Sunday, June 30, 2019

[Update: Launches in India on July 4th] Xiaomi’s Redmi 7A should launch in India and Europe soon

Update 1 (7/01/19 @ 2:00 AM ET): A teaser on Flipkart reveals that the Redmi 7A will be launched in India on July 4th.

Xiaomi’s Redmi recently upgraded its entry-level catalog with the launch of the Redmi 7A in China. Priced at almost nearly $80, the Redmi 7A is a decently-powered smartphone for first-time smartphone users or for those looking to minimize their usage. Compared to its predecessor, the Redmi 7A comes with a performance upgrade, a better display, a bigger battery, and a more charming design. Now, the smartphone is expected to arrive in markets including India and Europe.

Thanks to XDA Recognized Developer yshalsager, we have learned about the presence of model identifiers for the Indian as well as the global variants of the Redmi 7A. As per the developer, the model names corresponding to the global variants of the Redmi 7A are “M1903C3EG” and “M1903C3EH” while the Indian variant corresponds to “M1903C3EI.” These model names coincide with those for the Chinese variants.

Meanwhile, WinFuture confirms the information provided by yshalsager and reports that the Redmi 7A will soon be available in Europe. The smartphone will be slightly more expensive compared to the direct currency conversion from the Chinese yuan. As per the German publication, the Redmi 7A has already been listed by retailers in the Czech Republic and Slovakia and is expected to be priced in the ballpark of 100 euros (~$110).

The Redmi 7A features a 5.45″ HD+ display and is powered by a Snapdragon 439 chipset. It has two variants – one with a 2GB/16GB configuration and another with 3GB/32GB. It is equipped with a single camera on the rear as well as on the front. While there’s no fingerprint scanner, the smartphone boasts support for AI face unlock. A major highlight of the smartphone is its 4,000mAh battery which should offer a decent two-day-long backup and while expecting fast charging support at this pricing will be outrageous, the smartphone does come with 10W charging, which should be good enough for basic users.

The Redmi 7A is speculated to be announced in parts of Europe on June 21st and shall be available across the continent by July. In India, we may expect to see the launch in July as well, alongside the launch of the Redmi K20 series.

Category Redmi 7A
Dimensions and weight 146.30 x 70.41 x 9.55mm; 165g
Software
  • MIUI 10 based on Android 9 Pie (expected)
Display
  • 5.45-inch HD+ (1440×720)
System-on-chip
  • Snapdragon 439
RAM and storage
  • 2GB/16GB & 3GB/32GB
  • microSD card slot with up to 256GB expandable storage
Battery
  • 4,000 mAh
  • 10W charging
Rear cameras 13MP
Front camera 5MP with AI beauty mode
Security
  • AI Face unlock
Ports
  • micro USB port
  • Dual nano-SIM slots with dedicated SD card slot
  • 3.5mm headphone jack
Connectivity
  • Dual 4G VoLTE
  • Wi-Fi 802.11 b/g/n
  • Bluetooth 5.0
Colors Black, Blue

Update: Teaser reveals launch date in India

The Redmi 7A is set to launch in India on July 4th in India, as revealed by a teaser microsite on Flipkart. The webpage divulges that the smartphone will feature a Facebook-ready camera and a long-lasting battery. We’re not sure about the pricing of the smartphone yet.

Last week, Xiaomi’s Manu Jain also tweeted about a “massive” feature upgrade over the Chinese variant of the smartphone. We expect this upgrade to include the customization in MIUI for Indian users but we’ll have a clearer idea when the smartphone launched in India later this week.

Via: Gadgets 360

The post [Update: Launches in India on July 4th] Xiaomi’s Redmi 7A should launch in India and Europe soon appeared first on xda-developers.

Chromebooks will soon be able to show Bluetooth battery indicators

A much-awaited feature that arrived with Android Oreo was the ability to see the battery level of the Bluetooth device you were connected to. It’s an important feature and quite surprising that it took so long to implement in AOSP, as even custom ROMs such as LineageOS supported it. There are so many reasons as to why it should be a standard feature, for example allowing you to roughly estimate how much listening time you have on your Bluetooth earphones. However, while Bluetooth battery indicators have been in AOSP for nearly two years now, the other Google-owned OS, Chrome OS, doesn’t have them. That’s set to change, with a commit spotted by Chrome Story which says that soon, Chromebooks will be able to display the battery level of a connected Bluetooth device.

Chromebooks will soon have Bluetooth battery indicators

If you have a Chromebook on the Canary channel of Chrome OS, you can enable Bluetooth battery indicators now. Simply enable the following flag.

chrome://flags/#show-bluetooth-device-battery

Whether it works or not yet is a different story. The writer at Chrome Story who initially discovered this commit tried it with the Anker SoundBuds Slim+ and it didn’t report the battery level.

Still, if you have a Chromebook on the Canary channel it’s worth giving a shot, as it may work for you. Even if the feature isn’t fully implemented yet, at least it’s confirmed to be implemented in the future. If you really want a working version of the feature as early as possible, it’s probable that it will be fixed in the next beta version.


Via: Chrome Story

The post Chromebooks will soon be able to show Bluetooth battery indicators appeared first on xda-developers.

Google’s Manifest V3 will change how ad blocking Chrome extensions work: Is it to cripple them, or is it for security?

Google Chrome is the most popular cross-platform web browser available on the market right now, claiming 62.7% of the global browser usage share up until May 2019, with Apple’s Safari coming in second at 15.89% and Mozilla’s Firefox claiming 5.07%. Because of its lion’s share, the smallest of changes that Google Chrome undertakes for its platform end up affecting millions of users around the world. So when Google announced the next extensions manifest version in the form of Manifest V3 for Google Chrome Extensions, we knew we were in for some big changes, especially when it came to light that Google was building in a content blocker API within Chrome itself.

What is Manifest V3?

If you are an active Chrome user, you undoubtedly use a few extensions. Extensions are small software programs that customize the browsing experience using the APIs that the browser provides, allowing users to tailor functionality and behavior to suit their individual needs and preferences. These extensions are distributed mainly through the Chrome Web Store, which is home to more than 180,000 extensions.

Since late last year, Google has been working on “Manifest V3,” a set of proposed changes to the Chrome Extensions platform that can be classified as “breaking changes.” As the public discussion document for Manifest V3 states, the extension manifest version is a mechanism for restricting certain capabilities to a certain class of extensions. These restrictions can be in the form of either a minimum version or a maximum version. Restricting to a minimum version allows newer APIs or capabilities to only be available to newer extensions while restricting to a maximum manifest version allows older APIs or capabilities to be gradually deprecated.

In simpler terms, a new manifest version allows Chrome to restrict APIs and features to this new manifest version, in order to force extension developers to migrate away from certain older APIs due to their negative impact on the user experience. Implementing an extension in Manifest V3 should theoretically provide stronger guarantees from the perspectives of security, privacy, and performance.

While there is a wide range of changes outlined in Manifest V3, the most controversial change relates to Google’s decision to limit the blocking abilities present in the existing chrome.webRequest API (and focus the API around observation instead of blocking) and then present these blocking abilities through a new chrome.declarativeNetRequest API. This particular change has inflamed the community as it ends up targeting the ad-blocking mechanism of the famous ad-blocking extension, uBlock Origin, and directly affects its 10 Million+ users.

Before we address this issue, let’s take a look at how the webRequest API compares to declarativeNetRequest API.

Web Request API and Declarative Net Request API

The present

Web Request’s official description describes the API as follows:

Use the chrome.webRequest API to observe and analyze traffic and to intercept, block, or modify requests in-flight.

With Web Request, Chrome sends all the data in a network request to the extension listening for it. The extension then has a chance to evaluate the request and instruct Chrome on what to do with the request: allow it, block it, or send it with some modifications.

Google Chrome Web Request API Diagram

Follow along the sequence of events to understand what is happening when extensions use the Web Request API. When a user with a Web Request extension installed clicks on a link, Chrome informs the extension that a data request has been made before the request reaches the server. The extension can choose to modify the request at this stage. The server then responds, but the response once again goes through the extension, and the extension can dictate whether the response needs to be modified. Chrome then finally renders the page and the user is able to view the result of his click action.

As Chrome hands over all the data in a network request, extensions which use the Web Request API have access to read and modify everything that a user does on the web. So while content blockers like uBlock Origin wisely utilize the potential of this API, Google claims that other extensions with malicious intentions have abused the same to gain access to users’ personal information. According to Google, 42% of malicious extensions have used the Web Request API since January 2018. Google also claims that there are “significant performance costs” involved with the API as the blocking version of it requires a persistent and often long-running process which is fundamentally incompatible with ‘lazy’ processes.

With Manifest V3, Google is proposing to limit this API in its blocking form. As an alternative, Google is providing the Declarative Net Request API.

The future

Declarative Net Request’s official description describes the API as follows:

The chrome.declarativeNetRequest API is used to block or modify network requests by specifying declarative rules.

With Declarative Net Request, Chrome does not need to send all information about a request to the listening extension. Instead, the extension registers rules with Chrome that tell the browser beforehand on what to do if certain types of requests are seen.

Google Chrome Declarative Net Request API

The extension specifies its rules beforehand. The users’ request is then matched against this rule by the browser (and not the extension), and the action is also undertaken by the browser, and the page is subsequently rendered. Google mentions that this allows them to ensure efficiency since they can exercise control over the algorithm determining the result and can prevent or disable inefficient rules. It also presents better privacy guarantees to the end-user as details of the network request are not exposed to the extension. Since persistent and long-running processes are no longer necessary (since the rules are registered beforehand), Google claims that this approach also brings performance improvements that will make extensions significantly more viable on resource-constrained platforms.

Declarative Net Request will be available to both Manifest V2 (current) and Manifest V3, but it will be the primary way that Google will allow network requests to be modified in Manifest V3.

The controversy

Google’s changes appear to make sense until you hear the other side of the story, mainly that of ad blockers. This particular API migration is being viewed as Google’s way of killing off ad blockers as it fundamentally changes the way one of the most popular ad blockers works. This ties into the “theory” that Google is motivated towards this change more from the business perspective than from the perspective of user security. After all, Google is heavily reliant on advertising for its revenue, and ad blockers are perceived as a direct threat for Google’s clients on this front, as was revealed through Alphabet’s 2018 SEC Form 10-K filing (via The Register):

New and existing technologies could affect our ability to customize ads and/or could block ads online, which would harm our business.

Technologies have been developed to make customizable ads more difficult or to block the display of ads altogether and some providers of online services have integrated technologies that could potentially impair the core functionality of third-party digital advertising. Most of our Google revenues are derived from fees paid to us in connection with the display of ads online. As a result, such technologies and tools could adversely affect our operating results.

Google had to release a statement to address this, reiterating its stance that the change is in the interest of user privacy and not a direct attack against ad blockers:

We are not preventing the development of ad blockers or stopping users from blocking ads. Instead, we want to help developers, including content blockers, write extensions in a way that protects users’ privacy.

Reference needs to be made to two of the most popular ad-blockers available on Google Chrome: uBlock Origin and Adblock Plus, both of which take different approaches to achieve the same result of content blocking. uBlock Origin heavily relies on Web Request API, and the community has taken a preference to this extension over the years, while Adblock Plus’s approach (coupled with an EasyList filter) mimics that of the Declarative Net Request API.

Google’s push to deprecate Web Request will essentially kill uBlock Origin in its current format, something that will indeed affect a lot of users. While users with no loyalty (and no intention of bothering themselves with how the ad block is achieved) will find alternative solutions that come with their own drawbacks, it will become impossible for loyalists and enthusiasts to come up with new filtering engine designs to circumvent the various techniques that web sites will eventually come up with to combat ad blockers on this specific API.

Declarative Net Request was also proposed to be a rather limited filtering engine, as it was initially planned to have a 30,000 rule limit on per-extension static filter rules (rules that are declared during installation); and 5,000 rule limit on per-extension dynamic filter rules (rules that can be added after installation). Any excess rules will be ignored, which is a bit of a problem as EasyList itself has 70,000 rules, while uBlock Origin can be configured to run with over 100,000 rules. After the initial backlash from the community, Google responded by promising to alter the static rule limit from 30,000 rules per-extension to a global maximum of 150,000 rules. This then has the side effect of precluding users from using other rule-heavy scripts in conjunction with an ad blocker, so users will have to juggle around with their preferences.

Other than the limited filtering limit, Declarative Net Request can only redirect to static URLs, so there is no support included for pattern matching. uBlock Origin heavily relies on pattern matching, and the extension developer stated that it is not possible to retrofit his extension’s matching algorithm to meet the APIs requirement. The API would also require a complete extension update to simply update the filter list, which would be a far too frequent activity considering the frequency with which these filter lists are updated. Of course, these updates would also hinge on Google’s extension review criteria and processes.

On the other hand, Google has always maintained its stance that its intent to move away from Web Request is from a security perspective, as the Web Request API is too powerful in its current form and leaves open a very wide room for abuse. This abuse isn’t just theoretical, as Google has mentioned that 42% of malicious extensions have abused this API. Apple Safari’s Content Blocker API was designed like Declarative Net Request for similar reasons, as there is lesser room for a rogue developer to exploit. On the nerfed Web Request, network requests would still be observable, but they would need permissions on the relevant hosts. With Manifest V3, host permissions are also changing significantly and they can no longer be granted in a blanket manner at install time.

Google has also used performance overheads as a motivator for the switch. Evaluation of network requests occurs in the JavaScript thread of the extension, which can be costly on performance. As a rebuttal, uBlock Origin’s developer mentions that his extension does not incur any significant performance penalty even when having as many as 140,000 static filters to enforce. The costs incurred are claimed to be easily recovered by the resources that are prevented from being downloaded from remote servers and thus not processed by the browser.

Even though Google does not use this reasoning, one argument against Web Request can also be made for efficiency with ad blocking. With Web Request, if an extension does not respond in time (because of a lag or a crash), the network handling request is plainly allowed, which lets ads slip through the ad blocker. Declarative Net Request, on the other hand, would not suffer from this drawback. Instead, ads will pass through if they do not get caught within the static rules, and this will happen more often than not.

Conclusion

From the explanations above, it is clear that Declarative Net Request is not a 1:1 functionality clone for the blocking capabilities of the Web Request API, and extension developers are bound to be miffed when their hard work will get handicapped by such changes. But Google’s reasoning also carries weight — Web Request is too powerful, and its powers need to be curtailed in the larger interest of the user community (which comprises of average users along with enthusiasts).

The move towards Declarative Net Request could have been a positive PR move too — after all, Google is adding in a built-in content blocker API to Chrome! But since the new API comes with its own heavy restrictions, the community rightfully sees this as a clipping of their wings. In an ideal world, Google should have explored the working of ad blockers like uBlock Origin before pushing forth the new API. As it stands now, the new API could use further relaxations on its rule limits to accommodate scenarios where users would want to use two filter-heavy extensions.

According to The Register, the first builds with Manifest V3 changes will be available from July 2019 onwards. We hope Google accommodates the feedback received from the extension developer community with these builds.

The post Google’s Manifest V3 will change how ad blocking Chrome extensions work: Is it to cripple them, or is it for security? appeared first on xda-developers.

