XPrivacy Pro v1.10.8
Requirements: Android v4.0+, Xposed Framework
Overview: XPrivacy can prevent applications (including associated background services and content providers) from leaking privacy sensitive data.
XPrivacy can restrict the categories of data an application can access. This is done by feeding an application with no or fake data. There are several data categories which can be restricted, for example contacts or location. For example, if you restrict access to contacts for an application, this will result in sending an empty contact list to the application, when it requests access to your contacts. Similarly, restricting an application's access to your location will result in a random or set location being sent to the application.
XPrivacy doesn't revoke (i.e. block) permissions from an application, which means that most applications will continue to work as before and won't force close. There are two exceptions to this, access to the internet and to external storage (typically an SD card) is restricted by denying access (revoking permissions). There is no other way to realize this, since these permissions are handled by Android in a special way. Android delegates handling of these permission to the underlying Linux network/file system.
If restricting a category of data for an application results in problems for the application, it is possible to allow access to the data category again to solve the issue.
By default, all newly installed applications will have no access to any data category at all, to prevent a new application from leaking sensitive data right after installation. Shortly after installing a new application, XPrivacy will ask which data categories you want the new application to have access to. XPrivacy comes with an application browser, which allows you to quickly enable or disable applications' access to a particular data category (i.e. to view and control all access to the camera, for example). It is also possible to edit all data categories for one application.
To help you identify potential data leaks, XPrivacy will monitor attempts made by all applications to access sensitive data. XPrivacy will display a yellow triangle icon as soon as data of a data category has been used. XPrivacy will also display if an application has internet access, indicating that the application poses a risk of sharing the data it obtains with an external server. This is just a guideline, since an application could access the internet through other applications too. If an application has requested Android permissions to access data in a data category, this will be displayed with a green tick icon, but this will only be shown when looking at an individual application, since checking permissions for all applications is quite slow.
XPrivacy is built using the Xposed framework. XPrivacy taps into a number of selected functions of Android through the Xposed framework. Depending on the function, XPrivacy conditionally skips execution of the original function (for example when an application tries to set a proximity alert) or alters the result of the original function (for example to return empty calendar data).
XPrivacy has been tested with CyanogenMod 10 and 10.1 (Android 4.1 and 4.2), and will most likely work with any Android version 4.1 or 4.2 variant, including stock ROMs. Root access is needed to install the Xposed framework. Because of a bug in the Xposed framework, XPrivacy currently needs a fixed Xposed binary, which is provided as download for both Android version 4.1 and 4.2.
Recent changes:
Version 1.10.8 TEST
Fixed import of filter settings
Fixed up navigation (again) (issue)
Version 1.10.7 TEST
Mark categories dangerous in template
Permanently cache XPrivacy version and Android usage settings
Do not display number of packages in progress dialog
Show location for license file in about dialog
Fixed up navigation (again) (issue)
Auto import pro license file (issue)
Allow application specific disable of globally set randomization (issue)
Compatibility with MultiSimTelephonyManager (issue)
Restrict /sys/block/..http://forum.mobilism.org/cid and /sys/class/..http://forum.mobilism.org/cid (issue)
Restrict system properties ending with cid (issue)
Updated Slovak translation
Version 1.10.5 TEST
Restrict access to sensors (issue)
Restrict Google advertising ID (issue)
Send more usage data and faster
Version 1.10.4 BETA
Added setting to enable Android usage data (default disabled) (issue)
Randomize settings at boot in separate thread (issue)
Added dangerous restrictions to template (issue, issue)
Fixed opening correct application settings from notification (issue)
Do not use current application context (issue)
Handle all exceptions while processing package events (issue)
Require Xposed 2.3.1
Updated Arabic translation
Updated German translation
Updated Italian translation
Note: all premium features available. no key file needed. no LuckyPatcher needed.
This app has NO advertisements
More Info:
Download Instructions:
http://uploaded.net/file/8j6715r8
Mirror:
http://unlimitzone.com/3xynlhthqfqh
Requirements: Android v4.0+, Xposed Framework
Overview: XPrivacy can prevent applications (including associated background services and content providers) from leaking privacy sensitive data.
