Cover photo
Jan Ole Suhr
Works at
Attended TU Clausthal-Zellerfeld
Lived in Berlin
3,630 followers|465,484 views


Jan Ole Suhr

Shared publicly  - 
Preview, capture, manage camera directly from fragment, add you own layout
CameraFragment - A simple easy-to-integrate Camera Fragment for Android
1 comment on original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 
Making it easy to create beautiful about screens for your apps:
material-about-library - Making it easy to create beautiful about screens for your apps
1 comment on original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 

Announcing updates to Google’s Internet of Things platform: Android Things and Weave

Today we are announcing a full range of solutions to make it easier to build secure smart devices and get them connected. We are releasing a Developer Preview of Android Things, an operating system for connected devices that has the support and scale of existing Android developer infrastructure. You can now develop IoT software using Android Studio and the Android SDK. We are also updating the Weave platform to provide an easy way to add cloud connectivity and management to devices, and enable access to Google services like the Google Assistant and many more over time.

Learn more about Google’s IoT platform from our blog post at, and join our new Google+ community at
18 comments on original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 
Well, I did say, on both the AAWP and PSC podcasts, that this was the probable reason for the Note 7's battery issues two MONTHS ago. Just sayin'...It's physics 8-)
While Samsung is yet to divulge the details behind the batteries inside the Galaxy Note 7 exploding, a design engineering firm called Instrumental has done
2 comments on original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 
A pretty inspirational curation list of mobile error
View original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 
Hmpf ...
The fight against Ghost Push continues

Since 2014, the Android security team has been tracking a family of malware called 'Ghost Push,' a vast collection of 'Potentially Harmful Apps' (PHAs) that generally fall into the category of 'hostile downloaders.' These apps are most often downloaded outside of Google Play and after they are installed, Ghost Push apps try to download other apps. For over two years, we’ve used Verify Apps to notify users before they install one of these PHAs and let them know if they’ve been affected by this family of malware.

Ghost Push has continued to evolve since we began to track it. As we explained in last year's Android Security report [], in 2015 alone, we found more than 40,000 apps associated with Ghost Push. Our actions have continued at this increasingly large scale: our systems now detect and prevent installation of over 150,000 variants of Ghost Push.

Several Ghost Push variants use publicly known vulnerabilities that are unpatched on older devices to gain privileges that allow them to install applications without user consent. In the last few weeks, we've worked closely with Check Point [], a cyber security company, to investigate and protect users from one of these variants. Nicknamed ‘Gooligan’, this variant used Google credentials on older versions of Android to generate fraudulent installs of other apps. This morning, Check Point detailed those findings on their blog.

As always, we take these investigations very seriously and we wanted to share details about our findings and the actions we've taken so far.


- No evidence of user data access: In addition to rolling back the application installs created by Ghost Push, we used automated tools to look for signs of other fraudulent activity within the affected Google accounts. None were found. The motivation behind Ghost Push is to promote apps, not steal information, and that held true for this variant.
- No evidence of targeting: We used automated tools to evaluate whether specific users or groups of users were targeted. We found no evidence of targeting of specific users or enterprises, and less than 0.1% of affected accounts were GSuite customers. Ghost Push is opportunistically installing apps on older devices.
- Device integrity-checks can help: We’ve taken multiple steps to protect devices and user accounts, and to disrupt the behavior of the malware as well. Verified Boot [], which is enabled on newer devices including those that are compatible with Android 6.0, prevents modification of the system partition. Adopted from ChromeOS, Verified Boot makes it easy to remove Ghost Push.
- Device updates can help: Because Ghost Push only uses publicly known vulnerabilities, devices with up-to-date security patches have not been affected. Also, if a system image is available (such as those we provide for Nexus and Pixel devices[]) a reinstall of the system software can completely remove the malware.


- Strengthening Android ecosystem security: We’ve deployed Verify Apps [] improvements to protect users from these apps in the future. Even if a user tries to install an offending app from outside of Play, Verify Apps has been updated to notify them and stop these installations.
- Removing apps from Play: We’ve removed apps associated with the Ghost Push family from Google Play. We also removed apps that benefited from installs delivered by Ghost Push to reduce the incentive for this type of abuse in the future. Downloading apps from Google Play, rather than from unknown sources [], is a good practice and will help reduce the threat of installing one of these malicious apps in the future.
- Protecting Google Accounts: We revoked affected users’ Google Account tokens and provided simple instructions so they can sign back in securely. We have already contacted all users that we know are affected.
- Teaming-up with Internet service providers: We are working with the Shadowserver Foundation and multiple major ISPs that provided infrastructure used to host and control the malware. Taking down this infrastructure has disrupted the existing malware, and will slow the future efforts.


We’ve taken many actions to protect our users and improve the security of the Android ecosystem overall. These include: revoking affected users’ Google Account tokens, providing them with clear instructions to sign back in securely, removing apps related to this issue from affected devices, deploying enduring Verify Apps improvements to protect users from these apps in the future and collaborating with ISPs to eliminate this malware altogether.

