Hardening Android
These mitigations are kept as simple as possible, with tools found in most Androids. Some things are harder to cover. For example, each manufacturer has its own privacy settings somewhere, and there are even a growing number of alternatives that do not report everything you do to Google.
Accounts and authentication
Services and applications
- Introduction
- Application stores
- Research before installing apps
- Unwanted apps list
- Remove unwanted apps
- Secure browsers that protect your privacy
- Change your default applications
- Use a secure messaging service
- Use secure email services
- Use SSH tunnels
- Use a VPN service
- Use a Tor proxy
- Change MAC address
- Edit hosts file
Privacy
Operations security
Guards! Guards!