Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Torque is cheap.


computers / comp.mobile.android / Re: Battery charge tests - running a battery to 0 frequently - checking re-charge times

Re: Battery charge tests - running a battery to 0 frequently - checking re-charge times

<t5c1pb$145r$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=32040&group=comp.mobile.android#32040

  copy link   Newsgroups: comp.mobile.android misc.phone.mobile.iphone sci.electronics.repair
Path: i2pn2.org!i2pn.org!aioe.org!Gj+613xB9sVIQxAtFideEw.user.46.165.242.75.POSTED!not-for-mail
From: spa...@nospam.com (Andy Burnelli)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,sci.electronics.repair
Subject: Re: Battery charge tests - running a battery to 0 frequently - checking re-charge times
Date: Mon, 9 May 2022 22:41:21 +0100
Organization: Aioe.org NNTP Server
Message-ID: <t5c1pb$145r$1@gioia.aioe.org>
References: <t510ud$2t9$1@gioia.aioe.org> <j0697h54tjhs33lpatuvfmpr6gfnjc5ogk@4ax.com> <t53fmp$l1h$1@gioia.aioe.org> <796b7htpk2cr7v6el16h3firad87mtt9he@4ax.com> <t54smd$17mm$1@gioia.aioe.org> <b7e786e8-106b-4314-abbd-c80c42dfed9cn@googlegroups.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Info: gioia.aioe.org; logging-data="37051"; posting-host="Gj+613xB9sVIQxAtFideEw.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.6.1
Content-Language: en-GB
X-Notice: Filtered by postfilter v. 0.9.2
 by: Andy Burnelli - Mon, 9 May 2022 21:41 UTC

ohg...@gmail.com wrote:

>> Notice the tire experiments above where there is precious little
>> information on the Internet why all the cars that are perfectly aligned in
>> any given twisty road area wear the tires the exact same abnormal way.
>>
>> Take a look at the Scotty Kilmer video below, and note particularly that
>> the photos I've been posting (which I've posted for years) are the _same_
>> as in Scotty Kilmer's videos (just look and you'll recognize my pictures!).
>> <https://youtu.be/i7alzjqmPQo>
>>
>> This is a shot he took of my BMW tires, for example, with wear lined up:
>> <https://i.postimg.cc/HngnZR6h/scottykilmer.jpg> He stole my images! :)
>>
> Kilmer is a backyard mechanic at best who doesn't know any more about,
> well, *anything* than any one else. I wouldn't let this guy change
> the oil on a car.

I understand and I don't disagree since I, myself, have a love:hate
relationship with Scotty Kilmer, as he seems to spew every bit of nonsense
in the book - but - he's also an extremely experienced mechanic.

BTW, this offshoot tangent happened when Jeff Liebermann asked how many
apps I have installed if I can lose hundreds without blinking an eye,
and the test I just ran moments ago shows 663 installed 3rd-party
"packages" and 390 system packages.

I include the documentation of a post I just made below so that the folks
on this newsgroup (which is different from that post) can benefit from the
tremendous effort in making the solution easily cut & paste for everyone.

If anyone here can help find the missing apps, I'd appreciate your
knowledge since I've tried what I know offhand and that has failed so far.

Please see below for a post I just made for this recent thread today:
*Using Windows to find hidden files on the Android file system over Wi-Fi*
<https://groups.google.com/g/comp.mobile.android/c/gonmj6NB2f0>

WIP: Using Windows to find hidden files on the Android file system

Help requested from those who know more about finding hidden files
on Android from the Windows computer over your local Wi-Fi network.

Recently I updated Android 11 to 12 and all hell broke loose (perhaps
because I change my GSF ID which, we can assume, is saved by apps).
<https://i.postimg.cc/0Q4xmPPR/gsfid01.jpg> How to change GSF ID
Maybe changing the GSF ID caused apps with GSF to be indexed wrong?
<https://i.postimg.cc/YStB48LH/gsfid03.jpg> Some apps use GSF APIs

This learning experience is perhaps a good thing as it's an opportunity to
learn where Android apps typically install their code into.
<https://groups.google.com/g/comp.mobile.android/c/GngVnfddiT8>

As that location is likely still there (I find it hard to believe that
Google _deleted_ the apps off my Android phone during the update).
<https://i.postimg.cc/L4tFb7ND/update14.jpg> The apps are gone!

