Google’s ‘Secret’ Update Scans All Your Photos
-
you can search in your settings/app managment(im using a onplus12r though
-
broken english too, probably from a paid indian reviewer.
-
yea i found it as soon as this article said it was on your phone spying on you, ALSO many people, like myself noticed the battery draining pretty fast too, this is probalby the cause, if it installs without your knowledge, i doubt the app is excluded from your "app battery usage logs to, like it doesnt show up how much power its using.
-
too bad firefox is going through the way like google, they are updating thier privacy terms of usage.
-
And interestingly enough my phone crapped out on this post. But at least I was still able to read the the post.
-
ironfox?
-
Interestingly I don't have it on my stock samsung phone. I haven't updated it since oneui 6. Is safetycore installed by update or by GMS?
-
Then I guess the better question is what do you use?
-
I don't see it on the app store to remove anymore
-
People don't seem to understand the risks presented by normalizing client-side scanning on closed source devices. Think about how image recognition works. It scans image content locally and matches to keywords or tags, describing the person, objects, emotions, and other characteristics. Even the rudimentary open-source model on an immich deployment on a Raspberry Pi can process thousands of images and make all the contents searchable with alarming speed and accuracy.
So once similar image analysis is done on a phone locally, and pre-encryption, it is trivial for Apple or Google to use that for whatever purposes their use terms allow. Forget the iCloud encryption backdoor. The big tech players can already scan content on your device pre-encryption.
And just because someone does a traffic analysis of the process itself (safety core or mediaanalysisd or whatever) and shows it doesn't directly phone home, doesn't mean it is safe. The entire OS is closed source, and it needs only to backchannel small amounts of data in order to fuck you over.
Remember the original justification for clientside scanning from Apple was "detecting CSAM". Well they backed away from that line of thinking but they kept all the client side scanning in iOS and Mac OS. It would be trivial for them to flag many other types of content and furnish that data to governments or third parties.
-
Don't worry they won't!
/Burn
-
Basically, ot scans all files and shit like an antivirus does on windows? Oks
-
they will probably hide it better, and make uninstallable in the future.
-
the police of vice and virtue, just like SA has.
-
im not surprised if they are also using an AI, which is very error prone.
-
Fuck these cunt
-
Using ADB:
adb shell pm disable-user --user 0 com.google.android.safetycore
If you have Shizuku and aShell/ShizuShell installed, then just run this command in aShell:
pm disable-user --user 0 com.google.android.safetycore
Alternatively, for a GUI method, setup Shizuku and then use an app like Hail or Ice Box
-
cromite for chrome, and ironfox?