Questions about security, privacy and anonymity in the network and under the android | [technoblabla] general security, privacy and anonymity issues



Rep: (714)
Questions about security, privacy and anonymity on the network and under the android

Android: inspection and analysis of executable files пїЅ | VPN lovers club | Anonymous Paranoid Club



Since there are enough different topics for discussing software for Android security, private and anonymous surfing, but discussing general security, privacy and anonymity issues in them is increasingly considered offtopic, I think it makes sense to create a separate topic for this popular topic, where you can all these topics are free to speak and ask.
So you are welcome!

Safety
Since many tips and tools in the subject require superuser (root) rights, you should follow certain safety guidelines:
1. Try to do all the actions consciously, having previously studied the relevant materials and clarifying incomprehensible moments.
2. Make as many backups as possible. They can be done both with the help of custom recovery (TWRP, CWM, PhilZ Touch, Carliv, etc.), and with the help of applications that can backup all the firmware, as well as individual applications and data.
Relevant applications can be found in the section:
Software ->Backup.
Accordingly, it is worth taking care of safe storage of the created backups.
About security, all and different
Four Horsemen Infocalypse
Which apps and tools actually keep your messages safe?
Protection of confidential data and anonymity on the Internet PDF
Why backdoor encryption can destroy the security of the Internet
Save the average user: how CYPHERPUNK changed the Internet and protect online freedom
prism-break- protection from global surveillance systems such as SORM, PRISM, XKeyscore and TemporaGithub
Guardian Project
https://privacytools.io/- encryption against global mass surveillanceGithub
SECURITY IN-A-BOX- tools and tactics for digital security
GitHub - ValdikSS / awesome-anti-censorship: curated list of open-source anti-censorship tools
danoctavian / awesome-anti-censorship: curated list of open-source anti-censorship tools
GitHub - StreisandEffect / streisand- Wiring, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, Sslh, Stunnel, and a Tor bridge. It also generates custom instructions for all of these services. You can be shared with friends, family members, and fellow activists.
sovereign / sovereign: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
https://ssd.eff.org/- Tips, Tools and How-tos for Safer Online Communications
How to protect Android: 10 tips for maximum security PDF
Mission Impossible: Hardening Android for Security and Privacy PDF
eBlocker- hardware and software platform
De-Googling my phone В· Martin Pitt
nomoregoogle.com - a fresh collection of alternatives to the services of the technology giant
Project SAFE "I have nothing to hide"
They will find, if they wish. What is the price of this anonymity online? Attached fileThe price of this anonimnosti.pdf(105.2 KB)

Big data
Information Security
Information Security - Wikipedia
Personal Data Protection - Wikipedia
OPSEC for Linux users, developers and administrators
The basic model of threats to the security of personal data when they are processed in personal data information systems
Internet counterintelligence in action: create a personal information security management system
Information technology social hacking
The art of "teaching protection of information" ... while giving a ton of good-will and non-speaking words PDF
DLP
IPC
Massachusetts Institute of Technology. Lecture course # 6.858. "Security of computer systems." Nikolai Zeldovich, James Mykens. year 2014
MIT course "Computer Systems Security". Lecture 1: "Introduction: threat models", part 1
MIT course "Computer Systems Security". Lecture 1: "Introduction: threat models", part 2
MIT course "Computer Systems Security". Lecture 1: "Introduction: threat models", part 3
MIT course "Computer Systems Security". Lecture 2: "Control of hacker attacks", part 1
MIT course "Computer Systems Security". Lecture 2: "Control of hacker attacks", part 2
MIT course "Computer Systems Security". Lecture 2: "Control of hacker attacks", part 3
MIT course "Computer Systems Security". Lecture 3: "Buffer overflow: exploits and protection", part 1
MIT course "Computer Systems Security". Lecture 3: "Buffer overflow: exploits and protection", part 2
MIT course "Computer Systems Security". Lecture 3: "Buffer overflow: exploits and protection", part 3
MIT course "Computer Systems Security". Lecture 4: "Separation of privileges", part 1
MIT course "Computer Systems Security". Lecture 4: "Separation of privileges", part 2
MIT course "Computer Systems Security". Lecture 4: "Separation of privileges", part 3
MIT course "Computer Systems Security". Lecture 5: "Where Security Errors Come From", Part 1
MIT course "Computer Systems Security". Lecture 5: "Where Security Errors Come From", Part 2
MIT course "Computer Systems Security". Lecture 6: "Opportunities", part 1
MIT course "Computer Systems Security". Lecture 6: "Opportunities", part 2
MIT course "Computer Systems Security". Lecture 6: "Opportunities", part 3
MIT course "Computer Systems Security". Lecture 7: "Sandbox Native Client", part 1
MIT course "Computer Systems Security". Lecture 7: "Sandbox Native Client", part 2
MIT course "Computer Systems Security". Lecture 7: "Sandbox Native Client", part 3
MIT course "Computer Systems Security". Lecture 8: "Model of network security", part 1
MIT course "Computer Systems Security". Lecture 8: "Model of network security", part 2
MIT course "Computer Systems Security". Lecture 8: "Model of network security", part 3
MIT course "Computer Systems Security". Lecture 9: "Web application security", part 1
MIT course "Computer Systems Security". Lecture 9: "Web Application Security", part 2
MIT course "Computer Systems Security". Lecture 9: "Web Application Security", part 3
MIT course "Computer Systems Security". Lecture 10: "Symbolic execution", part 1
MIT course "Computer Systems Security". Lecture 10: "Symbolic execution", part 2
MIT course "Computer Systems Security". Lecture 10: "Symbolic Execution", part 3
MIT course "Computer Systems Security". Lecture 11: “Ur / Web programming language”, part 1
MIT course "Computer Systems Security". Lecture 11: “Ur / Web programming language”, part 2
MIT course "Computer Systems Security". Lecture 11: "Ur / Web programming language", part 3
MIT course "Computer Systems Security". Lecture 12: "Network Security", part 1
MIT course "Computer Systems Security". Lecture 12: "Network Security", part 2
MIT course "Computer Systems Security". Lecture 12: "Network Security", part 3
MIT course "Computer Systems Security". Lecture 13: "Network Protocols", part 1
MIT course "Computer Systems Security". Lecture 13: "Network Protocols", part 2
MIT course "Computer Systems Security". Lecture 13: "Network Protocols", part 3
MIT course "Computer Systems Security". Lecture 14: "SSL and HTTPS", part 1
MIT course "Computer Systems Security". Lecture 14: "SSL and HTTPS", part 2
MIT course "Computer Systems Security". Lecture 14: "SSL and HTTPS", part 3
MIT course "Computer Systems Security". Lecture 15: "Medical software", part 1
MIT course "Security of computer systems". Lecture 15: "Medical software", part 2
MIT course "Security of computer systems". Lecture 15: "Medical software", part 3
MIT course "Security of computer systems". Lecture 16: "Attacks through the side channel", part 1
MIT course "Security of computer systems". Lecture 16: "Attacks through the side channel", part 2
MIT course "Security of computer systems". Lecture 16: "Attacks through the side channel", part 3
MIT course "Security of computer systems". Lecture 17: User Authentication, Part 1
MIT course "Security of computer systems". Lecture 17: User Authentication, Part 2
MIT course "Security of computer systems". Lecture 17: User Authentication, Part 3
MIT course "Computer Systems Security". Lecture 18: "Private Internet Browsing", part 1
MIT course "Security of computer systems". Lecture 18: "Private Internet browsing", part 2
MIT course "Computer Systems Security". Lecture 18: "Private Internet Browsing", part 3
MIT course "Computer Systems Security". Lecture 19: “Anonymous Networks”, part 1 (lecture from the creator of the Tor network)
MIT course "Computer Systems Security". Lecture 19: “Anonymous Networks”, part 2 (lecture from the creator of the Tor network)
MIT course "Computer Systems Security". Lecture 19: “Anonymous Networks”, part 3 (lecture from the creator of the Tor network)
MIT course "Computer Systems Security". Lecture 20: "Security of mobile phones", part 1
MIT course "Computer Systems Security". Lecture 20: “Mobile Phone Security”, part 2
MIT course "Computer Systems Security". Lecture 20: "Mobile Phone Security", part 3
MIT course "Computer Systems Security". Lecture 21: "Tracking data", part 1
MIT course "Computer Systems Security". Lecture 21: "Tracking data", part 2
MIT course "Computer Systems Security". Lecture 21: "Tracking data", part 3
MIT course "Computer Systems Security". Lecture 22: MIT Information Security, Part 1
MIT course "Computer Systems Security". Lecture 22: MIT Information Security, Part 2
MIT course "Computer Systems Security". Lecture 22: MIT Information Security, Part 3

Online services
Bitcoin
VPN
Auto removal
Website archiving
Mobile networks
Platforms
Search
post office
A review of several postal services Attached filee-mail providers - who choose the .pdf?(1.05 MB)

Comparative table of postal services
Free Webmail for Better Privacy
List of Secure Email Providers that take privacy serious
RiseUp
https://riseup.net/- Riseup offers a means of online communication for groups and individuals involved in the socio-liberation activities. We - a project dealing with the creation of democratic alternatives and to exercise the right to self-determination by the control for their own safety communication tools.
Autistici
https://autistici.org/- We believe that the world can be much better. We try to contribute to its change, providing activists, groups and collectives platforms for freer communication and digital tools to protect the integrity of their own.
Our beliefs are simple enough: the world should not be built on the money, it is based should be based on solidarity, soobschnost, mutual, equal rights and freedoms and social justice.
We believe that communication should be free - and free - and therefore available everywhere.
Cock.li
https://cock.li/- service for mail and XMPP
Dismail
Disroot
Easy
HideMyAss
Kolab Now
mailbox
Mailinator
Protonmail
Safe mail
SCRYPTmail
Tutanota

Checks
Abuse
APK
Cloudflare
DNS
IP
Sip
SSL / TLS
URL
Harmful
miscellanea
Certificates
Speed
Leaks
Vulnerabilities
Encryption

Synchronization
Social networks
Storage
Encryption


Radical Servers

Regulations

Forum
"Free Web" | Free internet is discussed in the topic.
Amnesiagroup corner
Benga1983 corner
commandos98
DoberPC corner
Corner of elenakawai
Fahren-heit
Formobe corner
Corner IcanTellstories
JumpingJerry Corner
Corner Ruiz_Av
Tomin corner
Wernow corner
About potential threats (Post wernow # 51543260)
On threat groups (Post wernow # 51550069)
About open code (Post wernow # 51902449)
Selling information (Post wernow # 52003733)
About toolkit (Post wernow # 52015424)
About providers in android (Post wernow # 52061764)
On complete privacy and security (Post wernow # 53580616)
About F-Droid, messengers and priorities (Post wernow # 59144989)
About F-Droid and open source (Post wernow # 59151363)
About Fingerprint (Post wernow # 61458449)
About biometrics (Post wernow # 61564247)
About wiretapping and protection from it (Post wernow # 62796218)
On leaks and anonymous networks (Post wernow # 66632070)
About file attributes (Post wernow # 66682128)
About USSD (Post wernow # 66793981)
How to take a dump via tcpdump (Post wernow # 66824767)
About the causes of problems with modules Xposed (Post wernow # 67999793)
On the priorities of threats (Post wernow # 68333815)
About UID 1000 (The Post wernow # 68613246)
On the interaction of DuckDuckGo and Yandex (Post wernow # 68635660)
About DuckDuckGo Algorithms (Post wernow # 68655630)
On the hardware protection device (Post wernow # 69275830)
On the protection of the port microUSB (Post wernow # 69281156)
About threats and liability (Post wernow # 69293509)
About threats, fictional worlds and time (Post wernow # 69309907)
On service traffic (Post wernow # 69566867)
On the infrastructure Telegram (Post wernow # 70323319)
About China (Post wernow # 73860971)
About China (Post wernow # 73863824)
About China (Post wernow # 73880680)
About messengers (Post wernow # 73969101)
About Antivirus (Post wernow # 74161934)
About China (Post wernow # 74950096)
About malware testing and emulators (Post wernow # 75074647)
About Google Data Collection (Post wernow # 76081812)
About repairing devices (Post wernow # 76537920)
About inspections in China (Post wernow # 76539879)
About device checks (Post wernow # 77754685)
On digital capitalism (Post wernow # 78044951)
About Telegram and the Future (Post wernow # 78053170)
About the registration of instant messengers in the Russian Federation (Post wernow # 78739705)
About famous cryptographers (Post wernow # 78739705)
On anonymity (Post wernow # 78927918)
About VPN (Post wernow # 79392952)
On the set and disagreement (Post wernow # 79458293)
On the hidden record and the legislation of the Russian Federation (Post wernow # 79511161)
About microcopy and data protection (Post wernow # 79670518)
About IMEI registration in the Russian Federation (Post wernow # 79852809)
On the registration of IMEI in the Russian Federation (Post wernow # 79858616)
About changing IMEI (Post wernow # 80654422)
About bookmarks in chips (Post wernow # 80781651)
About bookmarks in chips and checking them (Post wernow # 80786808)
About bookmarks in chips (Post wernow # 80817610)
About removing EXIF ​​(Post wernow # 80944444)
Analysis of EXIF ​​(Post wernow # 80973859)
yhnyhn11


Software
Compatibility Test Suite (CTS)
GApps
microG GmsCore is a FLOSS framework- framework for replacing original Google Play services
NanoDroid- implementation of Play Services Core (open source)
NOGAPPS Project
/ d / gapps- program to remove / disable Gapps (open source)
GSM
Android IMSI-Catcher Detector- identifies fake base stations (IMSI-Catcher) in GSM / UMTS networks (open source)
В®Darshak- helps to detect "silent" sms, signs of phone tapping, lack of communication encryption on Samsung Galaxy S3 (GT I9300) (open source)
EAGLE Security- protection against listening in the form of determining false base stations and blocking access of applications to the camera and microphone (closed source code)
Network cell info- shows the location of cells on the map and measures the signal strength of the serving cell and neighboring cells (closed source code)
В®SnoopSnitch- makes a map of attacks on devices with a Qualcomm chip (open source)
Hips
Binderfilter
Binderfilter- IPC Binder call control system in the core (open source)
Picky - an application for managing BinderFilter filters (open source)
Commandos98 corner

