How to get rid of packages
First you may try to just uninstall the packages with:
adb shell pm uninstall <package_id>
<package_id> is the internal package ID (not the displayname), e.g.
This only works for apps that are also uninstallable via GUI. See below how to remove packages nevertheless.
Most bloatware is installed in the system partition. This means that you may technically “uninstall” updates to the package. The originally provisioned base version of the package remains installed and active though. In that case you have to disable the package in order to prevent it from running.
You may disable packages manually via the GUI (‘app info’ > ‘Disable’) or by using the package manager
pm via ADB:
adb shell pm disable-user <package_id>
Force disabling packages
Some packages are configured in a way that they can’t be disabled via GUI and/or ADB. Maybe you also want to make sure they never get enabled again.
Therefore you have to mark them as “uninstalled for the user” (user ‘0’).
adb shell pm uninstall -k --user 0 <package_id>
-k-switch above, the package is not deleted but only set to an “uninstalled” state.
You may restore a package uninstalled this way via:
adb shell pm install-existing <package_id>
Here is a list of some (common, vendor independent) apps that may be disabled.
Disabling system apps may lead to a loss of (critical) functionality and/or increased battery drain (yes, increased. As some system apps blindly try to call dependency activities which don’t exist anymore and even may crash in the process of doing so).
If you are unsure whether your system needs one of the apps to function properly, do not disable them.
These information is based on my personal usage pattern and research. YMMV.
These packages enable some system features (e.g. behavior analysis for “enhancing the user experience”).
|App name||Package ID||Functionality|
|Adaptive Connectivity Services||com.google.android.apps.scone||Automatically switches basebands between LTE and 5G on demand. Seems to be only used for stock pixel devices.|
|Device Personalization Services / Actions Services||com.google.android.as||Device learning, e.g. enhanced keyboard autosuggestions, keep screen on when looking at it (with help of the camera), smart replies. Shows up under: Display > Lock Screen > Now Playing and Privacy > Device Personalization Services.|
|Google Assistant (1)||com.android.hotwordenrollment.okgoogle||Voice training for Google Assistant.|
|Google Assistant (2)||com.android.hotwordenrollment.xgoogle||Voice training for Google Assistant.|
|Google Assistant (3)||com.android.hotwordenrollment.tgoogle||Voice training for Google Assistant.|
|Google Connectivity Services||com.google.android.apps.gcs||Google curated public Wi-Fi access and Google managed VPNs.|
|Google Fi||com.google.android.apps.tycho||Only needed for Google Fi users.|
|Pixel Ambient Services||com.google.intelligence.sense||Detects device movement, ambient audio, other devices nearby, etc. Seems to work in conjunction with “Device Personalization Services”|
|Android Accessibility Suite||com.google.android.marvin.talkback||A.k.a. “Talkback”. Basically a screen reader.|
|com.google.android.googlequicksearchbox||Google (voice) search and search box|
|Gboard||com.google.android.inputmethod.latin||Google Keyboard with online prediction|
|Digital Wellbeing||com.google.android.apps.wellbeing||Records your habits to “optimize your life balance”. A euphemism for tracking even more stuff you do.|
These packages provide user functionality or access to online services. They are always installable by the user on most Android devices via Google Play Store.
|App name||Package ID|
Vendor spyware list
Here goes a list of verified packages that only harvest data without enhancing usablity or offering any functionality (a.k.a. spyware). These ones often ship with various devices and shoud be uninstalled AND disabled (in that order) to make sure they never get activated again:
adb shell pm uninstall -k --user 0 <package_id> && adb shell pm disable-user <package_id>
|App name||Package ID||Vendor|
|Fingerpirnt test (yes, fingerpirnt)||com.goodix.gftest||Xiaomi|
|Qualcomm “Mobile Security”||com.qualcomm.qti.qms.service.telemetry||Samsung/Xiaomi|