mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-07-24 12:21:09 +00:00
Revamping the Android section (#390)
Co-authored-by: Daniel Nathan Gray <dng@disroot.org> Signed-off-by: Freddy <freddy@decypher.pw>
This commit is contained in:
24
_data/operating-systems/android-applications/1_orbot.yml
Normal file
24
_data/operating-systems/android-applications/1_orbot.yml
Normal file
@@ -0,0 +1,24 @@
|
||||
title: Orbot
|
||||
type: Recommendation
|
||||
logo: /assets/img/android/orbot.svg
|
||||
description: |
|
||||
<strong>Orbot</strong> is a free proxy app that routes your connections through the Tor Network.
|
||||
|
||||
Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using the <a href="https://developer.android.com/reference/android/net/VpnService">VpnService</a> and can be used with the VPN killswitch (⚙️ Settings → Network & internet → VPN → ⚙️ → Block connections without VPN).
|
||||
|
||||
For resistance against traffic analysis attacks, consider enabling <em>Isolate Destination Address</em> ( ⁝ →Settings → Connectivity). This will use a completely different Tor Circuit (different middle relay and exit nodes) for every domain you connect to.
|
||||
|
||||
<h4>Notes</h4>
|
||||
Orbot is often outdated on the Guardian Project's <a href="https://guardianproject.info/fdroid">F-Droid repository</a> and <a href="https://play.google.com/store/apps/details?id=org.torproject.android">Google Play</a> so consider downloading directly from the <a href="https://github.com/guardianproject/orbot">GitHub repository</a> instead.
|
||||
|
||||
All versions are signed using the same signature so they should be compatible with each other.
|
||||
website: 'https://guardianproject.info/apps/org.torproject.android'
|
||||
downloads:
|
||||
- icon: fab fa-android
|
||||
url: 'https://guardianproject.info/fdroid'
|
||||
- icon: fab fa-google-play
|
||||
url: 'https://play.google.com/store/apps/details?id=org.torproject.android'
|
||||
- icon: fab fa-github
|
||||
url: 'https://github.com/guardianproject/orbot'
|
||||
- icon: fab fa-gitlab
|
||||
url: 'https://gitlab.com/guardianproject/orbot'
|
20
_data/operating-systems/android-applications/2_shelter.yml
Normal file
20
_data/operating-systems/android-applications/2_shelter.yml
Normal file
@@ -0,0 +1,20 @@
|
||||
title: Shelter
|
||||
type: Recommendation
|
||||
logo: /assets/img/android/shelter.svg
|
||||
description: |
|
||||
<strong>Shelter</strong> is an app that helps you leverage the Android work profile to isolate other apps.
|
||||
|
||||
Shelter supports blocking contact search cross profiles and sharing files across profiles via the default file manager (<a href="https://source.android.com/devices/architecture/modular-system/documentsui">DocumentsUI</a>).
|
||||
|
||||
<h4>Notes</h4>
|
||||
CalyxOS includes a device controller so we recommend using their built in work profile instead.
|
||||
website: 'https://gitea.angry.im/PeterCxy/Shelter'
|
||||
downloads:
|
||||
- icon: fab fa-android
|
||||
url: 'https://f-droid.org/en/packages/net.typeblog.shelter'
|
||||
- icon: fab fa-google-play
|
||||
url: 'https://play.google.com/store/apps/details?id=net.typeblog.shelter'
|
||||
- icon: fab fa-github
|
||||
url: 'https://github.com/PeterCxy/Shelter'
|
||||
- icon: fab fa-git
|
||||
url: 'https://gitea.angry.im/PeterCxy/Shelter'
|
26
_data/operating-systems/android-applications/3_auditor.yml
Normal file
26
_data/operating-systems/android-applications/3_auditor.yml
Normal file
@@ -0,0 +1,26 @@
|
||||
title: Auditor
|
||||
type: Recommendation
|
||||
logo: /assets/img/android/auditor.svg
|
||||
description: |
|
||||
<strong>Auditor</strong> is an app which leverages hardware security features to provide device integrity monitoring for <a href="https://attestation.app/about#device-support">supported devices</a>. It currently works with GrapheneOS and the stock operating system. It performs attestation and intrusion detection by:
|
||||
<ul>
|
||||
<li>Using a <a href="https://en.wikipedia.org/wiki/Trust_on_first_use">Trust On First Use (TOFU)</a> model between an <em>auditor</em> and <em>auditee</em>, the pair establish a private key in the <a href="https://source.android.com/security/keystore/">hardware-backed keystore</a> of the <em>Auditor</em>.</li>
|
||||
<li>The <em>auditor</em> can either be another instance of the Auditor app or the <a href="https://attestation.app">Remote Attestation Service</a>.</li>
|
||||
<li>The <em>auditor</em> records the current state and configuration of the <em>auditee</em>.</li>
|
||||
<li>Should tampering with the operating system of the <em>auditee</em> after the pairing is complete, the auditor will be aware of the change in the device state and configurations.</li>
|
||||
<li>The user will be alerted to the change.</li>
|
||||
</ul>
|
||||
|
||||
No personally identifiable information is submitted to the attestation service. We do still recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring.
|
||||
|
||||
If your <a href="/threat-modeling/">threat model</a> requires complete anonymity you could consider using Orbot or a VPN to hide your IP address from the attestation service.
|
||||
|
||||
To make sure that your hardware and operating system is genuine, <a href="https://grapheneos.org/install/web#verifying-installation">perform local attestation</a> immediately after the device has been installed and prior to any internet connection.
|
||||
|
||||
website: 'https://attestation.app'
|
||||
privacy_policy: 'https://attestation.app/privacy-policy'
|
||||
downloads:
|
||||
- icon: fab fa-google-play
|
||||
url: 'https://play.google.com/store/apps/details?id=app.attestation.auditor'
|
||||
- icon: fab fa-github
|
||||
url: 'https://github.com/GrapheneOS/Auditor'
|
Reference in New Issue
Block a user