A list of fine Android Smartphone Apps

Signal

Signal is a secure, free, and open source messaging application that uses end-to-end encryption to securely send and receive all kinds of communications with other Signal users

KeepassDX

KeePassDX is an open-source password manager for Android . It allows users to edit encrypted keys and digital identities in a single KeePass file and fill out forms securely. It supports Argon2, Argon2id, as well as AES-KDF . Some users have reported issues with opening KeePassDX databases when the app is opened via “Share with KeePassDX” . However, others have praised KeePassDX for hitting the right balance between portability and ease of use . KeePassDX is a KeePass implementation for Android

SecScanQRCode

SecScanQR is a QR code scanner/generator that cares about user privacy[1][2]. It allows users to scan QR codes and share them with friends, or copy them to do a web search with the information from the QR code. The app also allows users to generate QR codes, barcodes, and many more formats[2].

SecScanQR is part of the Privacy Friendly Apps group developed by the research group SECUSO at Technische Universität Darmstadt[3][4]. The app requires minimal permissions, namely camera access and write external storage[2][3][4].

QR codes can contain malicious links, so it is important to carefully check the link before accessing the corresponding webpage[3][4]. To help users avoid not checking the link and in particular the highlighted domain carefully, the app provides information about possible fraud and its users need to confirm that they checked the link and it is trustworthy[4].

To scan a QR code using SecScanQR, users need to allow camera access and center the QR code on the screen[1][2][3][4]. The app supports the following formats: text, product codes, phone number, SMS, email address, email, contact information (e.g. vCards), URL, and WiFi information[3].

There are other ways to scan QR codes, such as using Google Lens or online QR code scanner web applications[5][6].

Citations: [1] https://f-droid.org/en/packages/de.t_dankworth.secscanqr/ [2] https://github.com/Fr4gorSoftware/SecScanQR [3] https://secuso.aifb.kit.edu/english/QR_Scanner.php [4] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=com.secuso.privacyFriendlyCodeScanner [5] https://www.wired.com/story/how-to-scan-a-qr-code/ [6] https://nanonets.com/blog/scan-qr-codes-from-photos-or-documents/

Greentooth

Greentooth is an Android app that can help users save battery and mitigate the security risks of Bluetooth by automatically turning Bluetooth off when it is no longer needed[4]. The app is available on both F-Droid and Google Play[1][2]. The app has a quick settings tile for turning on/off Greentooth[1]. Greentooth Technologies Private Limited (GTPL) is the developer of the app[2][3]. In addition to Greentooth, GTPL has also developed Extracarbon, an on-demand Kabadiwala app that allows users to sell their waste and old items for cash or shopping credits[3].

Citations: [1] https://f-droid.org/en/packages/com.smilla.greentooth/ [2] https://play.google.com/store/apps/details?hl=en_US&id=com.greentooth [3] https://play.google.com/store/apps/dev?gl=US&hl=en_US&id=6827947733752468361 [4] https://apkcombo.com/greentooth/com.smilla.greentooth/ [5] https://apkvision.org/app/communication/greentooth-79891/ [6] https://apkshub.com/app/com.smilla.greentooth

Osmand

OsmAnd is a map and navigation app available for Android and iOS[1][2][3][5]. It uses the OpenStreetMap (OSM) map database for its primary displays, but is an independent app not endorsed by the OpenStreetMap Foundation[1]. The app is available in both free and paid versions, with the latter unlocking the download limit for offline maps and providing access to Wikipedia points of interest (POIs) and their descriptions from within the app[1]. Some of the features of OsmAnd include:

OsmAnd is actively being developed and everyone can contribute to the application by reporting bugs, improving translations, or coding new features[4].

Citations: [1] https://en.wikipedia.org/wiki/OsmAnd [2] https://osmand.net [3] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=net.osmand [4] https://f-droid.org/en/packages/net.osmand.plus/ [5] https://apps.apple.com/us/app/osmand-maps-travel-navigate/id934850257

UntrackMe

UntrackMe is an Android app that helps protect user privacy by removing tracking parameters from URLs[1][2][4]. The app is available in both a lite and full version, with the full version containing all features of the lite version and handling all links to remove tracking parameters[1]. UntrackMe also uses its own app picker that displays URLs before visiting them[1].

UntrackMe is specifically designed to work with Twitter and YouTube links[1][3][5][6]. Once set by default to open Twitter and YouTube links, UntrackMe transforms them into Nitter and Invidious links and delegates the action to another app[3][5][6].

To configure UntrackMe, users can click on the “CONFIGURE” button in the app, which will open Android's settings page for UntrackMe Lite[2]. From there, users can go to “Open by” and select UntrackMe as the default app for Twitter, YouTube, or Google Maps links[2].

UntrackMe is available for download on F-Droid and APKMirror[1][3]. Additionally, there is a Google Chrome extension available for UntrackMe[4].

Citations: [1] https://f-droid.org/en/packages/app.fedilab.nitterizeme/ [2] https://fedilab.app/wiki/untrackme [3] https://www.apkmirror.com/apk/tom79/untrackme-fdroid-version/ [4] https://chrome.google.com/webstore/detail/untrackme/obgcmibolhhaohbfkkjkcbfcdjdjimoa [5] https://alternativeto.net/software/untrackme/about/ [6] https://framagit.org/tom79/nitterizeme

Private Lock

https://f-droid.org/en/packages/com.wesaphzt.privatelock/

Newpipe

NewPipe is a free and open-source Android app that provides an intuitive, feature-rich, and privacy-friendly alternative to the YouTube app[1]. It allows users to watch videos on YouTube and other platforms such as SoundCloud, MediaCCC, PeerTube, and Bandcamp[2]. NewPipe has been created with the purpose of getting the original YouTube experience on Android devices without any annoying ads, tracking, or other privacy-invading features[1].

To install NewPipe, users can download it from the F-Droid app store, which is a trusted catalog of free and open-source applications for Android[1][4]. If users install NewPipe via the default F-Droid repository, updates for NewPipe might take their time to arrive. If users want to use their own repository, they can check out the next item in the slideshow[1].

There is also a subreddit dedicated to discussing features and more about NewPipe[2]. Additionally, there is a YouTube video that provides a tutorial on how to install NewPipe[3].

Citations: [1] https://newpipe.net [2] https://www.reddit.com/r/NewPipe/ [3] https://youtube.com/watch?v=bem4adjGKjE&t=0 [4] https://f-droid.org/en/packages/org.schabi.newpipe/

Blockada

Blokada is an ad blocker and privacy app for Android and iOS that is being supported and actively developed by the open-source community[1]. It blocks ads, trackers, and malware, and can be used for all apps and browsers without requiring root or jailbreak[1][2]. Blokada is free, secure, and open source, and its source code is available for Android and iOS[1]. Blokada Cloud is a new cloud-based ad-blocking solution that is faster and more reliable than the old method, and it can be used on multiple devices and supports any platform compatible with DNS over TLS/HTTPS[1]. Blokada Plus is a VPN that encrypts all traffic with a global VPN network[1][5].

Blokada Classic is an older version of Blokada that is still available for download and makes it easy to block ads and malware, and protect your privacy by blocking web tracking[2]. It also allows users to choose which apps or websites to block ads on, and even has a VPN that users can use to connect to the internet without regional restrictions[2]. Blokada 5 is another version of Blokada that is available for download and blocks ads, trackers, and malware, and can improve battery life[3].

The official subreddit of Blokada is available on Reddit, where users can discuss the app and ask questions[4]. Blokada is also available for download on the App Store for iOS devices[5].

Citations: [1] https://blokada.org [2] https://blokada-classic.en.uptodown.com/android [3] https://www.apkmirror.com/apk/blocka-ab/blokada-5-ad-blocker-privacy-app-no-ads-no-tracking-better-battery/ [4] https://www.reddit.com/r/blokada/ [5] https://apps.apple.com/us/app/blokada/id1508341781

OpenKeychain

OpenKeychain is a free and open-source mobile app for the Android operating system that provides strong, user-based encryption which is compatible with the OpenPGP standard[1]. It allows users to encrypt, decrypt, sign, and verify signatures for messages[1][2]. OpenKeychain stores and manages users' keys, as well as those of the people they communicate with, on their Android devices[2]. The app is based on the well-established OpenPGP standard, making encryption compatible across devices and systems[2]. OpenKeychain primarily integrates with K-9 Mail to provide end-to-end encryption capabilities[2]. The auditing company Cure53 performed an intensive security audit of OpenKeychain and concluded that none of the spotted issues were considered to be of critical severity in terms of security implications[2]. The app has been adapted to work with smart cards and NFC rings, resulting in a usability study published on Ubicomp 2017[1]. The OpenKeychain developers participated in three Google Summer of Code programs with a total of six successful students[1]. The app is available on GitHub[3] and its website provides installation instructions and a list of compatible software for Windows, Mac OS, and other operating systems[4]. There is also a tutorial on YouTube that explains how to use OpenKeychain[5].

