mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-10-01 01:35:57 -04:00
366 lines
29 KiB
Markdown
366 lines
29 KiB
Markdown
|
---
|
||
|
title: "Android"
|
||
|
icon: 'simple/android'
|
||
|
---
|
||
|
|
||
|
![Android logo](assets/img/android/android.svg){ align=right }
|
||
|
|
||
|
The **Android Open Source Project** is an open-source mobile operating system led by Google which powers the majority of the world's mobile devices. Most phones sold with Android are modified to include invasive integrations and apps such as Google Play Services, so you can significantly improve your privacy on your mobile device by replacing your phone's default installation with a version of Android without these invasive features.
|
||
|
|
||
|
[:octicons-home-16:](https://source.android.com/){ .card-link title=Homepage }
|
||
|
[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation}
|
||
|
[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Source Code" }
|
||
|
|
||
|
Notavelmente, o GrapheneOS suporta [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play). Os Serviços Google Play podem ser executados como um aplicativo de usuário regular e contidos em um perfil de trabalho ou usuário [perfil](/android/#android-security-privacy) de sua escolha.
|
||
|
|
||
|
- [General Android Overview :material-arrow-right-drop-circle:](os/android-overview.md)
|
||
|
- [Why we recommend GrapheneOS over CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/)
|
||
|
|
||
|
## Derivados AOSP
|
||
|
|
||
|
We recommend installing one of these custom Android operating systems on your device, listed in order of preference, depending on your device's compatibility with these operating systems.
|
||
|
|
||
|
!!! note
|
||
|
|
||
|
![GrapheneOS logo](/assets/img/android/grapheneos.svg#only-light){ align=right }
|
||
|
![GrapheneOS logo](/assets/img/android/grapheneos-dark.svg#only-dark){ align=right }
|
||
|
|
||
|
**GrapheneOS*** é a melhor escolha quando se trata de privacidade e segurança. GrapheneOS fornece [endurecimento adicional de segurança](https://en.wikipedia.org/wiki/Hardening_(computação)) e melhorias na privacidade.
|
||
|
|
||
|
### GrapheneOS
|
||
|
|
||
|
!!! nota
|
||
|
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
|
||
|
|
||
|
Os dispositivos de "suporte estendido" da GrapheneOS não possuem patches de segurança completos (atualizações de firmware) devido à descontinuação do suporte por parte do fabricante do equipamento original (OEM).
|
||
|
|
||
|
Estes dispositivos não podem ser considerados completamente seguros. It has a [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), network and sensor permissions, and various other [security features](https://grapheneos.org/features). GrapheneOS also comes with full firmware updates and signed builds, so verified boot is fully supported.
|
||
|
|
||
|
[:octicons-home-16: Homepage](https://grapheneos.org/){ .md-button .md-button--primary }
|
||
|
[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Privacy Policy" }
|
||
|
[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation}
|
||
|
[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Source Code" }
|
||
|
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
|
||
|
|
||
|
Para acomodar usuários que precisam dos Serviços do Google Play, CalyxOS opcionalmente inclui [MicroG](https://microg.org/). Com o MicroG, CalyxOS também agrupa no [Mozilla](https://location.services.mozilla.com/) e [DejaVu](https://github.com/n76/DejaVu) serviços de localização.
|
||
|
|
||
|
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
|
||
|
|
||
|
### CalyxOS
|
||
|
|
||
|
!!! nota
|
||
|
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
|
||
|
|
||
|
![logo CalyxOS](/assets/img/android/calyxos.svg){ align=right }
|
||
|
|
||
|
**CalyxOS*** é uma alternativa decente ao GrapheneOS.
|
||
|
Possui alguns recursos de privacidade no topo do AOSP, incluindo [Datura firewall](https://calyxos.org/docs/tech/datura-details), [Signal](https://signal.org) integração no aplicativo discador, e um botão de pânico embutido. CalyxOS também vem com atualizações de firmware e compilações assinadas, portanto [boot verificado](https://source.android.com/security/verifiedboot) é totalmente suportado.
