[It turns out the dialog to separately toggle biometric usage for the lock screen and in apps is unique to CalyxOS, and possibly Graphene.]
biometric_keyguard_enabled isn’t a system property that lives in the getprop/setprop namespace.
It’s a Secure Settings key that Android stores in the Settings.Secure table (the same place where things like “stay‑on‑while‑plugged‑in” or “show‑password‑characters” live).
Because of that:
adb shell getprop won’t list it – getprop only shows properties that are part of the Android property service.
setprop can only touch properties that are declared as writable for the shell user. biometric_keyguard_enabled isn’t on that whitelist, so the kernel logs a failure (the “see dmesg” line) and you get the “Permission denied” when you try to read the log without root.
How to change it without rooting
The shell user (the one you get when you run adb shell) does have permission to modify many Secure Settings keys via the settings command. Try the following:
Check the current value (0 = disabled, 1 = enabled)
adb shell settings get secure biometric_keyguard_enabled
Disable the biometric keyguard
adb shell settings put secure biometric_keyguard_enabled 0
Re‑enable it later if you wish
adb shell settings put secure biometric_keyguard_enabled 1
A few notes:
Value semantics – The setting expects an integer (0 or 1). Using false/true will be rejected.
Immediate effect – Most Secure Settings changes take effect right away, but some UI components may cache the old value until you lock/unlock the device or restart the System UI. If you don’t see the change instantly, try toggling the screen off/on or issuing adb shell am restart (which restarts the activity manager).
Device‑specific behavior – LineageOS may expose additional safeguards or UI toggles for this feature. If the command returns “null” or “SecurityException”, the build you’re using might have removed the key entirely. In that case the setting can’t be altered via settings.
No root needed – Because you’re using the settings tool as the shell user, you don’t need root access. The only thing you can’t do without root is edit the underlying property service (setprop) for keys that aren’t whitelisted.
Why dmesg is blocked
On a non‑rooted device the shell user isn’t allowed to read the kernel log (klogctl). That’s why adb shell dmesg prints “Permission denied”. It’s unrelated to the setting itself; it’s just a security measure to prevent ordinary users from snooping on kernel messages.
TL;DR
What you triedWhy it failedWhat to do insteadadb shell getprop / setprop biometric_keyguard_enabled …Not a system property; not writable for shellUse the settings command on the secure namespaceadb shell dmesgKernel log is restricted to rootNo need to view it; the failure reason is already reported by setprop
Give the settings commands a try and you should be able to toggle the biometric keyguard without needing root. If you encounter a “SecurityException” or the key isn’t present, the particular LineageOS build you’re on simply doesn’t expose that setting. In that case you’d need to rely on the UI toggle (if any) or flash a custom build that includes the option.
Website for Bass OS, a product-focused open-source OS based on AOSP, Android-x86 and Bliss OS that is highly configurable and created to allow a variety of features to be included and configuration options to be tuned out-of-the-box, letting one source cover a variety of different devices
BlissOS?
https://appuals.com/install-blissos-on-uefi-system/
https://github.com/BlissOS
FydeOS, a flexible ChromeOS alternative, delivers a Chromebook-like experience on regular PCs, with or without Google services, on-premise or in the cloud.
[low cost, but not quite free]
The link for mandatory security rules links to rules for IAM, not networking.
https://docs.oracle.com/en-us/iaas/Content/Network/Concepts/networksecuritygroups.htm
But, apparently there are mandatory IAM policies, and the linked document skips the actual GUI procedure:
https://docs.oracle.com/en-us/iaas/mysql-database/doc/iam-policies.html
Using Device Manager to Uninstall Devices and Driver Packages
PanelRail® and RevealRail are the ideal, universal, perforated cladding attachment rails for better drainage and ventilation. Available as black or mill finish and in multiple sizes. Pre-punched attachment holes make installation over CMU, concrete or wood back-up walls quick and easy.
Recommended by builder
"asphaltic" and "polymer" don't sound great, rather not have a ton of petrochemicals on my house
alternatives:
https://www.e2zero.com/product/house-wrap/
https://vaproshield.com/products/wall-wrb-ab/rainscreen-sa
https://www.ecohome.net/products/1232/henry-building-systems-henrys-weathersmart/2205258/
https://www.kingwills.com/building-envelopes-house-wrap/
Powerful Video Surveillance Software
compare to Shinobi
It seems like the edge server is available for free as an open-source stack, in a VM.
https://www.rsna.org/practice-tools/data-tools-and-standards/image-share-validation-program/developer-tools
top-level facilitator (RCE): Sequoia Project
How to get immunization records for children under 18 years of age and adults age 18 years and older
The PARA Method is my simple, intuitive system to find any information right when you need it. In this video, I'll show you how to set up PARA for yourself.W...
A key best practice for logging is to centralize or aggregate your logs in a single location, especially if you have multiple servers or architecture tiers. Modern applications often have several tiers of infrastructure that can include a mix of on-premises servers…
[The Elastic ELK stack is popular but probably overkill; Graylog is related]
Similar guide:
https://sematext.com/blog/log-aggregation/
Taplist.io is a simple tool to create a digital beer tap list. It takes minutes to set up, looks great, and works on any TV and the web.
[They have a 4-tap free version, and an inexpensive hobbyist price tier.]