u/Sweaty_Astronomer_47

google accessibility services block may impact quicktile use for android users with advanced device protection

google accessibility services block may impact quicktile use for android users with advanced device protection

Android 17 blocks non-accessibility apps from the AccessibilityService API | anonhaven.com

> Google added an accessibility API lockdown in Android 17 Beta 2. When Advanced Protection Mode (AAPM) is active, the system prevents any app not classified as an accessibility tool from receiving AccessibilityService access. ...

> ... Apps must declare isAccessibilityTool=true in their service metadata to pass the check. Screen readers, voice control systems, and switch-based input tools qualify. Automation apps, custom launchers, notification customizers, password managers, and antivirus software do not [qualify].

Bitwarden uses accessibility services to support the quick action tiles.

autofill from android app | Bitwarden.com

> Quick-action tiles use the Android accessibility service to make autofill actions available from your notifications pull-down's settings menu.

I'm not sure when this change might come into effect. The article mentions Android 17 Beta 2, so I think (?) it might come to standard android when we get Android 17 which is supposed to be in June or July.

It seems like this might affect certain users if they have android's advance device protection active and they use bitwarden quicktiles.

▲ 1 r/brave

finding my per-site exceptions to "forget me when I leave this site"

I am loving that Brave gives me the control to establish strict global protections and relax them on a per-site basis for sites that I trust and visit frequently.

Here's how I'm planning to do that for javascript:

  1. GLOBALLY turn on javascript blocking (settings / shields / block scripts / on)
  2. ON A PER-SITE BASIS, disable javascript blocking for sites I want to trust (click the Lion and turn off block scripts)
  3. PERIODICALLY REVIEW my setup (settings / privacy and security / site and shield settings / javascript / scroll down to "customized behaviors" and review sites "allowed to use javascript"

I have an almost comparable workflow in mind for "forget me when I leave this site":

  1. GLOBALLY turn on "forget-me-when-I-leave-this-site" (settings / shields / forget me when I leave this site / on)
  2. ON A PER-SITE BASIS, disable forget-me-when-I-leave for sites I want to trust (click the Lion and turn off forget me when I leave this site)
  3. PERIODICALLY REVIEW" which sites I have previously trusted by disabling "forget me when I leave this site"... HOW DO I DO THAT?

Steps 1 and 2 are completely parallel in the settings but I can't seem to find how to accomplish step 3 for forget-me-when-I-leave-this-site. Is it hiding somewhere else in the settings?

reddit.com
u/Sweaty_Astronomer_47 — 5 days ago
▲ 177 r/Bitwarden

Decryption error... Contact customer success to avoid ADDITIONAL data loss.

I tried to log into the chrome extension using my yubikey.

First attempt failed in some way (I'm not sure if I got an error message, but I assumed I had typed my pin wrong and tried again).

Second attempt succeeded, except I get this error message warning me about ADDITIONAL data loss (which means I already have data loss?!?)

It includes 12 sets of hex strings (each wrapping to 2 lines like the one shown).

I have no idea what particular data may have been lost in my vault. I don't see anything obvious. Neither do I know how I can associate these hex numbers with my entries (does anyone know that?).

Trying to decide whether the next action is going back to my last backup or not.

I will be contacting support, but also posting here for any suggestions.

u/Sweaty_Astronomer_47 — 6 days ago

I have Debian 12. After running sudo apt update, uname -r tells me that I have kernel 6.6.99 which apparently is not yet patched for copy-fail and therefore vulnerable to local privilege escalation under certain conditions.

I'm trying to figure out what would be the steps to rectify the situation. I see some discussion here:

Debian Linux Patched Copy Fail (CVE-2026-31431) Vulnerability - OSTechNix

It seems to require more technical knowledge than I have.

Can anyone provide suggestions to update the kernel or make the system safe until the update arrives?

u/Sweaty_Astronomer_47 — 10 days ago

Two things I noted:

  1. Is there any way to eliminate trust in ancient X11 from this app?
  2. Is it still requiring an outdated version of org.gnome.Platform? When I perform flatpak update, I get the error message:
  • Info: (pinned) runtime org.gnome.Platform branch 48 is end-of-life, with reason: The GNOME 48 runtime is no longer supported as of March 24, 2026. Please ask your application developer to migrate to a supported platform.
    • I think this error originates from OnlyOffice but I'm not positive. The only other flatpak I have installed is flatseal

EDIT - The following item appears related to X11 on the flatpak

u/Sweaty_Astronomer_47 — 18 days ago