|
||
|
|
||
|
[:octicons-home-16: Homepage](https://divestos.org){ .md-button .md-button--primary }
|
||
|
[:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Onion Service" }
|
||
|
[:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Privacy Policy" }
|
||
|
[:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation}
|
||
|
[:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Source Code" }
|
||
|
[:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribute }
|
||
|
|
||
|
DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled.
|
||
|
|
||
|
DivestOS tem vulnerabilidade automática do kernel ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), menos blobs proprietários, um personalizado [hosts](https://divested.dev/index.php?page=dnsbl) arquivo, e [F-Droid](https://www.f-droid.org) como a loja de aplicativos. Inclui [UnifiedNlp](https://github.com/microg/UnifiedNlp) para localização da rede. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features).
|
||
|
|
||
|
DivestOS também inclui correções do kernel do GrapheneOS e habilita todos os recursos de segurança do kernel disponíveis via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). Todos os kernels mais novos que a versão 3.4 incluem página completa [sanitização](https://lwn.net/Articles/334747/) e todos os ~22 kernels compilados por Clang têm [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) activado. However, doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [Neo Store](https://github.com/NeoApplications/Neo-Store/) with the DivestOS repositories enabled to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.
|
||
|
|
||
|
!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
|
||
|
|
||
|
DivestOS firmware update [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) and quality control varies across the devices it supports. We still recommend GrapheneOS depending on your device's compatibility. For other devices, DivestOS is a good alternative.
|
||
|
|
||
|
Not all of the supported devices have verified boot, and some perform it better than others.
|
||
|
|
||
|
## Recursos de segurança e privacidade do Android
|
||
|
|
||
|
When purchasing a device, we recommend getting one as new as possible. The software and firmware of mobile devices are only supported for a limited time, so buying new extends that lifespan as much as possible.
|
||
|
|
||
|
Vários perfis de usuário (Configurações → Sistema → Vários usuários) são a maneira mais simples de isolar no Android. Com perfis de usuário você pode limitar um usuário de fazer chamadas, SMS ou instalar aplicativos no dispositivo. These phone variants will prevent you from installing any kind of alternative Android distribution.
|
||
|
|
||
|
Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of [IMEI blacklisting](https://www.gsma.com/security/resources/imei-blacklisting/). There is also a risk involved with you being associated with the activity of the previous owner.
|
||
|
|
||
|
A few more tips regarding Android devices and operating system compatibility:
|
||
|
|
||
|
- Remoção automática de [Exif](https://en.wikipedia.org/wiki/Exif) metadados (ativados por padrão)
|
||
|
- Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with.
|
||
|
- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details!
|
||
|
|
||
|
### DivestOS
|
||
|
|
||
|
Google Pixel phones are the **only** devices we recommend for purchase. Pixel phones have stronger hardware security than any other Android devices currently on the market, due to proper AVB support for third-party operating systems and Google's custom [Titan](https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html) security chips acting as the Secure Element.
|
||
|
|
||
|
!!! nota
|
||
|
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
|
||
|
|
||
|
![DivestOS logo](/assets/img/android/divestos.svg){ align=right }
|
||
|
|
||
|
**DivestOS** é um [soft-fork](https://en.wikipedia.org/wiki/Fork_(software_development)#Forking_of_free_and_open-source_software) de [LineageOS](https://lineageos.org/).
|
||
|
|
||
|
DivestOS herda muitos [dispositivos suportados](https://divestos.org/index.php?page=devices&base=LineageOS) do LineageOS.
|
||
|
|
||
|
Ele assinou builds, tornando possível ter [boot verificado](https://source.android.com/security/verifiedboot) em alguns dispositivos não-Pixel.
|
||
|
|
||
|
Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface.
|
||
|
|
||
|
Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones.