Citations: [1] https://en.wikipedia.org/wiki/OpenKeychain [2] https://www.openkeychain.org [3] https://github.com/open-keychain/open-keychain [4] https://www.openpgp.org/software/openkeychain/ [5] https://youtube.com/watch?v=NFnxZmS2Z2Y&t=0 [6] https://www.reddit.com/r/GPGpractice/comments/11og6fp/openkeychain_android_help/

Mull Browser

This is a privacy-oriented and deblobbed web browser based on Mozilla Firefox technology. It enables many features upstreamed by the Tor Uplift project using preferences from the arkenfox-user.js project. It is recommended to install uBlock Origin. Mull does not connect to various Mozilla and Google services that track users. To find it, enable the “Divest OS” repo in Aurora Droid, or add the following repo to F-Droid manually. It is available on F-Droid.

Fenec

Opensource Firefox Android

Haven

Haven is a free and open-source security application for Android designed to monitor activity occurring in the vicinity of a device using its built-in sensors, and to alert the device owner of such activity[3]. It is an Android application that leverages on-device sensors to provide monitoring and protection of physical areas[1]. Haven turns any Android phone into a home security system that can detect motion, send app alerts to users, record set periods of time, hear/record sound, and detect physical phone movement[3]. The app is designed to be installed on a cheap Android burner, and it uses the phone's cameras, microphones, and even accelerometers to monitor for any motion, sound, or disturbance of the phone[6]. The Haven app can be downloaded from Google Play or from the Haven Nightly “Bleeding Edge” repository[1]. The app requires a SIM card to send SMS alerts, and there are some limitations to its functionality[3].

Citations: [1] https://guardianproject.github.io/haven/ [2] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.havenapp.main [3] https://en.wikipedia.org/wiki/Haven_(software) [4] https://apps.apple.com/us/app/haven-preventative-security/id1326207881 [5] https://apps.apple.com/us/app/haven-dispensaries/id1590406477 [6] https://www.wired.com/story/snowden-haven-app-turns-phone-into-home-security-system/

F-Droidstore

F-Droid is an installable catalog of FOSS (Free and Open Source Software) applications for the Android platform[1][2]. It is an alternative to the Google Play Store and is characterized by the fact that it only contains free and open-source apps[2][4]. The main repository, hosted by the project, contains only free and open-source apps, and applications can be browsed, downloaded, and installed from the F-Droid website or client app without the need to register for an account[2]. The F-Droid client makes it easy to browse, install, and keep track of updates on your device[1]. F-Droid is powered by donations[1].

F-Droid is not available on the Google Play Store, so to install the F-Droid client, the user has to allow installation from “Unknown sources” in Android settings and retrieve the F-Droid Android application package (.apk file) from the official site[2]. The selection of apps is much smaller in F-Droid than the Play Store, around 3,000 compared to around 3 million[2]. However, F-Droid offers a variety of tools, and all the available applications have free licenses like GPL, MIT, or Apache[4].

F-Droid Nearby is a simple app for exchanging free software apps locally, device-to-device, even when the internet is not available or too expensive[5]. It is compatible with the built-in Nearby feature of the F-Droid client app[5].

