mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2024-10-01 01:35:57 -04:00
9e35e2ef8a
Signed-off-by: Daniel Gray <dngray@privacyguides.org>
354 lines
30 KiB
Markdown
354 lines
30 KiB
Markdown
---
|
|
title: "Android"
|
|
icon: 'simple/android'
|
|
description: Vous pouvez remplacer le système d'exploitation de votre téléphone Android par ces alternatives sécurisées et respectueuses de la vie privée.
|
|
---
|
|
|
|
![Logo d'Android](assets/img/android/android.svg){ align=right }
|
|
|
|
**Android Open Source Project** est un système d'exploitation mobile open source dirigé par Google qui équipe la majorité des appareils mobiles dans le monde. La plupart des téléphones vendus avec Android sont modifiés pour inclure des intégrations et des applications invasives telles que Google Play Services. Vous pouvez donc améliorer considérablement votre vie privée sur votre appareil mobile en remplaçant l'installation par défaut de votre téléphone par une version d'Android dépourvue de ces fonctionnalités invasives.
|
|
|
|
[:octicons-home-16:](https://source.android.com/){ .card-link title=Page d'accueil }
|
|
[:octicons-info-16:](https://source.android.com/docs){ .card-link title=Documentation}
|
|
[:octicons-code-16:](https://cs.android.com/android/platform/superproject/){ .card-link title="Code source" }
|
|
|
|
Voici les systèmes d'exploitation, les appareils et les applications Android que nous recommandons pour optimiser la sécurité et la confidentialité de votre appareil mobile. Pour en savoir plus sur Android :
|
|
|
|
[Présentation générale d'Android :material-arrow-right-drop-circle:](os/android-overview.md ""){.md-button}
|
|
|
|
[Pourquoi nous recommandons GrapheneOS plutôt que CalyxOS :material-arrow-right-drop-circle:](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/ ""){.md-button}
|
|
|
|
## Dérivés de AOSP
|
|
|
|
Nous vous recommandons d'installer l'un de ces systèmes d'exploitation Android personnalisés sur votre appareil, classés par ordre de préférence, en fonction de la compatibilité de votre appareil avec ces systèmes d'exploitation.
|
|
|
|
!!! note "À noter"
|
|
|
|
Les appareils en fin de vie (tels que les appareils à "support étendu" de GrapheneOS ou de CalyxOS) ne disposent pas de correctifs de sécurité complets (mises à jour de micrologiciel) en raison de l'arrêt du support par le constructeur. Ces appareils ne peuvent pas être considérés comme totalement sûrs, quel que soit le logiciel installé.
|
|
|
|
### GrapheneOS
|
|
|
|
!!! recommendation
|
|
|
|
![Logo GrapheneOS](assets/img/android/grapheneos.svg#only-light){ align=right }
|
|
![Logo GrapheneOS](assets/img/android/grapheneos-dark.svg#only-dark){ align=right }
|
|
|
|
**GrapheneOS** est le meilleur choix en matière de confidentialité et de sécurité.
|
|
|
|
GrapheneOS apporte des améliorations supplémentaires en matière de [renforcement de la sécurité](https://fr.wikipedia.org/wiki/Durcissement_%28informatique%29) et de confidentialité. Il dispose d'un [allocateur de mémoire renforcé](https://github.com/GrapheneOS/hardened_malloc), d'autorisations pour le réseau et les capteurs, et de diverses autres [fonctions de sécurité](https://grapheneos.org/features). GrapheneOS est également livré avec des mises à jour complètes du micrologiciel et des versions signées, de sorte que le démarrage vérifié est entièrement pris en charge.
|
|
|
|
[:octicons-home-16: Page d'accueil ](https://grapheneos.org/){ .md-button .md-button--primary }
|
|
[:octicons-eye-16:](https://grapheneos.org/faq#privacy-policy){ .card-link title="Politique de confidentialité" }
|
|
[:octicons-info-16:](https://grapheneos.org/faq){ .card-link title=Documentation}
|
|
[:octicons-code-16:](https://grapheneos.org/source){ .card-link title="Code source" }
|
|
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuer }
|
|
|
|
GrapheneOS prend en charge [Sandboxed Google Play](https://grapheneos.org/usage#sandboxed-google-play), qui exécute les [Services Google Play](https://fr.wikipedia.org/wiki/Services_Google_Play) entièrement sandboxed comme toute autre application normale. This means you can take advantage of most Google Play Services, such as [push notifications](https://firebase.google.com/docs/cloud-messaging/), while giving you full control over their permissions and access, and while containing them to a specific [work profile](os/android-overview.md#work-profile) or [user profile](os/android-overview.md#user-profiles) of your choice.
