Skip to main content

SL4A r0 Released

After far too long, SL4A r0 has been released. So, what's new?

Features:
  • Interpreters are now installed as separate APKs.
  • Scripts can now be bundled into Script APKs that do not depend on SL4A.
  • Added support for running multiple scripts simultaneously. You can view, stop, and connect a terminal to running scripts in the Script Monitor. The number of running scripts is indicated by the notification icon and in the notification itself.
  • Lots of performance improvements to start up time and memory consumption. For instance, interpreters are now run in a single process instead of being wrapped up in a shell process and facades are loaded lazily.
  • Security has been improved by requiring scripts to authenticate themselves with the RPC server. This happens automatically and prevents malware from connecting to a running SL4A RPC server and assume SL4A's permissions.
  • The Bluetooth API is now blocking, easier to use, and more robust.
  • It is now possible to deprecate APIs before changing them. In the future, APIs will be deprecated for some time before they are changed. Scripts using a deprecated API will generate a notification.
  • Closing a terminal now optionally kills the attached process. If you leave the process running, you can reattach the terminal to it later from the Script Monitor.
  • Added timestamp to sensor readings.
  • Added battery management APIs.
  • Added support for interpreter shortcuts.
  • Added support for search. You can now search for scripts within the script manager and from the quick search box (enable it under your device's Search settings).
Bug fixes:
  • Fixed Logcat Viewer force close.
  • Removed camera feature requirements which allows SL4A to be installed on more devices.
  • Interpreter installation prompts the user before overwriting any existing scripts.
  • The scripts Live Folder now only shows executable scripts.
Under the covers:
  • The RpcEvent annotation will be used to dynamically generate triggers from APIs that generate events.
In the works:
  • Replacing the SL4A terminal with ConnectBot's terminal.
Visit the SL4A project page to download the latest APK.

Popular posts from this blog

Python on Android

Note: This post is out of date. If you'd like to run Python on your Android device, please see my Android Scripting Environment project. Here's an early Christmas present for all those Python fanatics (self included) out there! With a lot of help from my friends (thanks Manuel and Thomas !) I managed to install Python 2.4.5 on my G1. It's still rough around the edges, but I think it's a good start. Klaus Reimer has a nice overview of how to cross-compile Python . My instructions borrow a lot from his. Download and build the Android source . These directions assume that you have installed the source to /android_src . Download and build the Python 2.4.5 source . These directions assume that you have installed the source to /python_src . Make copies of python and pgen for use later in the build process then clean up. $ cd /python_src $ cp python hostpython $ cp Parser/pgen Parser/hostpgen $ make distclean Apply the following patch to the Python source. diff -r -c -b P...
Read more

Email Injection

Not so long ago, I ran a wiki called SecurePHP. On that wiki, there was one particular article about email injection that received a lot of attention. Naturally, with all the attention came lots of spam. As a result, I disabled editing of the wiki and content stagnated. Still, the email injection article remained popular. About a year later, the server that hosted SecurePHP died and I never had a chance to hook it all back up. I saved the article though and I'm reposting it now. It may be a bit old (I've been away from PHP for a long time), and I didn't write all of it, so feel free to leave comments about needed updates and corrections. Though this article focuses on PHP, it provides a lot of general information regarding email injection attacks. The PHP mail() Function There are a lot of ways to send anonymous emails, some use it to mass mail, some use it to spoof identity, and some (a few) use it to send email anonymously. Usually a web mailform using the mail() funct...
Read more

Unblock Us Security

Unblock Us is an interesting solution to viewing region locked content online. Instead of offering VPN services, they offer a DNS-based solution. By using their DNS servers, geolocation requests by services such as Hulu and Pandora are directed through a geographically appropriate proxy. The remainder of your traffic (e.g. the video or audio stream) is accessed directly. That means you can make use of your connection's full bandwidth. Conversely, VPN connections often decrease your connection speed significantly. However, the DNS solution has security implications. As a DNS provider, Unblock Us is the in perfect position to perform a man in the middle attack . After all, that's what they're doing to sites like Hulu. (Note that SSL connections are safe from man in the middle attacks.) If you trust Unblock Us, then this isn't a problem. If you don't, it's best to limit the traffic that uses their DNS servers. The remainder of your traffic should use a trusted ...
Read more