From de35a80221253ca5d481fd6ccb0b75f90a33b123 Mon Sep 17 00:00:00 2001 From: sandbank52641 <153552626+sandbank52641@users.noreply.github.com> Date: Wed, 29 May 2024 17:00:19 +0200 Subject: [PATCH] use conforming procedure style in usage.html --- static/usage.html | 227 ++++++++++++++++++++++++++-------------------- 1 file changed, 127 insertions(+), 100 deletions(-) diff --git a/static/usage.html b/static/usage.html index e5567699..5eb2b319 100644 --- a/static/usage.html +++ b/static/usage.html @@ -110,9 +110,12 @@ like it. Our experience is that when armed with the appropriate knowledge, the vast majority of users prefer the newer gesture navigation approach.
-The system navigation mode can be configured in Settings ➔ System ➔ Gestures ➔ - System navigation. The same menu is also available in Settings ➔ Accessibility ➔ - System controls ➔ System navigation.
+The system navigation mode can be configured in Settings > System > Gestures > Navigation + mode. The same menu is also available in Settings > Accessibility > System + controls > Navigation mode.
You can enable our exploit protection compatibility mode via Settings ➔ Apps ➔ - App ➔ Exploit protection. The exploit protection compatibility mode toggle will:
+You can enable our exploit protection compatibility mode via + Settings > Apps > APP > Exploit protection compatibility mode. The exploit protection + compatibility mode toggle will:
Wi-Fi and Bluetooth scanning for improving location detection are disabled - by default, unlike the stock OS. These can be toggled in Settings ➔ Location ➔ - Location Services ➔ Wi-Fi and Bluetooth scanning. These features enable - scanning even when Wi-Fi or Bluetooth is disabled, so these need to be kept - disabled to fully disable the radios when Wi-Fi and Bluetooth are disabled. - GrapheneOS itself doesn't currently include a supplementary location service - based on Wi-Fi and Bluetooth scanning. These options impact whether apps such - as sandboxed Google Play are able to use the functionality if you grant them - the Location permission. GrapheneOS plans to eventually include an OS service - based on local databases rather than a network-based service giving the user's - location to a server whenever location is being used.
+Wi-Fi and Bluetooth scanning for improving location detection are disabled by + default, unlike the stock OS. These can be toggled in Settings > Location > Location services > Wi-Fi and + Bluetooth scanning. These features enable scanning even when Wi-Fi or Bluetooth is + disabled, so these need to be kept disabled to fully disable the radios when Wi-Fi and Bluetooth + are disabled. GrapheneOS itself doesn't currently include a supplementary location service based + on Wi-Fi and Bluetooth scanning. These options impact whether apps such as sandboxed Google Play + are able to use the functionality if you grant them the Location permission. GrapheneOS plans to + eventually include an OS service based on local databases rather than a network-based service + giving the user's location to a server whenever location is being used.
Associated MAC randomization is performed by default. This can be controlled - per-network in Settings ➔ Network & Internet ➔ Internet ➔ NETWORK ➔ Privacy.
+ per-network in Settings > Network + & internet > Internet > NETWORK > Privacy.In the stock OS, the default is to use a unique persistent random MAC address for each network. It has 2 options available: "Use randomized MAC (default)" and "Use @@ -946,15 +960,16 @@
If you have a reliable LTE connection from your carrier, you can reduce attack - surface by disabling 2G, 3G and 5G connectivity in Settings ➔ Network & - Internet ➔ SIMs ➔ Preferred network type. Traditional voice calls will only work - in the LTE-only mode if you have either an LTE connection and VoLTE (Voice over - LTE) support or a Wi-Fi connection and VoWi-Fi (Voice over Wi-Fi) support. VoLTE / - VoWi-Fi works on GrapheneOS for most carriers unless they restrict it to carrier - phones. Some carriers may be missing VoWi-Fi due to us not including their - proprietary apps. Please note that AT&T users may see "5Ge" being used when - LTE Only mode is enabled as AT&T intentionally mislabel LTE services as "5Ge" - to mislead users.
+ surface by disabling 2G, 3G and 5G connectivity in Settings > Network & internet > SIMs > SIM > Preferred network type. Traditional voice calls will only + work in the LTE-only mode if you have either an LTE connection and VoLTE (Voice over LTE) support or + a Wi-Fi connection and VoWi-Fi (Voice over Wi-Fi) support. VoLTE / VoWi-Fi works on GrapheneOS for + most carriers unless they restrict it to carrier phones. Some carriers may be missing VoWi-Fi due to + us not including their proprietary apps. Please note that AT&T users may see "5Ge" being used + when LTE Only mode is enabled as AT&T intentionally mislabel LTE services as "5Ge" to mislead + users.This feature is not intended to improve the confidentiality of traditional calls and
texts, but it might somewhat raise the bar for some forms of interception. It's not a
@@ -1073,28 +1088,29 @@
The compatibility layer has a configuration menu available at Settings ➔
- Apps ➔ Sandboxed Google Play. The compatibility layer has a configuration menu available at
+ Settings > Apps > Sandboxed Google Play. By default, apps using Google Play geolocation are redirected to our own
- implementation on top of the standard OS geolocation service. You don't need
- to grant any permissions to Google Play or change any settings for working
- location in apps using Google Play geolocation due to our rerouting feature.