|
||
|
|
||
|
Os dados de cada usuário são criptografados usando sua própria chave de criptografia exclusiva, e os arquivos do sistema operacional são deixados não criptografados. O Boot Verificado garante a integridade dos arquivos do sistema operacional, impedindo que um adversário com acesso físico possa adulterar ou instalar malware no dispositivo.
|
||
|
|
||
|
A few more tips for purchasing a Google Pixel:
|
||
|
|
||
|
- If you're after a bargain on a Pixel device, we suggest buying an "**a**" model, just after the next flagship is released. Discounts are usually available because Google will be trying to clear their stock.
|
||
|
- Apenas o Google e os aplicativos de terceiros verificados podem acessar os dados da conta
|
||
|
- Look at online community bargain sites in your country. These can alert you to good sales.
|
||
|
- Google provides a list showing the [support cycle](https://support.google.com/nexus/answer/4457705) for each one of their devices. The price per day for a device can be calculated as: $\text{Cost} \over \text {EOL Date}-\text{Current Date}$, meaning that the longer use of the device the lower cost per day.
|
||
|
|
||
|
## Aplicações recomendadas
|
||
|
|
||
|
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
||
|
|
||
|
### Perfis de usuário
|
||
|
|
||
|
!!! nota
|
||
|
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
|
||
|
|
||
|
DivestOS atualização de firmware [status](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) varia entre os dispositivos que suporta.
|
||
|
|
||
|
Para telefones Pixel, ainda recomendamos o uso de GrapheneOS ou CalyxOS.
|
||
|
|
||
|
Para outros dispositivos suportados, o DivestOS é uma boa alternativa. downloads
|
||
|
|
||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.typeblog.shelter)
|
||
|
|
||
|
!!! Recomendamos que você verifique o [documentação](https://developers.yubico.com/SSH/) de Yubico sobre como configurar isso.
|
||
|
|
||
|
![logo Orbot](/assets/img/android/orbot.svg){ align=right }
|
||
|
|
||
|
**Orbot** é um aplicativo proxy gratuito que roteia suas conexões através da Rede Tor.
|
||
|
|
||
|
[Visite orbot.app](https://orbot.app/){ .md-button .md-button--primary }
|
||
|
|
||
|
**Downloads***
|
||
|
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=org.torproject.android)
|
||
|
- [:pg-f-droid: F-Droid](https://guardianproject.info/fdroid)
|
||
|
- [:fontawesome-brands-github: GitHub](https://github.com/guardianproject/orbot)
|
||
|
- [:fontawesome-brands-gitlab: GitLab](https://gitlab.com/guardianproject/orbot)
|
||
|
|
||
|
### Perfil de trabalho
|
||
|
|
||
|
!!! nota
|
||
|
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
|
||
|
|
||
|
Orbot está frequentemente desatualizado no [repositório F-Droid](https://guardianproject.info/fdroid) e [Google Play](https://play.google.com/store/apps/details?id=org.torproject.android) do Projeto Guardian, então considere fazer o download diretamente do [repositório GitHub](https://github.com/guardianproject/orbot). Todas as versões são assinadas usando a mesma assinatura, portanto devem ser compatíveis umas com as outras.
|
||
|
|
||
|
[:octicons-home-16: Homepage](https://attestation.app){ .md-button .md-button--primary }
|
||
|
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Privacy Policy" }
|
||
|
[:octicons-info-16:](https://attestation.app/about){ .card-link title=Documentation}
|
||
|
[:octicons-code-16:](https://attestation.app/source){ .card-link title="Source Code" }
|
||
|
[:octicons-heart-16:](https://attestation.app/donate){ .card-link title=Contribute }
|
||
|
|
||
|
??? downloads
|
||
|
|
||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play)
|
||
|
- [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases)
|
||
|
- [:material-cube-outline: GrapheneOS App Store](https://github.com/GrapheneOS/Apps/releases)
|
||
|
|
||
|
Auditor performs attestation and intrusion detection by:
|
||
|
|
||
|
- ⚙️ Configurações → Google → Anúncios
|
||
|
- ⚙️ Configurações → Privacidade → Anúncios
|
||
|
- The *auditor* records the current state and configuration of the *auditee*.
