Nheko is my favourite client, it uses QT and is written in C++, its lightweight and works well on my machines with low resources, it also respects my system theme
Nheko is my favourite client, it uses QT and is written in C++, its lightweight and works well on my machines with low resources, it also respects my system theme
deleted by creator
sudo sed -i 's/libalpm.so.14/libalpm.so.15/g' /usr/bin/paru
I figure that the administrators of your homeserver could see your IP address, I doubt that it would be sent to anyone you are just chatting with.
I was thinking about that too, I cant think of much this ID is good for other than fingerprinting users. It just sucks that there isnt much of anything that can be done about it without a rooted device or privacy rom.
I did a internet search on “AAAD” and I found this github repository. I’m not sure if it is the same, but they seem to serve the same purpose and share the same name. I took a look into the code and I saw something about Settings.Secure.ANDROID_ID
in AboutPaymentActivity.kt
, so I did some searching on that, and according to a person on stackoverflow, Settings.Secure.ANDROID_ID
is a ID unique to every app on your phone, this ID will persist across uninstalls and reinstalls. The only reason it should change is if the package name or signing key changes. Also it should be different for different users on the phone, but im guessing it might not be possible to add more users on android auto, im not sure, I’ve never really used one.
Now, about circumventing it, you could modify the source code and remove the license verification checks and rebuild, but this might not be legal, I’m not to good with legal stuff, but the license had a few words that suggest it might be non-free, but if software licenses arent an issue, feel free! There is also the option of just resigning the apk with your own key, which should change the ID, I believe you can do this in luckypatcher with one click, but lucky patcher is kind of sketchy and might not be able to work on android auto, I dont know much about them.
I hope this helps, im sorry I couldnt find any like anything that could just reset it and be done with it, maybe someone else might chime in with a more helpful answer.
If Firefox can read it from disk without a password, any other program running as your user can read it from disk without a password. But to prevent this you can encrypt your Firefox profile with a password.
When your browser connects to a website, it will tell the webserver what type of browser you are using in the HTTP headers. This can be used for serving a special web page for browsers with quirks, or it can be used to block certain browsers.
It may look something like this:
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:123.0) Gecko/20100101 Firefox/123.0
But you can use an extension like this one to spoof your user agent and send out one that corresponds to a chromium browser.
Idk if im allowed to link it here, but for anyone having trouble accessing TG, they offer an onion service on tor, which is gonna be a whole lot harder to block, you can find the link on their official proxy list