Skip to content

Conversation

@marktech0813
Copy link

I added a new “Privacy Advisor” feature inside the app that scans installed apps for telephony/SIM-related permissions, shows results, and lets you copy ADB commands to clamp them.

  • Launch: open the app → menu → Privacy Advisor.
  • What it does: lists apps requesting READ_PHONE_STATE, READ_PHONE_NUMBERS, READ_SMS, READ_CALL_LOG; tap an app to see granted/denied state and copy ADB commands to revoke/ignore and reset the app.
  • Docs: added AIMSICD/TikTok-SIM-Privacy.md with step-by-step non-root fixes.

Key Edit:

  • Strings added in AIMSICD/src/main/res/values/strings.xml.
  • New doc: AIMSICD/TikTok-SIM-Privacy.md.

Status: I created the activity, layout, strings, manifest entry, and menu wiring, plus a troubleshooting doc.

  • Added PrivacyAdvisorActivity with list and details dialog; copy-to-clipboard ADB commands.
  • Wired into AndroidManifest.xml and main_menu.xml; handled in MainActivity.
  • Added minimal strings and a concise doc (AIMSICD/TikTok-SIM-Privacy.md).

Do this in order until TikTok works

  1. Deny TikTok access to phone/SIM, then reset the app
  • Settings > Apps > TikTok > Permissions > Phone → Deny. Also Deny SMS, Contacts, Call logs if present.
  • Force stop TikTok.
  • Storage & cache > Clear storage.
  • Open TikTok on Wi‑Fi and test.
  1. Most reliable non‑root: use a secondary Android user with no telephony
  • Settings > System > Multiple users > Add user.
  • When asked, do NOT enable “Phone calls & SMS for this user.”
  • Switch to the new user, connect to Wi‑Fi, install only TikTok, sign in, and test.
  1. Stronger clamp (ADB, no root)
  • Enable Developer options and USB debugging.

  • Connect to a PC with ADB, then run:
    adb shell pm list packages | grep -i tiktok
    # Replace PKG with the exact package you see (e.g. com.zhiliaoapp.musically or com.ss.android.ugc.trill)
    PKG=com.zhiliaoapp.musically

    # Revoke dangerous telephony permissions
    adb shell pm revoke $PKG android.permission.READ_PHONE_STATE
    adb shell pm revoke $PKG android.permission.READ_PHONE_NUMBERS
    adb shell pm revoke $PKG android.permission.READ_SMS
    adb shell pm revoke $PKG android.permission.READ_CALL_LOG 2>/dev/null || true
    
    # Clamp app-ops that leak telephony identifiers (Android 10+)
    adb shell cmd appops set $PKG READ_DEVICE_IDENTIFIERS ignore
    adb shell cmd appops set $PKG READ_PHONE_STATE ignore
    adb shell cmd appops set $PKG READ_PHONE_NUMBERS ignore
    adb shell cmd appops set $PKG READ_SMS ignore
    
    # Reset the app after changes
    adb shell am force-stop $PKG
    adb shell pm clear $PKG
    
  1. On‑device alternative to ADB (still non‑root)
  • Install Shizuku, start it.
  • Install “App Ops” or “App Manager”; link it to Shizuku.
  • For TikTok, set the same app‑ops above to “Ignore/Deny,” and revoke Phone/SMS permissions.
  • Force stop and clear storage for TikTok, then test.
  1. Temporarily disable the SIM subscription while using TikTok
  • Settings > Network & Internet > SIMs > toggle OFF the Syrian SIM (disables subscription, not just data).
  • Keep Wi‑Fi ON.
  • Force stop + Clear storage for TikTok, then test.
  • Dual‑SIM: place the Syrian SIM in slot 2 and disable that slot when using TikTok.
  1. Optional: firewall to Wi‑Fi only
  • Install NetGuard or RethinkDNS.
  • For TikTok, block “Mobile data,” allow “Wi‑Fi.”
  • Use this alongside the steps above; it doesn’t hide the SIM but avoids mobile routing.

Notes

  • Always force stop + clear storage before re‑testing so TikTok drops any cached region flags.
  • Intercepting what TikTok sends isn’t feasible non‑root due to TLS + certificate pinning.
  • If all else fails, use the web version in a browser profile or an Android tablet/Chromebook (no cellular stack). On iPhone it already works, as you noted.

Summary

  • Deny Phone/SIM access and clear TikTok’s storage; test on Wi‑Fi.
  • Best fix: run TikTok in a secondary user without telephony enabled.
  • For stronger enforcement, use ADB (or Shizuku + App Ops) to set telephony app‑ops to Ignore.

Contribution by Gittensor, learn more at https://gittensor.io/

I added a new “Privacy Advisor” feature inside the app that scans installed apps for telephony/SIM-related permissions, shows results, and lets you copy ADB commands to clamp them.

Contribution by Gittensor, learn more at https://gittensor.io/
I added a new “Privacy Advisor” feature inside the app that scans installed apps for telephony/SIM-related permissions, shows results, and lets you copy ADB commands to clamp them.
        <activity
            android:name=".ui.activities.PrivacyAdvisorActivity"
            android:label="@string/menu_privacy_advisor"
            android:parentActivityName=".ui.activities.MainActivity"
            android:configChanges="keyboardHidden|screenLayout|screenSize|orientation">
            <intent-filter>
                <category android:name="android.intent.category.DEFAULT"/>
            </intent-filter>
        </activity>
<?xml version="1.0" encoding="utf-8"?>
<LinearLayout xmlns:android="http://schemas.android.com/apk/res/android"
	android:layout_width="match_parent"
	android:layout_height="match_parent"
	android:orientation="vertical"
	android:padding="16dp">
    <!-- header, progress, empty text, list -->
</LinearLayout>
    <item
        android:id="@+id/privacy_advisor"
        android:icon="@drawable/ic_action_settings"
        android:title="@string/menu_privacy_advisor"
        app:showAsAction="never" />
added new string.
@marktech0813
Copy link
Author

Please check PR,
thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant