[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 1732379199720383.png (1.63 MB, 670x1200)
1.63 MB
1.63 MB PNG
Yo /g/, anyone actually used this site before? People keep saying it’s “safe,” but I smell something rotten. Did you actually install stuff from there, or are we just trusting a sketchy APK site like idiots? Spill the tea before I try it and regret it.
>>
>>106444852
You write like a retard
>>
>>106444893
not retarded, feels more like a "how do you do fellow kids"
>>
>>106444852
Yeah. Some apps aren't malicious, but some are. Scan on virus total, check the exodus, check the manifest and permissions before anything else. Then install it in a sandbox/work profile. It will isolate the game/app from the personal profile. Use Shelter from Fdroid to create the sandbox/work profile. Don't install it in your personal profile. Do not ever give the Internet access. Use a firewall like NetGuard to block the internet access. It will prevent the game/app from contacting home. If something seems off in the sandbox/work profile after installing it, just delete the damn sandbox/work profile. This won't 100% guarantee the safety. But this will reduce the chance of fucking your own device.

Use a second device for this kind of shit if you have it. But with always on VPN.

>>106444893
>>106444934
These fuckers talk shit that unrelated to what you asked because they don't know shit.
>>
>>106444852
Decent place to pirate "some" paid applications.
>>
>>106445148
Lel, what a pussy. Android applications are sandboxed by default and any decent stock/custom OS gives you options to cut off internet access in the settings, including opening listening ports on localhost for websites to exploit and PrivacyGuard. And no program can read or write outside it's /data/data/<package-name> or /storage/emulated/0/Android/(data|obb|files)/<package-name> without the permission. Just root your phone and store sensistive data outside the protected /storage/emulated/0 mount.

Nothing ever happens if you know how to distinguish trustable android packages from untrusted ones anyway.

Always have (on a root access device) AppManager from F-Droid and A certain Russian Malware with a smiley face for good measure. They're exceedingly useful management tools.
>>
>>106445677
>Always have (on a root access device) AppManager from F-Droid and A certain Russian Malware with a smiley face for good measure. They're exceedingly useful management tools.
Expanding on this. You can use those to disable any activities from the app (possibly added by a malware author for example) or to rescind ANY of the dozens of extremely nuanced permissions android has which it for some baffling reason doesn't expose to the end user, so you have very fine control over what resource a program can access.
>>
>>106445712
You can also cutoff their API endpoints and learn to edit their AndroidManifest.xml and other files to change the package names and/or labels so that they're invisible to other programs that usually want to interface with and/or detect them.



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.