Lizard insurance app mandates you give location permission, refusing access to the rest of the app otherwise. I have 0 intention of giving them this but so far have failed to find a phone number to call them (their mobile website tells me to use the app).
Until I find a different company run by living, real people, my current intention is to use the app to manage my insurance in the meantime. I don’t want to give them my location, even if it’s only while using the app, so how do I get the app to think it has my location when it actually doesn’t?
inb4 just use a computer: nah. It’s about spite at this point.
The option you’re looking for is “mock location,” and it is buried in the developer options in the settings menu on your phone.
You will probably have to enable the developer options menu on your phone, which is done by tapping the build number in “about phone” five times. You will get a popup message when developer options are enabled, and then the Developer Options entry will appear under “System” (at least on recent Android versions) in your settings menu.
Note that this is not a complete solution. You still need a mock location app, which you will give permission via this screen to override your phone’s reported GPS location.
And to top it off, some apps will not let you use them at all with Developer Options enabled, though if OP’s insurance app is as bad as most I’ve seen, it’ll be too shitty to detect it.
Mock my GPS (mock the GPS and Network location providers) https://f-droid.org/packages/com.github.warren_bank.mock_location/
Hide Mock Location (Xposed module to hide the mock location setting) https://f-droid.org/packages/com.github.thepiemonster.hidemocklocation/
For now… Over last few years less and less corpo apps work on non GPS phones
Any suggestion for a legit mock app?
These seem ok.:
From fdroid/neo:
https://apt.izzysoft.de/fdroid/index/apk/com.github.warren_bank.mock_location
https://www.f-droid.org/en/packages/cl.coders.faketraveler/
Edit: I don’t live in Washington DC.
So, I guess it does the trick.
Ty
Negative, unfortunately. I’ve never had a use case to mess with the option.
I found a few on github, though. I imagine any open source tools are probably… less… likely to be thinly disguised vectors to pwning your device.
Okie dokie