It seems the function is not implemented. It has an active bounty of certain amount, and if someone does implement can claim it too.
Maybe, it will be implemented in 2026.
It seems the function is not implemented. It has an active bounty of certain amount, and if someone does implement can claim it too.
Maybe, it will be implemented in 2026.
Any particular reason NFC payment apps don’t work? Atleast some should work with MicroG.


Personally, I’m more effed by the borders and the squigly icon shapes of your launcher.
But, you can use a 3rd party icon pack like Material You or Material You dark/light icon pack. Or maybe use Icon Pack Studio to create a custom icon pack for your phone.



Use signal or other private, encrypted apps folks. Also, get others to use them so they benefit too.


I won’t accept an MDM device for personal use. I was just replying about signal being compromised with regular MDM in work profile on a non-rooted phone.
Everything would still be monitored. But, messages in signal should not be.


I was talking about signal. Did you miss that?


What makes you think they would allow such a thing to exist? The french government was apparently after GrapheneOS for its extreme security and privacy.
The EU is after chat software with its chat control bill. Governments only care about power. Once they have it, it will be abused.


The app is limited for TV which limits the reach. Plus, I do not download apps outside of fdroid for the most part.


This is a 3rd party youtube client. Did it not stop working when you did not update the app for almost a whole month?


Fortunately, its an app for TVs. Still, sometimes you have to be extra careful when downloading 3rd party apps. Especially, those which do not exist on fdroid.


True, but Accessibility API cannot bypass secure display, and secure flag I had replied that in another comment so I did not mention that here.


If it’s rooted sure. But, regular work profile phones with MDM software are not.


It is stored encrypted last I checked the signal website…


How? The decrypted messages would have to be stored in plan text to be read. Unless, it can be read from RAM…


Apps using Flag_Secure and Secure_display can block screencapture. While user apps stay below MDM apps in privilege. The MDN app themselves reside below the android system.
Do you have a source of MDM apps bypassing secure display and having the ability to capture the display?


By not storing decrypted message on device? You can also block screenshots if you have a reasonable suspicious your screen can be used to capture the text shown on the device.


Not sure if you are intentionally being obtuse. But, this is not a hard problem. It has already been solved.
We have Signal, OMEMO in XMPP which already do that. You don’t need to do any encryption in your head…


An E2E Encrypted message should not be readable by anyone but the recipient and the sender.
If it can be read and shared without your explicit consent and approval with anyone even your employer. It’s no better than regular TLS encryption.


The default assumption everyone had was E2EE message data like RCS would be private.
Even apple does not share imessage data unless the Apple ID belongs to the employer.
Why would google do such stupidity is beyond me. But, yes on android assume everything is tracked 24/7. Trust your personal phone only.
You cannot do that. Use the apps which you do use regularly. Hopefully, they make it to the 1st page.