Kiwi Browser adds text reflow support, Translator settings, external download manager support, and more

Kiwi Browser by XDA Senior Member arnaud42 has been the browser of choice for many for a long time now. With extension support, a reachability button, an AMOLED friendly dark mode and lots more, it’s really no wonder why it’s exploded in popularity since its release last year. arnaud42 isn’t done adding features to Kiwi Browser either, as the latest version now available on the Google Play Store has added text reflow support, translator settings, external download manager support and more. You can read the full changelog below.

  • This version supports text rewrap / reflow (adapt text based on zoom level).
    • Interface and animations are really improved
    • Better performance (new GPU driver and 64-bits engine!)
  • New settings:
    • Google Translate, Yandex and Baidu (Settings, Translator)
    • Possibility to add exceptions / whitelist in content filter
    • Support for external download managers
    • Show extensions first
    • Protect incognito windows

While there are loads of new features and improvements to Kiwi Browser, one particular improvement that may get overlooked is the introduction of a new GPU driver and a 64-bit rendering engine. That should result in faster page load times along with smoother performance all around – something that many may have already known Kiwi Browser for. Having used it, it definitely presents a noticeable improvement over Google Chrome in some aspects.

However, there still are a number of new features in Kiwi Browser worth talking about. Text reflow is one of my favorites, as it means that zooming in on a webpage will make the text get bigger and wrap to suit your screen. External download manager support is great too, as it will allow you to download files from the internet using something like Advanced Download Manager. You can also whitelist websites to show advertisements so that you can support the websites that you may most frequent.

The update is available now and you can download Kiwi Browser either from XDA Labs or the Google Play Store. You can also check out the XDA forum thread for more information as well.

Kiwi Browser on the XDA Apps & Games forum

kiwi browser kiwi browser

Kiwi Browser - Fast & Quiet (Free, Google Play) →

The post Kiwi Browser adds text reflow support, Translator settings, external download manager support, and more appeared first on xda-developers.

Magisk now supports system-as-root and the Google Pixel 3/Pixel 3a’s logical partitions on Android Q

Google released the first Android Q beta back in March, and root access via Magisk quickly became available for the Google Pixel and Google Pixel 2. The Google Pixel 3, however, could not be rooted on Android Q because the developer of Magisk, XDA Recognized Developer topjohnwu, needed to figure out how to work with the new logical partitions layout. With his new internship at Apple, topjohnwu has had less time to work on Magisk, but that hasn’t stopped him from having two big breakthroughs in development. In the latest Canary release, Magisk now supports system-as-root, making it harder for apps to detect root access, and also supports devices with logical partitions such as the Pixel 3 and Pixel 3a XL series on Android Q.

Google Pixel 3 Forums     Google Pixel 3 XL Forums

Google Pixel 3a Forums  Google Pixel 3a XL Forums

Google Pixel 3 and Pixel 3a Logical Partition Support on Android Q

To help developers test AOSP versions of Android on existing devices, Google releases Generic System Images (GSIs) that can be booted on Project Treble-compatible devices (any device that launched with Android 9 Pie or later.) Installing a GSI requires unlocking the bootloader, which may not be possible on all devices, and flashing a system image over fastboot after wiping user data. In Android Q, Google is introducing a new feature called Dynamic System Updates which lets developers boot a GSI without unlocking the bootloader or wiping data. In order to support Dynamic System Updates, a device needs to have logical partitions that can be dynamically resized to make space for the GSI installation. The Google Pixel 3, Google Pixel 3 XL, Google Pixel 3a, and Google Pixel 3a XL have logical partitions on the Android Q betas, though only the Pixel 3 and Pixel 3 XL support DSU. Nonetheless, it’s because of this radical change in the partition structure that Magisk wasn’t working.

When topjohnwu is determined, nothing stops him from achieving root access. Just the other day, he announced that he had successfully rooted his Pixel 3 XL on Android Q beta 4. His commit description here explains the technical details of how he achieved logical partition support, but what’s important is that Magisk can now be installed on devices with or without logical partitions.

System-as-Root Support

For devices with A/B dual partitions, the system partition is mounted as the root directory (/), but devices without A/B dual partitions have the system partition mounted at /system. This makes system-only OTAs impossible on non-A/B devices because files in the ramdisk, which need updating, are located in the boot partition. That’s why, in order to make system-only OTAs possible in Android Pie and above, Google mandates that all devices launching with Android Pie support the system-as-root partition layout. In the system-as-root layout, the ramdisk image is merged into the system image, which is mounted as rootfs.

Since Google introduced system-as-root, the solution to root devices was to revert system-as-root back to the old partition “initramfs rootfs” layout. That works fine for Android 7.1 to Android 9 Pie since Android has legacy support for this old layout, but Android Q completely removes support as system-as-root is now mandatory for all devices, even for those devices that are updating to Android Q. Prior versions of Magisk still worked thanks to some “really nasty hacks,” but topjohnwu wasn’t satisfied with that solution so to properly support system-as-root he has introduced “MagiskInit.”

A nice side effect of properly support the system-as-root partition layout is that one potential avenue of root detection has been squashed. As topjohnwu graciously explained to me, the old “revert to initramfs rootfs” method was easy for apps to detect because Magisk would mount system to ‘/system_root’ and bind mount ‘/system_root/system’ to ‘/system.’ All an app would need to do to detect the presence of root is check whether ‘/system_root’ exists or if ‘/’ is ‘rootfs.’ However, it’s not clear that any apps actually took advantage of this to detect root. Still, it’s better safe than sorry.

Miscellaneous Changes

Android Q introduces support for something called the “blastula pool” to the Android application lifecycle. MagiskHide was unable to detect apps to hide root access from if the new “process pool” feature was enabled. The latest Canary release now supports this feature. According to topjohnwu: “To properly support the new blastula pool optimization introduced in Q, I had rewritten a good chunk of ptracing logic for process monitoring.”


If you have a Pixel 3, Pixel 3 XL, Pixel 3a, or Pixel 3a XL on the Android Q beta, try out the latest Magisk Canary release and let us know if you manage to root your device.

Magisk Canary Channel

The post Magisk now supports system-as-root and the Google Pixel 3/Pixel 3a’s logical partitions on Android Q appeared first on xda-developers.

Saturday, June 29, 2019

Google’s Fast Share is an upcoming AirDrop-like file sharing tool for Android

When I discovered that Google was deprecating Android Beam in Android Q, I was surprised to see how many people were upset by the news. The file transfer service used NFC to transfer files between devices, and although it was slow and rarely used, it still had its fans because of how widely available it was. Every Android device supported Android Beam, as a matter of fact. Now, in order to share files, you have to use other methods that aren’t guaranteed to work on every device. Google has pushed users toward the Files by Google app, but it now appears that the company is working on a new file-sharing tool. The tool, called Fast Share, is part of the Nearby service in Google Play Services, and it looks to be not only an Android Beam replacement but also an Apple AirDrop competitor.

Fast Share was first spotted by 9to5Google earlier today, but we quickly figured out how to access it for ourselves to share the below screenshots. We also thank XDA Recognized Developer Quinny899 for his assistance in getting some of these screenshots. The screenshots show that the new file-sharing tool will let you “share to nearby devices without Internet,” much like Android Beam once did. Rather than NFC, the service uses Bluetooth to initiate a handshake and then subsequently transfers files over a direct Wi-Fi connection. This will allow for larger files to be transferred much more quickly than Android Beam. Fast Share even allows you to give your device “Preferred Visibility” to nearby devices, which lets those devices “always see your device when you’re nearby, even if you’re not using Fast Share.”

The share flow seems similar to Apple’s AirDrop file sharing service, which Android users have wanted for years. You can send one or more files to another device by selecting the files you want and picking the “Fast Share” option in the share sheet menu. Then, you can pick which device you want to send to once the devices appear in the scanning menu. The activity currently shows generic share targets, including a Chromebook, a Google Pixel 3, an iPhone, and a smartwatch. Hopefully, the service will actually support sending files to Chrome OS devices, Apple iOS devices, and Wear OS smartwatches once it goes live, but we can’t say for sure just based on the presence of these generic share targets.

What we can be sure of is that the service will support sending and receiving files to and from other Android devices with Google Play Services installed. Whether Fast Share will require a specific Android OS version is something we’re not sure of, though. I would imagine that it’ll support most modern Android releases given that it only requires Bluetooth and Wi-Fi Direct support.

We’ll keep an eye out on this file sharing service and will let you know if or when it goes live. It looks like it’ll be a decent competitor to Apple’s AirDrop, but given its reliance on Google Play Services, some will be disappointed that it won’t be as ubiquitous as Android Beam. Google is known to rip services out of AOSP and put them into Google Play Services, so this move shouldn’t come as a surprise. Still, given how many Certified Android devices are on the market, you’ll likely have a hard time finding a device that won’t support this new file sharing tool once it’s available.


Via: 9to5Google

The post Google’s Fast Share is an upcoming AirDrop-like file sharing tool for Android appeared first on xda-developers.

HTC U12+ gets the Android Pie update in Taiwan

The last few years have been rough for Taiwanese smartphone brand HTC. While the brand is certainly capable of designing decent smartphones, it can’t seem to keep up with the current trends of the smartphone industry. Although it isn’t giving up on smartphones, its focus has shifted away from flagships and toward the blockchain and 5G. As a result, we’ve seen the brand slow down software support for its existing products like the HTC U12+. The smartphone was launched last year with Android 8.0 Oreo-based Sense UI on top.

HTC U12+ Forums

Just last month, HTC announced its Android 9 Pie update timeline for three of its devices. According to the timeline, the HTC U12+ was scheduled to receive the Android Pie update this month. This week, we’ve learned the brand has followed through with its promise.

Twitter user @sardroid shared a screenshot of the Android 9 Pie OTA update on their Taiwanese HTC U12+. XDA Member satinghostrider and multiple users on the HTC forums have reported receiving the update, too. The update is 1.06GB in size and has a build number of 2.45.709.1. The changelog doesn’t give much information about the security patch or any other important details, but it does mention that the BlinkFeed has removed Google+ because of the shutdown of the social media service.

HTC is known for releasing updates in Taiwan first since the brand is based in the country. The HTC U11 received the update in Taiwan earlier this month, though notably the update was temporarily suspended due to a bug that soft-bricked some phones. Android 9 Pie was released to the public nearly a year ago, and HTC is already one of the slower brands to push the update to its devices. Still, at least the brand is following through on its promise.

The post HTC U12+ gets the Android Pie update in Taiwan appeared first on xda-developers.

Xiaomi seeks testers for POCO F1’s Android Q update and Mi 6, Redmi 6, Redmi 6A’s Android Pie update

Xiaomi recently announced that it will be shutting its Global Beta ROMs for all devices, with effect from July 1, 2019. Public beta ROMs, though are presumed to be Beta in nature, have been stable enough for a lot of users to use it as a daily driver mainly because of the rather frequent nature of updates. This came with the drawback that a lot of these users would not provide feedback to Xiaomi through the relevant channels, defeating some of the purposes of the program and living with a not-so-stable MIUI experience. Now, Xiaomi is looking for a closed group of beta testers who wish to try out the upcoming Android Q update to the Poco F1, as well as Android Pie updates to the Xiaomi Mi 6, Xiaomi Redmi 6 and Xiaomi Redmi 6A.

This recruitment drive is for testing out “Stable ROM” and making it “more perfect” before releasing it publicly, which does practically make it a beta test. The thread further goes on to call the version “unstable” and “nightly”, which does indeed make this a beta test despite the nomenclature adopted for the program.

Testers for the Poco F1 will try out the Android Q ROM for the device, but it is unknown whether this refers to Developer Preview variants of Android Q, or MIUI-based Android Q, or even stable Android Q but on MIUI (though this would be far-fetched considering there is still plenty of time for stable Android Q to release).

Xiaomi Poco F1 XDA Forums

For the Xiaomi Mi 6, testers will try out the Global Stable ROM for its Android Pie release, which was made available in Beta form previously. Similarly, alpha builds for Android Pie were available previously for the Xiaomi Redmi 6 and Xiaomi Redmi 6A, and now Xiaomi would be testing out what would become the Stable releases.

Xiaomi Mi 6 XDA Forums

Xiaomi Redmi 6 XDA Forums | Xiaomi Redmi 6A XDA Forums

Application deadline for all the above testing groups is July 7, 2019. Testers need to know English and should be comfortable using QQ as their IM tool. You would also need an unlocked bootloader, and should be willing to bear the risk of a broken update. If you are interested, follow along the other instructions in the application thread to apply for the same.


Source: Mi Community

The post Xiaomi seeks testers for POCO F1’s Android Q update and Mi 6, Redmi 6, Redmi 6A’s Android Pie update appeared first on xda-developers.

Friday, June 28, 2019

Samsung Galaxy Watch Active 2 pictures show no rotating bezel

The Samsung Galaxy Watch Active was released earlier this year along with the Galaxy S10 family. This device marked a pretty big design shift for Samsung’s watches. Gone was the chunky, industrial aesthetic and the fan-favorite rotating bezel. Instead, Samsung went for a much sleeker and slimmed down design. New leaks reveal that the Samsung Galaxy Watch Active 2 is headed in the same direction.

The folks over at SamMobile got their hands on some photos of the Galaxy Watch Active 2. We can see that it has a very similar look to the original Watch Active. Once again, the rotating bezel is nowhere in sight. The home/power button is round and the back button is rectangular. There is also a red circle around the power button, which could be an Apple-like indicator of LTE connectivity.

Galaxy Watch Active 2

In terms of specs, the Watch Active 2 is said to have two models: LTE and WiFi. The LTE model will have a 340 mAh battery while the WiFi version has 237 mAh. There will also be two different sizes: 40mm and 44mm. The watch will be running Samsung’s latest version of One UI as well.

The original Galaxy Watch Active is not very old, so it could be a while before we see this new watch. The real-life photos indicate that it’s nearly ready for prime time, though. We’ll wait and see if Samsung decides to show off the Galaxy Watch Active 2 with the Galaxy Note 10.


Source: SamMobile

The post Samsung Galaxy Watch Active 2 pictures show no rotating bezel appeared first on xda-developers.

LCDs with in-display fingerprint scanners will bring the tech to budget phones

Smartphones are always progressing. Years ago, it was crazy to think that a budget smartphone could have a fingerprint scanner. Since then, the proliferation of the fingerprint scanner has made it so that it is ubiquitous even in the sub-$200 market. The next evolution of it is the in-display fingerprint scanner, which removes the need for a dedication hardware sensor taking up space on the body of the device. That technology has been limited to OLED panels so far, though, because their thinness allows light to pass through easier. That’s set to change as both BOE and AUO Optronics announced an LCD displays that support an optical in-display fingerprint scanner.

For those unfamiliar, BOE is one of the lesser-known display manufacturers in the business. Even still, they’re no stranger to both the flagship and the budget markets. For example, the Huawei Mate 20 Pro used panels made by both BOE and LG (though they were seemingly not high quality). AMOLED panels are still more expensive than LCD, so this particular advancement will allow for budget phones to have an in-display fingerprint scanner.

