diff --git a/res/values/config.xml b/res/values/config.xml index 4236b278a748a788becbd516dab1a9b74fac66d2..eed044a3bb0f9ebb4c07449da21004a899c84d80 100644 --- a/res/values/config.xml +++ b/res/values/config.xml @@ -17,9 +17,6 @@ - - https://stats.lineageos.org/api/v1/stats - true diff --git a/res/values/strings.xml b/res/values/strings.xml index 5b63a7b07f5464b13ff22798eeab23db8b5c8e5f..32f7bee3008ab90639beedcde21eeafa3f0fde7a 100644 --- a/res/values/strings.xml +++ b/res/values/strings.xml @@ -541,28 +541,6 @@ Total commits: %2$s

Last update: %3$s]]> - - - LineageOS statistics - Help make LineageOS better by opting into anonymous statistics reporting - About - Opting into LineageOS Statistics will allow non-personal data to be submitted to the - developers of LineageOS to track unique installations across devices. The information submitted includes an unique identifier, - which does not compromise your privacy or personal data. The data is submitted during each boot.\n\nFor an example of the data that is submitted, tap on Preview Data. - Enable reporting - Preview data - View stats - Learn more - - - Unique ID - Device - Version - Country - Carrier - Stats collection - Allow installation metrics and device statistics to be collected - Auto-rotate screen Rotation settings @@ -724,6 +702,7 @@ out of date Security patches are released monthly by Google in cooperation with SoC vendors to address flaws which could be exploited by malicious apps to bypass security restrictions and cause permanent damage to your device. Patches made available by Google are applied every month on all supported devices, but patches to proprietary code can only be applied by your device\'s manufacturer. To keep your device safe make sure your LineageOS build is always up-to-date, and (if applicable) ensure your vendor image is updated to the latest one recommended by LineageOS. + Security patches are released monthly by Google in cooperation with SoC vendors to address flaws which could be exploited by malicious apps to bypass security restrictions and cause permanent damage to your device. Patches made available by Google are applied every month on all supported devices, but patches to proprietary code can only be applied by your device\'s manufacturer. To keep your device safe make sure your /e/ OS build is always up-to-date, and (if applicable) ensure your vendor image is updated to the latest one recommended by /e/ OS. Encryption Enabled Needs a secure lock screen diff --git a/res/xml/preview_data.xml b/res/xml/preview_data.xml deleted file mode 100644 index 025524ca4ec55f215aae384e5cfc2cfd71baf474..0000000000000000000000000000000000000000 --- a/res/xml/preview_data.xml +++ /dev/null @@ -1,52 +0,0 @@ - - - - - - - - - - - - - - - - - diff --git a/src/org/lineageos/lineageparts/trust/TrustPreferences.java b/src/org/lineageos/lineageparts/trust/TrustPreferences.java index f99f8abec42b16c87aa08d156555fd94669e78db..484f2ee13fa3972e9856d4d6f358d6149e7fa1cf 100644 --- a/src/org/lineageos/lineageparts/trust/TrustPreferences.java +++ b/src/org/lineageos/lineageparts/trust/TrustPreferences.java @@ -78,7 +78,7 @@ public class TrustPreferences extends SettingsPreferenceFragment { mRootPref.setOnPreferenceClickListener(p -> showInfo(R.string.trust_feature_root_explain)); mSecurityPatchesPref.setOnPreferenceClickListener(p -> - showInfo(R.string.trust_feature_security_patches_explain)); + showInfo(R.string.trust_feature_security_patches_explain_e)); mEncryptionPref.setOnPreferenceClickListener(p -> showInfo(R.string.trust_feature_encryption_explain)); mSmsLimitPref.setOnPreferenceChangeListener((p, v) ->