UsageNotes » History » Revision 12

« Previous | Revision 12/27 (diff) | Next »
Wolfgang Wiedmeyer, 04/26/2017 11:55 AM
link to website recommodations

Usage Notes

General-purpose usage notes and tips can be found on this page.
The website also provides recommendations and general advice.

Enabling root access

To allow root access, open the Developer options in the settings. There, press Root access. In the pop-up menu, select either Apps only, ADB only or Apps and ADB, depending on how you want to restrict root access. See ADB for more information about root access with ADB.

Device Encryption

Tips for encrypting the device

Setting a device encryption password separate from the lockscreen password

By default on Android, the encryption password is the same as the lockscreen password. As users tend to use a simple PIN, password or pattern for the lockscreen, the encryption can be easily circumvented with a brute-force attack.

Replicant allows to set an encryption password that is not tied to the lockscreen:
  1. Encrypt your device (In the settings: Security -> Encrypt phone)
  2. After the phone has rebooted and the encryption is set up, select Change encryption password in the Security menu of the settings
  3. Choose a strong passphrase. You will only have to enter this passphrase once when the device boots
  4. Reboot the device and verify that the encryption works properly by entering the previously chosen passphrase

If a separate encryption password is in place and a PIN or password is set for the lockscreen, another security measure is active: After five unsuccessful attempts to unlock the screen, the device is rebooted and the attacker is faced with the much stronger encryption passphrase. This makes brute-force attacks on the lockscreen much harder.

Other tips

  • Do not set the default keyboard (LatinIME) as a non-system app if you use encryption: it will prevent you from entering the password to open the encrypted storage.

Browser and webview: freedom and security issues

The default Browser has JavaScript enabled and runs the JavaScript that is loaded when you visit a website. Replicant has no mechanism to check if the complex JavaScript programs that are included in some websites are free software. See the JavaScript Trap article for more general freedom-related information about JavaScript.

Not only browser apps might run non-free JavaScript. Some apps include an embedded view that loads websites which is called webview. Although app developers can disable JavaScript for the webview, JavaScript is usually enabled in the webview. So you might run non-free software inside a webview.

For these reasons, it is recommended to disable JavaScript by default in the browser settings. As most browser exploits require JavaScript to work, you can also prevent that malicious websites can make use of security issues with your browser. Unfortunately, the currently used webview in Replicant has many security issues. See #1780 for more information. So disabling JavaScript helps a lot in securing your device.

Prevent usage of the embedded webview in apps

Some apps have a setting that allows to use an external browser to view websites. This ensures that the embedded webview is not used and websites are loaded with a browser you can configure for security and privacy and that allows to disable JavaScript.

Use AdAway

AdAway blocks a lot of known malicious websites that contain spyware and malware. However, using AdAway does not guarantee that all malicious websites or domains in general are blocked or that only free JavaScript is loaded.

Use two web browsers

The Lightning browser works well with Replicant, but it is prone to the same security issues as the default browser or the webview in general. However, this browser can be better configured for privacy and security. It is recommended to go through all the settings and to not only disable Javascript, but also to enable other settings that enhance privacy and security.

If you use Lightning as your default browser with the above described configuration, some websites might not work due to disabled JavaScript or other settings. But if you are sure that these websites do not contain non-free JavaScript, spyware or malware, you could load these websites with the default browser that has JavaScript enabled. This way, you do not need to enable JavaScript or disable other conflicting settings in Lightning for certain websites and revert the changes afterwards again. The default browser is then your browser for trusted websites with only free programs, while you visit all other websites with the configured Lightning browser.

Camera app

  • If the front camera on your device requires a non-free firmware, selecting the front camera will crash the app and you will not be able to use the app unless you delete the data of the app:
    1. In the settings under Personal, select Apps
    2. There will be two apps named Camera. Select the second one that has a camera as icon.
    3. Press Storage
    4. Select Clear Data and confirm the dialog

    You should now be able to use the camera again.

  • If the camera app freezes when you take a picture, press the shutter button a second time. This should restart the camera in the background and take the picture.

Barcode scanning

The mostly used barcode scanner app ZXing has a slow preview. The privacy-friendly QR Scanner has a faster preview.

Video playback

Viewing videos in the gallery or in the browser is not possible. See #1539 for background information.

Only the VLC app is known to be able to play videos on Replicant. Make sure to disable hardware acceleration in the settings to prevent crashes.

VLC is currently disabled in the F-Droid repository because only outdated versions are available. You need to enable the archive repository in the repository settings to be able to install VLC from F-Droid.

Terminal emulator

Replicant 6.0 includes a minimal terminal app, but it is not accessible by default. To make the app visible in the launcher, open the Developer options in the settings. In the Debugging section, enable Local terminal. A more feature-complete terminal emulator is available from F-Droid:

Updated by Wolfgang Wiedmeyer over 6 years ago · 12 revisions

Also available in: PDF HTML TXT