 

Just last month, Taiwanese manufacturer AU Optronics launched a 6-inch full-screen optical embedded fingerprint scanning LTPS display. This is the world’s first fingerprint scanning technology that supports optical sensors embedded in an LCD screen. At the moment, it comes in FHD+ resolution, 2304×1080. We don’t really know when these panels will begin to ship, though Wang Teng, product director at Xiaomi, says that he expects to see them arrive early next year or by the end of this year.

These fingerprint scanners will definitely not be contenders for their flagship counterparts, but they’re yet another example of a hardware advancement trickling down to lower cost phones. It could well be possible that their performance is actually worse than first generation in-display fingerprint scanners on AMOLED panels.


Source: CNBetaVia: Gizchina

The post LCDs with in-display fingerprint scanners will bring the tech to budget phones appeared first on xda-developers.

[Update: Except Nokia 2] The Nokia 1 gets Android Pie, so now every HMD Global phone has the latest update

Update (6/28/19 @ 1:53 PM ET): The Nokia 2 is confirmed to be not receiving the Android Pie update.

I am becoming increasingly impressed with how well HMD Global has handled Android’s software updates for all of its smartphones. Granted, you don’t get all of the bells and whistles from their OEM ROM as say, Samsung’s version of Android, but fans of stock Android have found themselves a good home with the current roster of Nokia smartphones. After releasing a couple of roadmaps for their Android Pie update schedule, the company has just announced the update is currently rolling out to the Nokia 1.

Getting into the smartphone industry isn’t an easy goal for a company to achieve. Essential had all the hype in the world with the launch of the PH-1. While it did make an impact in the smartphone industry, there are few who would say it was a commercial success. Even going the route of licensing out your brand name (similar to how Nokia licenses its name to HMD Global) has rarely proven to be successful in the long-term. We’re so used to smartphone OEMs only keeping their high-end smartphones updated with the latest version of Android but Nokia 1 owners don’t have to worry about that.

I was very skeptical about HMD Global when they began releasing smartphones under the Nokia brand. However, the company has been very vocal about their plans and current schedule for software updates. The Nokia 1 was launched in early 2018 with Android Oreo (Go Edition) and costs you less than $60 from Amazon (brand new). It’s getting the Android Pie update OTA right now. Competition within the smartphone industry is tough on the businesses that choose to participate. However, that type of competition is great for the consumer as it forces everyone else to step up their game.

Most OEMs only guarantee 2 major version updates for its flagship smartphones and 3 years of security updates. For years, customers had to buy these $500+ smartphones in order to feel safe knowing they can get major version updates (along with prompt security updates). HMD Global is showing that customers don’t have to do that anymore. Now, we just have to wait and see if HMD Global will be able to continue with this rigorous update schedule for its Nokia smartphones and keep the company out of the red.


Update: Except Nokia 2

Earlier this week, Juho Sarvikas, Chief Product Officer at HMD Global, tweeted about the Nokia 1 getting Android Pie. He said, “Now there is a Nokia smartphone everyone running Pie.” Turns out this isn’t completely true. The Nokia 2 will not be getting the update, as confirmed by an HMD Staff Member.

Via: LoveNokia

The post [Update: Except Nokia 2] The Nokia 1 gets Android Pie, so now every HMD Global phone has the latest update appeared first on xda-developers.

OPPO Reno 10x Zoom Vs Huawei P30 Pro: Battle of the Camera Beasts

2019 has seen some really great smartphone cameras. The technology is getting crazy impressive and devices are doing really interesting things with it. Two devices that moved the needle earlier this year are the OPPO Reno 10x Zoom and Huawei P30 Pro. XDA TV’s Daniel Marchena put together a side-by-side camera comparison of these two camera behemoths.

OPPO Reno 10x Zoom XDA Forums | Huawei P30 Pro XDA Forums

Daniel has already stated his love for the Huawei P30 Pro’s camera, so how does it stack up with the Reno 10x Zoom? OPPO is not the household name that Huawei has become (for better or worse), but Daniel walked away from the comparison very impressed. The minimum focus field of the zoom lens is a little disappointing, and low-light photography can’t touch the P30 Pro, but the main sensor is really great.

Check out Daniel’s comparison in the video below. Which phone do you think has the better camera setup?

Specifications Huawei P30 Pro OPPO Reno 10x Zoom
Display
  • 6.47-inch OLED;
  • 1080 x 2340;
  • 19.5:9;
  • HDR10
  • 6.6-inch OLED
  • 1080 x 2340
  • 19:5:9
  • Screen-to-body ratio: 93.1%
SoC 7nm HiSilicon Kirin 980:
  • 2x Cortex-A76
  • 2x Cortex-A76
  • 4x Cortex-A55
Qualcomm Snapdragon 855
  • 1 x 2.84GHz Kryo 485 (A76-based)
  • 3 x 2.42GHz Kryo 485 (A76-based)
  • 4 x 1.8GHz Kryo 485 (A55-based)
RAM 8GB 6GB/8GB
Storage 128/256/512GB 128GB/256GB UFS 2.1
Expandability Up to 256GB through proprietary nano-memory card (in SIM 2 slot) Yes
Battery 4200 mAh; With 40W fast charging, and 15W fast wireless charging, reverse wireless charging 4065mAh; 20W VOOC 3.0 charging
Fingerprint Sensor Optical In-display Optical In-display
Rear Camera
  • 40MP, f/1.6, OIS +
  • 20MP, f/2.2, ultra-wide angle +
  • 8MP, f/3.4, telephoto with 7.8x optical zoom and 10x hybrid zoom +
  • 3D ToF
  • Laser AF
  • Dual LED Flash
  • 48MP Sony IMX586 primary sensor, f/1.7, OIS
  • 13MP telephoto sensor, f/3.0, 10X hybrid zoom
  • 8MP 120° ultra-wide sensor f/2.2
Front Camera 32MP 16MP with front-facing LED, f/2.0
IP Rating IP68 N/A
Android Version EMUI 9.1 based on Android Pie ColorOS based on Android 9 Pie