|
||
|
- Should tampering with the operating system of the *auditee* happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations.
|
||
|
- You will be alerted to the change.
|
||
|
|
||
|
No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring.
|
||
|
|
||
|
If your [threat model](basics/threat-modeling.md) requires privacy, you could consider using [Orbot](tor.md#orbot) or a VPN to hide your IP address from the attestation service. To make sure that your hardware and operating system is genuine, [perform local attestation](https://grapheneos.org/install/web#verifying-installation) immediately after the device has been installed and prior to any internet connection.
|
||
|
|
||
|
### Bota Verificada
|
||
|
|
||
|
!!! nota
|
||
|
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
|
||
|
|
||
|
![Logotipo do Abrigo](/assets/img/android/shelter.svg){ align=right }
|
||
|
|
||
|
**Shelter** é um aplicativo que ajuda você a aproveitar o perfil de trabalho do Android para isolar outros aplicativos. O Shelter suporta o bloqueio de busca de contatos entre perfis e compartilhamento de arquivos entre perfis através do gerenciador de arquivos padrão ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)).
|
||
|
|
||
|
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
|
||
|
[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation}
|
||
|
[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Source Code" }
|
||
|
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
|
||
|
|
||
|
??? downloads
|
||
|
|
||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play)
|
||
|
- [:simple-github: GitHub](https://github.com/GrapheneOS/Camera/releases)
|
||
|
- [:material-cube-outline: GrapheneOS App Store](https://github.com/GrapheneOS/Apps/releases)
|
||
|
|
||
|
Main privacy features include:
|
||
|
|
||
|
- Auto removal of [Exif](https://en.wikipedia.org/wiki/Exif) metadata (enabled by default)
|
||
|
- Considere as opções de preço e promoções oferecidas em [tijolo e argamassa](https://en.wikipedia.org/wiki/Brick_and_mortar) lojas.
|
||
|
- Microphone permission not required unless you want to record sound
|
||
|
|
||
|
!!! note
|
||
|
|
||
|
Como CalyxOS inclui um controlador de dispositivos, recomendamos o uso de seu perfil de trabalho embutido.
|
||
|
|
||
|
Recomenda-se um abrigo sobre [Insular](https://secure-system.gitlab.io/Insular/) e [Island](https://github.com/oasisfeng/island) pois suporta [bloqueio de busca de contatos](https://secure-system.gitlab.io/Insular/faq.html). If you enable location (in Secure Camera) that **won't** be deleted either. If you want to delete that later you will need to use an external app such as [ExifEraser](data-redaction.md#exiferaser).
|
||
|
|
||
|
### VPN Killswitch
|
||
|
|
||
|
!!! nota
|
||
|
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
|
||
|
|
||
|
![Logótipo do auditor](/assets/img/android/auditor.svg#only-light){ align=right }
|
||
|
![Auditor logo](/assets/img/android/auditor-dark.svg#only-dark){ align=right }
|
||
|
|
||
|
**Auditor** é um aplicativo que utiliza recursos de segurança de hardware para fornecer monitoramento de integridade de dispositivos para [dispositivos suportados](https://attestation.app/about#device-support). Atualmente trabalha com GrapheneOS e com o sistema operacional de estoque do dispositivo. [Visite attestation.app](https://attestation.app){ .md-button .md-button--primary }
|
||
|
|
||
|
**Downloads:**
|
||
|
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor)
|
||
|
- [:fontawesome-brands-github: GitHub](https://github.com/GrapheneOS/Auditor)
|
||
|
|
||
|
[Content-Security-Policy](https://en.wikipedia.org/wiki/Content_Security_Policy) is used to enforce that the JavaScript and styling properties within the WebView are entirely static content.
|
||
|
|
||
|
[:octicons-repo-16: Repository](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary }
|
||
|
[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Source Code" }
|
||
|
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribute }
|
||
|
|
||
|
??? downloads
|
||
|
|
||
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play)
|
||
|
- [:simple-github: GitHub](https://github.com/GrapheneOS/PdfViewer/releases)
|
||
|
- [:material-cube-outline: GrapheneOS App Store](https://github.com/GrapheneOS/Apps/releases)
|
||
|
|
||
|
## Obtaining Applications
|
||
|
|
||
|
### Alternativas Globais
|
||
|
|
||
|
GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to.
|
||
|
|
||
|
### Orbot
|
||
|
|
||
|
The Google Play Store requires a Google account to login which is not great for privacy. You can get around this by using an alternative client, such as Aurora Store.
|
||
|
|
||
|
!!! nota
|
||
|
Consulte o [Tabela de Hardware](https://openwrt.org/toh/start) para verificar se o seu dispositivo é suportado.
|
||
|
|
||
|
![Secure camera logo](/assets/img/android/secure_camera.svg#only-light){ align=right }
|
||
|
![Secure camera logo](/assets/img/android/secure_camera-dark.svg#only-dark){ align=right }
|
||
|
|
||
|
**Secure Camera** é um aplicativo de câmera focado em privacidade e segurança que pode capturar imagens, vídeos e códigos QR.
|
||
|
|
||
|
As extensões do fornecedor CameraX (Portrait, HDR, Night Sight Sight, Face Retouch e Auto) também são suportadas nos dispositivos disponíveis. [Visite github.com](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
|
||
|
|
||
|
**Downloads:**
|
||
|
- [:fontawesome-brands-google-play: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play)
|
||
|
- [:fontawesome-brands-github: GitHub](https://github.com/GrapheneOS/Camera/releases)
|
||
|
|
||
|
Aurora Store does not allow you to download paid apps with their anonymous account feature. You can optionally log in with your Google account with Aurora Store to download apps you have purchased, which does give access to the list of apps you've installed to Google, however you still benefit from not requiring the full Google Play client and Google Play Services or microG on your device.
|
||
|
|
||
|
### Abrigo
|
||
|
|
||
|
For apps that are released on platforms like GitHub and GitLab, you may be able to add an RSS feed to your [news aggregator](/news-aggregators) that will help you keep track of new releases.
|
||
|
|
||
|
![RSS APK](./assets/img/android/rss-apk-light.png#only-light) ![RSS APK](./assets/img/android/rss-apk-dark.png#only-dark) ![APK Changes](./assets/img/android/rss-changes-light.png#only-light) ![APK Changes](./assets/img/android/rss-changes-dark.png#only-dark)
|
||
|
|
||
|
#### Droid-ify
|
||
|
|
||
|
On GitHub, using [Secure Camera](#secure-camera) as an example, you would navigate to its [releases page](https://github.com/GrapheneOS/Camera/releases) and append `.atom` to the URL:
|
||
|
|
||
|
`https://github.com/GrapheneOS/Camera/releases.atom`
|
||
|
|
||
|
#### GitLab
|
||
|
|
||
|
On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate to its [project repository](https://gitlab.com/AuroraOSS/AuroraStore) and append `/-/tags?format=atom` to the URL:
|
||
|
|
||
|
`https://gitlab.com/AuroraOSS/AuroraStore/-/tags?format=atom`
|
||
|
|
||
|
#### Verifying APK Fingerprints
|
||
|
|
||
|
If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools).
