outis151
outis151
In my opinion it is completely pointless to try and hide the API key within the app. Anybody with a rooted phone and a custom CA certificate can see it...
Unfortunately there is no way to limit who has access to the API key... It can be extracted either from the APK or from network analysis. Every measure to filter...
As mentioned in https://github.com/Exodus-Privacy/exodus-android-app/issues/207#issuecomment-1242904852 none of these methods will help you hide the api key... They might make it a bit more difficult only
This is something that also occurs when running inside unprivileged LXC containers (Kernel 5.10) , but I haven't figured out why that is yet. There shouldn't be any reason why...
`runsc` is actually running as root user inside the user namespace of the lxc container which is unprivileged. The result is the same running it with the `--rootless` flag. I...
Thanks for the suggestions. Will continue trying to find what is causing this
The idea was to skip processing mrt records based on the timestamp in the CommonHeader. Since I am working with local mrt files, I cannot use an API to limit...
Indeed, I tried using `Elementor` for performance reasons but I doubt there is any major difference as the payload of each CommonHeader is already mostly parsed anyway from looking at...
This can be observed with both of the following settings set: 1) "Notes opening behavior" set to "Plain preview" 2) "Direct Edit" set to disabled
The console is also not visible when only audio is played (and not video)