A Complete Rooted DeGoogling + Operational Security Guide TWRP + Magisk + MicroG + Fossify + InviZible Pro + AFWall+ + DresOS App Suite – For 2026
Project Goal: Turn any stock Android phone into a fully private, hardened, FOSS-only device with no Google tracking, no Google Services, no hidden data harvesting, and only open-source replacements — then layer on a full defensive security stack to protect against surveillance, malware, censorship, and network-level attacks.
Why: Because of all the restrictions Google is bringing into place over the open-source communities, to bring you back your privacy, to stop your data being sold, and to give you full operational security on a device you actually control.
Rooting and flashing can brick your device, void your warranty, trip Knox/SafetyNet, and wipe all data. Back up everything (photos, apps, files) before starting. This is advanced — if you're not comfortable with ADB/fastboot or device-specific guides, stop and use a non-root method. Proceed at your own risk.
Make a full TWRP backup after rooting (Boot + System + Data + Vendor) before any debloating.
- What You Will Need
- Replacement Overview
- Step 1: Unlock the Bootloader
- Step 2: Install TWRP
- Step 3: Install Magisk
- Step 4: Install Core FOSS Apps
- Step 5: Install Magisk Modules
- Step 6: Set Up Noogle microG
- Step 7: Change System WebView to AOSmium
- Step 8: Set Up Shizuku
- Step 9: Fine-Tune Debloat & Cleanup
- Step 11: Replace System File Manager, Package Installer & Download Manager
- Step 12: Final Setup & Defaults
- Step 13: Test & Backup
- OPSEC Overview
- OPSEC Step 1: Configure DNS and MAC Randomization
- OPSEC Step 2: Set Up InviZible Pro in Proxy + Root Mode
- OPSEC Step 3: Set Up AFWall+ — Root-Level Kernel Firewall
- OPSEC Step 4: Set Up Secure Email — Tuta + Duck Addresses
- OPSEC Step 5: Spoof Location with Fake Traveler
- OPSEC Step 6: Final Checks and Hardening Tips
- Apps Overview
- 1. ZArchiver Pro
- 2. IYPS
- 3. RedReader
- 4. URL Check
- 5. Hypatia
- 6. OONI Probe
- 7. InviZible Pro
- 8. AFWall+
- 9. Metrolist
- 10. Arcane Chat
- 11. Aurora Store
- 12. Fossify Suite
- 13. HeliBoard
- 14. Tuta Mail
- 15. DuckDuckGo Privacy Browser
- 16. AOSmium WebView
Download only from these official links (2026). Install F-Droid first — it is the backbone of your FOSS ecosystem.
| Tool | Purpose | Link |
|---|---|---|
| F-Droid | Main FOSS app store | Download APK / Site |
| Inure App Manager | Debloat + app management | GitHub Releases |
| Shizuku | Root-like advanced system permissions | GitHub Releases |
| TWRP | Custom recovery (full backups + flashing) | twrp.me → search your exact device model |
| Magisk | Root + module framework | GitHub Releases |
| De-Bloater | Fine-tune system app removal | F-Droid / GitHub |
| Noogle microG | Magisk module — replaces Google Play Services | GitHub Releases |
| LSPosed | Advanced Xposed-style module framework | GitHub Releases |
| Open WebView | Magisk module — installs Vanadium as system WebView + unlocks WebView selector; also used to build AOSmium module | Download ZIP v2.5.2 |
| AFWall+ | Root-level iptables firewall — per-app kernel-level rules, mobile data proxy redirect, no VPN slot | F-Droid / GitHub |
| SD Maid SE | Deep system cleaner + remnant finder | F-Droid |
| Fossify Suite | Phone, Messages, Gallery, Calendar, Files, Launcher, Contacts, Music | fossify.org/apps (all via F-Droid) |
| AOSmium | Primary system WebView (installed via Magisk module you build in Step 7) | Manual APK — codeberg.org |
| InviZible Pro | Tor + I2P + DNSCrypt in proxy + root mode — IP anonymisation, encrypted DNS, no VPN slot used | F-Droid direct APK / F-Droid search: InviZible Pro |
| DuckDuckGo Privacy Browser | Primary browser (Chrome replacement) | F-Droid |
| Aurora Store | Anonymous Play Store alternative | F-Droid |
| HeliBoard | Fully offline keyboard (no Gboard) | F-Droid |
| Tuta Mail | End-to-end encrypted email (no Gmail) | F-Droid |
| Download Navi | FOSS download manager (no Google Downloads) | F-Droid |
| SAI | Split APK Installer — FOSS package installer | F-Droid |
| Fake Traveler | GPS location spoofer | F-Droid |
Here is exactly what each core app replaces and why it is better for privacy:
| App | Replaces | Why It's Better |
|---|---|---|
| Fossify Phone | Stock Phone / Dialer | Fully open source, zero telemetry |
| Fossify Messages | Stock SMS | Privacy-first, no Google tracking |
| Fossify Files | Google Files / Stock File Manager | Open source, no cloud sync, no telemetry |
| DuckDuckGo Privacy Browser | Chrome | Private search engine, tracker blocking, zero Google telemetry |
| AOSmium WebView | Android System WebView (Google) | Blocks ads & trackers in every app that loads web content |
| Tuta Mail | Gmail | End-to-end encrypted email (no Google account or content scanning) |
| HeliBoard | Gboard | Completely offline keyboard, no data sent anywhere, ever |
| Aurora Store | Google Play Store | Anonymous downloads, no Google account required |
| Noogle microG | Google Play Services | Full app compatibility without any Google tracking infrastructure |
| Fossify Gallery / Calendar / Launcher / Contacts / Music | Stock Google equivalents | All open source, no cloud sync or telemetry |
| Download Navi | Google Download Manager | FOSS download manager, zero Google components |
| SAI (Split APK Installer) | Google Package Installer | FOSS installer with signature verification, no Google calls home |
| InviZible Pro | Orbot + separate DNS/I2P apps | Combines Tor, I2P, and DNSCrypt in proxy + root mode — no VPN slot used; IP spoofing via Android system proxy; iptables DNS redirect at kernel level |
| AFWall+ | No equivalent in stock Android | Root-level iptables firewall; per-app internet blocking at kernel level; custom rules for mobile data proxy routing; works independently of VPN and proxy layers |
Device-specific — required for TWRP + Magisk. Usually wipes all data.
- Enable Developer Options: Settings → About phone → tap Build number 7 times.
- Turn on OEM unlocking + USB debugging.
- Install ADB & Fastboot on your PC (Android Platform Tools from Android Developers).
- Connect phone via USB.
- Run:
adb reboot bootloader - Run:
fastboot flashing unlock(orfastboot oem unlockon older devices). - Confirm on phone screen — this will factory reset the device.
Samsung: Use Download Mode + Odin with official or unofficial unlock.
Huawei / carrier-locked phones: Use the official unlock code process for your carrier.
Exact instructions: Search [your exact model] unlock bootloader XDA Developers and follow that device's specific guide.
Phone will factory reset. Set it up again and re-enable USB debugging before continuing.
TWRP gives you full device backups and easy module/zip flashing.
- Go to twrp.me and search your exact device model and variant.
- Download the latest
.img(and.zipif available). - Follow the exact instructions on that device's TWRP page — they are device-specific.
Typical commands:
adb reboot bootloader
fastboot boot twrp-xxxx.img # Temporary boot into TWRP
# Inside TWRP: Install → select TWRP .zip to make it permanent
# Or: Advanced → Install Recovery Ramdisk
Reboot to recovery to confirm TWRP is permanently installed.
No TWRP for your device? Use Magisk direct patching method only (see Step 3 below) or check XDA for unofficial TWRP builds. Search [model] unofficial TWRP.
Two methods — pick one based on your situation.
- Download the latest Magisk APK from GitHub.
- Extract your device's
boot.img(orinit_boot.img) from the stock firmware ZIP for your exact model and Android version. - Install the Magisk app on your phone.
- Open Magisk app → Install → Select and Patch a File → choose
boot.img. magisk_patched_xxxx.imgwill appear in your Downloads folder.- Pull it to your PC:
adb pull /sdcard/Download/magisk_patched_xxxx.img adb reboot bootloaderfastboot flash boot magisk_patched_xxxx.img(orinit_bootif your device uses it).- On some devices you also need to flash a patched
vbmeta.imgwith flags:fastboot flash vbmeta vbmeta.img --disable-verity --disable-verification - Reboot. Open Magisk app — it should show "Installed."
- Rename the Magisk APK file from
.apkto.zip - Boot to TWRP → Install → select and flash the
.zip - Reboot system
Samsung-specific: Use Recovery mode + Odin with a patched AP.tar file.
Reboot → open Magisk app → you are rooted. Keep Magisk app installed — you need it for everything that follows.
- Transfer the F-Droid APK to your phone and install it (allow installs from unknown sources when prompted).
- Open F-Droid and from the search/browse install all of these:
- Inure App Manager
- Shizuku
- SD Maid SE
- All Fossify apps (Phone, Messages, Gallery, Calendar, Files, Launcher, Contacts, Music)
- HeliBoard
- DuckDuckGo Privacy Browser
- Aurora Store
- Tuta Mail
- Download Navi
- SAI (Split APK Installer)
- Fake Traveler
- Download the AOSmium APK from codeberg.org/AXP-OS/app_aosmium/releases to your PC — you will convert it into a Magisk module in Step 7.
Do not open or configure these apps yet — follow each step in order.
Open Magisk app → Modules → Install from storage and flash each of these one at a time, rebooting between them if instructed:
- Noogle microG — replaces Google Play Services
- LSPosed — advanced Xposed module framework (Zygisk version)
- Open WebView v2.5.2 — the Magisk module that handles both system WebView installation and the framework patch that unlocks WebView switching
- Download: open-webview.zip
- When the installer runs during flashing it presents a numbered selection menu navigated with the volume keys. Select Vanadium — built and maintained by the GrapheneOS project, the most security-hardened Android OS in existence. Vanadium applies GrapheneOS's full suite of exploit mitigations and hardened compiler flags. Selecting it installs Vanadium directly into the system partition via Magisk so it is always present as a selectable WebView regardless of device.
- Flash this even if you plan to use AOSmium. The module does two things: (1) installs your chosen WebView as a system-level app, and (2) patches the Android framework to unlock the WebView implementation selector — without this patch, AOSmium may not appear in Developer Options on certain devices even when installed correctly. Full instructions in Step 7.
Reboot after flashing all three.
Noogle microG is a Magisk module that installs a clean, privacy-respecting replacement for Google Play Services. Apps that require Play Services (push notifications, maps, logins) will work through microG with zero Google data harvesting.
- Open Magisk → tap the action button on Noogle microG → grant root permissions.
- Open the microG Settings app (should appear in your app drawer after reboot).
- Go to Self Check → work through every unticked item until all show green/ticked.
- Signature spoofing must say "OK" — this is handled by LSPosed + Zygisk automatically.
- microG is now active. Apps that previously needed Google Play Services will route through it.
Note: If the Self Check still shows issues after LSPosed is installed, reboot once more. If microG fails entirely, try uninstalling the LSPosed module from Magisk and retrying — some devices have compatibility quirks.
The Android System WebView is a browser engine baked into Android itself. It is not a browser you open — it is the rendering engine used internally by hundreds of apps whenever they display web content: Facebook news feeds, Amazon product pages, Spotify artist profiles, microG sign-in screens, news apps, email clients, and countless others. By default this engine is Google's own WebView, which phones home to Google on every render. Replacing it means every one of those apps stops feeding Google's data pipeline.
AOSmium (built by the AXP.OS Project) is a Chromium-based WebView forked from Mulch (Divested Computing Group) and hardened with Vanadium's (GrapheneOS) security patches throughout. It is the primary WebView target for DresOS. Vanadium (built by GrapheneOS) is the backup — equally hardened, directly from the most security-focused Android OS project in the world.
Your everyday browser is DuckDuckGo Privacy Browser, not AOSmium or Vanadium. Both AOSmium and Vanadium run invisibly as the system's web rendering engine. DuckDuckGo's App Tracking Protection can be fully enabled — InviZible Pro runs in proxy + root mode and does not touch the Android VPN slot at all. Full details in Part 2.
This method packages the AOSmium APK into a proper Magisk module ZIP so Magisk installs it directly into the system partition — identical to how Open WebView installs Vanadium. A system-partition install guarantees AOSmium always appears in the Developer Options WebView selector.
- A PC running Linux, macOS, or Windows (WSL works on Windows)
git,bash, and standard shell tools- The AOSmium APK for your device architecture (arm64 for most modern phones)
1. Download the AOSmium APK
Go to codeberg.org/AXP-OS/app_aosmium/releases and download the latest APK matching your device architecture — arm64 for virtually all phones made after 2016.
Transfer the APK to your PC and rename it to aosmium.apk for clarity.
2. Clone the Open WebView module source
git clone https://github.com/Magisk-Modules-Alt-Repo/open_webview.git
cd open_webview3. Understand the module structure
The Open WebView module packages a WebView APK into a Magisk-compatible ZIP by placing it at the correct system path and writing the metadata Magisk needs. You are going to create the same structure manually for AOSmium, which gives you full control without modifying the upstream scripts.
4. Create the AOSmium module directory structure
mkdir -p aosmium-webview-module/META-INF/com/google/android
mkdir -p aosmium-webview-module/system/app/AOSmium5. Copy the AOSmium APK into the module
cp aosmium.apk aosmium-webview-module/system/app/AOSmium/AOSmium.apk6. Create META-INF/com/google/android/update-binary
This is the shell script Magisk runs during installation:
cat > aosmium-webview-module/META-INF/com/google/android/update-binary << 'EOF'
#!/sbin/sh
SKIPUNZIP=1
unzip -o "$ZIPFILE" 'system/*' -d "$MODPATH"
set_perm_recursive "$MODPATH/system/app/AOSmium" root root 0644 0644
EOF7. Create META-INF/com/google/android/updater-script
echo "#MAGISK" > aosmium-webview-module/META-INF/com/google/android/updater-script8. Create module.prop
cat > aosmium-webview-module/module.prop << 'EOF'
id=aosmium-webview
name=AOSmium WebView (DresOS)
version=v1.0
versionCode=1
author=DresOS
description=Installs AOSmium as a system-level WebView provider. Hardened Chromium fork by AXP.OS using GrapheneOS/Vanadium security patches. Select AOSmium in Developer Options > WebView implementation after reboot.
minMagisk=20400
EOF9. Zip the module into a flashable archive
cd aosmium-webview-module
zip -r ../AOSmium-WebView-Magisk.zip .
cd ..10. Transfer the ZIP to your phone
adb push AOSmium-WebView-Magisk.zip /sdcard/Download/11. Flash via Magisk
- Open Magisk app → Modules → Install from storage
- Navigate to
/sdcard/Download/AOSmium-WebView-Magisk.zip - Tap it → swipe to install → reboot
12. Activate AOSmium as System WebView
After rebooting:
- Go to Settings → System → Developer Options
- (If not visible: Settings → About phone → tap Build number 7 times)
- Tap WebView implementation
- Select AOSmium
- Reboot
Test: Open Aurora Store, a news app, or any app with embedded web content. Content should now render through AOSmium — tracker blocking and ad filtering active at the WebView layer across every app on the phone.
If AOSmium does not appear in the WebView selector after the above steps, or if it renders incorrectly on your specific device, Vanadium is already installed — it was placed in the system partition when you flashed the Open WebView module in Step 5 and selected Vanadium.
Vanadium is the WebView and browser built by the GrapheneOS project. It is the most security-hardened WebView available for Android — the same WebView that ships as the default on GrapheneOS itself. It uses GrapheneOS's full exploit mitigation suite, hardened memory allocator, hardened compiler flags, and security-focused Chromium patches that go beyond what any other fork ships.
To activate Vanadium:
- Go to Settings → System → Developer Options → WebView implementation
- Select Vanadium
- Reboot
Why not Cromite or Mulch from the Open WebView module? Cromite uses the same package name as the stock Android System WebView on some OEM builds, causing package conflict errors on affected devices. Mulch was maintained by DivestOS, which reached end-of-life in December 2024 and no longer receives security updates — do not use it. Vanadium is the actively maintained, most hardened, most correct backup choice.
Flash Open WebView module → select Vanadium during install
↓
Build AOSmium Magisk module ZIP → flash via Magisk → reboot
↓
Developer Options → WebView implementation
↓
Does AOSmium appear?
YES → select AOSmium → reboot → done ✓
NO → select Vanadium (already installed) → reboot → done ✓
Either outcome gives you a privacy-hardened, Google-free system WebView. AOSmium is the primary target; Vanadium is the guaranteed fallback.
Shizuku gives apps like Inure App Manager powerful system-level access — specifically the ability to deeply debloat and manage system apps — without requiring every individual operation to go through a full root prompt. It is safer, more granular, and lighter than running everything root, and it works perfectly alongside your existing Magisk root.
- Lets Inure and other tools debloat safely and deeply at the system level.
- Survives reboots when configured correctly.
- Uses Android's ADB-equivalent permission layer — no need to expose full root for every operation.
- Works with several other FOSS tools that support it.
- Open the Shizuku app.
- When Magisk prompts for root permission, grant it to Shizuku permanently.
- On the main Shizuku screen where it shows the root option, tap Start (the big button).
- You will briefly see a black screen with white text confirming the service has started.
- Go to Shizuku settings → enable Auto start on boot and Keep alive.
- When you open Inure App Manager for the first time it will automatically request Shizuku access — approve it and grant all requested permissions.
- You can view and manage all apps that have been granted Shizuku access under Shizuku → Authorized apps.
Test: Reboot your phone. Open Shizuku — it should auto-start and show "Running" with root status. If it shows "Not running," open Shizuku and tap Start again.
You are now ready for the deepest, safest debloating possible.
Now we remove every trace of Google and system bloat safely.
- Open Inure App Manager.
- Grant it full access — choose Root and Shizuku. Approve everything it asks for.
- Go to the Debloat tab.
- Tap the select all icon.
- Select the Recommended debloat list.
- This automatically selects everything your device does not need: Google bloat, carrier apps, unused system services, etc.
- Review the list carefully. Uncheck anything you want to keep. Then tap Debloat to remove everything.
- Restart the phone.
Note: If Inure looks like it is doing nothing after you tap Debloat — leave it running. It is digging through your system to safely remove everything. This can take several minutes.
- Open the De-Bloater app (it will detect Magisk root automatically).
- Scan system apps.
- Remove all remaining Google system apps, including:
- Gmail
- Google Search
- Chrome
- Google Play Services remnants (anything not replaced by microG)
- Any other carrier or OEM bloat
- Apply changes and reboot.
You must have installed all replacement apps before removing their Google equivalents. Specifically:
- Install Tuta Mail before removing Gmail
- Install Fossify Phone before removing the stock dialer
- Install Fossify Messages before removing the stock SMS app
- Install AOSmium before removing Chrome and the Google WebView
- Install Download Navi before removing Google Download Manager
- Install SAI before removing the Google Package Installer
Removing a system app without a replacement can break core phone functions until you restore a TWRP backup.
Open SD Maid SE → run Full Scan + CorpseFinder → delete every Google remnant, leftover data folder, and orphaned system file.
Download: F-Droid — dev.ukanth.ufirewall
AFWall+ (Android Firewall+) is a root-level firewall that uses iptables — the same Linux kernel-level packet filtering used in professional firewalls and servers. Unlike app-based firewalls that operate through the Android VPN slot, AFWall+ works at the kernel level, meaning it intercepts and controls network traffic before any app can touch it. No VPN slot is used. No app can bypass it. It runs silently in the background and survives reboots via Magisk root.
This is your system-wide network policy layer. InviZible Pro (covered in Part 2) handles routing your traffic through Tor/I2P/DNSCrypt via proxy. AFWall+ handles which apps are permitted to reach the network at all — including blocking apps that would try to bypass the proxy entirely.
InviZible Pro is configured in proxy mode (not VPN mode) so the Android VPN slot remains free for DuckDuckGo App Tracking Protection. In proxy mode, InviZible Pro cannot enforce firewall rules on apps that ignore or bypass the system proxy — some apps do exactly this. AFWall+ operates at a level those apps cannot reach: the kernel's iptables chains, which sit below the entire Android app layer.
- Install AFWall+ from F-Droid.
- Open AFWall+ — it will request root via Magisk. Grant it permanently.
- The main screen shows every installed app as a row with toggle switches for:
- WiFi (left column) — allow/block on Wi-Fi networks
- Data (middle column) — allow/block on mobile data
- VPN/Roaming (right column, if shown) — allow/block on VPN or roaming
- Set the default policy first:
- Tap the ≡ menu → Set Default Policy → Deny (White List)
- This means all apps are blocked by default — you explicitly whitelist only what needs internet. This is the most secure posture.
Enable internet for these apps (tap their toggles to green for Wi-Fi and Data):
| App | Allow | Notes |
|---|---|---|
| DuckDuckGo | ✅ WiFi + Data | Your browser — needs full access |
| InviZible Pro | ✅ WiFi + Data | Proxy engine — must reach Tor/I2P/DNS servers |
| Tuta Mail | ✅ WiFi + Data | Email push notifications |
| F-Droid | ✅ WiFi only | App updates — Wi-Fi only to avoid data leaks |
| Aurora Store | ✅ WiFi only | App updates — Wi-Fi only |
| Arcane Chat | ✅ WiFi + Data | Messaging — needs constant connectivity |
| OONI Probe | ✅ WiFi + Data | Network tests |
| Hypatia | ✅ WiFi only | Signature updates only |
| microG (com.google.android.gms) | ✅ WiFi + Data | If using microG for push notifications |
| Fossify Phone | ✅ Data | Calls over mobile data |
| Metrolist | ✅ WiFi + Data | Music streaming |
| RedReader | ✅ WiFi + Data | Reddit client |
Block everything else — games, offline tools, system apps that have no reason to phone home, and any remaining Google service remnants.
On rooted devices, AFWall+ can redirect traffic at the kernel level to ensure apps route through InviZible Pro's local Tor proxy even if they do not respect Android's system proxy setting. Go to:
AFWall+ → ≡ menu → Custom Scripts → Startup Script
Add the following rule to redirect all outgoing HTTP/HTTPS traffic through InviZible Pro's Tor HTTP proxy on port 8118 (replace UID with the app's Android user ID from Settings → Apps → [App] → App info):
iptables -t nat -A OUTPUT -p tcp -m owner --uid-owner UID -j DNAT --to-destination 127.0.0.1:8118For most users, the combination of InviZible Pro system proxy + DuckDuckGo App Tracking Protection + AFWall+ default-deny whitelist is sufficient without custom iptables rules. The custom script approach is for advanced users who want guaranteed per-app Tor enforcement regardless of system proxy compliance.
AFWall+ → ≡ menu → Logs shows you every blocked connection attempt in real time — which app tried to reach which IP, when, and whether it was blocked. This is an excellent way to spot apps trying to phone home that you did not expect.
A truly de-Googled phone requires replacing not just apps but the system-level utilities Google embeds for file management, app installation, and downloading. Here is the full FOSS replacement stack — zero Google components:
Fossify Files is already included in the Fossify suite you installed in Step 4. It is a direct open-source replacement for Google Files (Files by Google). It provides:
- Full local file browsing (internal storage and SD card)
- Copy, move, delete, rename, compress operations
- Support for ZIP archives
- No cloud sync, no analytics, no Google dependencies whatsoever
- Completely offline and self-contained
Set Fossify Files as your default file manager in Settings → Apps → Default apps.
For encrypted archiving, AES-encrypted backups, and powerful archive management, use ZArchiver Pro from the DresOS app suite (covered in Part 3). These two work together: Fossify Files for everyday browsing, ZArchiver Pro for anything requiring encryption or complex archive formats.
SAI (Split APK Installer) is a fully open-source replacement for Google's PackageInstaller. It supports:
- Standard APK installation
- Split APK packages (.apks / .xapk files) — the format many apps use
- APK signature verification before installing
- Batch installation from ZIP archives
- Root and Shizuku installation modes for seamless installs without confirmation prompts
- Zero Google components, zero network calls home
Install from F-Droid: https://f-droid.org/packages/com.aefyr.sai.fdroid/
Set SAI as the default app opener for .apk files in Settings → Apps → Default apps → Opening links, or by long-pressing an APK in Fossify Files and selecting SAI.
Download Navi is a fully open-source download manager — a complete replacement for Google's hidden Download Manager service that normally handles all file downloads on Android. It provides:
- Parallel and resumable downloads
- Browser integration (set as default download handler)
- File hash verification (MD5/SHA-256) to confirm download integrity
- Support for batch downloads and download queues
- A clean, modern interface
- Zero Google dependencies — it does not call home anywhere
Install from F-Droid: https://f-droid.org/packages/com.tachibana.downloader/
After installing, go to Settings → Apps → Default apps → Opening links and make sure Download Navi handles download intents. In DuckDuckGo Privacy Browser, go to Settings and set Download Navi as the external download manager if prompted.
Why This Matters: Google's Download Manager is a hidden background service that most users never interact with directly — but it silently handles every file download on the phone and can report metadata to Google. Download Navi replaces it entirely with zero tracking.
For sourcing and updating apps:
- F-Droid handles all open-source apps from its repository and any added repos (like AXP.OS for AOSmium). F-Droid verifies all APK signatures against developer keys.
- Aurora Store provides anonymous access to the Google Play Store catalogue without a Google account. Use Anonymous login mode only.
Together, these two replace the Google Play Store ecosystem completely.
Go to Settings → Apps → Default apps and set:
| Function | Default App |
|---|---|
| Browser | DuckDuckGo Privacy Browser |
| Keyboard / Input method | HeliBoard |
| Home / Launcher | Fossify Launcher |
| Phone app | Fossify Phone |
| SMS / Messages | Fossify Messages |
Tuta Mail (also set for mailto: links) |
|
| File manager | Fossify Files |
| Package installer | SAI |
| Download manager | Download Navi |
Aurora Store: Open it → Settings → set Anonymous login mode. Do not log in with any Google account.
DuckDuckGo Privacy Browser: Open it and complete initial setup. App Tracking Protection can and should be enabled — InviZible Pro runs in proxy + root mode and does not occupy the Android VPN slot, so there is no conflict. Enable it in DuckDuckGo → Settings → App Tracking Protection → Enable. Android will prompt you to allow a VPN connection for DuckDuckGo — confirm it. This gives you both InviZible Pro's proxy-level Tor/DNSCrypt routing AND DuckDuckGo's in-app tracker blocking running simultaneously.
LSPosed modules (optional hardening):
- Hide My Applist — prevents apps from detecting other apps installed on your phone
- Play Integrity Fix — helps microG pass SafetyNet/Play Integrity checks for apps that require it
- Make and receive a test phone call via Fossify Phone
- Send and receive a test SMS via Fossify Messages
- Send and receive a test email via Tuta Mail
- Open a website in DuckDuckGo Privacy Browser — confirm it is working and App Tracking Protection shows as active
- Open AFWall+ — confirm firewall rules are applied and the app shows iptables as active
- Open Aurora Store — verify apps load and anonymous mode works
- Open an APK via SAI — confirm it installs correctly
- Download a file in DuckDuckGo — confirm it opens in Download Navi
- Everything working through microG and the new system WebView as expected
TWRP Backup (if not done already): Boot to TWRP → Backup → select Boot + System + Data + Vendor → swipe to back up. This is your emergency restore point. Store the backup folder in a safe location off-device.
If anything breaks: Boot to TWRP → Restore → select your backup → swipe. Your full system is back in minutes.
This repository provides a guide to enhancing operational security (OPSEC) and cybersecurity on Android devices. It focuses on protecting against phishing, malware, IP tracking, data mining, device fingerprinting, censorship detection, and network surveillance — using free, open-source tools only.
This method creates a layered privacy setup: encrypted DNS at the OS level (Quad9 DNS-over-TLS), Tor routing + DNSCrypt + I2P at the network level via InviZible Pro in proxy + root mode (which leaves the VPN slot free), a root-level iptables firewall via AFWall+ enforcing per-app access control at the kernel level, app-layer tracker blocking via DuckDuckGo App Tracking Protection in the VPN slot, and location spoofing at the sensor level via Fake Traveler. The result is an extremely hardened device with multiple independent, non-conflicting privacy layers operating simultaneously.
Compatibility: Android 10 or later. The degoogling steps in Part 1 are recommended but most OPSEC steps work on stock Android too.
Architecture Note: InviZible Pro runs in proxy + root mode — not VPN mode. It exposes Tor as an HTTP proxy on
127.0.0.1:8118, and uses iptables (via Magisk root) to redirect all DNS to DNSCrypt at the kernel level. The Android system proxy setting routes HTTP/HTTPS traffic from all cooperating apps through Tor. The Android VPN slot remains completely free, meaning DuckDuckGo's App Tracking Protection can and should be fully enabled to run alongside InviZible Pro. AFWall+ adds a second independent kernel-level firewall layer — per-app access control and mobile data proxy redirect — that operates entirely outside of both the proxy and VPN systems.
This is the baseline privacy layer — applied at the OS level, before any apps run.
- Go to Settings → Network & Internet → Private DNS.
- Select Private DNS provider hostname.
- Enter:
dns.quad9.net - Save.
What this does: Quad9 DNS blocks malicious domains, protects against malware and phishing at the DNS resolution level, and does not log or collect user data — unlike Google DNS (8.8.8.8) or Cloudflare DNS (1.1.1.1) which both log queries. Quad9 is operated by a Swiss nonprofit. All DNS queries are now encrypted via DNS-over-TLS and filtered against Quad9's threat intelligence database.
Note: Once InviZible Pro is running in proxy mode (Step 2), it takes over DNS resolution via DNSCrypt, which is more private than system-level DNS-over-TLS. The Quad9 setting here serves as a fallback for when InviZible Pro is not active.
- Go to Settings → Network & Internet → Internet → tap your Wi-Fi network.
- Tap Network usage → set to Treat as unmetered (reduces certain monitoring behaviors).
- Go to Privacy (within the same network settings).
- Enable Use randomized MAC address.
- Disable Send device name.
What this does: Every Wi-Fi device has a hardware MAC address that uniquely identifies it. By default, this allows any network operator to track your device across time even if you change your IP. Randomized MAC changes your device's hardware identifier on each network, preventing this form of persistent tracking. Your device might appear as a completely random hardware identifier — preventing physical location tracking via Wi-Fi network logs.
- Go to Settings → About phone → tap Build number seven times to unlock Developer Options.
- In Developer options:
- Enable Non-persistent MAC (complements the randomization above across reboots)
- Enable Tethering hardware acceleration (improves performance when hotspot is used)
InviZible Pro (the app listed in stores as iVizblePro) is the network privacy engine of the DresOS stack. It combines Tor, I2P, and DNSCrypt into a single application. In this setup it runs in proxy mode with root, which means:
- It runs as a local proxy server on your device — the Android VPN slot is not used at all
- DuckDuckGo's App Tracking Protection can be fully enabled alongside it with zero conflict
- Magisk root lets InviZible Pro redirect DNS at the iptables level without any VPN interface
- Android's built-in system proxy setting routes your traffic through InviZible Pro's Tor HTTP proxy — your apparent IP address to every website and service becomes a Tor exit node IP, not your real IP
Download: pan.alexander.tordnscrypt.stable_26603.apk Or search InviZible Pro in F-Droid.
DNSCrypt:
DNS converts domain names like example.com into IP addresses. By default this happens in plain text — your ISP, network operator, and any middlebox on the network can see every domain you visit, even when page content is HTTPS-encrypted. DNSCrypt encrypts and cryptographically authenticates every DNS query. In proxy + root mode, InviZible Pro uses iptables to redirect all DNS traffic (UDP and TCP port 53) to its local DNSCrypt listener at port 5354 — no app can bypass it, no VPN is needed.
Tor (The Onion Router):
Tor routes your traffic through three volunteer-operated relays. Each relay only knows the immediately previous and next hop — no single relay can identify both your identity and your destination. InviZible Pro exposes Tor as a local HTTP proxy on port 8118. When you set Android's system proxy to 127.0.0.1:8118, all apps that respect the system proxy route their traffic through Tor. From the perspective of every website and service you connect to, your IP address is the Tor exit node's IP — a relay in another country, different from your real IP, rotating every 10 minutes.
I2P (Invisible Internet Project):
A separate anonymising network using garlic routing (bundles multiple encrypted messages per hop). Independent of Tor, runs on its own relay network. Suited for accessing .i2p hidden services (eepsites) and provides a different anonymity model from Tor that resists certain traffic correlation attacks differently. InviZible Pro exposes the I2P HTTP proxy locally on port 4444.
Root Mode / iptables DNS Redirection: With Magisk root, InviZible Pro writes iptables rules at the kernel level to redirect all outbound DNS queries (port 53 → port 5354) to DNSCrypt — regardless of which app generates them. No VPN slot needed. This runs below the application layer: it cannot be bypassed by any app.
Follow these steps in order. Do not start any service until Phase 6.
- Install InviZible Pro via F-Droid or the direct APK link above (install with SAI).
- Open InviZible Pro.
- Allow notification permissions when prompted.
- Do not tap Start on anything yet.
- Tap the ≡ hamburger menu (top-left corner) → Settings → Common settings.
- Find Run mode or Connection method → select Proxy mode (not VPN mode, not Root-only mode).
- Under Root settings in the same screen:
- Enable Run modules with root — allows InviZible Pro to use your Magisk root for iptables and more reliable process control
- Enable Redirect DNS to DNSCrypt — this is the iptables rule that forces all port-53 DNS from every app through DNSCrypt on port 5354
- Enable Fix TTL for tethering — useful if you share your connection via hotspot
- Under Proxy settings (still in Common settings):
- Confirm SOCKS5 proxy port:
9050(Tor SOCKS5) - Confirm HTTP proxy port:
8118(Tor HTTP CONNECT proxy — this is what you will enter into Android's Wi-Fi proxy setting)
- Confirm SOCKS5 proxy port:
- Enable Start on boot — restores all services and iptables rules automatically after every reboot.
- Go back to the main screen.
- Tap the DNSCrypt tab.
- Tap the settings gear icon.
- Under DNS servers, select resolvers that meet all of these criteria:
nolog— server does not log your queriesnodump— server does not share data with third partiesdnssec— server validates DNS responses cryptographically- Recommended:
quad9-dnscrypt-ip4-filter-pri(Quad9, Swiss non-profit, malware domain blocking),mullvad-adblock(Mullvad VPN's resolver, strict no-log, Swedish jurisdiction) - Always avoid: Any
cloudflareentry (logs queries), any Google resolver
- Select 2–3 qualifying servers for redundancy.
- Under DNSCrypt settings, enable:
- DNSSEC — cryptographic validation of all DNS responses; rejects spoofed or tampered answers
- Require DNSSEC — filters server list to DNSSEC-supporting resolvers only
- Require no logging — filters list to strictly non-logging resolvers only
- Block IPv6 — reduces attack surface if you do not actively use IPv6 services
- Bootstrap resolvers — allows initial encrypted resolver list fetch; only contacts a plain resolver once for bootstrapping, then stays encrypted
- Go back.
- Tap the Tor tab.
- Tap the settings gear icon.
- Under Tor settings, enable:
- Isolate destination addresses — forces each destination domain to use a separate Tor circuit; prevents one service from correlating your traffic to another
- Isolate destination ports — additional circuit isolation per port number
- Isolate SOCKS auth — further isolation if apps use SOCKS5 authentication
- Note the HTTP proxy port is
8118(used in Phase 7 below). - Under Bridges — enable this if you are in a country where Tor is blocked, or for extra obfuscation on any network:
- Enable Use bridges
- Select bridge type: obfs4 — disguises Tor traffic as ordinary HTTPS, bypasses deep packet inspection (DPI)
- Tap Request new bridges (fetches fresh bridges from Tor Project) or enter bridges manually from bridges.torproject.org
- Go back.
- Tap the I2P tab.
- Tap the settings gear icon.
- For most users, default settings are correct. If you plan to access I2P eepsites, confirm the I2P HTTP proxy is enabled on port
4444. - Enable Tunnel bandwidth limiting if your device is battery-sensitive.
- Go back.
- Note: I2P takes 10–20 minutes to fully build its routing table on first run — this is expected behaviour, not an error.
From the InviZible Pro main screen, start services in this exact order:
- DNSCrypt → tap Start → wait for status: Running
- Tor → tap Start → wait for bootstrap to reach 100% (30–90 seconds)
- I2P → tap Start → bootstrap begins (10–20 min first run; much faster after that)
InviZible Pro is now running. The iptables DNS redirect is active (all DNS → DNSCrypt). Your local Tor HTTP proxy is live at 127.0.0.1:8118.
This is how you route app traffic through InviZible Pro's Tor proxy using Android's built-in system proxy — no VPN slot used. Apps that respect the system proxy will have their HTTP/HTTPS traffic exit through a Tor exit node. Your real IP is not visible to any destination.
Repeat this for every Wi-Fi network you connect to:
- Settings → Network & Internet → Wi-Fi
- Long-press your network name → Modify network (or tap the pencil icon)
- Expand Advanced options
- Under Proxy → select Manual
- Enter:
- Proxy hostname:
127.0.0.1 - Proxy port:
8118 - Bypass proxy for:
localhost,127.0.0.1
- Proxy hostname:
- Tap Save
Mobile data: Android's system proxy setting is Wi-Fi only in standard UI. For cellular data, AFWall+ (OPSEC Step 3) with custom iptables rules can enforce routing at the kernel level. For most users, Wi-Fi proxy coverage is sufficient.
Now that the VPN slot is free:
- Open DuckDuckGo Privacy Browser
- Tap ≡ menu → Settings → App Tracking Protection → Enable
- Android prompts to allow DuckDuckGo to create a VPN connection — tap OK
- DuckDuckGo App Tracking Protection is now running in the VPN slot, blocking trackers inside all other apps
This gives you two independent protection layers running simultaneously:
- InviZible Pro — handles network-level anonymity (Tor IP spoofing, DNSCrypt, I2P) via proxy + iptables
- DuckDuckGo App Tracking Protection — handles app-layer tracker blocking via the VPN slot
- InviZible Pro main screen — all three services: Running (green)
- Open DuckDuckGo Privacy Browser
- Visit
https://check.torproject.org→ should confirm "Congratulations. This browser is configured to use Tor." - Visit
https://dnsleaktest.com→ run Extended Test → DNS should resolve through your DNSCrypt server, not your ISP - Visit
https://whatismyipaddress.com→ IP shown should be a Tor exit node IP, not your real IP or ISP IP - All three checks passing = DNS encrypted, traffic anonymised through Tor, real IP hidden
- InviZible Pro restores services and iptables rules on every boot automatically.
- If Tor is slow: stop I2P temporarily to free bandwidth for Tor circuits. Restart I2P when you need eepsites.
- Check InviZible Pro → Logs tab to see active Tor circuits, DNSCrypt queries, and any errors.
- Update InviZible Pro via F-Droid regularly — outdated Tor binaries can have known vulnerabilities.
- Do not log into personal accounts (Google, Facebook, etc.) while routing through Tor — account-level identification defeats network-level anonymity.
AFWall+ (Android Firewall+) is a root-level firewall for Android that uses iptables — the Linux kernel's built-in packet filtering framework — to control exactly which apps can access the internet and on which interfaces. Unlike InviZible Pro's proxy (which apps must cooperate with) or DuckDuckGo's App Tracking Protection (which works at the VPN layer), AFWall+ operates at the kernel level: it is enforced before any app or VPN stack even sees the traffic. An app cannot circumvent it.
Download: F-Droid — dev.ukanth.ufirewall / GitHub
InviZible Pro's internal firewall (when running in proxy + root mode) handles routing decisions — which traffic goes through Tor, which goes through I2P. AFWall+ handles access control — which apps are allowed to communicate at all, on which network interfaces (Wi-Fi, mobile data, VPN), and to which addresses. These are complementary, not redundant:
- InviZible Pro routes and anonymises traffic
- AFWall+ decides at the kernel level which apps are even allowed to generate network traffic in the first place
Running both gives you defence-in-depth: even if InviZible Pro's proxy routing fails or an app bypasses the system proxy, AFWall+'s iptables rules are still enforced at the kernel.
- Install AFWall+ from F-Droid.
- Open AFWall+ → it will request root access via Magisk — grant it permanently.
- AFWall+ confirms it can control iptables.
- Tap the ≡ menu (top-left) → Preferences → Firewall rules.
- Confirm iptables mode is selected (not ip6tables-only — enable both for full coverage).
- Go back to the main screen.
- Tap Enable firewall (the toggle at the top) → confirm.
AFWall+ shows all installed apps with toggles for each interface:
- Wi-Fi column — whether this app can use Wi-Fi
- Data column — whether this app can use mobile/cellular data
- VPN column — whether this app can use VPN tunnel traffic (relevant for DuckDuckGo App Tracking Protection)
- LAN column — whether this app can access local network (optional column)
Recommended starting rules:
| App | Wi-Fi | Mobile Data | Notes |
|---|---|---|---|
| DuckDuckGo Privacy Browser | ✓ | ✓ | Primary browser, allow all |
| InviZible Pro | ✓ | ✓ | Must have access to reach Tor network |
| Tuta Mail | ✓ | ✓ | Email, allow all |
| Arcane Chat | ✓ | ✓ | Messaging, allow all |
| Aurora Store | ✓ | ✗ | Updates via Wi-Fi only to save data |
| Hypatia | ✓ | ✗ | Signature updates via Wi-Fi only |
| OONI Probe | ✓ | ✓ | Needs both for network testing |
| F-Droid | ✓ | ✗ | Update repo via Wi-Fi only |
| Fossify Phone | ✓ | ✓ | Calls use data |
| Fossify Messages | ✓ | ✓ | MMS uses data |
| Metrolist | ✓ | ✗ | Stream via Wi-Fi only |
| Games / offline apps | ✗ | ✗ | Block all — no reason for internet access |
| Any Google remnant | ✗ | ✗ | Block completely |
Android's system proxy setting only applies to Wi-Fi. On mobile data, apps bypass the system proxy. To enforce Tor proxy routing on mobile data as well, add these custom iptables rules in AFWall+:
- Tap ≡ menu → Custom rules
- Add the following (routes HTTP and HTTPS from all apps through InviZible Pro's local Tor HTTP proxy on mobile data):
# Redirect HTTP traffic to InviZible Pro Tor proxy (mobile data)
-A OUTPUT -p tcp --dport 80 -o rmnet+ -j REDIRECT --to-port 8118
-A OUTPUT -p tcp --dport 443 -o rmnet+ -j REDIRECT --to-port 8118
Note:
rmnet+matches mobile data interfaces on most Android devices. On some devices this may bermnet_data+— check your device's interface names in a terminal emulator if the rule does not apply.
- Save and apply.
- ≡ menu → Log → Enable log — AFWall+ will log all blocked connection attempts.
- Check the log periodically — blocked entries reveal apps attempting to phone home, connect to ad networks, or bypass your privacy stack.
- ≡ menu → Preferences → UI preferences → Password protection → set a PIN.
- This prevents any app or accidental tap from disabling your firewall.
This two-layer setup gives you the strongest available email privacy. Tuta Mail is your real, encrypted inbox. Duck Addresses are disposable forwarding aliases you hand out to every app, website, and service instead of your real address — so your actual Tuta inbox is never exposed.
- Open Tuta Mail and create a new account.
- Use a
.dedomain address (e.g.,yourname@tuta.de) — German privacy laws (DSGVO/GDPR) provide strong legal protections for accounts hosted in Germany. - No phone number is required. Tuta only asks for an email address and an encryption key / recovery code — write this down and store it somewhere physically safe. This recovery code is how you regain access to your account if you ever lose access. Guard it the same way you would guard a physical key to your home.
- Enable biometric lock or a strong PIN within Tuta Mail's security settings.
- All emails between Tuta accounts are automatically end-to-end encrypted. Emails to external recipients (Gmail, etc.) can be password-encrypted using Tuta's "secure external password" feature.
What Tuta does: End-to-end encrypted email with zero trackers, zero ads, and zero data mining. Unlike Gmail, Tuta cannot read your emails. Unlike most providers, Tuta also encrypts subject lines and metadata — not just the body. Your encryption key means only you can access your account, even if Tuta's servers were ever compromised.
Duck Addresses are free, private email aliases provided by DuckDuckGo. The idea is simple: instead of giving any website, app, or service your real Tuta address, you give them a Duck Address like yourname@duck.com. DuckDuckGo strips all email trackers from messages and forwards them clean to your real Tuta inbox. If a service gets breached, sells your data, or starts spamming you — you just deactivate that alias. Your real Tuta address is never exposed.
Setup:
- Open DuckDuckGo Privacy Browser.
- Tap the ≡ menu → Settings → Email Protection.
- Tap Get Started and follow the setup flow.
- When asked for your forwarding address, enter your Tuta Mail address — all forwarded emails will arrive in your Tuta inbox, stripped of trackers.
- You will receive a Duck Address (e.g.,
yourname@duck.com). This is your primary alias. No phone number required — just your Tuta address to receive forwarded mail. - You will also be given an encryption key / personal Duck Key — store this safely alongside your Tuta recovery code. This is how you manage your account if needed.
Using Duck Addresses everywhere:
- Whenever any app, website, or form asks for your email address, tap the DuckDuckGo keyboard suggestion "Use Duck Address" — or manually enter your
@duck.comaddress - DuckDuckGo can also auto-generate unique one-time aliases for each service (e.g.,
yourname_amazon_5k3j@duck.com) — these appear as autofill suggestions in DuckDuckGo browser when you tap an email field - Each unique alias forwards to your Tuta inbox with all trackers removed
- If a specific service starts sending spam or your alias appears in a breach, go to DuckDuckGo Settings → Email Protection → Manage and deactivate just that alias — without touching your real address
What this stops:
- Phishers — they only have a disposable alias, never your real Tuta address
- Doxxers — your real inbox cannot be searched for, looked up, or correlated across services
- Data brokers — even if five different companies share your email address, they each have a different alias and cannot link your accounts together
- Email trackers — DuckDuckGo strips tracking pixels, spy links, and hidden tracking code from every forwarded email before it reaches Tuta
DuckDuckGo's browser also includes a built-in password manager that integrates with Duck Address setup. Once you have Email Protection enabled:
- When you create a new account on any website in the DuckDuckGo browser, it will automatically suggest a strong, randomly generated password for the password field — tap to accept and it is saved to DuckDuckGo's encrypted local password storage
- Saved passwords are stored on-device, encrypted, and sync only to other devices you control via your Duck account (optional)
- On returning to a site, DuckDuckGo autofills both the Duck Address alias and your saved password
- This means for most sign-ups you never manually type or choose a password — the browser generates, saves, and fills it all automatically
Use IYPS (App #2) to analyse the strength of any existing passwords you want to migrate, then replace weak ones with DuckDuckGo-generated passwords going forward.
The complete email security chain:
Website/App → Duck Address alias (unique per service)
→ DuckDuckGo strips email trackers
→ Forwards clean to your Tuta Mail address
→ Tuta decrypts with your encryption key
→ You read it
Your real address never appears anywhere outside of the DuckDuckGo Email Protection settings on your own device.
Physical location is one of the most sensitive data points your phone broadcasts constantly. Fake Traveler lets you replace your real GPS coordinates with any location in the world.
- Open Fake Traveler.
- Browse the map and select a fake location (tap to pin it, or search for a city/place).
- Tap Apply or Start mocking.
- Go to Settings → About phone → tap Build number seven times to ensure Developer Options is open.
- In Developer Options → scroll to Select mock location app → choose Fake Traveler.
- Your device's GPS will now report the fake location to all apps that request it.
What this does: Spoofs your device's geolocation, preventing apps from determining your real position. Combined with InviZible Pro's Tor routing (which masks your IP address from network observers), this gives you both network-level and sensor-level location protection simultaneously.
InviZible Pro / proxy setup:
- Confirm InviZible Pro is running (all three services green) and the Android system proxy is set to
127.0.0.1:8118on your Wi-Fi network. - Allow InviZible Pro background network access and disable any battery optimization that would kill it (Settings → Battery → Battery optimization → InviZible Pro → Not optimized).
- Allow background network and battery usage for Tuta Mail (for push notifications) the same way.
AFWall+ check:
- Open AFWall+ and confirm the default policy is Deny (White List) and only the apps you explicitly approved are green.
- Check the Logs tab — you should see blocked connection attempts from apps you did not whitelist. This confirms it is working.
DuckDuckGo App Tracking Protection:
- Since InviZible Pro uses proxy mode and does not occupy the Android VPN slot, DuckDuckGo's App Tracking Protection can and should be enabled.
- Open DuckDuckGo → ≡ menu → App Tracking Protection → Enable. Android will prompt you to confirm the VPN connection — this is DuckDuckGo using the VPN slot to monitor other apps' tracker traffic. Confirm it.
- Both InviZible Pro (proxy mode) and DuckDuckGo App Tracking Protection will now run simultaneously without conflict.
Network preference:
- Use Wi-Fi over mobile data where possible — Tor performance is significantly better on Wi-Fi, and the system proxy applies automatically to saved Wi-Fi networks.
- On public Wi-Fi, AFWall+'s whitelist ensures no unexpected apps phone home even on untrusted networks.
Periodic maintenance:
- Run Hypatia weekly to scan for malware.
- Run OONI Probe to monitor for censorship or network manipulation in your area.
- Run SD Maid SE monthly to clear leftover data from removed apps.
- Update all apps via F-Droid regularly — security patches are critical.
Your device now has a hardened, layered cybersecurity posture reducing risks from surveillance, phishing, malware, censorship, and network-level attacks.
The following apps form the complete DresOS defensive security application suite. Every single one is open-source, has zero Google dependencies, and is sourced directly from verified developer releases or F-Droid. Together they cover encrypted file storage, password management, private social media, link safety scanning, malware detection, network censorship monitoring, privacy routing, private media, and secure communications — building a complete defensive security ecosystem on your device.
Download: zarchiver-pro.apk
ZArchiver Pro is a powerful file management and archive tool with strong AES-256 encryption capabilities. While Fossify Files handles everyday file browsing, ZArchiver Pro is your tool whenever you need to compress, encrypt, archive, or securely package files. It supports a wide range of archive formats and can create password-protected, AES-256-encrypted archives.
- AES-256 encryption for 7z archives — the same encryption standard used by security professionals and government agencies
- Create and extract ZIP, 7z, TAR, GZ, BZ2, XZ, RAR (extract only), and many other formats
- Password-protect any archive with AES-256 or ZipCrypto
- Split large archives across multiple parts
- Preview files within archives before extracting
- Batch operations (compress multiple files at once)
- Full support for SD card, USB OTG storage, and internal storage
- Install via SAI from the direct APK link above.
- Grant storage permission when prompted.
- Creating an encrypted backup:
- Long-press files/folders in ZArchiver → select Compress
- Choose format: 7z (for AES-256 encryption support)
- Enable Encrypt archive → set a strong password (use IYPS from the next app to check its strength, or use DuckDuckGo's built-in password generator)
- Select Encryption method: AES-256
- Tap OK — your encrypted archive is created
- Extracting an encrypted archive: tap the archive → enter password → extract
- Use case — Secure Backups: Before performing any major system changes (flashing, debloating), compress your important files into an AES-256-encrypted 7z archive and store it on an SD card or secure off-device location.
Sensitive files (personal documents, cryptographic keys, backup configurations) should never sit unencrypted on a device. ZArchiver Pro's AES-256 encryption means even if someone extracts your SD card or gains physical access to your storage, they cannot read protected archives without the password.
Download: IYPS_v1.5.6.apk
IYPS (It's Your Password Security) is an open-source password strength analyser and generator. It does not store passwords — that job is handled by DuckDuckGo's built-in password manager (covered in App #14). What IYPS does is tell you exactly how strong or weak any given password is, with real-world crack-time estimates across different attack scenarios, and generate strong random passwords on demand.
- Password strength analyser — paste any existing password and get a detailed breakdown: entropy score, estimated crack time under online attack, offline attack, and distributed cracking scenarios
- Password generator — creates strong, random passwords with customisable length and character sets
- Completely offline — no password ever leaves your device during analysis
- No storage, no vault, no sync — purely an analysis and generation tool
- No ads, no trackers, no telemetry
- Install via SAI from the direct APK link above.
- Open IYPS — no account or setup required.
- Check an existing password:
- Paste it into the analyser field
- IYPS shows the entropy score and estimated crack time across attack scenarios (online throttled, offline fast hash, distributed brute-force)
- Anything under "centuries" for an offline attack is worth replacing
- Generate a strong password:
- Go to the Generator tab
- Set desired length (20+ characters recommended) and character set (uppercase, lowercase, numbers, symbols)
- Tap generate — copy the result and save it in DuckDuckGo's password manager (see App #14)
Most people massively overestimate how strong their passwords are. IYPS shows you in concrete terms exactly how quickly your password would fall — making it a practical tool for auditing your existing passwords before migrating them to DuckDuckGo's password manager. Use IYPS to generate and vet, DuckDuckGo to store.
Download: RedReader-v1.25.1.apk
RedReader is a free, open-source Reddit client that removes all advertising, tracking, data collection, and analytics present in the official Reddit app and other third-party clients.
- No ads whatsoever — not even Reddit's own promoted posts
- No tracking or analytics — no telemetry sent to Reddit or any third party
- No account required to browse — full anonymous access to Reddit content
- Optional account login for commenting/voting without Reddit app telemetry
- Clean, fast, highly readable interface
- Full image, GIF, and video support
- Offline reading mode — cache posts for reading without connectivity
- Night mode and customizable text sizes
- Install via SAI from the direct APK link above.
- Open RedReader — no setup required to start reading anonymously.
- Browse without account: You can immediately browse subreddits, search, and read posts without logging in.
- Optional account login:
- Settings → Accounts → Add Account
- Log in with your Reddit credentials — RedReader does not store these beyond the session token
- Customize feed:
- Add subreddits to your front page by searching (magnifying glass) and subscribing
- If not logged in, subreddits are stored locally in the app
The official Reddit app is one of the most aggressive data-harvesting apps available — it requests extensive device permissions, tracks your reading behavior, and feeds data to advertising networks. RedReader provides the same content access with none of the surveillance.
Download: URLCheck-3.4.1.apk
URL Check is an open-source link analysis and scanning tool. Before opening any link, URL Check intercepts it and scans it for IP loggers, tracking parameters, malware indicators, phishing patterns, and URL redirects — showing you exactly where a link actually leads before you visit it.
- IP logger detection — identifies links from known IP-logging services (grabify, iplogger, etc.)
- Phishing detection — flags domains that impersonate legitimate services
- Malware link scanning — checks against known malicious URL databases
- URL unshortener — expands bit.ly, t.co, and all other shorteners to reveal the real destination
- Tracking parameter stripping — removes
utm_source,fbclid,gclid, and all other tracking tags from URLs automatically - Redirect following — shows the full redirect chain so you can see every server a link passes through
- VirusTotal integration (optional) — submit URLs to VirusTotal's multi-engine scanner
- Clipboard monitoring (optional) — automatically checks any URL you copy
- Install via SAI from the direct APK link above.
- Open URL Check → go through the initial permissions setup (allow it to handle link intents).
- Set as default link opener:
- In URL Check settings → enable "Intercept links"
- Android will prompt you to set URL Check as the handler for links — confirm
- How it works in practice:
- Someone sends you a link in a chat app or email
- Instead of opening directly in the browser, URL Check intercepts it
- A screen appears showing: the original URL, expanded URL, any trackers detected, any malware flags
- Tap Open to proceed (if clean) or Copy to share the cleaned URL
- Tracking removal:
- Enable "Remove tracking parameters" in settings
- All UTM tags, Facebook click IDs, Google analytics parameters, etc. are stripped automatically
Phishing and IP logging are two of the most common attack vectors in targeted surveillance. A single click on an IP logger reveals your real IP address, approximate location, device type, and OS — even if you are using a VPN. URL Check prevents this by scanning every link before it is opened.
Download: hypatia_v3.18.apk
Hypatia is a fully open-source antivirus and malware scanner for Android, powered by ClamAV signature databases. It scans APKs before installation, scans files on your storage, and can perform full-device scans to detect known malware, trojans, ransomware, and other threats.
- ClamAV-powered — uses the same signature database as the industry-standard ClamAV engine trusted by organizations worldwide
- APK scanning — scans any APK file before you install it, including those from Aurora Store and direct downloads
- File scanning — scans documents, archives, downloaded files, and any other content on your storage
- Full-device scan — scans all installed apps and accessible storage in one pass
- Real-time protection (optional) — monitors new files as they are created or downloaded
- Offline capable — signatures are downloaded locally; scanning does not require internet once signatures are updated
- Zero telemetry, no cloud scanning, no data sent to any server during scans
- Regular signature updates via the app (or F-Droid)
- Install via SAI from the direct APK link above.
- Open Hypatia → grant storage permission.
- Update signatures first:
- Settings → Update signatures → tap Update All
- Wait for ClamAV, MSRT, and other signature databases to download
- Scan a specific APK before installing:
- Download an APK via Download Navi
- Open Hypatia → Scan file → navigate to the downloaded APK → scan
- If clean: green result → install with SAI
- If flagged: do not install — delete the file
- Full device scan:
- Tap the Scan button on the main screen → select Full Scan
- Hypatia scans all installed apps and storage
- Real-time monitoring:
- Settings → Real-time protection → Enable
- Hypatia monitors new files as they land on your device and alerts you if anything malicious is detected
- Scheduled scans:
- Set up weekly scans in Settings → Schedule to run automatically
Side-loading APKs (which is necessary on a de-Googled phone without Play Protect) requires you to take responsibility for your own malware screening. Hypatia with ClamAV signatures provides robust detection of known threats in every APK you install — a critical piece of the defensive stack.
Download: ooniprobe_274.apk
OONI Probe (Open Observatory of Network Interference) is a network measurement tool developed by the Tor Project and independent researchers. It detects censorship, surveillance infrastructure, and network manipulation on your internet connection — telling you exactly what your ISP or government is blocking or tampering with.
- Website blocking detection — tests whether specific websites are blocked on your network
- Censorship measurement — detects DNS manipulation, HTTP blocking, TCP/IP blocking, and TLS interference
- Surveillance infrastructure detection — identifies middleboxes (equipment used for network surveillance)
- VPN and Tor reachability — tests whether Tor, VPNs, and circumvention tools are blocked
- Global network data — contributes your test results to OONI's public database, helping document censorship worldwide
- Runs automatic tests at scheduled intervals
- Completely open-source (Tor Project affiliated)
- Install from F-Droid using the link above (or search "OONI Probe" in F-Droid).
- Open OONI Probe → complete the onboarding (agree to data sharing terms — your test results are contributed to the public OONI database anonymously).
- Run immediate tests:
- Tap Run on the main dashboard
- OONI Probe runs the full test suite: websites, instant messaging, circumvention tools, middleboxes
- View results:
- Results appear under the Test Results tab
- Green checkmarks = no blocking detected
- Red X = blocking or manipulation detected
- Orange warning = anomaly (possible interference)
- Automated testing:
- Settings → Automated testing → Enable
- Set a schedule (e.g., daily at 3am on Wi-Fi only)
- Interpret results:
- If websites you expect to be accessible show as blocked → your ISP/government is censoring them → use InviZible Pro's Tor routing to bypass
- If circumvention tools (Tor, VPNs) show as blocked → use InviZible Pro's Tor bridge mode with obfs4 bridges (see OPSEC Step 2)
Understanding your threat environment is the first step in defending against it. OONI Probe tells you exactly what your network operator is doing to your traffic — whether you are in a heavily censored country or simply want to know if your ISP is silently blocking certain content.
App Store Name: InviZible Pro Download: pan.alexander.tordnscrypt.stable_26603.apk
(Full step-by-step setup in Part 2 — OPSEC Step 2)
InviZible Pro is the network privacy engine of the DresOS stack. It is a single application combining Tor, I2P, and DNSCrypt — running in proxy + root mode, which means it does not use the Android VPN slot and can run alongside DuckDuckGo App Tracking Protection simultaneously. It routes your traffic through Tor via Android's system proxy setting, giving every app that respects the system proxy a Tor exit node as its apparent IP address. Root access via Magisk lets it redirect all DNS at the iptables level — nothing bypasses DNSCrypt.
| Without InviZible Pro | With InviZible Pro |
|---|---|
| Orbot (Tor client — separate app) | Built-in Tor with isolation settings |
| Standalone DNSCrypt app | Built-in DNSCrypt with DNSSEC |
| Standalone I2P client | Built-in I2P with garlic routing |
| Plain-text DNS leaking to ISP | All DNS encrypted via iptables redirect |
| Real IP visible to websites | Tor exit node IP visible instead |
- Tor — three-hop onion routing for strong anonymity; circuit isolation per destination; obfs4 bridge support for censored networks
- I2P — independent garlic-routing network for I2P eepsites and a distinct anonymity model from Tor
- DNSCrypt — encrypts and authenticates all DNS queries via a local resolver on port 5354; prevents ISP-level domain surveillance
- DNSSEC — cryptographically validates every DNS response; blocks spoofed DNS answers
- Root / iptables DNS redirect — forces all device DNS (port 53 → 5354) through DNSCrypt at the kernel level; no app can bypass it
- Proxy mode — exposes Tor as HTTP proxy on
127.0.0.1:8118and SOCKS5 on127.0.0.1:9050; Android system proxy routes all compatible app traffic through Tor without touching the VPN slot - Start on boot — restores all services and iptables rules automatically after every reboot
- Works alongside DuckDuckGo App Tracking Protection (VPN slot is completely free)
(Full setup guide covering all 9 phases — proxy mode config, DNS server selection, Tor isolation settings, I2P bootstrap, root iptables activation, Android system proxy IP spoofing, DuckDuckGo ATP enablement, and verification — is in Part 2 — OPSEC Step 2.)
Download: F-Droid — dev.ukanth.ufirewall / GitHub
(Full setup and custom rules in Part 2 — OPSEC Step 3)
AFWall+ (Android Firewall+) is a root-level firewall that uses iptables — the Linux kernel's native packet filtering framework — to control internet access per app, per network interface. It operates at the kernel level, below all apps, VPNs, and proxy layers. An app cannot circumvent it by any means: iptables rules are enforced by the kernel before traffic ever reaches a network socket.
AFWall+ is a completely separate and complementary layer to InviZible Pro. InviZible Pro handles routing and anonymisation — AFWall+ handles access control. Together they give defence in depth: even if InviZible Pro's proxy routing is temporarily unavailable or an app ignores the system proxy, AFWall+ still enforces which apps are allowed to communicate at all.
- Per-app, per-interface rules — separately control Wi-Fi, mobile data, and VPN for every installed app
- Whitelist mode — default deny; only explicitly approved apps can reach the internet
- Custom iptables rules — write raw iptables rules for advanced control (e.g. mobile data proxy redirect to port 8118)
- Logging — logs every blocked connection attempt; reveals apps trying to phone home
- PIN lock — locks the firewall UI so no app or accidental tap can disable rules
- LAN control — optionally block apps from accessing your local network
- Works on any rooted Android device with Magisk; no VPN slot consumed
Every de-Googled phone still has apps that attempt to reach the internet — analytics libraries embedded in third-party APKs, microG service pings, update checkers, background sync services. InviZible Pro routes traffic anonymously but does not block apps from connecting. AFWall+ fills this gap: apps you have not explicitly approved cannot generate any network traffic at all. It also solves the mobile data proxy gap — Android's system proxy applies to Wi-Fi only, but AFWall+'s custom iptables rules can redirect HTTP/HTTPS traffic on mobile data interfaces through InviZible Pro's Tor proxy on port 8118 as well.
(Full configuration, recommended per-app rules table, and custom iptables rules for mobile data proxy routing are in Part 2 — OPSEC Step 3.)
Download: Metrolist.apk
Metrolist is a privacy-focused, modded YouTube Music client. It provides access to YouTube Music's full catalogue — including all your existing playlists and library if you have a YouTube Music account — without Google's tracking, advertising, or data collection.
- Ad-free YouTube Music — no pre-roll ads, no mid-song interruptions, no audio ads
- No tracking — Google Analytics, advertising identifiers, and telemetry calls are removed
- Background playback — music plays when the screen is off or when using other apps (normally requires a paid YouTube Music Premium subscription)
- Audio quality control — select specific bitrates and codec preferences
- Offline capability — cache songs locally for offline listening
- Account support — optionally log in with a YouTube/Google account to access your playlists and liked songs (note: if you log in, Google still knows what you are listening to — use without account for maximum privacy)
- Custom theme support, AMOLED dark mode
- Install via SAI from the direct APK link above.
- Open Metrolist.
- Without account (maximum privacy):
- Browse and search the full YouTube Music catalogue freely
- Your listening history is stored locally only
- With account (access your library):
- Tap the account icon → sign in via DuckDuckGo Privacy Browser with your Google account
- Your playlists, liked songs, and subscriptions will sync
- Understand that YouTube/Google will still log your listening activity server-side when you are logged in
- Background playback:
- Just minimize the app — music continues playing without needing any subscription
- Cache for offline listening:
- Long-press a song or playlist → Download → select audio quality
- Downloaded files are stored in your chosen directory (manage with Fossify Files or ZArchiver Pro)
Music streaming should not come with a surveillance apparatus. Metrolist gives you full access to YouTube Music's catalogue without surrendering your listening habits to Google's advertising engine.
Download: ArcaneChat-foss-arm64-v8a-2.43.0.apk
Arcane Chat is a fully decentralized, end-to-end encrypted messaging application built on the Delta Chat protocol, which uses email as the transport layer with OpenPGP end-to-end encryption. This means your messages are transmitted over email infrastructure — making them extremely difficult to block, and giving you full control of your identity (your email address) without depending on any centralized messaging server.
- End-to-end encryption via OpenPGP (Autocrypt standard) — messages are encrypted on your device before transmission and can only be decrypted by the recipient
- Decentralized — no central Arcane Chat server; messages route through standard email servers. There is no single point of failure or surveillance
- No phone number required — your identity is your email address (use your Tuta Mail address for full privacy)
- No metadata harvesting — unlike Signal, WhatsApp, or Telegram, there is no central server collecting who you talk to, when, or how frequently
- Censorship resistant — email infrastructure is nearly impossible to block globally; even in censored regions, email typically works
- Group chats, image/file sharing, voice messages
- Multiple accounts (use different email addresses for different contexts)
- FOSS (fully open-source), no ads, no tracking
- Install via SAI from the direct APK link above.
- Open Arcane Chat.
- Configure with Tuta Mail (recommended):
- Tap Add Account
- Enter your Tuta Mail address
- Arcane Chat will attempt auto-configuration; for Tuta you may need to enter IMAP/SMTP settings manually:
- IMAP server:
imap.tuta.com| Port:993| Security: TLS - SMTP server:
smtp.tuta.com| Port:465| Security: TLS
- IMAP server:
- Enter your Tuta password → Connect
- Start a conversation:
- Tap the + button → enter a contact's email address → write message → send
- If the recipient also uses Arcane Chat (or any Autocrypt-compatible app), messages are automatically end-to-end encrypted — look for the lock icon
- Verify encryption:
- Open a chat → tap the contact name → Encryption info
- Verify the displayed fingerprint matches your contact's (do this via a separate channel, e.g., in person or via phone call)
- Group chats:
- Tap + → New Group → add contacts by email → name the group → create
- Disappearing messages:
- Open a chat → Settings → Disappearing Messages → set a timer
Most encrypted messengers require you to trust a central server (Signal's servers, Telegram's servers, WhatsApp/Meta's servers). Arcane Chat removes this trust requirement entirely — your messages flow over email infrastructure you choose, encrypted with OpenPGP that only you and your recipient hold keys for. Using it with Tuta Mail combines the strongest available email privacy with the strongest available decentralized messaging protocol.
Download: Install via F-Droid — search "Aurora Store" or go to https://f-droid.org/packages/com.aurora.store/
Aurora Store is an open-source, unofficial Google Play Store client that lets you browse, download, and update apps from Google's Play catalogue without a Google account and without any Google Play Services telemetry. It is a full Google Play replacement with complete anonymity.
- Anonymous mode — browse and download apps using randomly generated anonymous credentials. Google sees an anonymous device, not your account.
- No Google account login required
- Full Play Store catalogue access — any app available on Google Play can be downloaded
- App update management — check for updates for all Play-sourced apps
- Exodus Privacy integration — shows you a detailed tracker and permission report for every app before you install it
- Block automatic app updates for specific apps
- Spoofed device profile — can present as a different Android device to access region-locked apps
- No ads, no telemetry, zero Google components in the Aurora app itself
- Install via F-Droid.
- Open Aurora Store → select Anonymous mode during setup. Do not log in with a Google account.
- Browse, search, and install apps exactly as you would on the Play Store.
- Before installing any app, check its tracker report:
- Tap the app → scroll down to Privacy → check the Exodus Privacy report
- Apps with many trackers (advertising, analytics, fingerprinting) should be avoided or replaced with FOSS alternatives
- Manage updates:
- Aurora Store → Updates tab → review available updates
- Update FOSS apps via F-Droid instead (F-Droid verifies signatures; Aurora Store does not independently verify)
Completely removing Play Store access is impractical for many users — some apps (banking, 2FA, essential services) only exist on Google Play. Aurora Store provides access to this catalogue without surrendering your identity or using Google Play Services. The Exodus Privacy integration helps you make informed decisions about which apps are safe to install.
Download: All via F-Droid — search each app name or visit fossify.org/apps
Fossify is a suite of open-source replacements for every core Android system app that Google ships with proprietary, tracking-laden stock versions. Together, the Fossify suite replaces the entire Google-provided app layer with fully open-source, zero-telemetry equivalents.
| App | Replaces | Features |
|---|---|---|
| Fossify Phone | Google/Stock Dialer | Open-source dialer, call blocking, call recording (where legal), no analytics |
| Fossify Messages | Google Messages | Open-source SMS/MMS, no Google RCS, no message scanning |
| Fossify Files | Files by Google | Local file manager, no cloud sync, no Google One integration |
| Fossify Gallery | Google Photos | Local gallery, no cloud backup to Google, no AI face scanning |
| Fossify Calendar | Google Calendar | Local calendar, optional CalDAV sync with your own server |
| Fossify Launcher | Pixel Launcher | Open-source home screen, no Google Feed integration |
| Fossify Contacts | Google Contacts | Local contacts, no sync to Google's servers |
| Fossify Music | YouTube Music / Play Music | Fully local music player, supports all common audio formats |
| Fossify Clock | Google Clock | Alarm, timer, stopwatch — zero telemetry |
| Fossify Notes | Google Keep | Local encrypted notes, no cloud sync |
- Install all Fossify apps via F-Droid (search individually or visit the Fossify F-Droid page).
- Set each as the default for its function in Settings → Apps → Default apps.
- Transfer your data:
- Contacts: Export from old app as
.vcf→ import into Fossify Contacts - Calendar: Export as
.ics→ import into Fossify Calendar - Photos: Already on your storage — open with Fossify Gallery
- Music: Already on your storage — open with Fossify Music
- Contacts: Export from old app as
Every stock Google app (Dialer, Messages, Files, Gallery, Calendar) contains telemetry that reports usage data, contact metadata, and behavioral information back to Google's servers. Fossify apps are clean replacements with identical functionality and zero reporting.
Download: F-Droid — search "HeliBoard" or visit https://f-droid.org/packages/helium314.keyboard/
HeliBoard is a fully open-source, completely offline keyboard for Android. It is a direct replacement for Google's Gboard, which is one of the most invasive data-collection tools on Android — it can capture everything you type (passwords, messages, searches) and transmit it to Google's servers for "personalization" and other undisclosed purposes.
- Completely offline — zero network access, zero data transmission
- Full multilingual support with offline dictionaries
- Swipe typing (gesture input)
- Auto-correction and predictive text (fully local)
- Customizable themes, layouts, and key sizes
- Voice input support via local speech-to-text (no cloud)
- No analytics, no crash reporting, no permissions beyond keyboard input
- Actively developed and maintained
- Install via F-Droid.
- Open HeliBoard → follow the setup wizard to enable it as a system keyboard.
- Go to Settings → General management → Keyboard list and default → select HeliBoard.
- Disable Gboard (or remove it during the debloating step).
- Download offline language dictionaries for your languages within HeliBoard settings.
Download: F-Droid — https://f-droid.org/packages/de.tutao.tutanota/
(Full setup in Part 2 — OPSEC Step 3)
Tuta Mail (formerly Tutanota) is an end-to-end encrypted email service operated by a German company under German and EU privacy law. It is a full Gmail replacement with zero data mining, zero ads, and full content encryption.
- End-to-end encryption for all emails (both subject and body, not just body like most providers)
- Zero-knowledge — Tuta cannot read your emails; they are encrypted before leaving your device
- Encrypted contacts and calendar included in the free plan
- Encrypted search (searches happen locally on your device, never on the server)
- Email aliases for compartmentalization (use different aliases for different purposes)
- Secure external email (password-protected messages to non-Tuta recipients)
- German/EU jurisdiction — GDPR compliance, no US FISA court exposure
- Free plan available; paid plans add more aliases and storage
- Fully open-source client (iOS and Android)
Download: F-Droid — https://f-droid.org/packages/com.duckduckgo.mobile.android/
DuckDuckGo Privacy Browser is a privacy-focused web browser with built-in tracker blocking, a private search engine as default, a one-tap Fire Button to wipe all browsing data, a built-in password manager, and Duck Address email protection. It is the primary browser in the DresOS setup, replacing Chrome entirely.
- Private search by default — DuckDuckGo search engine, no user profiles, no search history tracking
- Tracker blocking — blocks known advertising and analytics trackers on every page
- HTTPS upgrading — automatically upgrades connections to HTTPS where available
- Fire Button — one tap destroys all tabs, cookies, and browsing history instantly
- Cookie pop-up management — automatically handles GDPR cookie banners
- Duck Address / Email Protection — generates private
@duck.comforwarding aliases; strips trackers from forwarded emails before they reach your Tuta inbox; no phone number required, just your encryption key - Built-in password manager — stores encrypted passwords locally; auto-generates strong unique passwords when you create accounts on websites
- GPC (Global Privacy Control) — broadcasts a legal opt-out signal to websites
- No Google account required, no telemetry
DuckDuckGo's App Tracking Protection monitors tracker activity inside all other apps on your phone using the Android VPN slot. Enable this feature. InviZible Pro runs in proxy + root mode and does not use the Android VPN slot at all — there is zero conflict. Both run simultaneously and independently:
- InviZible Pro (proxy + iptables) → handles network-level anonymity: Tor IP routing, DNSCrypt, I2P
- DuckDuckGo App Tracking Protection (VPN slot) → handles app-layer tracker blocking: stops trackers inside installed apps from phoning home
You get both layers active at the same time, which is the full DresOS defensive stack.
- Install via F-Droid.
- Open DuckDuckGo → complete onboarding.
- When it asks about App Tracking Protection → Enable it. Android will prompt you to allow a VPN connection for DuckDuckGo — tap OK. InviZible Pro uses proxy + root mode and does not occupy the VPN slot, so there is no conflict.
- Set as default browser: Settings → Apps → Default apps → Browser → DuckDuckGo.
Setting up Duck Address (Email Protection):
- Tap ≡ menu → Settings → Email Protection → Get Started.
- When prompted for a forwarding address, enter your Tuta Mail address.
- You will receive a
@duck.comalias. No phone number required — your account is secured with an encryption key only. Write that key down and store it safely alongside your Tuta recovery code. - From now on, use your Duck Address (or auto-generated per-site aliases) for every sign-up on every app and website — see full setup guide in OPSEC Step 4.
Using the built-in password manager:
- When you create an account on any website, DuckDuckGo will automatically suggest a strong generated password in the password field — tap to accept.
- The password is saved to DuckDuckGo's encrypted on-device storage automatically.
- Next time you visit that site, DuckDuckGo autofills both your Duck Address alias and your saved password — you never have to remember or type either one.
- Use IYPS (App #2) to analyse the strength of any older passwords you want to check before migrating them.
Fire Button:
- Tap the flame icon at any time to wipe all tabs, cookies, and browsing history instantly — useful before handing your phone to someone or when switching contexts.
Download: AXP.OS F-Droid repo (see Step 7) or codeberg.org/AXP-OS/app_aosmium/releases
(Full setup and activation in Part 1 — Step 7)
AOSmium is the System WebView replacement in the DresOS stack — not a browser you open directly. Built by the AXP.OS Project, it is a Chromium fork built on Mulch (Divested Computing Group) with GrapheneOS/Vanadium security patches, minimized Google anti-features, and privacy hardening throughout.
The Android System WebView is used by hundreds of apps whenever they need to render web content inside themselves — social media apps, news apps, email clients, microG sign-in pages, shopping apps, and more. By replacing it with AOSmium, all of that embedded web content is rendered through a privacy-hardened, Google-free engine rather than Google's stock WebView.
DuckDuckGo Privacy Browser is your everyday browser. AOSmium runs silently in the background as the engine powering web content in every other app.
- Chromium-based with Vanadium (GrapheneOS) security patches
- Fork of Mulch (Divested Computing Group)
- Google anti-features minimized throughout
- Auto-updates via AXP.OS F-Droid repository
- Hardens web content rendering for every app on the device, not just the browser
Tested and confirmed working for the full DeGoogling + OPSEC stack:
- Motorola Moto G32 (custom TWRP recovery available on DresOS GitHub profile)
- Motorola Moto G7 Plus
- Samsung Galaxy A05s
If this works on your device, please report it with proof to the DresOS team so we can add it to the official compatibility list. Include: device model, Android version, TWRP version used, and which steps you completed.
Device-specific debloat lists and flashable ZIPs are available for the above devices. Drop your exact model in the Issues tab and the DresOS team will add a custom guide or resource for your device.
- Website: https://dresoperatingsystems.github.io/
- Issues & Device Requests: Use the GitHub Issues tab on this repository
MIT License — see LICENSE file.
You now have a 100% de-Googled, cyber secure Android device — no Google apps, no Google Services, AOSmium (or Vanadium) system WebView, Tor + I2P + DNSCrypt via InviZible Pro proxy + root mode, root-level iptables firewall via AFWall+, app-layer tracker blocking via DuckDuckGo App Tracking Protection, and a complete defensive security app suite. Every tool is open-source, every APK is sourced directly from verified developers, and every component is designed to give you full control of your own device, your own data, and your own privacy.
This is an update to both the degoogled and opsec project
Below you can find the wallpapers for the DresOS system (we will add more as we make more)