|
|
|
|
Google Pixel phones are the only devices that currently meet GrapheneOS's [hardware security requirements](https://grapheneos.org/faq#device-support).
|
|
|
|
### DivestOS
|
|
|
|
!!! recommendation
|
|
|
|
![Logo DivestOS](assets/img/android/divestos.svg){ align=right }
|
|
|
|
**DivestOS** est un léger dérivé de [LineageOS](https://lineageos.org/).
|
|
DivestOS hérite de nombreux [appareils pris en charge](https://divestos.org/index.php?page=devices&base=LineageOS) de LineageOS. Il a des versions signées, ce qui permet d'avoir un [démarrage vérifié](https://source.android.com/security/verifiedboot) sur certains appareils non-Pixel.
|
|
|
|
[:octicons-home-16: Page d'accueil](https://divestos.org){ .md-button .md-button--primary }
|
|
[:simple-torbrowser:](http://divestoseb5nncsydt7zzf5hrfg44md4bxqjs5ifcv4t7gt7u6ohjyyd.onion){ .card-link title="Service oignon" }
|
|
[:octicons-eye-16:](https://divestos.org/index.php?page=privacy_policy){ .card-link title="Politique de confidentialité" }
|
|
[:octicons-info-16:](https://divestos.org/index.php?page=faq){ .card-link title=Documentation}
|
|
[:octicons-code-16:](https://github.com/divested-mobile){ .card-link title="Code source" }
|
|
[:octicons-heart-16:](https://divested.dev/index.php?page=donate){ .card-link title=Contribuer }
|
|
|
|
DivestOS has automated kernel vulnerability ([CVE](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures)) [patching](https://gitlab.com/divested-mobile/cve_checker), fewer proprietary blobs, and a custom [hosts](https://divested.dev/index.php?page=dnsbl) file. Its hardened WebView, [Mulch](https://gitlab.com/divested-mobile/mulch), enables [CFI](https://en.wikipedia.org/wiki/Control-flow_integrity) for all architectures and [network state partitioning](https://developer.mozilla.org/en-US/docs/Web/Privacy/State_Partitioning), and receives out-of-band updates. DivestOS also includes kernel patches from GrapheneOS and enables all available kernel security features via [defconfig hardening](https://github.com/Divested-Mobile/DivestOS-Build/blob/master/Scripts/Common/Functions.sh#L758). All kernels newer than version 3.4 include full page [sanitization](https://lwn.net/Articles/334747/) and all ~22 Clang-compiled kernels have [`-ftrivial-auto-var-init=zero`](https://reviews.llvm.org/D54604?id=174471) enabled.
|
|
|
|
DivestOS implements some system hardening patches originally developed for GrapheneOS. DivestOS 16.0 and higher implements GrapheneOS's [`INTERNET`](https://developer.android.com/training/basics/network-ops/connecting) and SENSORS permission toggle, [hardened memory allocator](https://github.com/GrapheneOS/hardened_malloc), [exec-spawning](https://blog.privacyguides.org/2022/04/21/grapheneos-or-calyxos/#additional-hardening), [JNI](https://en.wikipedia.org/wiki/Java_Native_Interface) [constification](https://en.wikipedia.org/wiki/Const_(computer_programming)), and partial [bionic](https://en.wikipedia.org/wiki/Bionic_(software)) hardening patchsets. 17.1 and higher features GrapheneOS's per-network full [MAC randomization](https://en.wikipedia.org/wiki/MAC_address#Randomization) option, [`ptrace_scope`](https://www.kernel.org/doc/html/latest/admin-guide/LSM/Yama.html) control, and automatic reboot/Wi-Fi/Bluetooth [timeout options](https://grapheneos.org/features).
|
|
|
|
DivestOS uses F-Droid as its default app store. Normally, we would recommend avoiding F-Droid due to its numerous [security issues](#f-droid). However, doing so on DivestOS isn't viable; the developers update their apps via their own F-Droid repositories ([DivestOS Official](https://divestos.org/fdroid/official/?fingerprint=E4BE8D6ABFA4D9D4FEEF03CDDA7FF62A73FD64B75566F6DD4E5E577550BE8467) and [DivestOS WebView](https://divestos.org/fdroid/webview/?fingerprint=FB426DA1750A53D7724C8A582B4D34174E64A84B38940E5D5A802E1DFF9A40D2)). We recommend disabling the official F-Droid app and using [Neo Store](https://github.com/NeoApplications/Neo-Store/) with the DivestOS repositories enabled to keep those components up to date. For other apps, our recommended methods of obtaining them still apply.
|
|
|
|
!!! warning "Avertissement"
|
|
|
|
L'[état](https://gitlab.com/divested-mobile/firmware-empty/-/blob/master/STATUS) des mises à jour du micrologiciel DivestOS et le contrôle de la qualité varient selon les appareils qu'il prend en charge. Nous recommandons toujours GrapheneOS en fonction de la compatibilité de votre appareil. Pour les autres appareils, DivestOS est une bonne alternative.
|
|
|
|
Tous les appareils pris en charge ne disposent pas d'un démarrage vérifié, et certains le font mieux que d'autres.
|
|
|
|
## Appareils Android
|
|
|
|
When purchasing a device, we recommend getting one as new as possible. The software and firmware of mobile devices are only supported for a limited time, so buying new extends that lifespan as much as possible.
|
|
|
|
Avoid buying phones from mobile network operators. These often have a **locked bootloader** and do not support [OEM unlocking](https://source.android.com/devices/bootloader/locking_unlocking). These phone variants will prevent you from installing any kind of alternative Android distribution.
|
|
|
|
Be very **careful** about buying second hand phones from online marketplaces. Always check the reputation of the seller. If the device is stolen, there's a possibility of [IMEI blacklisting](https://www.gsma.com/security/resources/imei-blacklisting/). There is also a risk involved with you being associated with the activity of the previous owner.
|
|
|
|
A few more tips regarding Android devices and operating system compatibility:
|
|
|
|
- Do not buy devices that have reached or are near their end-of-life, additional firmware updates must be provided by the manufacturer.
|
|
- Do not buy preloaded LineageOS or /e/ OS phones or any Android phones without proper [Verified Boot](https://source.android.com/security/verifiedboot) support and firmware updates. These devices also have no way for you to check whether they've been tampered with.
|
|
- In short, if a device or Android distribution is not listed here, there is probably a good reason. Check out our [forum](https://discuss.privacyguides.net/) to find details!
|
|
|
|
### Google Pixel
|
|
|
|
Google Pixel phones are the **only** devices we recommend for purchase. Pixel phones have stronger hardware security than any other Android devices currently on the market, due to proper AVB support for third-party operating systems and Google's custom [Titan](https://security.googleblog.com/2021/10/pixel-6-setting-new-standard-for-mobile.html) security chips acting as the Secure Element.
|
|
|
|
!!! recommendation
|
|
|
|
![Google Pixel 6](assets/img/android/google-pixel.png){ align=right }
|
|
|
|
Les appareils **Google Pixel** sont connus pour avoir une bonne sécurité et prendre correctement en charge le [Démarrage Vérifié](https://source.android.com/security/verifiedboot), même lors de l'installation de systèmes d'exploitation personnalisés.
|
|
|
|
À partir des **Pixel 6** et **6 Pro**, les appareils Pixel bénéficient d'un minimum de 5 ans de mises à jour de sécurité garanties, ce qui leur assure une durée de vie bien plus longue que les 2 à 4 ans généralement proposés par les constructeurs concurrents.
|
|
|
|
[:material-shopping: Boutique](https://store.google.com/category/phones){ .md-button .md-button--primary }
|
|
|
|
Secure Elements like the Titan M2 are more limited than the processor's Trusted Execution Environment used by most other phones as they are only used for secrets storage, hardware attestation, and rate limiting, not for running "trusted" programs. Phones without a Secure Element have to use the TEE for *all* of those functions, resulting in a larger attack surface.
