I'm not sure if this is the proper place, but i haven't seen any other suitable section.
To the maintainers of this "EU" version of miui:
Are you aware of the home calls miui and its system applications do? Meaning the connection to the statistics and ad servers of Xiaomi.
Like data.mistat.intl.xiaomi.com and ccc.sys.miui.com that are forced and not needed to use the configuration, storage, account or cloud services, meaning the connection still happens even if you don't use any Xiaomi account, cloud service and you opted out from any statistics.
Are you aware of a tracking call performed each 5 minutes under root privileges?
A dns request to resolver.msg.xiaomi.net that connects to amazon aws servers in singapore, provides a json list that includes:
"app.chat.xiaomi.net":["114.54.23.116:5222","120.92.96.2:5222","111.13.142.2:5222","111.206.200.2:5222"]
A root privileged application connects to 114.54.23.116, or any of them, each 5 minutes, on TCP, sending encrypted packets.
They try to cover it using the 5222 port, used for XMPP protocol usually, and using the app.chat domain, but that isn't xmpp protocol neither any message service.
Are you European citizens, or distributing to European citizens?
-->en.wikipedia.org/wiki/General_Data_Protection_Regulation
To the maintainers of this "EU" version of miui:
Are you aware of the home calls miui and its system applications do? Meaning the connection to the statistics and ad servers of Xiaomi.
Like data.mistat.intl.xiaomi.com and ccc.sys.miui.com that are forced and not needed to use the configuration, storage, account or cloud services, meaning the connection still happens even if you don't use any Xiaomi account, cloud service and you opted out from any statistics.
Are you aware of a tracking call performed each 5 minutes under root privileges?
A dns request to resolver.msg.xiaomi.net that connects to amazon aws servers in singapore, provides a json list that includes:
"app.chat.xiaomi.net":["114.54.23.116:5222","120.92.96.2:5222","111.13.142.2:5222","111.206.200.2:5222"]
A root privileged application connects to 114.54.23.116, or any of them, each 5 minutes, on TCP, sending encrypted packets.
They try to cover it using the 5222 port, used for XMPP protocol usually, and using the app.chat domain, but that isn't xmpp protocol neither any message service.
Are you European citizens, or distributing to European citizens?
-->en.wikipedia.org/wiki/General_Data_Protection_Regulation