This post is about xPrivacy LUA. The successor of xPrivacy. I’ll be honest, I haven’t messed with Xposed framework in quite a bit of time but it was awesome then so I’m sure it’s awesome now.
Here are some of the features of xPrivacy LUA. It allows you to spoof or feed fake data for the following app permissions:
- Determine activity (fake unknown activity, see here)
- Get applications (hide installed apps and widgets)
- Get calendars (hide calendars)
- Get call log (hide call log)
- Get contacts (hide contacts with the pro option to allow (non) starred contacts, hide blocked numbers)
- Get location (fake location, hide NMEA messages)
- Get messages (hide MMS, SMS, SIM, voicemail)
- Get sensors (hide all available sensors)
- Read account name (fake name, mostly e-mail address)
- Read clipboard (fake paste)
- Read identifiers (fake build serial number, Android ID, advertising ID, GSF ID)
- Read notifications (fake status bar notifications)
- Read network data (hide cell info, Wi-Fi networks, fake Wi-Fi network name)
- Read sync data (hide sync data)
- Read telephony data (fake IMEI, MEI, SIM serial number, voicemail number, etc)
- Record audio (prevent recording)
- Record video (prevent recording)
- Send messages (prevent sending MMS, SMS, data)
- Use analytics (Fabric/Crashlytics, Facebook app events, Firebase Analytics, Google Analytic, Mixpanel, Segment)
- Use camera (fake camera not available and/or hide cameras)
- Use tracking (fake user agent for WebView only, Build properties, network/SIM country/operator)
How flippin’ awesome is that?
Github link to xPrviacy LUA HERE
Read all the entries in this series!
END TRANSMISSION