How to update Android without Googleapis

Hi
as a lot of google sites are blocked in my environment, I am surprised that Fairphone Open OS update link leads to
https://storage.googleapis.com/fairphone-updates/5ef4943c-5382-4aeb-9e2e-82ab73652d0e/fp2-A10-gms-22.08.0-rel.0-manual-switcher.zip
Is there another google-free site where i can download this File ?

I’m not aware of any download mirrors.

As you gave the link to the “gms” “manual-switcher” file … this file is not meant for updating Fairphone Open OS, it’s for switching from Fairphone Open OS to Fairphone OS, as described on the download page. Just saying.

1 Like

No , I had installed e-1.3-r-20220824212931-dev-FP2, but it is buggy and bouncing between the wlans 2.4 and 5 GHz in a few seconds rythm. Unusable.
So I have to make a fresh install of fp OpenOS A10 22.08
meanwhile I tested lineageOS 220909 , with the same result :
bouncing between the 2 wlan ranges 2.4 and 5 GHz. Unusable

You can do this using the file given under “Manual installation”.

You mean this:
https://storage.googleapis.com/fairphone-updates/5ef4943c-5382-4aeb-9e2e-82ab73652d0e/fp2-A10-sibon-22.08.0-rel.0-manual.zip
see headline

Yes.

If you need a guide … 🇬🇧 🇩🇪 ✏ Installing the Fairphone 2 from scratch in case of failure / Komplette Neuinstallation des Fairphone 2 im Fehlerfall

thanks for the link.
Installation was successful, but a way around googleapis was not shown.

1 Like

If you need to justify it to yourself … even if you run an Android OS without pre-installed Google Apps and services, Google still wrote most of the code actively running on your phone, which is way more intrusive than just getting some file hosted at their cloud storage :wink: .

This is why I have huge blocklists networkwise.

personal blocklist of services I found intrusive and dont need
#address=/add0n.com/#
address=/alicdn.com/#
address=/aliexpress.com/#
#address=/amazonaws.com/#
address=/*-amazonaws.com/#
address=/amazon.com/#
address=/amazon.de/#
address=/amazontrust.com/#
address=/apple.com/#
address=/bild.de/#
address=/cdn-apple.com/#
address=/consensu.org/#
address=/consentmanager.net/#
address=/cs4.wettercomassets.com/#
address=/cylex.de/#
address=/doubleclick.net/#
address=/enid.eu/#
address=/facebook.com/#
address=/facebook.com.au/#
address=/facebook.com.nl/#
address=/facebook.net/#
address=/facebook.nl/#
address=/fastly.net/#
address=/fbcdn.com/#
address=/fbcdn.net/#
address=/firefox.settings.services.mozilla.com/#
#address=/googleapis.com/#
address=/google.at/#
address=/google.ch/#
address=/google.com/#
address=/google.de/#
address=/google.fr/#
address=/googleusercontent.com/#
address=/idopy.com/#
address=/instagram.com/#
address=/itunes-apple.com/#
address=/kinja-static.com/#
address=/linkedin.com/#
address=/loadbee.com/#
address=/nmrodam.com/#
address=/partnernetworks.ebay.com/#
address=/paypal.com/#
address=/paypalobjects.com/#
address=/stylespring.de/#
address=/urldefense.com/#
address=/usercentrics.com/#
address=/wa.me/#
address=/weekli.systems/#
address=/whatsappbrand.com/#
address=/whatsapp.cc/#
address=/whatsapp.com/#
address=/whatsapp.info/#
address=/whatsapp.net/#
address=/whatsapp.org/#
address=/whatsapp-plus.info/#
address=/whatsapp-plus.me/#
address=/whatsapp-plus.net/#
address=/whatsapp.tv/#
address=/xing.com/#
address=/yandex.com/#
address=/yandex.ru/#
#address=/youtube.com/#
#address=/ytimg.com/#

general blocklist updated weekly
https://raw.githubusercontent.com/notracking/hosts-blocklists/master/domains.txt

avoids some traffic

Probably the spy functions are hidden in some closed source code?