Privacy-Focused Apps
We carefully select and analyze apps that respect your privacy and security. Each app is evaluated for its functionality, security features, and potential vulnerabilities.
All phones come pre-loaded with these privacy-respecting apps by default. You can easily remove any applications you don't need to customize your device to your specific requirements.
Verified and Pre-Downloaded Apps
All apps listed on this page have been carefully vetted, tested, and verified by our security team. These pre-selected applications prioritize your privacy and security while providing essential functionality.
Important Notice About Other Apps
While you can download additional apps through the App Store applications listed here (Aurora Store, F-Droid), we strongly advise against installing apps from unknown sources or apps that have not been vetted for privacy.
Many mainstream apps contain trackers, invasive permissions, and data collection mechanisms that may compromise your privacy. Any app installed outside our recommendations is at your own risk and may undermine the privacy protections we've implemented.
App Stores
Secure, privacy-focused app distribution platforms that prioritize open-source software and user privacy.
Communication
End-to-end encrypted messaging and calling apps that protect your conversations from surveillance.
Web Browsers
Privacy-hardened browsers with built-in tracker blocking and fingerprinting protection.
VPN Services
No-logs VPN clients from trusted providers that prioritize user privacy and security.
Email Services
Encrypted email services and clients that protect your correspondence from surveillance.
Cryptocurrency Tools
Non-custodial wallets and privacy-focused crypto tools for secure digital transactions.
Productivity & Office
Encrypted note-taking, calendar, and document apps that keep your personal data private.
Maps & Navigation
Offline mapping applications that provide navigation without location tracking.
Security Tools
Advanced security applications including password managers, 2FA, and system hardening tools.
Exploit Protection
Advanced threat response applications designed for secure data wiping and protection against device theft or seizure by threat actors.
Cloud Storage
End-to-end encrypted cloud storage services that keep your files private and secure.
Essential Utilities
Core system utilities including launchers, media players, and document readers that respect privacy.
Verify Your Device's Security
As part of our commitment to transparency and security, we provide tools and resources to help you verify that your device is secure and hasn't been compromised.
Professional Security Vetting
All applications have been carefully vetted by our team of privacy professionals for security and privacy compliance. Every app is installed without Google Play Services to ensure maximum privacy protection.
Security Auditing Tools
We include security auditing tools that can scan your device for potential vulnerabilities or signs of compromise. These tools are regularly updated to detect the latest threats.
Verified Boot
Our phones use GrapheneOS's verified boot process to ensure that the operating system hasn't been tampered with. This provides cryptographic verification of the entire OS.