Running adb over Wi-Fi (tcpip port 5555) allows me to list packages:
C:\> adb shell pm list packages > installed.txt (lists 663 packages)
C:\> adb shell pm list packages -s (of which 390 lines are system)
C:\> adb shell pm list packages -3 (and where 273 lines are third party)
One of which, we would have hoped, would be zoom, but it's not there:
C:\> adb shell pm list packages -f | findStr "zoom" (finds nothing)

Luckily, re-installing even hundreds of apps on Android is trivial since
all the APKs are automatically _not deleted_ when apps are installed.
<https://i.postimg.cc/Z5kdD2rg/aurora04.jpg> Just don't delete APKs

Which means they can be saved directly onto a Windows mount point.
<https://i.postimg.cc/cJK9rbjn/update03.jpg> APKs saved into Windows
And then the APKs can simply be slid onto Android to re-install apps.
<https://i.postimg.cc/wvsbcNBz/scrcpy05.jpg> Drag APK from Windows

But even without that, just clicking on the now-dead grayed-out icons
brings up the correct _new_ APK in the FOSS google play store client.
<https://i.postimg.cc/MHNhkgpY/update11.jpg> App is not installed

The point being the problem is NOT to re-install hundreds of APKs, as that
part is already trivial.... the problem here is to see if they're _still_
on the Android phone, where I need to know _where_ apps typically go.

Now it's time to look where the missing apps are typically installed into.

Let's take Zoom for example, which seems to have simply disappeared.
<https://i.postimg.cc/brtpv9T1/update17.jpg> Even Zoom disappeared!

First, let's check if Zoom requires GSF, and when we do, we see it does.
<https://i.postimg.cc/XJrSQ0w6/update21.jpg> Zoom requires GSF

So now, the question is whether or not Zoom is _already_ installed and
perhaps just hidden - but _where_ would zoom be installed onto Android?
<https://duckduckgo.com/?q=where+does+android+zoom+install+into>
<https://duckduckgo.com/?q=where+do+android+apps+install+into>

*Android Developers > Docs> Guides > App install location*
<https://developer.android.com/guide/topics/data/install-location>
"android:installLocation manifest attribute"

Apparently the flow is that the developer declares the location
android:installLocation=<unset>
App will be installed on internal storage only
android:installLocation="preferExternal"
App will be installed on sdcard if available
android:installLocation="auto"
App will be installed

But adb seems to show the location of installed packages.
<https://stackpointer.io/mobile/android-adb-list-installed-package-names/416/>

So let's try those adb commands over wi-fi (TCPIP port 5555) to see stuff.
C:\> adb kill-server
C:\> adb tcpip 5555
restarting in TCP mode port: 5555
C:\> adb connect 192.168.0.2:5555
connected to 192.168.0.2:5555
C:\> adb devices
List of devices attached
192.168.0.2:5555 device

I was hoping the "disabled" apps option would list zoom, but it didn't:
C:\> adb shell pm list packages -d > disabled_apps.txt (219L)
Nor did the enabled apps option list zoom (which wasn't expected):
C:\> adb shell pm list packages -e > enabled_apps.txt (444L)

I'm not at all sure what the definition of a "disabled" app really is.
But what was interesting was disabled apps were mostly in 1 spot.
C:\> adb shell pm list packages -d -f > location_disabled_apps.txt
package:/data/app/~~{stuff} (208L)
package:/product/app/. (3L)
package:/system/app/. (3L)
package:/system/priv-app/. (5L)

While enabled apps were far more scattered about the Android filesystem.
C:\> adb shell pm list packages -e -f > location_enabled_apps.txt (444)
package:/apex/. (11L)
package:/data/app/~~{stuff} (87L)
package:/product/app/. (8L)
package:/product/overlay/. (28L)
package:/product/priv-app/. (7L)
package:/system/app/. (106L)
package:/system/carrier/. (4L)
package:/system/framework/. (2L)
package:/system/priv-app/. (171L)
package:/system/system_ext/priv-app/. (8L)
package:/vendor/overlay/. (11L)
package:/vendor/priv-app/. (1L)

Of course, if I _install_ Zoom, the commands below will tell me where it
installed into, but I'm trying to find out if it's really still there.

So let's try this adb command over wi-fi (TCPIP port 5555) to see:
C:\> adb shell pm list packages -f -s > sys_package_location.txt (390L)
C:\> adb shell pm list packages -f > 3rd_package_location.txt (663L)

Summarizing those files, the system apps seem to be installed into
package:/apex/.
package:/data/app/.
package:/product/app/.
package:/product/overlay/.
package:/product/priv-app/.
package:/system/app/.
package:/system/carrier/.
package:/system/framework/.
package:/system/priv-app/.
package:/system/system_ext/priv-app/.
package:/vendor/overlay/.
package:/vendor/priv-app/.