- If you want to use Google's network location service to provide location
- estimates without satellite reception, you can disable the "Reroute location
- requests to OS APIs" toggle and grant what it requires to provide network
- location. You will need to grant "Allow all the time" Location access to
- Google Play services along with the Nearby Devices permission for it to have
- all the access it needs. You need to use the "Google Location Accuracy" link
- from the sandboxed Google Play configuration menu to access the Google Play
- services menu for opting into their network location service, otherwise this
- is all pointless. It will send the nearby Wi-Fi and cellular networks provided
- via the Location and Nearby Devices permissions to their service to retrieve a
- location estimate. In order to fully take advantage of Wi-Fi and Bluetooth
- scanning, you also need to enable the scanning toggles in Settings ➔ Location
- ➔ Location services which are disabled by default and control whether apps
- with the required permissions can scan when Wi-Fi and Bluetooth are otherwise
- disabled.Configuration
-
Re-routing location to the OS geolocation service will use more power than using the Google Play geolocation service since we do not provide a @@ -1109,9 +1125,10 @@ integration so there needs to be an app providing a way to access them.
The menu also provides links to this usage guide, Play services system - settings, Play Store system settings and Google settings. The Play services - and Play Store system settings are only included for convenience since they - can be accessed the same way as any other app via Settings ➔ Apps.
+ settings, Play Store system settings and Google settings. The Play services and + Play Store system settings are only included for convenience since they can be + accessed the same way as any other app via Settings > Apps.eSIM support on GrapheneOS doesn't require any dependency on Google Play, and never shares data to Google Play even when installed.
-eSIM support can be enabled in Settings ➔ Network & - Internet ➔ eSIM support. The toggle is persistent across every boot.
+eSIM support can be enabled in Settings > Network & internet > eSIM support. The toggle is persistent across every + boot.
By enabling the toggle, the proprietary Google functionality is enabled and will be used by the OS to provision and manage eSIMs.
@@ -1183,10 +1202,12 @@ depends on sandboxed Google Play, you'll be prompted to install it if it's not already installed. -After installation, Android Auto has to be set up from the "Settings ➔ Apps ➔ - Sandboxed Google Play ➔ Android Auto" configuration screen, which contains - permission toggles, links to related configuration screens, configuration tips, and - links to optional Android Auto dependencies.
+After installation, Android Auto has to be set up from the Settings > Apps > Sandboxed Google Play > Android Auto configuration screen, which contains permission + toggles, links to related configuration screens, configuration tips, and links to optional + Android Auto dependencies.
The permission toggles ask for a confirmation before turning on. The confirmation popup explains what access each permission toggle provides.
@@ -1227,12 +1248,12 @@ generally encountered with non-financial apps.Many of these apps have their own crude anti-tampering mechanisms trying to - prevent inspecting or modifying the app in a weak attempt to hide their code and - API from security researchers. GrapheneOS allows users to disable native code - debugging via a toggle in Settings ➔ Security to improve the app sandbox and this - can interfere with apps debugging their own code to add a barrier to analyzing the - app. You should try enabling this again if you've disabled it and are encountering - compatibility issues with these kinds of apps.
+ prevent inspecting or modifying the app in a weak attempt to hide their code and API + from security researchers. GrapheneOS allows users to disable Native code + debugging via a toggle in Settings > + Security to improve the app sandbox and this can interfere with apps debugging their + own code to add a barrier to analyzing the app. You should try enabling this again if you've + disabled it and are encountering compatibility issues with these kinds of apps.Banking apps are increasingly using Google's SafetyNet attestation service to
check the integrity and certification status of the operating system. GrapheneOS
@@ -1265,16 +1286,17 @@
Android apps can declare associations with domains in order to handle those
- URLs in the app automatically. For security reasons, app links are disabled by
- default to prevent apps intercepting arbitrary URLs. First party apps associated
- with a domain are expected to be authorized by the domain. Apps can ask for their
- app links to be verified by the OS by marking them with Android apps can declare associations with domains in order to handle those URLs
+ in the app automatically. For security reasons, app links are disabled by default to
+ prevent apps intercepting arbitrary URLs. First party apps associated with a domain
+ are expected to be authorized by the domain. Apps can ask for their app links to be
+ verified by the OS by marking them with As an example, the first party YouTube app will have the app links verified by
the OS automatically while the NewPipe app requires manually enabling handling
@@ -1347,12 +1369,16 @@
Some carriers may restrict functionality, such as VoLTE, on imported Pixel
- devices as they only whitelist the IMEI ranges of Pixel device SKUs which were
- sold locally. You can check your SKU on GrapheneOS by going to Settings ➔ About
- phone ➔ Model ➔ Hardware SKU and using the
- official Google
- documentation. You should check if such functionality works on the stock OS to
- troubleshoot. It is not possible to change the IMEI on a production device and
- GrapheneOS cannot add support for it since the hardware doesn't support it.App link verification
- autoVerify
in
- their manifest. The OS will securely confirm that the domain authorizes the app to
- handle the domain's URLs. Users can also manually enable an app's link
- associations via Settings ➔ Apps ➔ App name ➔ Open by default ➔ Add link. Apps can
- ask users to enable the associations and send them to this page in the Settings
- app.autoVerify
in their manifest.
+ The OS will securely confirm that the domain authorizes the app to handle the
+ domain's URLs. Users can also manually enable an app's link associations via
+ Settings > Apps > APP > Open by default > Add link. Apps
+ can ask users to enable the associations and send them to this page in the Settings app.
Android 12 introduced support for the GSMA