Difference between revisions of "Constraint: ADB Hacked"

m
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
<span style="color: #0E9549; font-size: 24px;">'''About this restriction'''</span><br/>
+
<span style="color: #0E9549; font-size: 24px;">'''About this constraint '''</span><br/>
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
+
This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
 +
 
 +
It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.<br/>
  
It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.</pre>
 
 
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
 
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
  
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
+
* ''WRITE_SECURE_SETTINGS''
* WRITE_SECURE_SETTINGS
+
<br/>
</pre>
+
* ''READ_LOGS''
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
+
<br/>
* READ_LOGS
+
* ''SET_VOLUME_KEY_LONG_PRESS_ LISTENER''
</pre>
+
<br/>
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
+
* ''CHANGE CONFIGURATION''
* SET_VOLUME_KEY_LONG_PRESS_ LISTENER
+
<br/>
</pre>
+
* ''DUMP''
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
+
<br/>
* CHANGE CONFIGURATION
 
</pre>
 
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
 
* DUMP
 
</pre>
 

Latest revision as of 15:56, 23 April 2024

About this constraint
This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.

It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.

ADB Hack Permissions

  • WRITE_SECURE_SETTINGS


  • READ_LOGS


  • SET_VOLUME_KEY_LONG_PRESS_ LISTENER


  • CHANGE CONFIGURATION


  • DUMP