And the third-party apps seem to be installed into:
package:/apex/. (11L)
package:/data/app/~~{stuff} (295L)
package:/product/app/. (11L)
package:/product/overlay/. (28L)
package:/product/priv-app/. (7L)
package:/system/app/. (109L)
package:/system/carrier/priv-app/. (4L)
package:/system/framework/. (2L)
package:/system/priv-app/. (176L)
package:/system/system_ext/priv-app/. (8L)
package:/vendor/overlay/. (11L)
package:/vendor/priv-app/. (1L)

There are two others options of interest which may help find zoom.
C:\> adb shell pm list packages -f -i > installer.txt (663L)
installer=com.android.settings (1L)
installer=com.android.vending (20L)
installer=com.aurora.adroid (9L)
installer=com.aurora.store (85L)
installer=com.facebook.system (3L) <== note WA is installed, not FB
installer=com.google.android.packageinstaller (57L)
installer=com.sec.android.app.samsungapps (1L)
installer=com.sprint.ce.updater (1L) <== note it's a T-Mobile phone
installer=com.tmobile.pr.adapt (4L)
installer=null (482)

This might help if I knew what a UID was and what the UID for Zoom is:
C:\> adb shell pm list packages -f -U > UID.txt (663L)
The UID is apparently particular for an application:
<https://stackoverflow.com/questions/5708906/what-is-uid-on-android>
The UID (aka AID) is the backbone of the Android sandboxing, apparently:
<https://source.android.com/security/app-sandbox>

This sounds promising but it lists installed packages apparently:
C:\> adb shell pm list packages -i > installer.txt (663L)
C:\> adb shell pm list packages -u > uninstaller.txt (663L)

Let's run a quick Windows diff filecompare of these two after sorting:
C:\> fc installer.txt uninstaller.txt (206L) <== too confusing

At this point, let's inventory all that is on the Android phone without
using adb but simply by using the Windows "dir" command on Android.
Pseudocode: dir android_file_system > list_of_all_files_on_android.txt

To more easily search my non-rooted phone, I mounted the Android root file
system as a Windows 10 drive letter using a free WebDAV server on Android.
*WebDAV Server* by The Olive Tree
Free, not ad free, Google free, requires GSF, rated 3.5, 100K+ installs
<https://play.google.com/store/apps/details?id=com.theolivetree.webdavserver>

*WebDAV Server - BestDAV PRO* by ZQ Software
Free, ad free, Google free, GSF free, rated 4.2, unknown # of installs
<https://play.google.com/store/apps/details?id=com.zq.webdav.app_pro>

I'm using "The Olive Tree" WebDav server because I can't figure out the
settings to get the "BestDav" WebDav server to allow _write_ from Windows.
(If you can solve this problem, I'd appreciate the help you can provide.)
For whatever reason, using "The Olive Tree" I can mount everything on
Android but the sdcard (which I haven't yet figured out why - but it
appears that the Windows adb command _can_ see what's on the SDCARD).
(If you can solve this problem, I'd appreciate the help you can provide.)

And then I ran this simple command on Windows to mount the phone:
net use Z: \\192.168.0.2@8080\DavWWWRoot
Where DavWWWRoot can be defined as any location on the phone you want.
<https://i.postimg.cc/Y0wQWVJn/update08.jpg> Windows reads Android root
Namely these are the following locations most people set DavWWWRoot to:
(o) Root (/)
(_) SdCard
(_)DCIM
(_)Custom folder
(_)Ext. SdCard
As shown in this graphic using that setting for the Windows mount point:
<https://i.postimg.cc/yNtmVWnz/update07.jpg> WebDav set to Android root

So that I could make a list of every file on the Android file system:
C:\> Z:
Z:\> dir /s/a/l/on/b > c:\tmp\android_filesystem.txt (3914L)

And then I could grep (findstr) for the hidden presence of zoom files.
C:\> findstr /i /r /c:"^.*oom" android_filesystem.txt
z:\pictures\photoroom
z:\pictures\photoroom\photoroom-20220421_205546.png
z:\pictures\photoroom\photoroom-20220421_205619.png
z:\aurora\store\downloads\com.mushroom.recogniser
z:\aurora\store\downloads\com.mushroom.shroomify
z:\aurora\store\downloads\com.photoroom.app
z:\aurora\store\downloads\com.shroomid
z:\aurora\store\downloads\com.shroomid\337\com.shroomid.apk
z:\aurora\store\downloads\com.shroomid\337\config.arm64_v8a.apk
etc.

Drat. There wasn't a single file on the Android filesystem with
"Zoom" anywhere in the name as far as I can tell from this.

Does anyone out there reading this know more about finding hidden files
on Android from the Windows computer over your local Wi-Fi network?
--
On Usenet, kind-hearted purposefully helpful people carry on polite
discussions which benefit everyone who participates in the conversation.

SubjectRepliesAuthor
o Battery charge tests - running a battery to 0 frequently - checking re-charge ti

By: Andy Burnelli on Thu, 5 May 2022

116Andy Burnelli
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor