mirror of
				https://github.com/privacyguides/privacyguides.org.git
				synced 2025-10-31 11:36:36 +00:00 
			
		
		
		
	Revamping the Android section (#390)
Co-authored-by: Daniel Nathan Gray <dng@disroot.org> Signed-off-by: Freddy <freddy@decypher.pw>
This commit is contained in:
		
							
								
								
									
										24
									
								
								_data/operating-systems/android-applications/1_orbot.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								_data/operating-systems/android-applications/1_orbot.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,24 @@ | ||||
| title: Orbot | ||||
| type: Recommendation | ||||
| logo: /assets/img/android/orbot.svg | ||||
| description: | | ||||
|   <strong>Orbot</strong> is a free proxy app that routes your connections through the Tor Network. | ||||
|  | ||||
|   Orbot can proxy individual apps if they support SOCKS or HTTP proxying. It can also proxy all your network connections using the <a href="https://developer.android.com/reference/android/net/VpnService">VpnService</a> and can be used with the VPN killswitch (⚙️ Settings → Network & internet → VPN → ⚙️ → Block connections without VPN). | ||||
|  | ||||
|   For resistance against traffic analysis attacks, consider enabling <em>Isolate Destination Address</em> ( ⁝ →Settings → Connectivity). This will use a completely different Tor Circuit (different middle relay and exit nodes) for every domain you connect to. | ||||
|  | ||||
|   <h4>Notes</h4> | ||||
|   Orbot is often outdated on the Guardian Project's <a href="https://guardianproject.info/fdroid">F-Droid repository</a> and <a href="https://play.google.com/store/apps/details?id=org.torproject.android">Google Play</a> so consider downloading directly from the <a href="https://github.com/guardianproject/orbot">GitHub repository</a> instead. | ||||
|  | ||||
|   All versions are signed using the same signature so they should be compatible with each other. | ||||
| website: 'https://guardianproject.info/apps/org.torproject.android' | ||||
| downloads: | ||||
|   - icon: fab fa-android | ||||
|     url: 'https://guardianproject.info/fdroid' | ||||
|   - icon: fab fa-google-play | ||||
|     url: 'https://play.google.com/store/apps/details?id=org.torproject.android' | ||||
|   - icon: fab fa-github | ||||
|     url: 'https://github.com/guardianproject/orbot' | ||||
|   - icon: fab fa-gitlab | ||||
|     url: 'https://gitlab.com/guardianproject/orbot' | ||||
							
								
								
									
										20
									
								
								_data/operating-systems/android-applications/2_shelter.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								_data/operating-systems/android-applications/2_shelter.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,20 @@ | ||||
| title: Shelter | ||||
| type: Recommendation | ||||
| logo: /assets/img/android/shelter.svg | ||||
| description: | | ||||
|   <strong>Shelter</strong> is an app that helps you leverage the Android work profile to isolate other apps. | ||||
|  | ||||
|   Shelter supports blocking contact search cross profiles and sharing files across profiles via the default file manager (<a href="https://source.android.com/devices/architecture/modular-system/documentsui">DocumentsUI</a>). | ||||
|  | ||||
|   <h4>Notes</h4> | ||||
|   CalyxOS includes a device controller so we recommend using their built in work profile instead. | ||||
| website: 'https://gitea.angry.im/PeterCxy/Shelter' | ||||
| downloads: | ||||
|   - icon: fab fa-android | ||||
|     url: 'https://f-droid.org/en/packages/net.typeblog.shelter' | ||||
|   - icon: fab fa-google-play | ||||
|     url: 'https://play.google.com/store/apps/details?id=net.typeblog.shelter' | ||||
|   - icon: fab fa-github | ||||
|     url: 'https://github.com/PeterCxy/Shelter' | ||||
|   - icon: fab fa-git | ||||
|     url: 'https://gitea.angry.im/PeterCxy/Shelter' | ||||
							
								
								
									
										26
									
								
								_data/operating-systems/android-applications/3_auditor.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								_data/operating-systems/android-applications/3_auditor.yml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,26 @@ | ||||
| title: Auditor | ||||
| type: Recommendation | ||||
| logo: /assets/img/android/auditor.svg | ||||
| description: | | ||||
|   <strong>Auditor</strong> is an app which leverages hardware security features to provide device integrity monitoring for <a href="https://attestation.app/about#device-support">supported devices</a>. It currently works with GrapheneOS and the stock operating system. It performs attestation and intrusion detection by: | ||||
|   <ul> | ||||
|     <li>Using a <a href="https://en.wikipedia.org/wiki/Trust_on_first_use">Trust On First Use (TOFU)</a> model between an <em>auditor</em> and <em>auditee</em>, the pair establish a private key in the <a href="https://source.android.com/security/keystore/">hardware-backed keystore</a> of the <em>Auditor</em>.</li> | ||||
|     <li>The <em>auditor</em> can either be another instance of the Auditor app or the <a href="https://attestation.app">Remote Attestation Service</a>.</li> | ||||
|     <li>The <em>auditor</em> records the current state and configuration of the <em>auditee</em>.</li> | ||||
|     <li>Should tampering with the operating system of the <em>auditee</em> after the pairing is complete, the auditor will be aware of the change in the device state and configurations.</li> | ||||
|     <li>The user will be alerted to the change.</li> | ||||
|   </ul> | ||||
|  | ||||
|   No personally identifiable information is submitted to the attestation service. We do still recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring. | ||||
|  | ||||
|   If your <a href="/threat-modeling/">threat model</a> requires complete anonymity you could consider using Orbot or a VPN to hide your IP address from the attestation service. | ||||
|  | ||||
|   To make sure that your hardware and operating system is genuine, <a href="https://grapheneos.org/install/web#verifying-installation">perform local attestation</a> immediately after the device has been installed and prior to any internet connection. | ||||
|  | ||||
| website: 'https://attestation.app' | ||||
| privacy_policy: 'https://attestation.app/privacy-policy' | ||||
| downloads: | ||||
|   - icon: fab fa-google-play | ||||
|     url: 'https://play.google.com/store/apps/details?id=app.attestation.auditor' | ||||
|   - icon: fab fa-github | ||||
|     url: 'https://github.com/GrapheneOS/Auditor' | ||||
		Reference in New Issue
	
	Block a user
	 Tommy
					Tommy