Privacy-Focused Apps

We carefully select and analyze apps that respect your privacy and security. Each app is evaluated for its functionality, security features, and potential vulnerabilities.

All phones come pre-loaded with these privacy-respecting apps by default. You can easily remove any applications you don't need to customize your device to your specific requirements.

Verified and Pre-Downloaded Apps

All apps listed on this page have been carefully vetted, tested, and verified by our security team. These pre-selected applications prioritize your privacy and security while providing essential functionality.

Important Notice About Other Apps

While you can download additional apps through the App Store applications listed here (Aurora Store, F-Droid), we strongly advise against installing apps from unknown sources or apps that have not been vetted for privacy.

Many mainstream apps contain trackers, invasive permissions, and data collection mechanisms that may compromise your privacy. Any app installed outside our recommendations is at your own risk and may undermine the privacy protections we've implemented.

App Stores

3 Applications

Secure, privacy-focused app distribution platforms that prioritize open-source software and user privacy.

Anonymous browsing
FOSS repositories
No tracking or surveillance
Install apps without compromising privacy

Communication

9 Applications

End-to-end encrypted messaging and calling apps that protect your conversations from surveillance.

End-to-end encryption
Disappearing messages
Anonymous registration options
Communicate securely without metadata collection

Web Browsers

3 Applications

Privacy-hardened browsers with built-in tracker blocking and fingerprinting protection.

Advanced tracker blocking
Anti-fingerprinting technology
Tor integration available
Browse anonymously without tracking

VPN Services

2 Applications

No-logs VPN clients from trusted providers that prioritize user privacy and security.

Strict no-logs policy
Anonymous payment options
Modern WireGuard protocol
Encrypt traffic and hide your location

Email Services

6 Applications

Encrypted email services and clients that protect your correspondence from surveillance.

End-to-end encryption
Zero-access encryption
PGP/OpenPGP support
Private email that only you can read

Cryptocurrency Tools

10 Applications

Non-custodial wallets and privacy-focused crypto tools for secure digital transactions.

Non-custodial wallets
Privacy coin support
Decentralized exchange access
Secure crypto without exposing activities

Productivity & Office

5 Applications

Encrypted note-taking, calendar, and document apps that keep your personal data private.

End-to-end encryption
Offline functionality
Self-hosting options
Stay productive while maintaining privacy

Maps & Navigation

2 Applications

Offline mapping applications that provide navigation without location tracking.

Offline map support
No location tracking
OpenStreetMap data
Navigate without revealing your movements

Security Tools

8 Applications

Advanced security applications including password managers, 2FA, and system hardening tools.

Password management
Two-factor authentication
System hardening utilities
Military-grade security for your digital life

Exploit Protection

3 Applications

Advanced threat response applications designed for secure data wiping and protection against device theft or seizure by threat actors.

Emergency data wiping
Anti-forensics protection
Automated threat response
Protect sensitive data from unauthorised access

Cloud Storage

2 Applications

End-to-end encrypted cloud storage services that keep your files private and secure.

Zero-knowledge encryption
Cross-platform sync
Privacy-first design
Secure file storage without exposure

Essential Utilities

6 Applications

Core system utilities including launchers, media players, and document readers that respect privacy.

No telemetry or tracking
Permission control
Full smartphone functionality
Essential tools that maintain your privacy

Verify Your Device's Security

As part of our commitment to transparency and security, we provide tools and resources to help you verify that your device is secure and hasn't been compromised.

Professional Security Vetting

All applications have been carefully vetted by our team of privacy professionals for security and privacy compliance. Every app is installed without Google Play Services to ensure maximum privacy protection.

Security Auditing Tools

We include security auditing tools that can scan your device for potential vulnerabilities or signs of compromise. These tools are regularly updated to detect the latest threats.

Verified Boot

Our phones use GrapheneOS's verified boot process to ensure that the operating system hasn't been tampered with. This provides cryptographic verification of the entire OS.