Citations: [1] https://f-droid.org/en/ [2] https://en.wikipedia.org/wiki/F-Droid [3] https://f-droid.en.uptodown.com/android [4] https://f-droid.en.softonic.com/android [5] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.fdroid.nearby

PilferShush

PilferShush Jammer is an experimental Android app that blocks other apps from using the microphone without the user's knowledge[2][4]. It uses a passive jamming technique that engages the microphone, thereby blocking other apps from using it, but it does not listen to or record any of the audio[1]. To block unwanted use of the microphone by hidden app processes, PilferShush Jammer requests use of the hardware microphone from the Android system and holds it, locking up the microphone from any other apps attempting to gain access to it[2][4]. This technique has been tested only on user apps, not system apps[2]. When the jamming technique is running and the microphone is locked up, PilferShush Jammer posts a notification to keep the user informed that it is running[2][4]. Tests have shown that it uses 0% CPU, 0% network, and 43.6mb RAM when running for over an hour[2][4]. PilferShush Jammer is an experimental app made as part of research into audio counter-surveillance methods within the Android and IoT world[4][6].

Citations: [1] https://f-droid.org/en/packages/cityfreqs.com.pilfershushjammer/ [2] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=cityfreqs.com.pilfershushjammer [3] https://www.reddit.com/r/privacytoolsIO/comments/js0vgg/pilfershush_jammer_review/ [4] https://download.cnet.com/PilferShush-Jammer/3000-20432_4-78284741.html [5] https://pilfershush-jammer.soft112.com [6] https://github.com/kaputnikGo/PilferShushJammer

FOSS Weatherwarn App

FOSS Weather is a FOSS weather app that provides weather information from several webservices. It can show weather information from wetterdienst.de, meteoblue.com, and the DWD. It also has features such as capturing websites for offline use, sharing screenshots of the whole webview, and searching and saving other locations as bookmarks. However, this app is no longer maintained.

Ripple

Ripple is a “panic button” app created by Guardian Project[1][2][3][5]. It allows users to send a trigger message to any app that is set up as a “panic responder”[1]. These responder apps can then perform actions such as locking or disguising themselves[1]. Ripple is available for free on F-Droid, a free and open-source Android app repository[3]. It is also available on GitHub, where users can learn more about the app and contribute to its development[2]. Additionally, Guardian Project has created PanicKit, an Android framework for building panic button functionality into other apps[6].

Citations: [1] https://guardianproject.info/apps/info.guardianproject.ripple/ [2] https://github.com/guardianproject/ripple [3] https://f-droid.org/en/packages/info.guardianproject.ripple/ [4] https://hosted.weblate.org/projects/guardianproject/ripple/ [5] https://ovio.org/project/guardianproject/ripple [6] https://youtube.com/watch?v=mS1gstS6YS8

WifiAnalyzer

WiFiAnalyzer is an Android application available on F-Droid that allows users to optimize their WiFi network by checking WiFi network status, signal strength, and identifying crowded channels[1]. The app features a list view and diagram views for the 2.4 GHz, 5 GHz, and 6 GHz band[2]. WiFiAnalyzer can identify nearby access points, graph channels signal strength, and analyze WiFi networks to rate channels[3]. The app is not a WiFi password cracking or phishing tool[3].

Some of the features of WiFiAnalyzer include:

Users can download WiFiAnalyzer from F-Droid or APKMirror. It is important to note that downloading the app from APKMirror means that users will not receive update notifications and it is a less secure way to download[1][5][6].

Citations: [1] https://f-droid.org/en/packages/com.vrem.wifianalyzer/ [2] https://f-droid.org/en/packages/org.bitbatzen.wlanscanner/ [3] https://vremsoftwaredevelopment.github.io/WiFiAnalyzer/ [4] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=com.vrem.wifianalyzer [5] https://www.apkmirror.com/apk/vrem-software-development/wifianalyzer-open-source-fdroid-version/wifianalyzer-open-source-fdroid-version-3-0-9-release/ [6] https://www.apkmirror.com/apk/vrem-software-development/wifianalyzer-open-source-fdroid-version/wifianalyzer-open-source-fdroid-version-3-0-2-release/

Pixelknot

PixelKnot is an Android application developed by Guardian Project that allows users to hide short text-based messages in photographs and share them across trusted channels[2]. The app uses steganography, which is the practice of concealing a message within another non-secret message, to hide the text inside a picture[2][3]. Some key features of PixelKnot include:

PixelKnot can be downloaded for free from Google Play, F-Droid, Uptodown, and Amazon Appstore for Android[1][4][5][6]. The app has been available since July 2013 and has received positive reviews from users[2][6].

Citations: [1] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=info.guardianproject.pixelknot [2] https://guardianproject.info/archive/pixelknot/ [3] https://github.com/guardianproject/PixelKnot [4] https://pixelknot.en.uptodown.com/android [5] https://www.amazon.com/The-Guardian-Project-PixelKnot-Messages/dp/B00E7TGIO2 [6] https://www.appbrain.com/app/pixelknot-hidden-messages/info.guardianproject.pixelknot

ProofMode

ProofMode is an open-source project developed by Guardian Project and WITNESS[2]. It is a lightweight and minimal “reboot” of the full encrypted, verified secure camera app, CameraV[1][3][4]. The goal of ProofMode is to provide a no-setup-required, automatic new user experience that works without requiring training, and to run all of the time in the background without noticeable battery, storage, or network impact[1][3][4]. ProofMode uses strong cryptography for strong identity and verification features, but not encryption[1][3]. It produces “proof” data formats that can be easily parsed and imported by existing tools[1][3]. ProofMode automatically adds digital proof data to all photos and videos taken, which can then be easily shared through a “Share Proof” share action, to anyone you choose[1][3]. However, according to a blog post from 2017, ProofMode doesn't prove anything, as all data sources, from the camera picture to the location data, can easily be faked[5].

Citations: [1] https://guardianproject.info/apps/org.witness.proofmode/ [2] https://proofmode.org/about [3] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.witness.proofmode [4] https://github.com/guardianproject/proofmode-android [5] http://www.lieberbiber.de/2017/03/07/the-guardian-projects-proof-mode-app-for-activists-doesnt-work/ [6] https://blog.witness.org/2017/07/media-activists-witness-guardian-project-back/

Save

https://guardianproject.info/apps/net.opendasharchive.openarchive.release/

https://directory.civictech.guide/listing/save

Zom

The Guardian Project is a global collective of software developers, designers, advocates, activists, and trainers who develop open-source mobile security software and operating system enhancements[1]. They also create customized mobile devices to help individuals communicate more freely and protect themselves from intrusion and monitoring. The project was founded by Nathan Freitas in 2009 in Brooklyn, NY, and has developed more than a dozen mobile applications for Android and iOS with over two million downloads and hundreds of thousands of active users[1].

PanicKit is a system-wide panic response software developed by the Guardian Project. It includes Zom with multiple destructive responses and a default lock response[2].

The Guardian Project has a presence on GitHub, where they host various repositories related to their software development projects[3].

“Guardian Project” is also the name of a card in the Magic: The Gathering trading card game[4][5].

Lastly, “Guardian Project” is the name of a gym on Instagram with over 11,000 followers[6].

Citations: [1] https://en.wikipedia.org/wiki/Guardian_Project_(software) [2] https://guardianproject.info/code/panickit/ [3] https://github.com/guardianproject [4] https://www.cardkingdom.com/mtg/ravnica-allegiance/guardian-project [5] https://mysterymtg.com/products/guardian-project [6] https://www.instagram.com/guardiangym/?hl=en

Hypathia

Hypatia is a free and open-source malware scanner for Android available on F-Droid[1][2][3][4]. It is powered by ClamAV style signature databases and has the following features:

To install Hypatia, it is recommended to install the F-Droid client and use that[1]. The app requires Android 4.1 or newer and allows the app to make use of foreground services[1].

Citations: [1] https://f-droid.org/en/packages/us.spotco.malwarescanner/ [2] https://f-droid.org/packages/us.spotco.malwarescanner/ [3] https://f-droid.org/de/packages/us.spotco.malwarescanner/ [4] https://f-droid.org/fr/packages/us.spotco.malwarescanner/ [5] https://f-droid.org/packages/ [6] https://forum.xda-developers.com/t/app-4-1-hypatia-a-real-time-malware-scanner.4249431/ [7] https://www.reddit.com/r/androidapps/comments/1096orp/malware/

Orbot

Orbot is a free proxy app that provides anonymity on the internet for users of the Android and iOS operating systems[1][2][3][4]. It uses Tor to encrypt internet traffic and then hides it by bouncing through a series of computers around the world, instead of connecting directly like traditional VPNs and proxies[2][4]. Orbot allows traffic from apps such as web browsers, email clients, map programs, and others to be routed via the Tor network[1]. It is used to keep the communications of users anonymous and hidden from governments and third parties that might be monitoring their internet traffic[1].

Some key features of Orbot include:

Orbot is free and open-source software[3][6]. It is available for download on Google Play and the App Store[2][3][6].

Citations: [1] https://en.wikipedia.org/wiki/Orbot [2] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.torproject.android [3] https://apps.apple.com/us/app/orbot/id1609461599 [4] https://guardianproject.info/apps/org.torproject.android/ [5] https://orbot.app [6] https://orbot.app/en/download/

Neo Store

Neo Store is an F-Droid client with a modern UI and an arsenal of extra features[1][6]. It is a feature-rich F-Droid client that is UX-focused on empowering users, with fast repository sync times, awesome built-in repositories, and easy exploration of new apps[1]. Some of its key features include:

Neo Store is available on F-Droid, which is a free and open-source Android app repository[2]. It is also available for download on APKMirror[3]. Additionally, it is possible to add Neo Store to your Android application by using a static library[4]. Finally, there is a separate app called “Neo” on the Google Play Store, which is exclusively for users with an existing Neo account[5].

Citations: [1] https://github.com/NeoApplications/Neo-Store [2] https://f-droid.org/en/packages/com.machiav3lli.fdroid/ [3] https://www.apkmirror.com/apk/neoapplications/neo-store-f-droid-version/neo-store-0-9-13-release/neo-store-0-9-13-android-apk-download/ [4] https://android.izzysoft.de/repo/apk/com.machiav3lli.fdroid [5] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=space.neo.app [6] https://codeberg.org/NeoApplications/Neo-Store

Proton Calendar

Proton Calendar is a planner and time-management tool that keeps your schedule private[2]. It is available for Android and iOS devices[1]. The Android app can be downloaded from the Google Play Store or directly from the Proton website as an APK file[1][4]. The app comes with a full set of advanced features and functionalities that can easily replace your existing calendar app[3]. Some of the features of the Proton Calendar app include:

The app is missing some features like color-coding, holidays, and contacts' birthdays[2]. However, the developers have stated that they are working on adding more features to the app in the future[5]. Collaborative sharing of calendars between Proton users is already possible in the Proton Calendar web client and Android app[5].

Citations: [1] https://proton.me/calendar/download [2] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=me.proton.android.calendar [3] https://proton.me/blog/calendar-android-app [4] https://protonapps.com/protoncalendar-android [5] https://apps.apple.com/us/app/proton-calendar-secure-events/id1514709943 [6] https://www.reddit.com/r/ProtonMail/comments/12ijj8s/the_proton_calendar_feature_disparity_between_ios/

Molly

Molly is a hardened fork of Signal for Android[2][4][5]. It is an independent app that uses Google's proprietary code to support some features, but the community is working to make it 100% free and open-source[1]. Molly comes in two flavors: one with proprietary blobs like Signal and one without, called Molly-FOSS[2][5]. The app is updated every two weeks to include the latest features and bug fixes from Signal, except for security issues which are patched as soon as fixes become available[2]. Molly has a passphrase lock feature that allows users to set a passphrase to secure their messages[2]. The app also locks down automatically when the user is gone for a set period of time and securely shreds RAM[1]. Molly can be downloaded from GitHub's Releases page or installed from the Molly F-Droid Repo[2].

Citations: [1] https://molly.im [2] https://github.com/mollyim/mollyim-android [3] https://www.reddit.com/r/privacytoolsIO/comments/khhzir/your_thoughts_on_molly_hardened_fork_of_signal/ [4] https://news.ycombinator.com/item?id=25743852 [5] https://lemmy.ml/post/48449 [6] https://www.saashub.com/compare-signal-vs-molly-signal-fork

SnoopSnitch

SnoopSnitch is an Android app that allows users to test the security of their mobile devices and mobile network security[1][2][3]. The app can analyze mobile radio data to detect threats like fake base stations, user tracking, and SS7 attacks[1]. It can also provide a detailed report of the patch-status of vulnerabilities (CVEs) by month[1].

SnoopSnitch requires a compatible rooted device with Qualcomm's firmware for installed or missing Android security patches to perform active network tests and attack monitoring[1]. The app asks for a number of permissions, most of which are only required for network tests and attack monitoring[1]. Users may also choose to help improve global network security and threat statistics by uploading their network measurements or security events, but SnoopSnitch will ask for confirmation before uploading any such information to their servers, and all uploads are encrypted[1].

SnoopSnitch is open-source software released under the GPLv3 license[1][3][6]. It can be downloaded from Google Play, F-Droid, Uptodown, and Soft112[1][2][4][5]. To build SnoopSnitch, the Android SDK is required[6].

Citations: [1] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=de.srlabs.snoopsnitch [2] https://f-droid.org/en/packages/de.srlabs.snoopsnitch/ [3] https://opensource.srlabs.de/projects/snoopsnitch [4] https://snoopsnitch.en.uptodown.com/android [5] https://snoopsnitch.soft112.com [6] https://github.com/srlabs/snoopsnitch

Extirpater

Extirpater is a free and open-source Android app that securely deletes files, making them irrecoverable[1][3]. It is a high-performance free space eraser, which is the first of its kind on Android[1][4]. It is recommended to use Extirpater before selling your device, after enabling encryption, or after deleting many apps/files[1].

Extirpater is developed by Divested-Mobile and is available on F-Droid[1][2][3]. It is also available on Google Play Store under the name “Shreddit – Data Eraser”[6]. The app provides features such as empty space shredding on internal and external storage, executing multiple shredding jobs on more than one storage simultaneously, and dual themes light and night mode[6]. It also provides strong integration with your device's built-in file manager or any third-party file manager[6].

Overall, Extirpater is a useful app for those who want to securely delete their data from their Android device. It is recommended to use it before selling your device or giving it away to ensure that your data is not recoverable.

Citations: [1] https://f-droid.org/en/packages/us.spotco.extirpater/ [2] https://github.com/Divested-Mobile/Extirpater [3] https://www.libhunt.com/compare-extirpater-vs-webcall-android?ref=compare [4] https://divestos.org/pages/our_apps [5] https://steemit.com/android/@aaforward/anonymity-and-emergency-data-deletion-for-smartphones [6] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=com.palmtronix.shreddit.v1

VLC

VLC for Android is a free and open-source cross-platform multimedia player that can play most multimedia files, as well as discs, devices, and network streaming protocols[1]. Here are some key features of the app:

VLC for Android can be downloaded from the Google Play Store or from the official VLC website[1][2]. It is also available for download from third-party websites like Uptodown[4][6].

Citations: [1] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=org.videolan.vlc [2] https://www.videolan.org/vlc/download-android.html [3] https://www.videolan.org/vlc/ [4] https://vlc.en.uptodown.com/android [5] https://www.videolan.org [6] https://vlc.en.uptodown.com/android/download

APKUpdater

APKUpdater is an open-source tool that simplifies the process of finding updates for installed apps[1]. It provides similar functionality to an app store, but instead of depending on a single source, it aggregates the results from APKMirror, Aptoide, F-Droid, and Google Play[1][3][6]. Some of the features of APKUpdater include finding updates from various sources, finding new apps to install, scheduling background update checks, and receiving notifications when updates are found[1][3]. APKUpdater supports Android 4.0.3 to Android 10 and Android TV[1][3]. APKUpdater is available for download on various websites, including APKMirror, Uptodown, and Malavida[2][3][4]. It is an interesting application that can help keep apps updated, although the process of updating apps may not be fast or particularly easy[3].

Citations: [1] https://github.com/rumboalla/apkupdater [2] https://www.apkmirror.com/apk/rumboalla/apkupdater/ [3] https://apkupdater.en.uptodown.com/android [4] https://www.malavida.com/en/soft/apkupdater/android/ [5] https://www.techdoctoruk.com/apk-updater-2022/ [6] https://forum.xda-developers.com/t/app-4-0-3-gplv3-apkupdater-2-get-updates-for-your-apps.3444517/

ExifEraser is a free and open-source Android app that allows users to remove metadata from their images[4]. The app supports modern Android versions from 6.0 and above[4]. ExifEraser can remove embedded ICC Profile, EXIF, Photoshop Image Resources, and XMP/ExtendedXMP metadata from JPEG images[1]. The app is permissionless, meaning it does not require any special permissions to function[4]. Other apps that can remove Exif metadata from photos on Android include Photo Metadata Remover and Scrambled Exif[3][5]. Users can also use the Exif Metadata app to view and remove Exif data from their photos[2].

Citations: [1] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=com.none.tom.exiferaser [2] https://www.xda-developers.com/how-to-view-remove-exif-data-android-ios/ [3] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=apps.syrupy.metadatacleaner [4] https://alternativeto.net/feature/exif-removal/ [5] https://f-droid.org/en/packages/com.jarsilio.android.scrambledeggsif/ [6] https://listoffreeware.com/best-free-exif-remover-app-for-android/

Pocket Paint is a graphical paint editor app developed by the free and open source non-profit Catrobat project[6]. It allows users to set parts of pictures to transparent, insert text/images, add layers, use color filling and picking tools, rotate, resize and position elements, and more[1][2][3][6]. The app is available on F-Droid and Google Play Store[3][6]. The F-Droid version is built and signed by F-Droid, and guaranteed to correspond to the source tarball[1]. The app requires Android 5.0 or newer[1]. The app's license is GNU Affero General Public License v3.0 or later[1][3].

Citations: [1] https://f-droid.org/packages/org.catrobat.paintroid/ [2] https://f-droid.org/pt/packages/org.catrobat.paintroid/ [3] https://github.com/Catrobat/Paintroid [4] https://news.ycombinator.com/item?id=34799272 [5] https://gitlab.com/fdroid/rfp/-/issues/1042 [6] https://alternativeto.net/software/pocket-paint/about/

OnionShare is an open-source tool that allows users to securely and anonymously share files, host websites, and chat with friends using the Tor network[1][5]. OnionShare has a mobile beta version available for download, but it is still in early alpha/beta state and has not yet been audited[2]. The OnionShare Android app is available for download on the Google Play Store[3]. The Android version of OnionShare is still under development and is available on GitHub[4]. To learn more about how OnionShare works, its security properties, how to use it, and how to contribute to the project, users can check out the documentation available on the OnionShare website[5].

Citations: [1] https://onionshare.org [2] https://onionshare.org/mobile/ [3] https://play.google.com/store/apps/details?hl=en_US&id=org.onionshare.android [4] https://github.com/onionshare/onionshare-android [5] https://github.com/onionshare/onionshare [6] https://apkcombo.com/onionshare/org.onionshare.android/

Mullvad VPN offers several options for Android users to connect to their VPN service[1][2]. Here are the different app options:

To install the Mullvad VPN app on Android, users can download it from the Google Play Store[3]. Once installed, users can follow a guide to learn how to use the app[4]. The app also allows users to submit support requests directly in the app and has a no-logging of user activity policy[2].

Citations: [1] https://mullvad.net/en/help/installing-mullvad-android-devices/ [2] https://mullvad.net/en/download/vpn/android [3] https://mullvad.net/en/help/install-mullvad-app-android/ [4] https://mullvad.net/en/help/using-mullvad-vpn-on-android/ [5] https://play.google.com/store/apps/details?gl=US&hl=en_US&id=net.mullvad.mullvadvpn [6] https://play.google.com/store/apps/developer?gl=US&hl=en_US&id=Mullvad+VPN

Silenc

Silence is a free and open-source SMS/MMS application that provides end-to-end encryption for your messages using the Signal encryption protocol[1][2]. It is a full replacement for the default text messaging application, and all messages are encrypted locally[1]. Silence works like any other SMS application, and there's nothing to sign up for or any new service your friends need to join[1][2]. Silence communicates using encrypted SMS messages, and no servers or internet connection is required[1][2]. All messages are encrypted locally, so if your phone is lost or stolen, your messages are protected[1][2]. Silence is made by volunteers, and it is free and open-source, enabling anyone to verify its security by auditing the code[1][2].

Citations: [1] https://silence.im [2] https://github.com/SilenceIM/Silence [3] https://www.reddit.com/r/fossdroid/comments/y3wytx/partisansms_encrypted_sms_messenger_for_android/ [4] https://silence.im/faq [5] https://git.silence.dev/Silence/Silence-Android/-/issues/597 [6] https://youtube.com/watch?v=aePo5CbjtEw

Note: It is important to note that while these apps may be useful for privacy and security, it is always important to research and evaluate them before using them to ensure they meet your specific needs and requirements.