这是indexloc提供的服务,不要输入任何密码
Skip to content

[Feature]: Bypassing Phantom Killer Using a LADB-Like Solution #4857

@IntinteDAO

Description

@IntinteDAO

Feature description

This is a concept that isn't talked about much, but perhaps it should be.

In short, if you don't have root, tutorials suggest doing it manually using adb.

In short, it often works like this: you enable ADB network debugging, connect to your device using adb, and issue commands.

LADB is no different here, as it does the same thing, but automatically. It enables network debugging and executes commands (makes commands available to you). This solution isn't without its drawbacks, as you obviously need to be connected to Wi-Fi (as with ADB network debugging), but it would allow (if implemented in Termux) reconfiguration of Android and disabling unnecessary security features without user intervention (just pairing with ADB is enough).

Of course, restarting the phone doesn't affect LADB's operation. This means that if a similar functionality to Termux were implemented, even system updates might not break it. But if something were to happen, the user would be informed.

Additional information

LADB

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions