Become A VIP Member Today! Apply Now

Zero Trace Phone Apps & Features

Configured To Keep You Anonymous At All Times

Important Disclaimer

This application/feature overview is a brief blueprint of the Zero Trace Phone’s overall functionalities. There are additional features and native applications that are not publicly listed to minimize possible attack vectors from being disclosed to entities against privacy. All features and tutorials are accessible post-purchase within the Zero Trace VIP Portal.

We reserve the right to deny and cancel/refund any purchase we believe to be in bad faith and against the company’s mission.

Security & Encryption

  • KeyPassDX
  • PGP Key
  • Sandbox
  • Storage Scopes
  • Secure Fingerprint
  • User Profiles
  • Auditor

Multi-format KeePass password manager, the app allows saving and using passwords, keys and digital identities in a secure way, by integrating the Android design standards.

– Create database files / entries and groups.
– Support for .kdb and .kdbx files (version 1 to 4) with AES – Twofish – ChaCha20 – Argon2 algorithm.
– Compatible with the majority of alternative programs (KeePass, KeePassX, KeePassXC, …).
– Allows opening and copying URI / URL fields quickly.
– Biometric recognition for fast unlocking (fingerprint / face unlock / …).
– One-time password management (HOTP / TOTP) for two-factor authentication (2FA).
– Material design with themes.
– Auto-Fill and integration.
– Field filling keyboard.
– History of each entry.
– Precise management of settings.
– Code written in native languages (Kotlin / Java / JNI / C).

World-Class Encryption Passwords are protected with advanced end-to-end encryption (AES-256 bit, salted hashtag, and PBKDF2 SHA-256) so your data stays secure and private.

Built-in Password Generator Create long, complex, and distinct passwords for every site you visit.

PGP Key helps you communicate more privately and securely. It uses encryption to ensure that your messages can be read only by the people you send them to, others can send you messages that only you can read, and these messages can be digitally signed so the people getting them are sure who sent them. PGP Key is based on the well established OpenPGP standard making encryption compatible across your devices and systems. 

Modern encryption is based on digital “keys”. PGP Key stores and manages your keys, and those of the people you communicate with, on your Android smartphone. It also helps you find others’ keys online, and exchange keys. But its most frequent use is in using those keys to encrypt and decrypt messages.

★ Integration with other Apps:
• K-9 Mail
• Conversations
• and many more…

★ Open Source: PGP Key is designed to be trustworthy. It’s open source with no secrets; anyone can examine and validate every bit of it 

★ Independent Security Audit: The auditing company Cure53 performed an intensive security audit of PGP Key. The security experts summarize their final result with "[…] none of the spotted issues were considered to be of a critical severity in terms of security implications. The latter is a significant and impressive result for an app of this complexity and relevance."

★ Permissions: Anyone can validate that the permissions are indeed only required for the listed features.
• In-app purchases: Donate to the developers
• Identity: Pre-fill name and email addresses
• Contacts: Connect keys to your contacts (only offline)
• Photos/Media/Files: Import/export keys from SD card
• Camera: Scan QR Codes to add other people's keys
• Others: Internet permission to retrieve keys, NFC permission to use YubiKeys

The Zero Trace Phone improves the app sandbox by hardening SELinux policy and seccomp-bpf policy along with all the hardening to components like kernel implementing the app sandbox and providing a path for the attacker to escape it if they can exploit those components. We primarily focus on the app sandbox, but we also improve the other sandboxes including making direct improvements to the web browser renderer sandbox used for both the default browser and WebView rendering engine provided by the OS and used by a huge number of other apps from dedicated browsers to messaging apps.

The Zero Trace Phone has a compatibility layer providing the option to install and use the official releases of Google Play in the standard app sandbox. Google Play receives absolutely no special access or privileges on the Zero Trace Phoneas opposed to bypassing the app sandbox and receiving a massive amount of highly privileged access. Instead, the compatibility layer teaches it how to work within the full app sandbox. It also isn't used as a backend for the OS services as it would be elsewhere since the Zero Trace Phone doesn't use Google Play even when it's set up.

Since the Google Play apps are simply regular apps on the Zero Trace Phone, you install them within a specific user or work profile and they're only available within that profile. Only apps within the same profile can use it and they need to explicitly choose to use it. It works the same way as any other app and has no special capabilities. As with any other app, it can't access data of other apps and requires explicit user consent to gain access to profile data or the standard permissions. Apps within the same profile can communicate with mutual consent and it's no different for sandboxed Google Play.

Sandboxed Google Play is close to being fully functional and provides near complete compatibility with the app ecosystem depending on Google Play. Only a small subset of privileged functionality which we haven't yet ported to different approaches with our compatibility layer is unavailable. Some functionality is inherently privileged and can't be provided as part of the compatibility layer.

The vast majority of Play services functionality works perfectly including dynamically downloaded / updated modules (dynamite modules) and functionality provided by modular app components such as Google Play Games. By default, location requests are rerouted to a reimplementation of the Play geolocation service provided by the Zero Trace Phone. You can disable rerouting and use the standard Play services geolocation service instead if you want the Google network location service and related features.

Our compatibility layer includes full support for the Play Store. Play Store services are fully available including in-app purchases, Play Asset Delivery, Play Feature Delivery and app / content license checks. It can install, update and uninstall apps with the standard approach requiring that the user authorizes it as an app source and consents to each action. It will use the standard Android 12+ unattended update feature to do automatic updates for apps where it was the last installer.

The Zero Trace Phone provides Storage Scopes as a fully compatible alternative to the standard Android storage permissions. Instead of granting storage permissions, users can enable Storage Scopes to grant the requested permissions in a highly restricted mode where the app can create files/directories in the user’s home directory but can only access the files it has created itself. Users can then optionally add files and directories as storage scopes to permit the app to access files created by other apps.

Enabling Storage Scopes makes the app assume that is has all of storage permissions that were requested by it, despite not actually having any of them. This means that the app can’t see any of the files that were created by other apps. The app is still allowed to create files and directories, same as any other modern app that doesn’t have any storage access permission.

Optionally, users can specify which of the files created by other apps the app can access. Access can be granted to a specific file or to all files in a directory. 

The Zero Trace Phone improves the security of the fingerprint unlock feature by only permitting 5 total attempts rather than implementing a 30 second delay between every 5 failed attempts with a total of 20 attempts. This doesn’t just reduce the number of potential attempts but also makes it easy to disable fingerprint unlock by intentionally failing to unlock 5 times with a different finger.


The Zero Trace Phone also adds support for using the fingerprint scanner only for authentication in apps and unlocking hardware keystore keys by toggling off support for unlocking. This feature already existed for the standard Android face unlock feature.

Android's user profiles are isolated workspaces with their own instances of apps, app data and profile data (contacts, media store, home directory, etc.). Apps can't see the apps in other user profiles and can only communicate with apps within the same user profile (with mutual consent with the other app). Each user profile has their own encryption keys based on their lock method. They're a great fit for the Zero Trace Phone with a lot of room for improvement.

The Zero Trace Phone provides improvements to user profile functionality and is working on further improvements to make switching between them and monitoring other profiles much more convenient.

More user profiles

The Zero Trace Phone raises the limit on the number of secondary user profiles to 32 (31 + guest) instead of only 4 (3 + guest) to make this feature much more flexible.

End session

The Zero Trace Phone also enables support for logging out of user profiles without needing a device manager controlling the device to use this feature. Logging out makes profiles inactive so none of the apps installed in them can run. It also purges the disk encryption keys from memory and hardware registers, putting the user profile back at rest.

Disabling app installation

The Zero Trace Phone adds a toggle to the user management settings for disabling secondary user app installation. You can install the apps you want to be usable in a secondary user and then disable the ability to install more apps as that user in the Owner profile. Android supports this as a standard device management feature but doesn't make it available to a user who owns their own device.

Notification forwarding

The Zero Trace Phone supports forwarding notifications from users running in the background to the currently active user. Forwarding notifications to other users is disabled by default and can be enabled within each user profile where forwarding to the active profile is wanted. Notifications forwarded from other profiles are displayed by default in a standard local notification channel.

The Auditor app uses hardware-based security features to validate the identity of a device along with authenticity and integrity of the operating system. It will verify that the device is running the stock operating system with the bootloader locked and that no tampering with the operating system has occurred. A downgrade to a previous version will also be detected. It builds upon the hardware-based verification of the operating system by chaining verification to the app to perform software-based sanity checks and gather additional information about device state and configuration beyond what the hardware can attest to directly.

The foundation of the Auditor app is generating a persistent key in the hardware-backed keystore for verifying the identity of the device and providing assurance that the operating system hasn't been tampered with or downgraded via verified boot. It performs a pairing process between the device performing verification (Auditor) and the device being verified (Auditee) to implement a Trust On First Use (TOFU) model. The device performing verification can either be another Android device running the app in the Auditor mode.

Verified boot validates the integrity and authenticity of firmware and the entire operating system (both the kernel and userspace) from an immutable hardware root of trust. The results are passed along to the hardware-backed keystore and used to protect the keys.


  • Element
  • K-9 Mail
  • iMessage

Element is both a secure messenger and a productivity team collaboration app that is ideal for group chats while remote working. This chat app uses end-to-end encryption to provide powerful video conferencing, file sharing and voice calls.

Element’s features include:
– Advanced online communication tools
– Fully encrypted messages to allow safer corporate communication, even for remote workers
– Decentralized chat based on the Matrix open source framework
– File sharing securely with encrypted data while managing projects
– Video chats with Voice over IP and screen sharing
– Easy integration with your favourite online collaboration tools, project management tools, VoIP services and other team messaging apps

Element is completely different from other messaging and collaboration apps. It operates on Matrix, an open network for secure messaging and decentralized communication. It allows self-hosting to give users maximum ownership and control of their data and messages.

Privacy and encrypted messaging
Element protects you from unwanted ads, data mining and walled gardens. It also secures all your data, one-to-one video and voice communication through end-to-end encryption and cross-signed device verification.

Element gives you control over your privacy while allowing you to communicate securely with anyone on the Matrix network, or other business collaboration tools by integrating with apps such as Slack.

Element can be self-hosted
To allow more control of your sensitive data and conversations, Element can be self-hosted or you can choose any Matrix-based host – the standard for open source, decentralized communication. Element gives you privacy, security compliance and integration flexibility.

Own your data
You decide where to keep your data and messages. Without the risk of data mining or access from third parties.

Element puts you in control in different ways:
1. Get a free account on the public server hosted by the Matrix developers, or choose from thousands of public servers hosted by volunteers
2. Self-host your account by running a server on your own IT infrastructure
3. Sign up for an account on a custom server by simply subscribing to the Element Matrix Services hosting platform

Open messaging and collaboration
You can chat with anyone on the Matrix network, whether they’re using Element, another Matrix app or even if they are using a different messaging app.

Super secure
Real end-to-end encryption (only those in the conversation can decrypt messages), and cross-signed device verification.

Complete communication and integration
Messaging, voice and video calls, file sharing, screen sharing and a whole bunch of integrations, bots and widgets. Build rooms, communities, stay in touch and get things done.

Pick up where you left off
Stay in touch wherever you are with fully synchronized message history across all your devices and on the web at

Open source
Element Android is an open source project, hosted by GitHub. Please report bugs and/or contribute to its development at

K-9 Mail is an open source email client that works with basically every email provider.


* supports multiple accounts
* Unified Inbox
* privacy-friendly (no tracking whatsoever, only connects to your email provider)
* automatic background synchronization or push notifications
* local and server-side search
* OpenPGP email encryption (PGP/MIME)

Install the app "OpenKeychain: Easy PGP" to encrypt/decrypt your emails using OpenPGP.

Apple’s messaging network has gained a lot of popularity in recent years, though it has long been locked down to its platforms. But now, iMessage (APK) makes it easy to send and receive messages to your friends and family through group chats, images, videos, and audio messages!

– Send and receive messages using Apple’s messaging network
– Chat together with your friends in groups
– Share images, videos, documents and more
– Enjoy a clean, beautiful messaging experience

Please note that a Mac computer is required to use this app.


This version of iMessage for Android excludes certain features found in the mainstram release, such as Sign-In with Google and location attachements.


  • Tor Browser
  • Mac Address Spoofer
  • Zurf

Tor Browser for Android is the only official mobile browser supported by the Tor Project, developers of the world’s strongest tool for privacy and freedom online.

Tor Browser isolates each website you visit so third-party trackers and ads can’t follow you. Any cookies automatically clear when you’re done browsing.

Tor Browser prevents someone watching your connection from knowing what websites you visit. All anyone monitoring your browsing habits can see is that you’re using Tor.

Tor aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information.

When you use Tor Browser for Android, your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays. Watch this animation to learn more about how it works:

With Tor Browser for Android, you are free to access sites your local internet service provider may have blocked.

The Zero Trace Phone supports per-connection MAC randomization and enables it by default. This is a more private approach than the standard persistent per-network random MAC used by modern Android.   When the per-connection MAC randomization added by Zero Trace is being used, DHCP client state is flushed before reconnecting to a network to avoid revealing that it's likely the same device as before.  

The Zero Trace Phone also applies fixes for serious flaws with the Linux kernel IPv6 privacy address implementation which allow using it as an identifier not just for connections to the same network but also across different networks.   

Wi-Fi on the Zero Trace Phone is very privacy-friendly and is essentially anonymous as long as apps do not leak uniquely identifying information to the network. The Zero Trace Phone avoids allowing itself to be fingerprinted as a privacy-modified smartphone,  


MAC randomization is always performed for Wi-Fi scanning. Zero Trace Phones have firmware support for scanning MAC randomization going significantly beyond a naive implementation. On many other devices, there are identifiers exposed by Wi-Fi scanning beyond the MAC address such as the packet sequence number and assorted identifying information in the probe requests.

Avoid using hidden APs (i.e. APs not broadcasting their SSID) since all known hidden SSIDs end up being broadcast as part of scanning for networks to find them again. SSIDs are not broadcast for standard non-hidden APs. Hidden APs are only hidden when no devices are connected. It makes little sense as a privacy feature, especially for a non-mobile AP where knowing the AP exists can't be used for tracking it since it doesn't move. The feature reduces your privacy rather than increasing it. If you need to use a hidden AP, make sure to delete the saved network afterward.

Wi-Fi and Bluetooth scanning for improving location detection are disabled by default, unlike the regular Android. These can be toggled in Settings ➔ Location ➔ Location Services ➔ Wi-Fi and Bluetooth scanning. These features enable scanning even when Wi-Fi or Bluetooth is disabled, so these need to be kept disabled to fully disable the radios when Wi-Fi and Bluetooth are disabled. The Zero Trace Phone itself doesn't currently support a supplementary location service based on Wi-Fi and Bluetooth scanning, as an additional safety protocol. 

Associated with an Access Point (AP)

Associated MAC randomization is performed by default. This can be controlled per-network in Settings ➔ Network & Internet ➔ Internet ➔ <network> ➔ Privacy.

In stock Android, the default is to use a unique persistent random MAC address for each network. It has 2 options available: "Use randomized MAC (default)" and "Use device MAC". In the Zero Trace Phone, the default is generating a new random MAC address when connecting to a network. It has 3 options available: "Use per-connection randomized MAC (default)", "Use per-network randomized MAC" and "Use device MAC".

The DHCP client uses the anonymity profile rather than sending a hostname so it doesn't compromise the privacy offered by MAC randomization. When the per-connection MAC randomization added by the Zero Trace Phone is being used, DHCP client state is flushed before reconnecting to a network to avoid revealing that it's likely the same device as before.

The Zero Trace Phone also disables support for stable link-local IPv6 addresses, since these have the potential to be used as identifiers. It's more sensible to use typical link-local address generation based on the (randomized) MAC address since link-local devices have access to both.

The Zero Trace Phone includes our Zurf browser as WebView implementation provided by the OS and our default browser. Zurf is a hardened variant of Chromium providing enhanced privacy and security, similar to how the Zero Trace Pen compares to AOSP. The Zurf browser currently doesn’t add many features but there are a lot of enhancements planned in the long term.


The Zero Trace Phone includes our Zurf subproject providing privacy and security-enhanced releases of Chromium. Zurf is both the user-facing browser included in the OS and the provider of the WebView used by other apps to render web content. The WebView is the browser engine used by nearly all other apps embedding web content or using web technologies for other uses. It’s also used by many minor web browsers not forking Chromium as a whole. These apps using the WebView benefit from a subset of the Zurf hardening.


Zurf was previously primarily focused on security hardening but we plan on adding assorted privacy and usability features. In the near future, we plan to add support for always incognito mode, content filtering (ad blocking, etc.), improved state partitioning, backup/restore, native autofill and many other features.


Chromium-based browsers like Zurf provide the strongest sandbox implementation, leagues ahead of the alternatives. It is much harder to escape from the sandbox and it provides much more than acting as a barrier to compromising the rest of the OS. Site isolation enforces security boundaries around each site using the sandbox by placing each site into an isolated sandbox. It required a huge overhaul of the browser since it has to enforce these rules on all the IPC APIs. Site isolation is important even without a compromise, due to side channels. Browsers without site isolation are very vulnerable to attacks like Spectre. On mobile, due to the lack of memory available to apps, there are different modes for site isolation. Zurf turns on strict site isolation, matching Chromium on the desktop, along with strict origin isolation.


Chromium has decent exploit mitigations, unlike the available alternatives. This is improved upon in Zurf by enabling further mitigations, including those developed upstream but not yet fully enabled due to code size, memory usage or performance. For example, it enables type-based CFI like Chromium on the desktop, uses a stronger SSP configuration, zero initializes variables by default, etc. Some of the mitigations are inherited from the OS itself, which also applies to other browsers, at least if they don’t do things to break them.


We recommend against trying to achieve browser privacy and security through piling on browser extensions and modifications. Most privacy features for browsers are privacy theater without a clear threat model and these features often reduce privacy by aiding fingerprinting and adding more state shared between sites. Every change you make results in you standing out from the crowd and generally provides more ways to track you. Enumerating badness via content filtering is not a viable approach to achieving decent privacy, just as AntiVirus isn’t a viable way to achieving decent security. These are losing battles, and are at best a stopgap reducing exposure while waiting for real privacy and security features.


Zurf will be following the school of thought where hiding the IP address through Tor or a trusted VPN shared between many users is the essential baseline, with the browser partitioning state based on site and mitigating fingerprinting to avoid that being trivially bypassed. The Tor Browser’s approach is the only one with any real potential, however flawed the current implementation may be. This work is currently in a very early stage and it is largely being implemented upstream with the strongest available implementation of state partitioning. Chromium is using Network Isolation Keys to divide up connection pools, caches and other state based on site and this will be the foundation for privacy. Chromium itself aims to prevent tracking through mechanisms other than cookies, greatly narrowing the scope downstream work needs to cover. The focus is currently on research since we don’t see much benefit in deploying bits and pieces of this before everything is ready to come together. At the moment, the only browser with any semblance of privacy is the Tor Browser.

Counter Surveillance

  • Mic Jammer
  • Anti-Stringray
  • Scrambled PIN
  • Toggles
  • LTE-only Mode

Mic Jammer blocks other apps attempting to utilize the microphone without your knowledge. Some apps use hidden processes to record tracking audio in the background that is either generated by nearby beacons, television commercials, streamed music services or websites. This tracking audio is transmitted between 18 kHz and 22 kHz (near ultra high frequency) which is beyond the range of typical human hearing but within the recording range of a typical Android phone.


To block unwanted use of the microphone by hidden app processes, Mic Jammer requests the use of the hardware microphone from the Android system and holds it. This technique locks up the microphone from any other apps attempting to gain access to it.


When the jamming technique is running and the microphone is locked up, Mic Jammer posts a notification to keep the user informed that it is running. Tests have shown that it uses 0% CPU, 0% network and 43.6mb RAM when running for over an hour.


This exclusive app made as part of research into audio counter-surveillance methods within the mobile phone world.


It does NOT record or listen to any audio.
It does NOT connect to the internet.


Tones can be emitted with a carrier frequency and a drift limit with rate all constrained to NUHF of 18 kHz to 24 kHz depending on the device capabilities. For instance 20000 Hz carrier, drift limit 1000 Hz and rate slow – will output random frequency between 19 kHz and 21 kHz approximately every second.


Both the active and passive jammers now run as a (foreground) service that should accurately indicate whether they are running or not.


Also includes a scanner to check user-installed apps for NUHF and Audio Content Recognition (ACR) SDKs as well as any services or receivers.


If another user app tries to take over the microphone from Mic Jammer, the latest build will try to restart a running passive jammer service automatically so that it complies with “the one that started capture the most recently receives audio” (quote from Android API docs). Apps that try to record audio but do not have access to the microphone will be given zeroed audio data (silence) by the system even though they may still appear to be recording audio.

Anti-Stingray is a counter-surveillance application that identifies what type of cell tower connection your phone is currently using. 

Many cell phone networks are switching from 4G (4th Generation) to 5G networks. The 5G network protocols were specifically designed to protect against some of the known insecurities of the older protocols, including those that allowed stingrays (IMSI catchers) to perform man-in-the-middle attacks on cell phone networks. To ease deployment and backwards compatibility, 4G and 5G networks can run together in what is known as 5G NR (New Radio) NSA (Non-Standalone) mode. This uses the 4G network for the control channel and the 5G network for the data communication. However, 5G NSA does not provide protection against stingrays. Android has access to all the information it needs to know if it is connected to a 5G NSA or a 5G SA (Standalone) network, but it doesn’t display that information to the user. The purpose of Anti-Stingray is to make that information easy to access.

What is a stingray?

Stingray is the generic name for an electronic surveillance tool that simulates a cell phone tower in order to force mobile phones and other devices to connect to it instead of to a legitimate cell tower. In doing so, the phone or other device reveals information about itself and its user to the operator of the stingray. Other common names for the tool are “cell-site simulator” and “IMSI catcher.”

Anti-Stingray will also warn you when you are connected to antiquated 2G and 3G networks.

A PIN is one of the most used security lock screens on Android devices. When a PIN code is set, the phone is locked and the user needs to enter the code in order to unlock the phone. It is one of the most secure security features on Android after password. It is more secure than “Pattern” because when the user sets a pattern, it leaves fingerprints that tell the way the code is set.

On the other hand, the PIN code doesn’t leave so many fingerprints. But still, someone can see the numbers you type. It will take them a few tries but at the end they will be able to find the code.

That is why the Zero Trace Phone has introduced a feature called Scramble PIN. As the name suggests, all the digits on your keyboard will scramble. This way, every time you enter the PIN code, digits will be positioned in different places.

Network permission toggle

The Zero Trace Phone adds a Network permission toggle for disallowing both direct and indirect access to any of the available networks. The device-local network (localhost) is also guarded by this permission, which is important for preventing apps from using it to communicate between profiles. Unlike a firewall-based implementation, the Network permission toggle prevents apps from using the network via APIs provided by the OS or other apps in the same profile as long as they’re marked appropriately.

The standard INTERNET permission used as the basis for the Network permission toggle is enhanced with a second layer of enforcement and proper support for granting/revoking it on a per-profile basis.

To avoid breaking compatibility with Android apps, the added permission toggle is enabled by default. However, the OS app installation UI has been extended to show the toggle as part of the installation confirmation page so users can disable it when installing an app. This will be extended to the app repository client included in the OS in the future.

Sensors permission toggle

Sensors permission toggle: disallow access to all other sensors not covered by existing Android permissions (Camera, Microphone, Body Sensors, Activity Recognition) including an accelerometer, gyroscope, compass, barometer, thermometer and any other sensors present on a given device. When access is disabled, apps receive zeroed data when they check for sensor values and don’t receive events. the Zero Trace Phone creates an easy-to-disable notification when apps try to access sensors blocked by the permission being denied. This makes the feature more usable since users can tell if the app is trying to access this functionality.

To avoid breaking compatibility with Android apps, the added permission is enabled by default. When an app attempts to access sensors and receives zeroed data due to being denied, the Zero Trace Phone creates a notification which can be easily disabled. The Sensors permission can be set to be disabled by default for user installed apps in Settings ➔ Privacy.

If you have a reliable LTE connection from your carrier, you can reduce attack surface by disabling 2G, 3G and 5G connectivity in Settings ➔ Network & Internet ➔ SIMs ➔ Preferred network type. Traditional voice calls will only work in the LTE-only mode if you have either an LTE connection and VoLTE (Voice over LTE) support or a Wi-Fi connection and VoWi-Fi (Voice over Wi-Fi) support. VoLTE / VoWi-Fi works on the Zero Trace Phone for most carriers unless they restrict it to carrier phones. Some carriers may be missing VoWi-Fi due to us not including their proprietary apps. Please note that AT&T users may see "5Ge" being used when LTE Only mode is enabled as AT&T intentionally mislabel LTE services as "5Ge" to mislead users.

This feature raises the bar for some forms of interception such as stingray attacks. LTE provides basic network authentication / encryption, if you decide to communicate outside of one of the included communication apps. The intention of the LTE-only mode is to harden against remote exploitation by disabling an enormous amount of legacy code.


Media & Documents

  • Collabra Office
  • Exif Scrubber
  • Private Screenshots
  • Anonymous Camera

Collabora Office is a text editor, spreadsheet and presentation program based on LibreOffice, the world's most popular Open Source office suite – and now it's on Android, enhancing your possibilities to work on mobile and for collaboration.

Supported files:

• Open Document Format (.odt, .odp, .ods, .ots, .ott, .otp)
• Microsoft Office 2007/2010/2013/2016/2019 (.docx, .pptx, .xlsx, .dotx, .xltx, .ppsx)
• Microsoft Office 97/2000/XP/2003 (.doc, .ppt, .xls, .dot, .xlt, .pps)

Collabora Office for Android uses the same engine as LibreOffice for Windows, Mac, and Linux. This, combined with a new front-end based on Collabora Online, reads and saves documents similarly to LibreOffice desktop.

Collabora Engineers Tor Lillqvist, Tomaž Vajngerl, Michael Meeks, Miklos Vajna and Jan Holešovský have been developing Android support since 2012, with the help of Google Summer of Code students Andrzej Hunt, Iain Billet and Kaishu Sahu.

This app is made by Collabora Productivity with the help of other companies & volunteers based on LibreOffice Technology.

Exif Scrubber helps you remove the metadata in your pictures before you share them.

If you feel like it.

If you don't want the big Internet companies (or whomever) to know where your pictures were taken don't forget to remove the metadata from them before you share them.

To remove the metadata from a picture, simply share it like you'd normally do and choose Exif Scrubber. A moment later, the share 'dialog' will reappear. Now just share with the app you intended to share with in the first place.

Et voilà!

★ This app is open source. You can take a look at the code (and contribute if you feel like it) here:


★ Basically, Exif is used by jpeg, which is the format in which your camera saves pictures. 

★ Exif Scrubber also renames the files (this can be disabled).


The Zero Trace Phone disables the inclusion of sensitive metadata in screenshots.

On stock Android, each screenshot includes an EXIF Software tag with detailed OS build/version information (android.os.Build.DISPLAY). It's the same value shown at Settings ➔ About device ➔ Build number. This leaks the OS, OS version and also usually the device family/model since builds are usually specific to a family of devices. The Zero Trace Phone completely disables this tag.

On Android, each screenshot also includes EXIF tags with the local date, time and timezone offset. The Zero Trace Phone disables this by default in order to avoid leaking the time and quasi-location information through metadata that isn't visible to the user. The date and time are already included in the file name of the screenshot which is fully visible to the user and can be easily modified by them without a third-party tool. The Zero Trace Phone includes a toggle for turning this metadata back on in Settings ➔ Privacy since some users may find it to be useful.

The Zero Trace Camera app has the same camera capabilities and quality as the stock OS. It will match the stock OS when comparing the same app on each OS. the Zero Trace Phone uses our own modern Camera app rather than the standard Google Camera app. The Zero Trace Phone's Camera is far better than any of the portable open-source camera alternatives and even most proprietary camera apps including paid apps. 

The Zero Trace camera app is focused on privacy and security. It includes modes for capturing images, videos and QR / barcode scanning along with additional modes based on CameraX vendor extensions (Portrait, HDR, Night, Face Retouch and Auto).

Camera permission is the only one that's required. Images and videos are stored via the Media Store API so media/storage permissions aren't required. The Microphone permission is needed for video recording by default but not when including audio is disabled. Location permission is only needed if you explicitly enable location tagging, which is an experimental feature.

By default, EXIF metadata is stripped for captured images and only includes the orientation. Stripping metadata for videos is planned but not supported yet. Orientation metadata isn't stripped since it's fully visible from how the image is displayed so it doesn't count as hidden metadata and is needed for proper display. You can toggle off stripping EXIF metadata in the More Settings menu opened from the settings dialog. Disabling metadata stripping will leave the timestamp, phone model, exposure configuration, and other metadata. Location tagging is disabled by default and won't be stripped if you enable it.

Social Media

  • Anonagram
  • ZeroPlayer
  • Nitter
  • Stealth

If you don't upload posts or stories on Instagram, but can't get rid of it because of people and content, you now have an alternative: Anonagram is a beautiful client that allows you to browse and interact with Instagram, while giving you more options to control your data.

* For those not having an account, you can access public profiles/hashtags/locations (depends on availability)!
* For those logged in, Anonagram can achieve most viewing and interaction features, with extra features such as downloading posts/stories/avatars, copying texts, comparing followers/following, and more!

Extra Features:

* Prevents irrational decisions: Anonagram removes double-tap and requires you to click into posts to give it a conscious like. It also allows you to easily access posts you've liked through your own profile.
* Allows customization: Pick your themes and layouts! You could even use grid layout for feed!
* Allows viewing at your own pace: No need to "hold" a story or scroll endlessly! Zoom whenever you want!
* Not a mod: Absolutely NO dependency of the actual Instagram app.
* Protects your privacy from friends: Anonagram allows you to read DMs and stories privately, without telling your friends!
* Protects your privacy from Instagram: The app only requests what it needs to show you the content and what you opted for in the settings. No communication with useless endpoints, and only minimal data is sent to Instagram.

*** Please use this app responsibly. ***

Do you like watching videos on YouTube but want an intuitive, feature-rich and privacy friendly app for that?

ZeroPlayer has been created with the purpose of getting the original YouTube experience on your smartphone without annoying ads and questionable permissions.


Download YouTube:
– Set title
– Choose between video, audio or captions download
– Select the most suitable file format.


ZeroPlayer also allows you to access SoundCloud & BandCamp

Listen to your favorite music while using other apps:
– Play in the background
– Create playlists for an endless music experience
– Save mobile data volume (we only download the audio)

Privacy first:
– No proprietary Google APIs
– Only send information which that isrequired to get video and channel – details
– Store everything offline on your device
– Download the resolution you need

Never stop playing!
– View videos whenever you like
– Resize and move it wherever you like
– Use the full comfort of our normal video player
– Pro tip: switch between all players with one click

Never miss updates again:
– Subscribe to a channel with one click
– Use your custom feed
– Watch your favorite channels
– Easily import and export your local subscriptions from other devices

Endless music:
– Create your own playlists
– Import playlists
– Mark your favorite videos
– Import your data on other devices to save time

Important notes:
• YouTube v3 API key is used in ZeroPlayer. This app does not allow any kind of content to be downloaded from Youtube.
• NewPipe app does not belong to nor is authorized by any social media website
• If there is any unauthorized actions (re-uploading or downloading of contents) and/or violations of intellectual property rights is the sole and only responsibility of the user.
If you have any issue with this app, please mail us.

Nitter is an open source Twitter front-end focused on privacy and performance. 


  • • No JavaScript or ads
  • • All requests go through the backend, client never talks to Twitter
  • • Prevents Twitter from tracking your IP or JavaScript fingerprint
  • • Uses Twitter’s unofficial API (no rate limits or developer account required)
  • • Lightweight
  • • RSS feeds
  • • Themes
  • • Mobile support (responsive design)
  • • AGPLv3 licensed, no proprietary instances permitted


Why Use Nitter?


It’s impossible to use Twitter without JavaScript enabled. For privacy-minded folks, preventing JavaScript analytics and IP-based tracking is important, but apart from using a VPN and uBlock/uMatrix, it’s impossible. Despite being behind a VPN and using heavy-duty adblockers, you can get accurately tracked with your browser’s fingerprint, no JavaScript required. This all became particularly important after Twitter removed the ability for users to control whether their data gets sent to advertisers.


Using an instance of Nitter (hosted on a VPS for example), you can browse Twitter without JavaScript while retaining your privacy. In addition to respecting your privacy, Nitter is on average around 15 times lighter than Twitter, and in most cases serves pages faster (eg. timelines load 2-4x faster).


In the future a simple account system will be added that lets you follow Twitter users, allowing you to have a clear chronological timeline without needing a Twitter account.



Stealth provides features from Reddit, without the need for an account. In fact, the app doesn't even let you log in with a Reddit account. Browser Reddit for it's hidden gems of information, while keeping your identity and data secure. There's a lot your Reddit searches and history can tell about you, so why risk it? 

• Browse Reddit (view posts, comments, subreddits, and users)

• Search posts, subreddits and users

• Subscribe to subreddits

• Sort

• History

• Save posts and comments

• Create different profiles (per-profile subscriptions, history and saved items)

• Show/hide NSFW content

• Image flairs

• Awards

• Save photos and videos

• Light/Dark theme



  • Unstoppable Wallet

Unstoppable wallet is purposely built as a decentralized management tool for cryptocurrencies.

It is engineered to serve privacy-conscious individuals looking to manage and invest in cryptocurrencies in a sovereign and professional manner.

Unstoppable is built with the following in mind:
– Capital Should Be Free >> It’s built to provide users with genuinely independent control over their capital.
– Capital Should Be Borderless >> It works outside the traditional finance layer and acts as a Swiss knife to the world of decentralized finances (DeFi).
– Capital Should Be Private >> It doesn’t leak private data, it has no means to track users, and takes extra measures to ensure privacy on multiple layers.

If the above rhymes well with you then Unstoppable is for you! And we are here to focus on your unique needs and serve you in the best possible manner.

Non-Custodial Multi-wallet >> Manage any number of cryptocurrencies across multiple portfolio-style wallets in a non-custodial manner. This wallet is like your own bank where you are the only client and the only one in charge. It’s designed to keep assets secure and easy to restore even if the phone is stolen and tampered with.
Investment Oriented Wallet >> Unstoppable brings unmatched cryptocurrency market analytics to your device: advanced sorting, curated categorization, extensive search filtering, and event-based alerting features.
Universal Wallet >> It supports all mainstream blockchains and is built in a standard compliant manner enabling users to use just one wallet app for everything crypto.
A Bitcoin Wallet >> The wallet packs some of the most advanced Bitcoin features available: SPV enabled, BIP 44/49/84/69 compliant, Bitcoin timelocks, custom transaction fees, and more.
A DeFi Wallet >> Full support for decentralized token swaps on Ethereum, Binance Smart Chain, Avalanche, Solana, and more. Also, the ability to interact with any smart contract-powered service on the blockchain via the WalletConnect protocol.
Ethereum Wallet >> Full support for Ethereum blockchain, its growing ecosystem of tokens (ERC20, NFT tokens, etc.), and other decentralized services such as ENS (Ethereum Name Service).
Ethereum L2 Wallet >> Artbitrum, Optimism, Polygon support.
Avalanche Wallet >> Full support for Avalanche C-Chain blockchain.
Binance Wallet >> Full support for original Binance Chain (incl. BEP2) and Binance Smart Chain.
NFT Wallet >> Full support for Non Fungible tokens (NFTs).
Crypto Academy >> The app includes two courses meant to onboard newcomers into the world of cryptocurrencies and the DeFi ecosystem in an easy-to-digest manner covering essential aspects of cryptocurrency security, storage, privacy, transacting, and exchanging.
Wallet for Privacy Coins >> Fully supports major privacy coins (ZCash, DASH) in an SPV manner. One of the very few wallets capable of supporting fully shielded Zcash transactions as well as the ability to privatize Bitcoin transactions.
Decentralized Wallet >> Designed to work with most major blockchains in a decentralized manner where an app doesn't depend on some server of a wallet provider to send/receive transactions but interacts with blockchain networks directly.
Privacy Focused >> Designed to allow for privacy even in the most privacy-breaching scenarios. There are no user accounts keeping your records, no identity checks that risk exposing your financials to the world, and no interaction with traditional finance layers. The app is partially TOR enabled and VPN support is coming soon.
Fully Open Source >> The most transparent wallet application built to date. The entire 4-year production process of the app is openly accessible online along with 100% of its code for anyone to evaluate or reuse in other projects. Verified and audited by third parties.

Be Unstoppable!

Location & Navigation

  • Location Alert
  • ZeroMaps

The Zero Trace Pen enables the privacy indicator for location data access in addition to the standard Android camera and microphone indicators. This shows an indicator when an app the user has granted permission to access location requests location data. We also resolve various UX issues with this feature as it currently exists in stock Android to get it into a highly usable state.

Android 13 has the location privacy indicator as a developer option but it doesn't work the same way as it does in the Zero Trace Phone. The Zero Trace Phone shows it for all location data accesses through any APIs. Normally, the stock OS only shows it for GNSS location requests, also known as high-power location requests, and doesn't normally show it for network location and other APIs gated by the Location permission / global block toggle.

The indicator works the same way as the Camera and Microphone ones, showing a bright green icon when location access occurs which then gets minimized to a small bright green dot when the quick settings tray isn't currently opened. Android 12 already includes Location with the other standard runtime permissions in the privacy dashboard for viewing the history.

Find the best route to your destination even without an internet connection. ZeroMaps uses OpenStreetMap data and a powerful search engine to offer you the optimal routes for driving, biking, hiking and public transportation.

• We do not track you. We do not profile you. We do not trade in your personal data; moreover, we do not have it.

• Save big on mobile internet costs and navigate reliably with offline maps powered by OpenStreetMap. 233 countries and regions are ready to be downloaded.
• Choose between 2D, 3D and Satellite map views.
• Get ready for travel and know every detail of your route like surface, difficulty, distance and elevation profile.
• Learn more about the points of interest near you from Wikipedia articles.
• Spot nearby parking places to easily park your car.
• Stay up-to-date and enjoy regular free map updates.

• Improve safe driving and avoid accidents. Receive alerts to potential problems on the road and record your trip.
• AI DashCam features Driver Assistance warnings and Dash Cam functionality.
• Avoid collisions and accidents with Driver Assistance warnings: Headway Warning, Forward Collision Warning, Pedestrian Collision Warning, Lane Departure Warning, Leaving Lane Warning, Stop & Go Assist.
• Record the road ahead during navigation to have an aid in the event of a collision or incident.
• Driver Assistance warnings and Recordings are available when the device is on a car mount in landscape mode, with a clear view of the road ahead.
* AI DashCam (with Driver Assistance warnings and Dash Cam functionality) requires Android 7 or later.

• Find the fastest or the shortest route to your destination when you travel by car, bike, on foot or with public transport.
• Plan your route with multiple waypoints.
• Stay safe with the free Head-up Display (HUD) feature which projects the most important navigation info onto the windshield of your car.
• Know in advance which lane to take with precise turn-by-turn navigation and lane assistance.
• Get notified about speed cameras and stay up to date with current speed limits.

• Get real-time traffic info, updated every minute.
• Discover alternative routes that avoid the traffic jams and save you time on the road.

• Get around town quickly and easily. Choose from public transit routes that combine all transportation modes: bus / metro / subway / light rail / train / ferry
• Get walking directions, transfer times, departure times, number of stops. And when available, the cost.
• Find wheelchair or bike friendly public transportation.

• View current temperature and local weather forecast for your favorite locations.
• See what weather conditions to expect in the next hours and view the forecast for the next 14 days.

Additional Features

Privacy Coin Ready
Open Source & Proven Security
Built-in Translations
Documentation & Video Tutorials
Unlimited Customizations
Loophole Updates
Zero Trace

Hey there!👋

I’m here to help if you have any questions!