|
|
|
|
Google Pixel phones use a TEE OS called Trusty which is [open-source](https://source.android.com/security/trusty#whyTrusty), unlike many other phones.
|
|
|
|
The installation of GrapheneOS on a Pixel phone is easy with their [web installer](https://grapheneos.org/install/web). If you don't feel comfortable doing it yourself and are willing to spend a bit of extra money, check out the [NitroPhone](https://shop.nitrokey.com/shop) as they come preloaded with GrapheneOS from the reputable [Nitrokey](https://www.nitrokey.com/about) company.
|
|
|
|
A few more tips for purchasing a Google Pixel:
|
|
|
|
- If you're after a bargain on a Pixel device, we suggest buying an "**a**" model, just after the next flagship is released. Discounts are usually available because Google will be trying to clear their stock.
|
|
- Consider price beating options and specials offered at physical stores.
|
|
- Look at online community bargain sites in your country. These can alert you to good sales.
|
|
- Google provides a list showing the [support cycle](https://support.google.com/nexus/answer/4457705) for each one of their devices. The price per day for a device can be calculated as: $\text{Cost} \over \text {EOL Date}-\text{Current Date}$, meaning that the longer use of the device the lower cost per day.
|
|
|
|
## Applications générales
|
|
|
|
We recommend a wide variety of Android apps throughout this site. The apps listed here are Android-exclusive and specifically enhance or replace key system functionality.
|
|
|
|
### Shelter
|
|
|
|
!!! recommendation
|
|
|
|
![Logo Shelter](assets/img/android/shelter.svg){ align=right }
|
|
|
|
**Shelter** est une application qui vous aide à tirer parti de la fonctionnalité Profil de Travail d'Android pour isoler ou dupliquer des applications sur votre appareil.
|
|
|
|
Shelter prend en charge le blocage de la recherche de contacts entre profils et le partage de fichiers entre profils via le gestionnaire de fichiers par défaut ([DocumentsUI](https://source.android.com/devices/architecture/modular-system/documentsui)).
|
|
|
|
[:octicons-repo-16: Dépôt](https://gitea.angry.im/PeterCxy/Shelter#shelter){ .md-button .md-button--primary }
|
|
[:octicons-code-16:](https://gitea.angry.im/PeterCxy/Shelter){ .card-link title="Code source" }
|
|
[:octicons-heart-16:](https://www.patreon.com/PeterCxy){ .card-link title=Contribuer }
|
|
|
|
??? downloads "Téléchargements"
|
|
|
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=net.typeblog.shelter)
|
|
|
|
!!! warning "Avertissement"
|
|
|
|
Shelter est recommandé par rapport à [Insular](https://secure-system.gitlab.io/Insular/) et [Island](https://github.com/oasisfeng/island) car il prend en charge le [blocage de la recherche de contact](https://secure-system.gitlab.io/Insular/faq.html).
|
|
|
|
En utilisant Shelter, vous accordez une confiance totale à son développeur, car Shelter agit en tant qu'[Administrateur de l'appareil](https://developer.android.com/guide/topics/admin/device-admin) pour créer le Profil de Travail, et il a un accès étendu aux données stockées dans ce dernier.
|
|
|
|
### Auditor
|
|
|
|
!!! recommendation
|
|
|
|
![Logo d'Auditor](assets/img/android/auditor.svg#only-light){ align=right }
|
|
![Logo d'Auditor](assets/img/android/auditor-dark.svg#only-dark){ align=right }
|
|
|
|
**Auditor** est une application qui exploite les fonctions de sécurité matérielle pour assurer le contrôle de l'intégrité des [appareils pris en charge](https://attestation.app/about#device-support). Actuellement, il ne fonctionne qu'avec GrapheneOS et le système d'exploitation d'origine de l'appareil.
