't cite reddit/forums and we should fint better sources
Workaround Google Play Services: Add Unified Push to list
 
Line 11: Line 11:
Most custom ROMs do not contain any of the components that send data to the manufacturer, Google, and their partner companies.<ref name=":0" /> In some cases, they even contain components that prevent individual apps from doing so, such as:
Most custom ROMs do not contain any of the components that send data to the manufacturer, Google, and their partner companies.<ref name=":0" /> In some cases, they even contain components that prevent individual apps from doing so, such as:


* [https://doc.e.foundation/support-topics/advanced_privacy_main.html /e/'s Advanced Privacy]
*[https://doc.e.foundation/support-topics/advanced_privacy_main.html /e/'s Advanced Privacy]
* [https://calyxos.org/docs/tech/datura-details/ CalyxOS's Datura Firewall]
*[https://calyxos.org/docs/tech/datura-details/ CalyxOS's Datura Firewall]
* [https://github.com/iodeOS/ota iodéOS's blocker]
*[https://github.com/iodeOS/ota iodéOS's blocker]


====Workaround Google Play Services====
====Workaround Google Play Services====
On a default Android system there is a deep integration with Google Play Services. This is a system process that requires access to files, contacts, storage, call logs, SMS messages, location, camera and microphone. And without this process running, basic system apps will not function.<ref>{{Cite web |last=Aragon |first=Jonah |date=21 Jul 2024 |title=Android |url=https://www.privacyguides.org/en/android/#install-a-custom-distribution |url-status=live |access-date=17 Aug 2025 |website=Privacy Guides}}</ref> Alternative systems avoid this process entirely, or use a privacy preserving workaround such as:
On a default Android system there is a deep integration with Google Play Services. This is a system process that requires access to files, contacts, storage, call logs, SMS messages, location, camera and microphone. And without this process running, basic system apps will not function.<ref>{{Cite web |last=Aragon |first=Jonah |date=21 Jul 2024 |title=Android |url=https://www.privacyguides.org/en/android/#install-a-custom-distribution |url-status=live |access-date=17 Aug 2025 |website=Privacy Guides}}</ref> Alternative systems avoid this process entirely, or use a privacy preserving workaround such as:


* [https://grapheneos.org/features#sandboxed-google-play GrapheneOS's Sandboxed Google Play]
*[https://grapheneos.org/features#sandboxed-google-play GrapheneOS's Sandboxed Google Play]
* [https://github.com/microg/GmsCore/wiki MicroG]<ref>{{Cite web |last=Gordon |first=Arielle |date=7 Jun 2019 |title=The Open Source Project That Keeps Google's Hands Off Your Android Data |url=https://www.vice.com/en/article/the-open-source-project-that-keeps-googles-hands-off-your-android-data/ |url-status=live |archive-url=https://web.archive.org/web/20250630130025/https://www.vice.com/en/article/the-open-source-project-that-keeps-googles-hands-off-your-android-data/ |archive-date=30 Jun 2025 |access-date=19 Aug 2025 |website=Vice}}</ref>
*[https://github.com/microg/GmsCore/wiki MicroG]<ref>{{Cite web |last=Gordon |first=Arielle |date=7 Jun 2019 |title=The Open Source Project That Keeps Google's Hands Off Your Android Data |url=https://www.vice.com/en/article/the-open-source-project-that-keeps-googles-hands-off-your-android-data/ |url-status=live |archive-url=https://web.archive.org/web/20250630130025/https://www.vice.com/en/article/the-open-source-project-that-keeps-googles-hands-off-your-android-data/ |archive-date=30 Jun 2025 |access-date=19 Aug 2025 |website=Vice}}</ref>
*[https://unifiedpush.org/ Unified Push]


==='''2. Expanding Device Lifespan'''===
==='''2. Expanding Device Lifespan'''===