Quote:
Originally Posted by joblack
LOL. Don't you think that's more than enough? It's nobody else's business what apps I have installed.
|
It's the list of running apps, not all apps. Not trying to downplay its nastiness here, but it's probably inherited from whatever code they used at its core. Since it's a launcher, one would expect it to have access to the list of backgrounded apps / switch between them / manage them etc.
Quote:
Originally Posted by joblack
And it can read sdcard contents ... so it can do (almost) everything? 
|
No, it just has access to the common storage. It can't read other apps' settings or whatnot.
But all this is moot, we don't know what it reports anyway, until someone intercepts the https data and decompiles / decrypts the umeng message, or until we read the code. And/or until we have an official statement from Onyx (which I for one haven't contacted about the issue).
Quote:
Originally Posted by joblack
Is it this one?
[...]
Android.Umeng is an advertisement library that is bundled with certain Android applications.
|
I don't know if it's exactly that one, but it definitely sends data to Umeng servers, and Umeng is a company in the umm... analytics business.
Quote:
Originally Posted by desk7
|
I figured out any method working for the
Boox M96 would work. I used TowelRoot v1, which was a bit cludgy, and my second choice after Cydia Impactor (which didn't work for me on linux because.. well.. strangeness, but should probably work for you on windows). I trust these two more than the other options.
Quote:
Originally Posted by desk7
|
Can't make a suggestion, I only ever tried AFWall+ and its predecessor, and don't know enough about the Android internals to imagine how this works without root. Test it out and see how it fares?