This is an automated archive made by the Lemmit Bot.
The original was posted on /r/fossdroid by /u/EllesarDragon on 2023-07-18 17:39:00.
I noticed f-droid also displays apps which have anti-features and then lists what anti-features the app has.
I sometimes make projects and do not add anti-features myself and do not consciously use proprietary services but I do use a game engine, it is a foss one, but there are third party proprietary binary black box blobs which are used for compiling projects to a android build. but I want to be sure really none of them have any anti-features in them.
so I wondered if there is a tool to scan them for such anti-features to make sure none of such black box blobs secretly inject some form of proprietary malware/anti-features.
for example the game engine expects one to use googles proprietary android sdk to compile it, now I recently found there also is a free open source alternative but didn’t yet look deep enough into that as of now, and then still I want to be sure no secret anti-features or malware sending data to google or backdoors or such are injected.
after all if they don’t want to tell about or show what actually truly happens one should always be cautious, and I certainly don’t want such shit ending up in something I made.
so how does f-droid figure out if and what anti-features are in a app, and how to check a local apk file for such anti-features(one that isn’t uploaded to a store(yet, or just won’t be uploaded in some cases, since regularly it is just some random experiment or thing I want).
the gameengine I use for making them is godot, which is free open source, but for exporting to android proprietary closed blobs are needed typically. I use godot since it can make pretty optimized things not to heavy weight and mostly allows porting it directly to around any platform and using one programming language instead of having to use different programming languages and writing different rendering engines for every platform