|
| 1 | +# Security Information |
| 2 | + |
| 3 | +## Windows Defender False Positives |
| 4 | + |
| 5 | +### Why does Windows Defender flag this as a virus? |
| 6 | + |
| 7 | +This is a **false positive** that commonly occurs with PyInstaller executables. Here's why: |
| 8 | + |
| 9 | +1. **PyInstaller behavior**: PyInstaller bundles Python and all dependencies into a single executable, which can trigger heuristic detection |
| 10 | +2. **Unsigned executable**: The executable isn't code-signed with a certificate, making Windows more suspicious |
| 11 | +3. **ADB interaction**: The tool interacts with ADB (Android Debug Bridge), which antivirus software may flag as suspicious |
| 12 | +4. **New executable**: Windows Defender is more likely to flag new, uncommon executables |
| 13 | + |
| 14 | +### Is it actually safe? |
| 15 | + |
| 16 | +**Yes, it's completely safe.** Here's how you can verify: |
| 17 | + |
| 18 | +1. **Source code is open**: All source code is available in this repository for inspection |
| 19 | +2. **Build process is transparent**: GitHub Actions builds are public and auditable |
| 20 | +3. **No network activity**: The tool only communicates with your connected Android device via ADB |
| 21 | +4. **No system modifications**: Only removes apps you explicitly select |
| 22 | + |
| 23 | +### How to use safely |
| 24 | + |
| 25 | +#### Option 1: Add Windows Defender Exception |
| 26 | +1. Open Windows Security |
| 27 | +2. Go to "Virus & threat protection" |
| 28 | +3. Click "Manage settings" under "Virus & threat protection settings" |
| 29 | +4. Click "Add or remove exclusions" |
| 30 | +5. Add the downloaded executable file |
| 31 | + |
| 32 | +#### Option 2: Use Python Source (Recommended for paranoid users) |
| 33 | +Instead of the executable, run from source: |
| 34 | +```bash |
| 35 | +git clone https://github.com/PixelCode01/UIBloatwareRegistry.git |
| 36 | +cd UIBloatwareRegistry |
| 37 | +python main.py |
| 38 | +``` |
| 39 | + |
| 40 | +#### Option 3: Build Your Own Executable |
| 41 | +```bash |
| 42 | +git clone https://github.com/PixelCode01/UIBloatwareRegistry.git |
| 43 | +cd UIBloatwareRegistry |
| 44 | +pip install pyinstaller |
| 45 | +python build_spec.py |
| 46 | +pyinstaller android-bloatware-remover.spec |
| 47 | +``` |
| 48 | + |
| 49 | +### Verification Steps |
| 50 | + |
| 51 | +1. **Check file hash**: Compare with hashes provided in releases |
| 52 | +2. **Scan with multiple engines**: Use VirusTotal.com to scan with 60+ antivirus engines |
| 53 | +3. **Review source code**: Inspect the code before running |
| 54 | +4. **Test in VM**: Run in a virtual machine first if concerned |
| 55 | + |
| 56 | +## Reporting Security Issues |
| 57 | + |
| 58 | +If you find a legitimate security issue, please: |
| 59 | + |
| 60 | +1. **Do NOT** open a public issue |
| 61 | +2. Email security concerns to the repository owner |
| 62 | +3. Provide detailed information about the vulnerability |
| 63 | +4. Allow time for the issue to be addressed before public disclosure |
| 64 | + |
| 65 | +## Code Signing |
| 66 | + |
| 67 | +We are working on implementing code signing to reduce false positives. This requires: |
| 68 | +- Purchasing a code signing certificate |
| 69 | +- Setting up automated signing in the build process |
| 70 | +- Establishing trust with certificate authorities |
| 71 | + |
| 72 | +## Best Practices for Users |
| 73 | + |
| 74 | +1. **Always download from official releases**: Only download from GitHub releases page |
| 75 | +2. **Verify checksums**: Compare file hashes when provided |
| 76 | +3. **Use test mode first**: Run with `--test` flag to verify functionality |
| 77 | +4. **Keep backups**: Always backup your device before removing apps |
| 78 | +5. **Review what you're removing**: Understand each package before removal |
| 79 | + |
| 80 | +## Technical Details |
| 81 | + |
| 82 | +### What the tool does: |
| 83 | +- Connects to Android devices via ADB |
| 84 | +- Lists installed packages |
| 85 | +- Removes selected packages using `adb shell pm uninstall` |
| 86 | +- Creates backup files locally |
| 87 | +- Logs operations for troubleshooting |
| 88 | + |
| 89 | +### What the tool does NOT do: |
| 90 | +- Access the internet (except for ADB communication) |
| 91 | +- Modify system files on your computer |
| 92 | +- Install anything on your computer |
| 93 | +- Send data to external servers |
| 94 | +- Access personal files or data |
| 95 | + |
| 96 | +### ADB Commands Used: |
| 97 | +```bash |
| 98 | +adb devices # List connected devices |
| 99 | +adb shell getprop ro.product.brand # Get device brand |
| 100 | +adb shell pm list packages # List installed packages |
| 101 | +adb shell pm uninstall --user 0 <pkg> # Remove package |
| 102 | +``` |
| 103 | + |
| 104 | +All commands are standard ADB operations used by Android developers worldwide. |
0 commit comments