XPrivacy can restrict the categories of data an application can access. This is done by feeding an application with no or fake data. There are several data categories which can be restricted, for example contacts or location. For example, if you restrict access to contacts for an application, this will result in sending an empty contact list to the application, when it requests access to your contacts. Similarly, restricting an application's access to your location will result in a random or set location being sent to the application.
XPrivacy doesn't revoke (i.e. block) permissions from an application, which means that most applications will continue to work as before and won't force close. There are two exceptions to this, access to the internet and to external storage (typically an SD card) is restricted by denying access (revoking permissions). There is no other way to realize this, since these permissions are handled by Android in a special way. Android delegates handling of these permission to the underlying Linux network/file system.
If restricting a category of data for an application results in problems for the application, it is possible to allow access to the data category again to solve the issue.
By default, all newly installed applications will have no access to any data category at all, to prevent a new application from leaking sensitive data right after installation. Shortly after installing a new application, XPrivacy will ask which data categories you want the new application to have access to. XPrivacy comes with an application browser, which allows you to quickly enable or disable applications' access to a particular data category (i.e. to view and control all access to the camera, for example). It is also possible to edit all data categories for one application.
To help you identify potential data leaks, XPrivacy will monitor attempts made by all applications to access sensitive data. XPrivacy will display a yellow triangle icon as soon as data of a data category has been used. XPrivacy will also display if an application has internet access, indicating that the application poses a risk of sharing the data it obtains with an external server. This is just a guideline, since an application could access the internet through other applications too. If an application has requested Android permissions to access data in a data category, this will be displayed with a green tick icon, but this will only be shown when looking at an individual application, since checking permissions for all applications is quite slow.
XPrivacy is built using the Xposed framework. XPrivacy taps into a number of selected functions of Android through the Xposed framework. Depending on the function, XPrivacy conditionally skips execution of the original function (for example when an application tries to set a proximity alert) or alters the result of the original function (for example to return empty calendar data).
XPrivacy has been tested with CyanogenMod 10 and 10.1 (Android 4.1 and 4.2), and will most likely work with any Android version 4.1 or 4.2 variant, including stock ROMs. Root access is needed to install the Xposed framework. Because of a bug in the Xposed framework, XPrivacy currently needs a fixed Xposed binary, which is provided as download for both Android version 4.1 and 4.2.
Recent changes:
Version 1.10.8 TEST
Fixed import of filter settings
Fixed up navigation (again) (issue)
Version 1.10.7 TEST
Mark categories dangerous in template
Permanently cache XPrivacy version and Android usage settings
Do not display number of packages in progress dialog
Show location for license file in about dialog
Fixed up navigation (again) (issue)
Auto import pro license file (issue)
Allow application specific disable of globally set randomization (issue)
Compatibility with MultiSimTelephonyManager (issue)
Restrict /sys/block/..http://forum.mobilism.org/cid and /sys/class/..http://forum.mobilism.org/cid (issue)
Restrict system properties ending with cid (issue)
Updated Slovak translation
Version 1.10.5 TEST
Restrict access to sensors (issue)
Restrict Google advertising ID (issue)
Send more usage data and faster
Version 1.10.4 BETA
Added setting to enable Android usage data (default disabled) (issue)
Randomize settings at boot in separate thread (issue)
Added dangerous restrictions to template (issue, issue)
Fixed opening correct application settings from notification (issue)
Do not use current application context (issue)
Handle all exceptions while processing package events (issue)
Require Xposed 2.3.1
Updated Arabic translation
Updated German translation
Updated Italian translation
Note: all premium features available. no key file needed. no LuckyPatcher needed.
This app has NO advertisements
More Info:
Code:
https://play.google.com/store/apps/details?id=biz.bokhorst.xprivacy
Download Instructions:
http://uploaded.net/file/8j6715r8
Mirror:
http://unlimitzone.com/3xynlhthqfqh
f000h — Wed Nov 13, 2013 5:38 am