(Sorry for no clear formatting, I don’t know how yet.)
Hi there,
I was using a Pixel with GrapheneOS, which recently died, and a backup phone with LineageOS (no other options).
With the Pixel de-googling and de-tracking was obviously straightforward, but with the one on LineageOS it obviously isn’t.
The phone with (official) LineageOS is well maintained and pretty up to date, but besides not utilizing invasive apps, there are not many means to de-google further components LineageOS depends on.
Because of that, I use some ADB commands and additionally edit the build.prop and gps.conf (after each update due to the lack of personal ability to automate it ).
The commands I use are:
-
settings put global captive_portal_http_url [desired URLs]
-
settings put global
captive_portal_https_url -
settings put global captive_portal_fallback_url
-
settings put global captive_portal_other_fallback_urls
(I use German security researcher Mike Kuketz’ server) -
settings put global ntp_server [URL]
(I use my country’s official time signal NTP server)
(Verify with “settings GET global …”)
_
Add to build.prop (via ADB pull/push):
net.dns1=[Provider IPv4 addresses]
net.dns2=
net.rmnet0.dns1=
net.rmnet0.dns2=
net.wlan0.dns1=
net.wlan0.dns2=
(using a VPN this does at least not seem to leak/bypass DNS requests)
_
Edit gps.conf (again, ADB pull/push):
[#] PROXY_APP_PACKAGE_NAME=…
NTP_SERVER=[URL]
_
Some of that might not even do anything, but I rather try than don’t.
_
Anyway, this is what I apply each update.
In addition I usually use a VPN and usually a private DNS when not connected.
_
Is there anything else I can do in order to minimize tracking? Disable some packages?
I know specific DNS may increase fingerprinting, but my primary objective is covering system components first.
_
(On a side note, anyone able to write a post-update script, like Magisk’s recovery menu survival scripts?)