Donkeyguard
Donkeyguard- Xposed-module allows you to block access of applications to personal data (open source)
Protect My Privacy
Protect My Privacy- Xposed module for managing application permissions (closed source)
Post Whitestar # 68400078
Xprivacy
Xprivacy- Xposed-module that allows you to prevent the leakage of your personal data through the application, control it or replace it to choose from (open source)
XPrivacyLua
XPrivacyLua- Xposed-module for Marshmallow +, which allows you to prevent the leakage of your personal data through applications, control it or replace it with a choice (open source)
XPrivacyLua Official Site
XPrivacyLua repo
Frequently Asked Questions
Comparison with XPrivacy
Forum

Sensors
Sensor Disabler- Xposed-module that allows you to disable and change the values ​​for all sensors available in the device (open source)
Camera
Camera block- temporarily disables and blocks all camera resources and denies access to the camera for other applications (closed source code)
Disable at the kernel level (Post Dementy000 # 79737060)
Microphone
Mic block- temporarily disables and blocks access to the microphone for other applications (closed source code)
Microphone Guard Plus- protection against listening
Ultrasound


Kernel / Shell
Busybox
В®BusyBox- BusyBox installer for Android (open source)
В® BusyBox- application to install BusyBox (open source)
BusyBox Install (No Root)- install BusyBox on devices without root (closed source code)
В®Busybox On Rails- installs BusyBox on the device, and also updates it to the current version (open source)
Entware
Logcat
Root
В® Dianxinos SU- Root access control (closed source)
В®Magisk - The Universal Systemless Interface- a utility that allows you to install various system applications and mods in systemless mode and hide the root from any applications and services (open source)
В® SuperSU- Advanced access control for superuser rights to applications on the device that require root (closed source code)
В® Superuser- a program for managing ROOT rights (open source)
В® Superuser- superuser rights management (open source)
Superuser- superuser rights management (open source)
В®Superuser X (L)- root-access for applications without intermediaries (closed source code)
Concealment
Rootcloak- Xposed-module that allows you to hide the presence of root for applications (open source)
В®suhide- suhide utility allows you to hide the presence of ROOT on your Android device (open source)

SELinux
SELinuxModeChanger- change SELinux mode
Terminal
Android Terminal Emulator- terminal emulator (open source)
Termux- terminal emulator with an extensive collection of Linux packages (open source)

Launcher
AppAsLauncher- allows you to select any third-party program as a launcher (closed source code)
T-UI F-Droid- launcher with terminal (open source)
Linux
Linux for tablet
BOCHS for Android- OS launch for x86
Complete Linux Installer- we install Linux on Android
Debian noroot- debian emulator
GNURoot- installation on Android Wheezy, Gentoo, Fedora or Aboriginal without root rights (open source)
GNURoot Debian- launch Debian on Android devices (open source)
В® Linux Deploy- automate the process of installing, configuring and running GNU / Linux distributions on the Android platform inside the chroot container (open source)
В® Linux Installer- Installing Debian / Ubuntu on Android devices
PureOS

QEMU for Android- starts any OS in the img and iso image
XServer XSDL- X server for Android, which allows displaying Linux graphic applications running on an external computer or installed in the chroot Android device
Replacing Android on the desktop distribution
Recovery
update-script
Android Script Creator- a program for creating scripts (update.zip)
Update Script Generate- program for creating updater-script (update.zip) based on boot.img and system.img for any processor in which it is possible to flash system images in img format (ext2, ext3, ext4)

SafetyNet
SafetyNet Helper Sample- a simple utility to check the status of SafetyNet (open source)
Sip
Ostel Setup (Post ANPolter # 47912222)
CSipSimple- functional SIP client (open source)
Linphone Video- Internet phone using VoIP (open source)
SMS / MMS
Image SMS- sending image via SMS (open source)
Encryption
Dark SMS- exchange of encrypted SMS messages, the ability to password protect SMS messages on the phone (closed source code)
Silence- SMS / MMS application that supports encryption (open source)
The wall- application for sending and receiving SMS messages encrypted with the AES algorithm (closed source code)

Tts
SVOX Classic Text To Speech Engine- reading text with voice for other applications
Webview
Android System WebView- Android WebView system component is based on Chrome technology and allows you to view web content in applications
Bromite
Bromite- WebView implementation without WebRTC and protected from some other digital fingerprints (open source)
SystemWebView releases
Installing SystemWebView
Forum


Automators
Easer
В®Easer F-Droid- automation of actions on events (connection to WiFi, Bluetooth, on time, location) (open source)
Tasker

USB
Blocking domains and ads
В® AdAway- ad blocker with white and black lists support (open source)
Adblocker reborn
Adblocker reborn- Xposed-module, blocks AdView, AdActivity, receivers, services, WebView and Hosts, while not touching the hosts file itself and does not conflict with the blockers that use it (open source)
DNSfilter- Blocker to DNS advertisements (Open source)

DNS6- allows you to block hosts via DNS through a local VPN service (open source)
В® MinMinGuard- Xposed-module for blocking ads inside applications (open source)
PeerBlock For Android- Xposed-module that allows you to block hosts and DNS (open source)
Silent- Xposed ad-blocking module (closed source)
UnbelovedHosts- Xposed-module, blocking calls to domain names that distribute advertising (closed source code)
Browsers
Chromium
Brave
Browser Brave: Fast AdBlock- Chromium-based web browser with built-in AdBlock, tracking protection and security system (open source)
Bromite
Bromite- Chromium based browser with ad blocker and privacy protection (open source)

Firefox
Firefox- a browser from the developers of Mozilla (open source)
Firefox focus- Mozilla browser with automatic blocking of a wide range of online trackers (open source) F-Droid
Firefox GOST- Firefox fork with Russian cryptography support
Icecatmobile
Icecatmobile- fork of Firefox browser that meets the requirements of completely free software (open source)
Iceraven
Iceraven (ex. Iceweasel)- is a web browser for Android, based on Mozilla versions, Fenix ​​from Firefox, GeckoView and Mozilla All Android components.
Librefox
Librefox- additions in privacy and security to Firefox (open source)
Waterfox
Waterfox browser- browser on the engine Gecko, which continues to support the "obsolete" according to the new Mozilla policy additionsopen source)
Waterfox - The free, open and private browser
Waterfox - Wikipedia
Fennec F-Droid
Fennec F-Droid- Fork Firefox browser with a fully open source

Add-ons
Adnauseam

anonymoX

Bluhell firewall- restriction of advertising and redirects
CanvasBlocker- prohibition of browser fingerprint identification
Certainly Something (Certificate Viewer)- view certificates
Certificate Patrol- certificate management
CheckMyHTTPS- verification of the certificate of the secure connection (open source)
Decentraleyes- protection against tracking through centralized CDN
Easy image blocker- image loading control
HTTP UserAgent cleaner- increased privacy (randomly replacing the UserAgent, canvas, locale fields, blocking WebRTC, etc.), blocking ajax and requests to third-party sites and unnecessary cookies, security assessment https (TLS) connections, phishing protection
HTTPS Everywhere- replacement in addresseshttp: //onhttps: //
Mobile Password Manager- view and edit saved passwords
NoScript- blocking scripts and plug-ins, protection against XSS and Clickjacking attacks
Onion Browser Button- connect to Tor in one click
Phony- substitution of User Agent
Random Agent Spoofer- change profiles at a specified time interval
RequestPolicy Continued- control of cross-domain requests
Save / Load Prefs- export and import of Firefox settings
Self-Destructing Cookies- automatic cleaning Cookies and LocalStorage
Speed ​​Tweaks (SpeedyFox)- setting preferences for browser acceleration
Spoof Timezone- time zone change
Third-party Request Blocker (AMO)- blocking requests to third-party resources
uMatrix- firewall with blocking of scripts, frames, etc.
User-Agent Switcher- change User-Agent
wow-dpi- bypass Russian blocking without the need to use proxy, Tor, etc.

F (L) OSS Browser
Privacy browser
Tor
Fire.onion (Browser + Tor)- anonymous web browser (open source)
Orfox
Orfox: Tor Browser for Android- a secure browser for Android based on Mozilla Firefox (open source)
Tor browser

TORnado (Browser + TOR)- anonymous web browser (closed source)

Notes
Note Crypt Pro- creation of encrypted (AES 128 bits, CBC, PKCS5Padding, random IV, PBKDF2WithHmacSHA1) tag database with support for tags (open source)
Swift notes- work with text files, encryption, setting a password, sending (closed source code)
Calls
Lock
Root Call SMS Manager- manager of blocking incoming and outgoing calls and SMS (closed source code)

Calendars
Calendar Calendar F-Droid- simple calendar with additional CalDAV synchronization, recurring events and reminders (open source)
Business calendar- functional calendar (closed source code)
Cameras
Bacon camera- camera with manual settings for devices that do not support Camera2Api (closed source code)
Open camera- multifunctional camera (open source)
Simple camera- multifunctional camera (open source)
Cards
Keyboards
The best keyboard for Android -savagemessiahzine.com
AnySoftKeyboard
AnySoftKeyboard- virtual keyboard with support for multiple languages ​​(open source)
Hacker's Keyboard
Hacker's Keyboard- A full 5-row keyboard with Tab / Esc / Ctrl keys with a separate number block (open source)
Jbak keyboard
Jbak keyboard- a beautiful and fast keyboard with a bunch of settings and features (open sourceNow closed)
Jbak2 keyboard
Jbak2 keyboard- a safe professional beautiful and fast keyboard, with a bunch of settings and features, without access to the Internet (open source)
Multiling O Keyboard
Simple keyboard
Simple keyboard- customizable keyboard with minimal resolutions (open source)

Contacts
Open contacts- creation and use of a separate contact database (open source)
SA Contacts- export phonebook contacts to Excel and vice versa (closed source code)
Save contacts to txt- allows you to save selected contacts downloaded from the phone book as a text file in TXT format, which can be sent by email (closed source code)
Simple contacts- creation and use of a separate contact database (open source)
VCF
VCF Contacts
VCF Contacts- opens .vcf files in the form of a phone book and allows you to add, delete, edit contacts, make calls (closed source code)
On the potential leak (Lent okomand # 69542431)


Messengers
Messenger Comparison - Wikipedia
Comparison of instant messengers - Wikreality
Comparison of instant messaging clients - Wikipedia
Comparison of LAN messengers - Wikipedia
Digital Communications Protocols
SECURE MESSAGING APPS COMPARISON
Tails - mobile messaging
True Private Messaging: 7 Apps to Encrypt Your Chats PDF
Crypto-resistant androids. Why encryption in Signal, WhatsApp, Telegram and Viber will not protect your correspondence from hacking PDF
Encrypt correctly! Why messengers do not protect the secret of your correspondence
Encrypt correctly! Choose an instant messenger for secure and private correspondence.
Encrypt correctly! Choose an instant messenger for secure and private correspondence.
Actor
Actor- centralized messenger (there is an email registration) based on the MTProto v2 protocol (open source)
Bitseal
Bitseal- decentralized transmission of encrypted messages to another subscriber or many subscribers (open source)
Bleep
Bleep (alpha)- decentralized messenger (there is a registration by email or anonymously) (closed source code)
Briar
Briar- messenger that works on the basis of secure Tor networks, as well as Wi-Fi and Bluetooth (open source)
Briar Beta - Open Source - News
Briar - Darknet Messenger ... Or Good News From The Dark Dungeon Mesh Networks
Chat.onion
Chat.onion- decentralized messenger based on the Tor network (anonymous registration) (open source)
Delta chat
Delta chat- centralized instant messenger with end-to-end encryption using the selected mail domain as the server (open source)
Delta chat
Delta makes chatting better
Contribute
Dib2Qm
Dib2Qm- IMAP and QuickMSG-based email messaging (open source)
Eleet
Eleet Private Messenger- private messenger (registration by phone number or anonymously) (closed source code)
Choosing a secure messenger for android devices: Eleet Private Messenger
Jitsi
Jitsi - Wikipedia- Internet telephony and instant messaging system
Jitsi (open source)
Jitsi meet (open source)
Jingle
Kontalk
Kontalk- client-server messenger (registration by phone number) based on XMPP (open source)
Nextcloud talk
Nextcloud talk- the extension of the Nextcloud platform, allowing you to make protected audio and video calls, as well as exchange text messages (open source)
Nextcloud talk
QuickMSG
QuickMSG- mail client with PGP support (open source)
RetroShare
RetroShare- a decentralized messenger based on the platform of the same name (open source)
Ring
Ring- decentralized messenger with e2e encryption (anonymous registration) (open source)
Ring (program) - Wikipedia
Riot
Riot- decentralized messenger (anonymous registration) (open source)
Safeum
Safeum- encrypted multimedia messenger (there is an email registration) (closed source code)
Signalal
Silent phone
Silent phone- paid instant messenger (anonymous registration) with encryption of audio and video calls and text messages (open source)
Signal-Server source code
Surespot
Surespot- client-server instant messenger (anonymous registration) for secure exchange of text messages, photos and voice notes for up to 10 seconds (open source)
Has secure IM app Surespot been compromised by the feds?
Telegram
Telegram F-Droid- client-server messenger (registration by phone number) based on the MTProto protocol (open source client, closed source server code)
Plus Messenger- unofficial client for Telegram (open source client)
MTProto - Wikipedia
Documentation

Proxy
Telegram Open Network (TON)

Security issues Telegram
Callback to Telegram developers
Is Telegram Safe? Or as I was looking for a bookmark in MTProto
Potential Android Telegram Vulnerability
Telegram attack for 2 ^ 64 operations, and why the supervillain doesn't need it
About the intricacies of privacy in the Telegram Bots API: "this is not a bug, this is a feature"
Why two-factor authentication in Telegram does not work
How to hack Telegram and WhatsApp: special services are not needed
Telegram entered in the register of information dissemination organizers
Telegram itself adds someone else's contacts? This is the norm
Telegram will ask for a passport
Why Telegram Passport is No End to End
Vulnerability in Telegram can compromise secret chats.
We reveal the numbers of Telegram users
Telegram messenger merges metadata to everyone
Telegram was unsafe
Iranian company intercepted all Telegram traffic
Telegram accused of storing messages in unencrypted form
Telegram will still share user data with special services.
"Media Factory" Eugene Prigogine constantly talks about the vulnerability of the telegram. Is it all scary?
Telegram Security Analysis PDF
Telegram, AKA “Stand back, we have Math PhDs!”
About the "safest" telegram
Comparison with Signal (Post neonedrid # 73388860)
About location tracking (Post Aeronliru # 68454877)
Company

Threema
Tox
Antox- decentralized messenger (anonymous registration) for confidential communication (open source)
TRIfA- tox client in active development (open source)
Tok - Encrypted Messenger- Exchange messages and files through encryption and without a centralized server with support for group chats. (open source)
Whatsapp
Wire
XMPP
Chatsecure

Conversations- XMPP client with encryption support and Android HIG design (open source)
Freelab messenger- XMPP client, fork Conversations (closed source)
IM + All-in-One Mobile Messenger- supports all popular instant messaging services: Facebook, ICQ, VKontakte, Mail.Ru Agent, Classmates. Gadu-Gadu, RenRen, mig33, SINA Weibo, Fetion and Jabber (closed source)
Jasmine im- IM client for quick and easy communication, ICQ, QIP, VK, Jabber, etc. (closed source)
Pix-Art Messenger F-Droid- fork of a well-known XMPP Conversations client with additional features (open source)
Sj im- XMPP client that supports automatic encryption of PGP (OTR) messages (closed source code)
Zom Mobile Messenger- XMPP client, focused on simplicity and security (open source)
Xabber- universal Jabber client (open source)

Location
Location Spoofer

Cleaning
Wipe for Android
Andro shredder- permanently delete files and SMS (closed source code)
File shredder- utility for permanently deleting files (closed source code)
IShredder 3- permanently delete files, photos, sms, contacts (closed source code)
В® SD Maid - System Cleaning- cleaning "tails" for remote applications (closed source)
Undeleter- permanently delete files of some types (closed source code)
shell

Passwords
bitwarden
bitwarden- client-server password manager (open source)
Keepass
Keepass2Android
Keepass2Android- password manager (open source)
AutoFill plugin- plugin for auto-complete (open source)

KeePassDroid- password manager (open source)
Password store
Password store- password manager compatible withpass (open source)
SealNote Secure Encrypted Note
SealNote Secure Encrypted Note- notes, registration data under encryption 256-bit AES (open source)
SuperGenPass

Payment systems
post office
Fairmail
K-9
K-9 Mail- mail client (open source)
p≡p
pretty easy privacy p≡p F-Droid- mail client with OpenPGP, key exchange via p2p, key import from other clients (open source)
Protonmail
ProtonMail - Encrypted Email- Email web service with encryption support (open source web version)
ProtonMail IMAP / SMTP Bridge- ProtonMail integration with any programs that support IMAP and SMTP
TempMail
TempMail- creation of temporary mailboxes on the site temp-mail.ru (closed source code)
Tutanota
Tutanota- Email web service with encryption support (open source)

Backup
Helium- backup and synchronization, the ability to work without root using the desktop client
В®oandbackup- create backup copies of applications with data (open source)
В® Titanium Backup- backup applications and user data
Nandroid
Nandroid Browser- extract and use separate files from nandroid backup
В® Nandroid Manager- allows you to view, explore and edit your Nandroid backups
Online Nandroid Backup * root- makes CWM / TWRP compatible backup without loading into recovery
В® Orange Backup- a program to create compatible with CWM and TWRP backups and synchronization with the cloud
Repositories
App & Gamesavagemessiahzine.com- view and check for updates of applications and games laid out onsavagemessiahzine.com
APKPure App- alternative application market
Aptoide- client-server application of an alternative market
APKUpdater- can check for updates for programs on popular alternative services APKMirror and APKPure (open source)
Aurora Store
Aurora Store- search and download programs from the Google Play Store without the Google Services Framework, fork of the Yalp Store (open source)

Blackmart- alternative to applanet and the like
F-Droid
F-Droid- repository of open source software (open source)
Second Security Audit Results

Open store- the application allows developers to create their own repositories with applications for Android
Yalp Store
Yalp Store- search and download programs from the Google Play Store without the Google Services Framework (open source)

Network
Ad-hoc / Mesh
Android Intercom- calls via bluetooth and Wi-Fi in the local network
Anyfi
Anyfi- mesh network of devices via Wi-Fi
Serval mesh
Gilga

Wi-Fi talkie- voice chat, chat and file sharing without the Internet within the Wi-Fi network
Freenet
Freenet- An ad hoc network provides access to decentralized anonymous communication and data storage. (Open source)
Yggdrasil
Yggdrasil- Connect to a network on android Yggdrasil (Open source)
MAC
macchanger

В® Change My MAC- change the MAC address of your Android device (closed source)
В® Pry-Fi- change the MAC address of your device (closed source code)
В®Wireless Mac Address Changer- changes the MAC address of the device to any other and restores the original back (closed source code)
DNS
AndroDNS F-Droid- configure DNS queries (open source)
Daedalus- change DNS settings via VPN tunnel (open source)
DNS man- change DNS for selected Wi-Fi networks (open source)
В®Override DNS- DNS change with built-in list of servers (closed source code)
Cloudflare
DNSCrypt
Tunneling
iodine- binary files for tunneling through a DNS server (open source)
AndIodine- tunneling through a DNS server using VPN Api (open source)
Element53 (DNS Tunnel)- tunneling through a DNS server (open source)

i2p
i2p- access to the anonymous I2P network
OONI
ooniprobe- a global observation network client for detecting censorship and traffic manipulation on the Internet (open source)
Proxy
Privoxy
ProxyDroid
В® ProxyDroid- HTTP / SOCKS4 / SOCKS5 proxy with automatic inclusion by SSID (open source)
Shadowsocks
Shadowsocks- fast SOCKS5 proxy with traffic encryption (open source)

Ssh
Tor
Orbot
Orbot- the ability to use the Tor network for anonymous surfing (open source)
How to set up Tor in Android - turn on Orbot
orWall
orWall- firewall for use in conjunction with Orbot, may conflict with other firewalls (open source)

VNC
VMLite VNC Server- control of the Android device through the browser
VPN
The Best VPN Services
Bitmask
Bitmask- VPN and encrypted (OpenPGP) email support (open source)
Openvpn
Open VPN Connect
Open VPN Connect- OpenVPN client (closed source)
OpenVPN Connect Android FAQ
OpenVPN Client
OpenVPN Client- a client with rich capabilities (for example, with a painless TAP connection option without root) for connecting to OpenVPN (closed source code)
VPN Client Pro- a client with rich capabilities (for example, with a painless TAP connection option without root) for connecting to a VPN (closed source code)
OpenVPN for Android

Outline
Wireguard
Wireguard- client for connections to the WireGuard tunnels (open source)

WebRTC
AtrizA Conference- WebRTC based conferences
UniComm- private p2p communications based on WebRTC (open source)
Zyptonite
Zyptonite- secure decentralized p2p platform

Wi-Fi
В®fqrouter2- turning the smartphone into a wi-fi repeater and not only
В® WiFi TX power- WiFi power control
Wi-Fi Direct
NearShare- communication and file transfer via WiFi Direct
SuperBeam | WiFi Direct Share- wireless data transfer directly between devices (including using WiFi Direct technology)
Wi-Fi cast- transfer files via Wi-Fi using the access point built into the phone (without an external Wi-Fi router)
WiFi Shoot! WiFi Direct- wireless data transfer directly between devices (WiFi Direct technology)
Protection
В®ARP guard- traffic interception / redirection protection
В® Wifi Protector- detection and prevention of ARP attacks on your phone in Wi-Fi networks
Wi-Fi Privacy Police- prevents connection to unknown networks and sending a list of known networks (open source)

Monitoring
Connection list- View all available TCP device connections
Network connections- monitoring of incoming / outgoing connections
В®Network Log- monitoring network connections
Tinny network monitor- monitor network connection
Pentesting
Pentesting

В®AndroDumpper (WPS Connect)- check Wi-Fi router vulnerabilities
В® bitShark- traffic sniffer
В®CSploit- penetration testing (hacking) in a Wi-Fi network
В® DroidSheep- scanning and interception of web sessions (profiles)
В® DroidSniff- allows you to scan and intercept web sessions of users sitting under one wifi
В® dSploit- an application for analyzing and assessing network security, searching for known vulnerabilities, real-time traffic manipulation, spoofing
В® FaceNiff- scanning and interception of Internet sessions
В® Intercepter-NG (ROOT)- multifunctional network sniffer
iwscan Analyzer [ROOT]- analyzer of networks 802.11 a / b / g / n / ac, Bluetooth, LTE, WCDMA, GSM
В®Netcut- allows you to automatically scan the network, receive data about connected devices and, if necessary, disable them
@Network Spoofer- sniffer
В®Network utilites (Test version)- a set of tools to work with the network, as well as intercept / monitor / redirect traffic within your network
Packet capture- allows you to intercept network traffic with SSL decryption
В®Packet Sniffer- viewing and analyzing packages
Proxymon SSL [ROOT]- debugger of open and secure TCP connections at the data level
Р’В® Reaver-GUI for Android- hacking wifi from devices with bcm4329 / 4330 wifi chipset
Router keygen- key generator for wi-fi routers
В® Shark for Root + Shark Reader- traffic sniffer and view dumps in .pcap format
SSLUnpinning- Xposed-module that allows you to make the substitution of certificates in applications (open source)
В® Wi.cap. Network sniffer- package sniffer for ROOT devices
WIBR + WIfi BRuteforce hack- generation of WEP / WPA / WPA2 keys to all Wi-Fi point
В®WIFI WPS WPA TESTER (ROOT)- attempt to connect to some access points using known vulnerabilities
В®WifiAccess WPS WPA WPA2- check Wi-Fi router vulnerabilities
В® WiFiKill- disable "extra" users of the WiFi network
В®WiFree WPS- Wi-Fi hacking (WPS PIN + Router Keygen)
В®WPS connect- connect to a wireless network using the WPS protocol
В®zANTI- security assessment of Wi-Fi networks
Social networks
Diaspora
dandelion *- communication in the social network Diaspora (open source)
Mastodon

Firewalls
AFWall
В® AFWall +- restriction of application access to the Internet (open source, fork DroidWall)
FAQ В· ukanth / afwall Wiki

В® Android Firewall- firewall on Android (open source, fork DroidWall)
В® DroidWall- restriction of application access to the Internet based on iptables (open source)
Lightningwall- Xposed module, firewall for installed applications (closed source)
Netguard- blocks access to applications (both user and system) access to the Internet (via wi-fi or mobile) without root (open source)
NoRoot Firewall
NoRoot Firewall- firewall that does not require root-rights (closed source code)
Firewall for Android


Signaling
Car alarm
Car alarm- determination of the alarm condition in the protected object using a microphone and / or accelerometer and signaling about it in various ways
Haven
Haven: Keep Watch- an application using various sensors (camera, microphone, gyroscope, accelerometer, light sensor) to record changes in the location of the device (open source)
Snowden introduced a mobile application for protection from surveillance
Edward Snowden has created a paranoid mobile app.

Data synchronization
BitTorrent Sync
BitTorrentВ® Sync- allows you to synchronize your files between different devices (closed source)
DAVdroid
DAVdroid- CalDAV / CardDAV synchronization (open source)
Folderseync
Folderseync- cloud synchronization with support for various services and protocols (closed source)
Syncthing
Syncthing- application for distributed data synchronization (open source)
Syncthing-silk- distributed synchronization of files between devices (open source)
Cloud data storage
Degoo
100 GB free space: Degoo- cloud file storage service (closed source code)
MEGA
MEGA- client for cloud Mega (closed source)
Nextcloud
- sync files with the Nextcloud server (open source)
ownCloud
ownCloud- synchronization of files with the ownCloud server (open source)


System
Notifications
Toast
Xtoast- Xposed module for managing pop-up notifications (closed source)

Runtime
ART Checker- check runtime (closed source)
Monitoring
OS Monitor- system monitoring (open source)
Simple system monitor- system monitor and task manager (closed source code)
Substitution
Android Device Changer- Xposed-module, which allows applications to change IMEI, Android Id, Serial Number, Wifi Mac, SSID, Google advertising id, Bluetooth Mac devices for applications (closed source code)
Device faker- Xposed-module that allows you to change the device to make it look like another (closed source code)
Device ID Masker- Xposed-module that allows you to replace many of the characteristics of the device (closed source code)
Phone Id Changer Pro- Xposed module that allows applications to change IMEI, Android Id, Serial Number, Wifi Mac Address, SSID (closed source code)
IMEI
В®Chamelephon- IMEI change for devices on MediaTek 65XX processors (closed source)
В®GhostPhone- IMEI change on MediaTek 65xx / 67xx processors (closed source code)
IMEI Changer- Xposed-module that allows you to change the IMEI device (closed source code)


Steganography
Pixelknot- allows you to hide text messages in images (open source)
Application Management
LuckyPatcher
В® LuckyPatcher by ChelpuS- application manager
My Android Tools
My Android Tools- disable / enable activity, service, receiver, provider for any applications (closed source code)
Lists of disabled services / receivers / activites / providers for different applications
Per App Hacking
Per App Hacking- Xposed-module to control the behavior of applications (open source)

APK
APK Editor
ApkCrack (AETool)
ApkCrack (AETool)- tool for editing apk-files
Apktool
Apktool- decompilation, recompilation, application signature
MT Manager
В® MT Manager- editing, translating, cloning, encrypting, signing and optimizing user and system (without installing frameworks) apk-files

Windows
APK-Info- view APK information (open source)

Analysis
Apk analyzer- allows you to explore applications on the device, providing a detailed report not only about installed programs, but also about uninstalled apk files
App Detective- gives the most complete array of various data on the installed APK, including their contents and online analysis
AppBrain Ad Detector- identification of potential problems of all applications installed on the device
Exodus
Inspeckage
Inspeckage- Xposed-module for dynamic analysis of installed applications (open source)

Mobile Security Framework- a platform for testing mobile applications (Android / iOS / Windows), fully automated and capable of performing static and dynamic data analysis, identifying potential problems of all applications installed on the device (open source)
Frost
В®AirFrozen ~ Disabler (ROOT)- freeze (stop) applications (open source)
Cloning
App cloner- creation (without the presence of root) modified clones of some programs (closed source code)
Sandboxes
Island
Island- execution of applications in the sandbox (closed source)
Android: Island - a utility for isolating and freezing applications without root
Shelter
Shelter- running applications in the sandbox (open source)
UserControl
UserControl- execution of applications in the sandbox (closed source)
VirtualXposed
VirtualXposed- execution of applications in the sandbox with partial support for Xposed (open source)

Permissions
Android Permissions- shows the list of permissions of installed applications (open source)
App Settings
App Settings- Xposed-module for fine-tuning applications, including permission management (open source)
v1.16

App Ops
App Ops- disables selective permissions for selected applications (closed source code)
Analysis of the work (Post xynta123 # 64938074)

AppOpsX- client for Android AppOpsService (open source)
App Ops - Permission manager- application permissions management (closed source)
AppOpsXposed- Xposed-module, restoring the functionality of the App Ops system permission manager on Android 4.4.2 and higher (open source)
Permission master- Xposed module for working with application permissions (closed source)
APK
Advanced permission manager- removal of permissions from apk (closed source)
APK Permission Remover- removal of permissions from apk (closed source)
Permission Manager (re-installer apps)- provision and prohibition of application rights by reinstalling them (closed source code)

Hiding
AppHider- hiding applications (closed source)

Vulnerabilities
BlueBorne Vulnerability Scanner by Armis- check device for BlueBorne vulnerability
Bluebox Security Scanner- check device for the presence of Master-key vulnerabilities
Stagefright Detector- device scan for Stagefright vulnerability
Trustable by Bluebox- a tool for researching publicly known system vulnerabilities
VTS for Android- a tool for researching publicly known system vulnerabilities
Files
Recovery
В® DiskDigger- recovery of deleted pictures, photos, videos, saving recovered files and the ability to send them to the mail
Dumpster - Recycle Bin- file basket
В® Hexamob Recovery PRO- recover deleted files
Undeleter- recovery of files deleted from SD-cards and internal memory
Forum

Images
Exif
Exif_Editor- full EXIF ​​editor
ExifTool- viewing and editing the extended information of image files (closed source code)
Photo editor- a program for high-quality photo processing (viewing, changing or deleting EXIF ​​data)
Photo exif editor- allows you to view, edit and delete Exif photo data
Scrambled exif- removal of metadata from images (open source)

Media
MediaInfo- obtaining technical information from audio and video files (open source)

File sharing
Encryption
Cryptography- encryption, training and hashed tool.
Algorithms: Understandable and animated- Animated guide catalog on algorithms.
Cryptomator Beta (Unreleased)- encrypt files in cloud storage and access them on all your devices
Derandom- prediction of pseudo-random numbers (open source)
EDS
EDS (Encrypted Data Store)- creation and management of encrypted containers TrueCrypt, VeraCrypt, LUKS, CyberSafe (closed source code)
Android: Protecting personal data. EDS: Overview and usage example.
Encfs
В® Cryptonite- data encryption on the device and in Dropbox (open source)
Encdroid- creation of encrypted folders on the device and in Dropbox
MiXplorer


В® EncPassChanger- change the password of the standard encryption section / data
Luks
В® LUKS Manager- creation and management of encrypted LUKS containers
Midnight murmur
Midnight murmur- encryption / decryption of files and text messages with a free design of the encryption procedure
PGP
Secrecy
Secrecy- encrypt files with AES256 (open source)
S.S.E.
Secret Space Encryptor (S.S.E Universal Encryption App)- encoder (AES, RC6, Serpent, Blowfish, Twofish, GOST-28147, Threefish (in Pro version), SHACAL-2 (in Pro version)) text and files, password manager (open source)
Encrypted for Android: Application S.S.E

Lock screens
App Lock (HI App Lock)- an application to block and protect confidential information
App Lock (Smart App Protector)- protects installed applications with a password or lock, and also prevents the screen from turning off and switching to landscape mode while applications are running from a user-defined list
CyanLockScreen- Xposed module to expand the lock screen on 4x4, 5x5 and 6x6 pixels
Cyclic Lock- Xposed-module for cycling PIN / password / pattern keys
DroidLock: Dynamic Lockscreen- screen lock, where PIN can be time, battery charge, etc.
В® GravityBox- Xposed-module with the ability to shuffle PIN numbers on the lock screen
Knock Lock-App Lock Pro- functional customizable screen blocker
Knock lock- allows you to select the lock area on the display to enable the "Knock Lock" feature
Lockdown- blocking applications with various keys
Lockmod- Xposed module for customizing the lock screen on Lollipop and above
Maxlock- Xposed-module that allows you to block the launch of applications (open source)
Picture Password Lockscreen- lock screen with support for drawing points, lines and circles
PIN / Pattern Shortcuts- Xposed-module that allows you to open different applications with different PIN codes
ScreenLock - Time Password- time based lock screen
Shortcut Lock Screen Mod [MM]- Xposed module for setting lock screen shortcuts on Marshmallow
Smart lock- protection of any installed applications with a password
Smart lock screen- floating screen lock button
Timepin- lock screen with PIN based on time
Data
Locker- clearing data after exceeding the maximum number of attempts to unlock the device
Selfdestruction Unlocking- deleting folders on the memory card and clearing the device memory when the limit of incorrect attempts to unlock the screen comes (closed source code)
Wrong pin shutdown- turning off the device when exceeding the limit of screen unlock attempts (open source)

Energy saving
Tips to improve power saving devices on Android OS
Wakelock
Wakelock detector- search for the cause of the device not falling asleep
Firmware
Useful


Option Caps TC

There is no curator in the subject. If there is a user in the subject who wants to become a Curator and the correspondingAnnouncement: Requirements for Candidates, he can apply in the topicI want to be curator(after having studied the topic header and all materials for curators). Prior to the appointment of a curator for filling caps, please contactmoderatorssection through a buttonPictureunder the messages to which you want to add links.



Post has been editedferhad.necef - 11.11.20, 07:28
Reason for editing: Fennec F-Droid



Rep: (714)
Yhnyhn11 @ 12/21/17, 00:31*
Cloud will connect and work with it like a folder, inside you create a container folder and copy the file to it.

I'm not contrary and that, but all previously seen options were working in a different way (although, maybe you simply painted the scheme on the other side).
How normal ENCFS works: A encrypted directory is created, and then decrypted at a specified point of mounting.
Accordingly, the reversive (reverse) ENCFS: The specified directories are encrypted in a certain virtual point of mounting (which may be the newly agreed RDDC), from which they fall into the cloud.

Post has been editedokouser - 21.12.17, 03:50



Rep: (239)
* okouser,
Everything, with such a chewed description, I understood what it was about. There is a direct, encrypted catalog is mounted in decoded formfor the userit myself, so hiding the true content of the directory from it (if you rename the suffix .encfs folders to automatically recognize and mount stops and you can go and see encrypted files), other file managers and clouds will see everything as it is, and Not as shown by Mixplorer for the user who knows the password.

Post has been editedyhnyhn11 - 21.12.17, 03:55



Rep: (714)
Yhnyhn11 @ 12/21/17, 00:51*
himself

And in Mixplorer you can not specify your own directory to decryption?



Rep: (7)
* okouser, Can you install Mixplorer and permerees?
I created the Encfs folder on the outer map. Then just copied the files there. Through Mixplorer, after entering the password, all files are visible decoded. You can work with them normally. But if you do the same with the cloud, then when you try to view the contents of the file - asks you to save in a temporary folder or direct link.



Rep: (239)
* okouser,
Alas, no, I do not watch the ability to change the settings
Attached Image

But as far as I understand it, it is still compatible with standard implementations and potentially they can. Most likely, for most users, the custom montage path was unnecessary, well, you can try to communicate with the author. Mixplorer from the box can create symlinks (if you have root), but it's still not that
* Zalexi,
With the cloud, the situation is different, there is no file on the phone, the option in the temporary folder should work in the idea, but again I'm not sure how it will be with its change, whether the machine pumped with a machine, but with references and ENCFS there may be problems

Post has been editedyhnyhn11 - 21.12.17, 04:03



Rep: (714)
Zalexi @ 12/21/17, 00:56*
Can you install Mixplorer and permerees?

Somehow maybe)
I am one of that breed who gives guidance, direction, advice, questions, and practice - a secondary matter)
Here we have hereyhnyhn11 Specialist in it.
Maybe tells.
Maybe someone from the experts will appear.
Yhnyhn11 @ 12/21/17, 00:59*
Custom Mounting Path was unnecessary

Clear.
I wonder how it is done.
Because if it is suddenly possible, a failure is possible that the decrypted catalog can completely replace the encrypted, then ...
I think, on the list of mount points you can say a lot.

Post has been editedokouser - 21.12.17, 04:14



Rep: (239)
* okouser,
If you consider that I do not use almost all of its functions ... Yes, like that lately, it is not particularly particularly often the file managers on the phone on the phone ...
Hmm, EDS successfully lit a container from Mixplorer, but in the opposite direction I did not come out
UPD as such a mount there is no, all this works without a root, most likely just a kind of "deception" of the user, it simply shows the decrypted data and it does not work outside this file marker

Post has been editedyhnyhn11 - 21.12.17, 04:24



Rep: (714)
Zalexi @ 12/21/17, 00:56*
But if you do the same with the cloud, then when you try to view the contents of the file - asks you to save in a temporary folder or direct link.

It seems to me that it is a bad practice.
I mean, those or other methods of simultaneous bilateral synchronization.
Cloud in the form of Dropbox is a backup copy, and not a system with version control, time, etc.
If you need to view files from the cloud on some device, it is at first to synchronize them into the key directory.
yhnyhn11 @ 12/21/17, 01:09*
he just shows the decrypted data and it does not work outside this file marker

Well, I hope, at least encryption Encfs present, and the key does not melt in the air.

Post has been editedokouser - 21.12.17, 04:30



Rep: (239)
* okouser,
Slightly above, I wrote, EDS completely lit it like a container, tomorrow I will create a couple of different on the PC and I will try to rain Mixplorer-y



Rep: (248)
In the header presentedMultiling O Keyboard + emoji, It seems to be even with my feed. But there is one moment, in the topic I presented itexplained. Those., If you periodically update and pelt the database, you can have access to information entered in almost original form. Because, even a year later, I can extract the essence and logic from these binary combinations.

Post has been editedtweed_man - 21.12.17, 09:45



Rep: (3167)
* tweed_man All keyboards with this feature have such a problem. And if it is also synchronized with the server ... then in general))



Rep: (248)
* ferhad.necef,
I did not disassemble the keyboards. But at the same from Google, I cannot find the bases in a similar open form, although this function works.



Rep: (3167)
* tweed_man , /data/data/com.google.android.InputMethod.latin/Files/Personal
It seems here.
PySy: just can not be that the keyboard remembers and it is impossible to find)

Post has been editedferhad.necef - 21.12.17, 10:20



Rep: (248)
Ferhad.necef @ 12/21/2017, 13:13*
It just can't be that the keyboard remembers and it is impossible to find)

Google is very hither. There is no databases there, what we say about, but from the fact that there is, you need to add in files - ".db", TK everything goes without extensions.

Post has been editedtweed_man - 21.12.17, 11:30



Rep: (3167)
Tweed_man @ 12/21/17, 11:28*
db
And if you add?



Rep: (248)
Ferhad.necef @ 12/21/2017, 14:31*
And if you add?

Well, I wrote above .. - There are no databases with couples.
Somewhere google all this hides only for your use)



Rep: (714)
* tweed_man
Clear, add to the header.
Those. If you do not use the prediction of words, then there are no problems?



Rep: (927)
Zalexi @ 12/21/17, 03:02*
Openkeychain
Cheto suspiciously ... open source code, but permits for suckers ...
So, as I understood in the latest versions and the location asks. What for?
Probably the workers do at the beginning of the open application, so that everyone calmed down, studied, and then Batz - and push some poodle ...
Zalexi @ 12/21/17, 03:02*
Communication - Telegram

Who wants to hide everyone, this does not use it at all.

Posted on 12/21/2017, 13:19:

Zalexi @ 12/21/17, 03:02*
Mixplorer is free, but closed and suddenly merges something.

Free - can already say that you do not at the expense of your pocket, but at the expense of manipulation over you.
He himself used quite a long Mixplorer, but did not experience anything about anything, because first: I didn't even feel the smell of the Internet, chopped everything you can: APM + Xprivacy + Afwall, secondly: the big scandal would have risen on the XDA There was something wrong here, I shake this program on the site, and I unsubscribe about the bugs there.
Switched to xplore, because More convenient for me, and also made him Amnesia about the Internet, and do not care that he has cool network capabilities and convenience, just removed everything from the main menu as regards network functional. If it is necessary, there is a browser and file sharing.

Post has been editedWhitestar - 21.12.17, 13:22



Rep: (927)
OKOUSER @ 12/21/17, 04:50*
Knowing Xiaomi, big doubts that there are no "left" connections.

Where is the Xiaomi?They are not connected.
Here Siaomi:Mi FileExplorer



Rep: (237)
And the king is not real! : Hysterics ::I am one of that breed who gives guidance, direction, advice, questions, and practice - a secondary matter)- And your smartphone is apparently no - never scropy has not laid out, and I don't want to poke in clave or can't ..

OKOUSER @ 19.12.17, 16:25*
P.S. You do not be offended, but once the topic is about anonymity and, respectively, denyonimization, then you can joke, if there is a reason.

.. although we need to think again, perhaps everything is completely different .. And then I, as I do not tell who, and the screensors, and the contents, and confess, and about sins .. on a silent .. It is necessary to revise the views and take from the older example

I looked at this booming desire to stuff through so much robber my "encryptions" into some clouds and not understand this philosophy, do not understand .. How did Zhvanetsky quoted it , without finite practical application? .. And do not forget that Delet is not at all - when you will appear to the Most High, all these files will be extracted and presented!
Eh, they took me what hackers by the generator of ideas - I would suggest it so much - it would be swam! .. In the meantime, the refrigerator is flushed, earned, but empty .. But once they do not take - it means that they themselves already know and work, plunge!
Hackers can secure a comfortable existence, only selling other people's passwords.

I thought to smell on everything and encrypt the whole phone, but I read that the productivity drops and changed my mind.But there is a way out: Apple! And everything is "encrypted", and over the performance here again "worked":http://m.interfax.ru/592790. )

Russians will judge for the illegal acquisition of GPS tracker
The tracker is equipped with a portable radio microphone with information transmission function through cellular channels, which allows you to classify it as a special technical tool for sewaging information.
Well, what then do not judge for the smartphone? oxymoron!

So it's fine on your own logic: no devices - no threats IB
My logic is different: there are max autonomous, independent and in contact with mines with an external world, a device - the threat of IB are reduced to min! OK, my interests do not coincide with the majority, I am supervised on this holiday, stopping propaganda! .. Posts a stream ..

Post has been editedxynta123 - 21.12.17, 14:53


Full version    

Help     rules

Now: 30.12.20, 16:44