Note: Huawei/Honor has stopped providing official bootloader unlock codes for its devices. Therefore, the bootloaders can’t be unlocked, which means that users cannot root or install custom ROMs.

The post OPPO Reno 10x Zoom Vs Huawei P30 Pro: Battle of the Camera Beasts appeared first on xda-developers.

Checketry is a download manager that syncs progress between desktop and mobile

If you live in an area that is not blessed with very high-speed internet, downloading large resources can become a bit of a task. Even files as big/small as 1GB can take hours to download, and the issue compounds itself the bigger the size of your file. Most people do not like to wait around staring at a computer or phone screen while such downloads slowly take place, but there aren’t many efficient solutions available to sync progress results across platforms. Checketry is one such download manager that lets you track and manage downloads for browsers, torrent clients, and game clients on your Windows desktop through your Android or iOS smartphone.

Checketry is a desktop and mobile app that lets you track and manage downloads between devices. The app shows all download information from your desktop, such as download speed, time left, size, and progress bar, on your mobile device. Downloads can be started from mobile and can also be paused, resumed, and cancelled. If you are willing to shell out for the (expensive, in our opinion) monthly or yearly Premium Plans, you also get the ability to modify desktop sleep settings and shutdown timer.

You can follow along with the discussion at Checketry’s thread over in our forums.

Checketry: File and Download Manager (Free, Google Play) →

The post Checketry is a download manager that syncs progress between desktop and mobile appeared first on xda-developers.

Synergy lets you use Substratum custom themes once again on Samsung’s One UI


When Samsung released its Android Pie-based software called One UI, we were big fans of its focus on one-handed ease of use and system-wide dark theme. Furthermore, unlike Android Pie builds for other devices, Samsung didn’t disable installing custom overlays in One UI. Sadly, around the time of the Galaxy S10 launch, Samsung merged the changes blocking custom overlays used by the Substratum theme engine. Fortunately, the Projekt team found a workaround. They have created a new app called Synergy to install themes on Samsung Galaxy phones running One UI, and it doesn’t need root.

Themes on One UI have been possible for a bit of time now with Custom Themes Install for OneUI. This app would let you install themes that were compiled for the Samsung theme store and made specifically for this app. It’s very useful but doesn’t give the same type of flexibility as Synergy. Synergy lets you import themes directly from Substratum Lite and the aforementioned custom themes.

How to Install Custom Substratum Themes on Samsung Galaxy devices running One UI

  1. Download Synergy and Substratum Lite from the Play Store.
    Synergy themes for One UI
  2. Download the compatible theme of your choice.
  3. Open Synergy and click “ADD OVERLAYS”
  4. Select Substratum Lite.
  5. Select the theme you wish to apply.
  6. Select all the apps and details about the theme you wish to install
  7. Click install selected in the bottom right corner.
  8. Click build in the bottom of Synergy.
  9. Now, before you get into installing the themes, Synergy is going to have you install a theme from the Samsung Theme store. Synergy does this to replace the One UI theme files.
  10. Go back to Synergy and uninstall and install the apps prompted.
  11. Reboot your device.
  12. After rebooting go to Settings -> Wallpapers and Themes -> Themes and click the Synergy icon and apply the themes.
  13. Reboot your phone.
  14. Go back to Synergy. Click the three lines in the bottom left corner of the app and select Night Mode Settings
  15. Install the prompted app.
  16. Enable night mode.

Not every theme will support this at launch, luckily the Projekt team worked with some theme developers on getting their themes working ahead of time. There are just a few listed below, but there are many more.

Flux - Substratum Theme ($1.49, Google Play) →

Swift Black Substratum Theme +Oreo & Samsung theme ($1.99, Google Play) →

Swift Dark Substratum Theme ($1.99, Google Play) →

Biohazard Samsung Edition [Substratum] ($1.49, Google Play) →

[Substratum] Linear ($1.99, Google Play) →

Sprite Substratum Theme Android O and P ($1.99, Google Play) →

It’s super easy to install Substratum themes on One UI devices using Synergy. It allows for so much more customization compared to the Samsung Theme Store or even those pre-packaged themes. This should work on any Samsung Galaxy device running One UI, so it’s not limited to just the latest versions. That includes the Samsung Galaxy S8, Galaxy Note 8, Galaxy S9, Galaxy Note 9, Galaxy S10, and multiple A series smartphones that have received the update.

Synergy - OneUI Theme Compiler ($1.99, Google Play) →

The post Synergy lets you use Substratum custom themes once again on Samsung’s One UI appeared first on xda-developers.