WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.4K

I really appreciate how Chrome allows saving pages as MHTML to the download folder.

S Browser however saves them to the /data/ directory, an application's private data space, which other applications can't access without root privileges.

But root requires unlocked bootloader, which a device usually does not have by factory, and unlocking the bootloader has a nasty side effect: The wipe.

This means that the originally downloaded data is locked into the S Browser's private folder.

But many other applications do this.

The precluded SMS and phonebook apps obviously save their information into their respective private locations.

But they should natively offer export functionality to spare us heavy workarounds, if at all.

Otherwise, that data is trapped there with no method of backing it up.

Also, forget about forensic methods. Since Android 6 (2016), pretty much every Android device is full-disk encrypted, making that method pointless if you happen not to be Cellebrite or the F.B.i with truckloads of money in your hands.

Applications should either store their data accessibly or offer native export functionality for data portability.


Side note: The Wikipedia draft article I wrote about this phenomenon .

I really appreciate how Chrome allows saving pages as MHTML to the download folder. S Browser however saves them to the /data/ directory, an application's private data space, which other applications can't access without root privileges. But root requires unlocked bootloader, which a device usually does not have by factory, and unlocking the bootloader has a nasty side effect: **The wipe.** This means that the originally downloaded data is locked into the S Browser's private folder. But many other applications do this. The precluded SMS and phonebook apps obviously save their information into their respective private locations. But they should natively offer **export functionality** to spare us heavy workarounds, if at all. Otherwise, that data is trapped there with no method of backing it up. Also, forget about forensic methods. Since Android 6 (2016), pretty much every Android device is full-disk encrypted, making that method pointless if you happen not to be Cellebrite or the F.B.i with truckloads of money in your hands. Applications should either store their data accessibly or offer native export functionality for data portability. ---- Side note: The Wikipedia draft article I wrote about this phenomenon [has been erased by infamous admin abuser Bbb23](/s/ModAbuse).

(post is archived)

[–] 0 pt

I was referring to Chrome for Android, not desktop Chrome.

Too late for ninja edit of original post.