This relay will be migrated to the datacenter in the UK to reduce the latency for most users. The migration itself takes less than 30 minutes, the DNS changes propagate in 1-3 hours (based on tests we ran). The relay will remain available on the same hostnames but with a different IP address.
The migration will start from 4pm UTC.
If you use Tor, it will be available as soon migration is complete, within 30 minutes - we did such migrations before without announcing them.
If you use public Internet to connect SimpleX relays, it will become available as soon as DNS updates.
If you have some important contacts where you use smp10 relay to receive messages you can switch them in advance (it won't be possible to switch during migration).
These URIs are the references to technical documentation in Google Android site - they are used in error messages by various libraries.
The presence of the URI in code does not mean that the app communicates with this URI.
On the opposite, the absence of the URI in code does not prove that the app does not communicate with any given URI - the URIs can be obfuscated in many ways.
So this scanning technique to discover potential attacks is completely inefficient, and it creates unnecessary work of removing URIs from code, but achieves absolutely nothing to prevent the actual network connection - any malicious app can hide them and make them invisible to the scanning.
Another example would be simplex.chat domain. While the app contains it in code, the app never communicates with this domain, and it is only used to namespace the links and to allow showing QR code for people who don't have the app.
You cannot establish what URIs any given app communicates with by scanning its code - you need to proxy all traffic and monitor all connections that the app makes.