|
||
|
|
||
|
1. Install [Java JDK](https://www.oracle.com/java/technologies/downloads/).
|
||
|
|
||
|
2. Download the [Android Studio command line tools](https://developer.android.com/studio#command-tools).
|
||
|
|
||
|
3. Extract the downloaded archive:
|
||
|
|
||
|
```bash
|
||
|
unzip commandlinetools-*.zip
|
||
|
cd cmdline-tools
|
||
|
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
|
||
|
```
|
||
|
|
||
|
4. Run the signature verification command:
|
||
|
|
||
|
```bash
|
||
|
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
|
||
|
```
|
||
|
|
||
|
5. The resulting hashes can then be compared with another source. Some developers such as Signal [show the fingerprints](https://signal.org/android/apk/) on their website.
|
||
|
|
||
|
```bash
|
||
|
Signer #1 certificate DN: CN=GrapheneOS
|
||
|
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
|
||
|
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
|
||
|
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
|
||
|
```
|
||
|
|
||
|
### Auditor
|
||
|
|
||
|
![F-Droid logo](assets/img/android/f-droid.svg){ align=right width=120px }
|
||
|
|
||
|
==We do **not** currently recommend F-Droid as a way to obtain apps.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are [notable problems](https://privsec.dev/posts/android/f-droid-security-issues/) with the official F-Droid client, their quality control, and how they build, sign, and deliver packages.
|
||
|
|
||
|
Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust.
|
||
|
|
||
|
Other popular third-party repositories such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that respository when they make it to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates.
|
||
|
|
||
|
That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through Play Store, Aurora Store, or by getting the APK directly from the developer. It is important to keep in mind that some apps in these repositories have not been updated in years and may rely on unsupported libraries, among other things, posing a potential security risk. You should use your best judgement when looking for new apps via this method.
|
||
|
|
||
|
!!! note
|
||
|
|
||
|
In some rare cases, the developer of an app will only distribute it through F-Droid ([Gadgetbridge](https://gadgetbridge.org/) is one example of this). If you really need an app like that, we recommend using [Neo Store](https://github.com/NeoApplications/Neo-Store/) instead of the official F-Droid app to obtain it.
|
||
|
|
||
|
## Framadate
|
||
|
|
||
|
**Please note we are not affiliated with any of the projects we recommend.** In addition to [our standard criteria](about/criteria.md), we have developed a clear set of requirements to allow us to provide objective recommendations. We suggest you familiarize yourself with this list before choosing to use a project, and conduct your own research to ensure it's the right choice for you.
|
||
|
|
||
|
!!! Considere o auto-hospedagem para mitigar esta ameaça.
|
||
|
|
||
|
![logo PrivateBin](/assets/img/productivity/privatebin.svg){ align=right }
|
||
|
|
||
|
**PrivateBin** é um pastebin online minimalista e de código aberto onde o servidor tem zero conhecimento de dados colados. Os dados são criptografados/descriptografados no navegador usando AES de 256 bits. Psono suporta compartilhamento seguro de senhas, arquivos, marcadores e e-mails.
|
||
|
|
||
|
### Software
|
||
|
|
||
|
- Must be open-source software.
|
||
|
- Must support bootloader locking with custom AVB key support.
|
||
|
- Must receive major Android updates within 0-1 months of release.
|
||
|
- Must receive Android feature updates (minor version) within 0-14 days of release.
|
||
|
- Must receive regular security patches within 0-5 days of release.
|
||
|
- Must **not** be "rooted" out of the box.
|
||
|
- Must **not** enable Google Play Services by default.
|
||
|
- Must **not** require system modification to support Google Play Services.
|
||
|
|
||
|
### Devices
|
||
|
|
||
|
- Must support at least one of our recommended custom operating systems.
|
||
|
- Must be currently sold new in stores.
|
||
|
- Must receive a minimum of 5 years of security updates.
|
||
|
- Must have dedicated secure element hardware.
|
||
|
|
||
|
### Applications
|
||
|
|
||
|
- Applications on this page must not be applicable to any other software category on the site.
|
||
|
- General applications should extend or replace core system functionality.
|
||
|
- Applications should receive regular updates and maintenance.
|
||
|
|
||
|
--8<-- "includes/abbreviations.pt.txt"
|