• 1 Post
  • 6 Comments
Joined 23 days ago
Cake day: March 30th, 2026



  • I mean, to each their own, but when I was learning Japanese, I did just that: I immersed myself into the language with as many senses (?) as possible. Reading, writing, listening, imitating (called “shadowing”), literally talking to myself, plastering my walls with glossary and example sentences, forcing myself to read them out loud every time I would pass by one of the words or sentences hanging from my walls. Right until I realized that I had hit a barrier that could only be overcome by moving - at least temporarily - to Japan, which I did, but that’s another story.





I’m on a rooted Samsung smartphone, running One UI 7.0 and Android 15. Not quite ready to switch to Graphene OS yet. Also, my threat model doesn’t require it. Yet. 🤣

In addition to having debloated with UAD-NG and using HaGeZi’s Ultimate DNS Blocklist in AdAway, I have also blocked:

android.clients.google.com  
android.googleapis.com  
deviceintegritytokens-pa.googleapis.com  
es11.samsungsm-ds.com  
mtalk.google.com  
pinning-02.secb2b.com  
play-lh.googleusercontent.com  
playstoregatewayadapter-pa.googleapis.com  
prod-lt-playstoregatewayadapter-pa.googleapis.com  
shop.line-scdn.net  

I haven’t noticed any unexpected behaviors yet. I also tried blocking:

i.ytimg.com  
play.googleapis.com  
digitalassetlinks.googleapis.com  

But the first one is needed to load thumbnails on NewPipe and the latter two are needed to update whatever you have installed through the Play Store - two apps in my case. I have logged out of my Google account and blocked the Play Store with a firewall and only unblock it once a month or so to update Play services and such.

Just wanted to share what can be blocked with a hosts file on a Samsung smartphone. 😊