This was a team effort within Google, across the Android security, Google Accounts, and the Counter-Abuse Technology teams. It also required close coordination with research firms, OEMs, and hosting companies. We want to thank those teams for their assistance and commitment during our ongoing efforts to fight Ghost Push and keep users safe.
50 comments on original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 
Wow, nice!
The missing Android blurring library. Fast blur-behind layout that parallels iOS:
View original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 
Android animated recording view:
AnimatedRecordingView - Android animated recording view
View original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 
Hahahaha :-) #NBA
Add a comment...

Jan Ole Suhr

Shared publicly  - 
I recently saw a question on /r/androiddev asking how to implement a fancy animation… and decided to demonstrate how to do it using AnimatedVectorDrawable.

Here's a breakdown of how I did it:

Or you can jump straight to the code here:

#AndroidDev #AndroidDesign #Animation
9 comments on original post
Add a comment...

Jan Ole Suhr

Shared publicly  - 
Building a better browser - Open Source
BIG updates for Pulse, Talon, EvolveSMS, and Source

This one has been a long time in the works! In collaboration with the Googley +Jacob Klinker, I am excited to include a brand new, readability/instant browser in all of our apps!

This thing is fast, powerful, flexible, ad free, a data saver, and looks great. It stores any articles that are loaded on your device, and on the server, so grabbing articles is always super fast. For a closer look at how it works, check out the open source project below!

This has been included in ALL of our network-enabled apps, so get downloading!

Pulse (SMS/Tablet Messenger):
Talon for Twitter:
Source News Reader:
Talon Classic:

Available for ANY DEVELOPER
Not only did we make something that we think is really awesome... but we are making it available for any app developers to use, for free. I am hosting the backend for everyone, so you just get to drop it in and let your users enjoy it :)

The Android library is open-source and incredibly easy to implement. If you are already using Chrome Custom Tabs, it basically piggy-backs off of those APIs. Check it out:

Obviously there is no personal information in any of the requests, so there is no security concern, all we are storing with this project is the article.

If you are a developer, I highly recommend trying it out in your apps! It is a very cool project and a great way to give your users something unique and new.

You're welcome!

Additional Pulse Features

On top of this very cool new browser, there are numerous media enhancements that have been added to Pulse for v1.11.0. Within any message thread, there will now be YouTube and web article previews, for received messages, directly on the message list! This also applies for the web and tablet versions of course.

Whenever a link is received in a message, it will automatically get parsed and loaded. That means that opening articles will be INSTANT within Pulse, from now on! This is a very cool feature in my opinion and really improves the experience, over just displaying a simple web link on a message. Check out the screenshot below for a look at how it works!

Jake and I are super stoked about this project and what it can do for apps, hope you try it out within our apps, then enjoy and integrate it yourselves! We have never seen an open-source project quite like this one :)

It is available and live on all of our apps right now! Enjoy all
26 comments on original post
Add a comment...
Jan Ole's Collections
Mobile Entrepreneur, App Developer, Founder & Owner of
Mobile Entrepreneur since 1999, App Developer since 2002, Creator of Gravity, the most popular Social Networking Client for Nokia/Symbian.
Bragging rights
Survived the New Economy Bubble!
  • TU Clausthal-Zellerfeld
    Informatik, 1993
Basic Information
Collections Jan Ole is following
Founder & CEO of
    Founder, 1998 - present
  • iobox Oy
    Director, WAP Development, 2000 - 2001
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Jan Ole Suhr's +1's are the things they like, agree with, or want to recommend.
Sky Force 2014

The mobile blaster legend is back to celebrate its 10-year anniversary in super-destructive style. Harnessing the intensity of classic arcad

Re: Nexus 4 update 4.4 stuck at 4 circles - Google Product Forums

Google Product Forums · Re: Nexus 4 update 4.4 stuck at 4 circles. RicardoSilva, 25.11.2013 06:26. Veröffentlicht in der Gruppe: Nexus. Kate

Google+: John Butterill's Virtual Photo Walks

Photographer John Butterill discovered a way to share his photo walks through Google+ Hangouts. Almost immediately photographers around the

Clash of Clans

Lead your clan to victory! Clash of Clans is an epic combat strategy game. Build your village, train your troops and battle with thousands o

AnTuTu Benchmark

NOTE: For the Ainol , Ramos , ONDA. please download: Popular free Andr

Windows Weekly 310: Billion-Dollar Business Bingo

Windows as a service, big change in Windows Phone 8 apps, Blue leak of the week, and more.

Nokia and Microsoft

Nokia and Microsoft. This is going to be that grandstanding “I told you so” post I promised a few days ago. When did I tell you so? In April

Is Twitter in Danger of Google Plus Overtaking?

Your top 3 power houses today are of course Facebook, Twitter, and LinkdedIn and we can possibly soon add Google+ to the list. Each serving