Difference between revisions of "Constraint: ADB Hacked"

(Created page with "<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device...")
 
Line 1: Line 1:
 
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.</pre>
 
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.</pre>
''''ADB Hack Permissions:'''''
+
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
 
* WRITE_SECURE_SETTINGS
 
* WRITE_SECURE_SETTINGS
 
* READ_LOGS
 
* READ_LOGS

Revision as of 19:15, 16 February 2024

This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.

ADB Hack Permissions

  • WRITE_SECURE_SETTINGS
  • READ_LOGS
  • SET_VOLUME_KEY_LONG_PRESS_ LISTENER
  • CHANGE CONFIGURATION
  • DUMP