|
|
|
|
[:octicons-home-16: Page d'accueil](https://attestation.app){ .md-button .md-button--primary }
|
|
[:octicons-eye-16:](https://attestation.app/privacy-policy){ .card-link title="Politique de confidentialité" }
|
|
[:octicons-info-16:](https://attestation.app/about){ .card-link title=Documentation}
|
|
[:octicons-code-16:](https://attestation.app/source){ .card-link title="Code source" }
|
|
[:octicons-heart-16:](https://attestation.app/donate){ .card-link title=Contribuer }
|
|
|
|
??? downloads "Téléchargements"
|
|
|
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.attestation.auditor.play)
|
|
- [:simple-github: GitHub](https://github.com/GrapheneOS/Auditor/releases)
|
|
- [:material-cube-outline: Magasin d'application de GrapheneOS](https://github.com/GrapheneOS/Apps/releases)
|
|
|
|
Auditor performs attestation and intrusion detection by:
|
|
|
|
- Using a [Trust On First Use (TOFU)](https://en.wikipedia.org/wiki/Trust_on_first_use) model between an *auditor* and *auditee*, the pair establish a private key in the [hardware-backed keystore](https://source.android.com/security/keystore/) of the *Auditor*.
|
|
- The *auditor* can either be another instance of the Auditor app or the [Remote Attestation Service](https://attestation.app).
|
|
- The *auditor* records the current state and configuration of the *auditee*.
|
|
- Should tampering with the operating system of the *auditee* happen after the pairing is complete, the auditor will be aware of the change in the device state and configurations.
|
|
- You will be alerted to the change.
|
|
|
|
No personally identifiable information is submitted to the attestation service. We recommend that you sign up with an anonymous account and enable remote attestation for continuous monitoring.
|
|
|
|
If your [threat model](basics/threat-modeling.md) requires privacy, you could consider using [Orbot](tor.md#orbot) or a VPN to hide your IP address from the attestation service. To make sure that your hardware and operating system is genuine, [perform local attestation](https://grapheneos.org/install/web#verifying-installation) immediately after the device has been installed and prior to any internet connection.
|
|
|
|
### Secure Camera
|
|
|
|
!!! recommendation
|
|
|
|
![Logo de Secure Camera](assets/img/android/secure_camera.svg#only-light){ align=right }
|
|
![Logo de Secure Camera](assets/img/android/secure_camera-dark.svg#only-dark){ align=right }
|
|
|
|
**Secure Camera** est une application de caméra axée sur la confidentialité et la sécurité qui peut capturer des images, des vidéos et des QR codes. Les extensions du vendeur CameraX (Portrait, HDR, Night Sight, Face Retouch et Auto) sont également prises en charge sur les appareils disponibles.
|
|
|
|
[:octicons-repo-16: Dépôt](https://github.com/GrapheneOS/Camera){ .md-button .md-button--primary }
|
|
[:octicons-info-16:](https://grapheneos.org/usage#camera){ .card-link title=Documentation}
|
|
[:octicons-code-16:](https://github.com/GrapheneOS/Camera){ .card-link title="Code source" }
|
|
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuer }
|
|
|
|
??? downloads "Téléchargements"
|
|
|
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.camera.play)
|
|
- [:simple-github: GitHub](https://github.com/GrapheneOS/Camera/releases)
|
|
- [:material-cube-outline: Magasin d'application de GrapheneOS](https://github.com/GrapheneOS/Apps/releases)
|
|
|
|
Main privacy features include:
|
|
|
|
- Auto removal of [Exif](https://en.wikipedia.org/wiki/Exif) metadata (enabled by default)
|
|
- Use of the new [Media](https://developer.android.com/training/data-storage/shared/media) API, therefore [storage permissions](https://developer.android.com/training/data-storage) are not required
|
|
- Microphone permission not required unless you want to record sound
|
|
|
|
!!! note "À noter"
|
|
|
|
Les métadonnées ne sont pour le moment pas supprimées des fichiers vidéo, mais cela est prévu.
|
|
|
|
Les métadonnées d'orientation de l'image ne sont pas supprimées. Si vous activez la fonction de localisation (dans Secure Camera), elle ne **sera pas** non plus supprimée. Si vous voulez la supprimer ultérieurement, vous devrez utiliser une application externe telle que [ExifEraser](data-redaction.md#exiferaser).
|
|
|
|
### Secure PDF Viewer
|
|
|
|
!!! recommendation
|
|
|
|
![Logo de Secure PDF Viewer](assets/img/android/secure_pdf_viewer.svg#only-light){ align=right }
|
|
![Logo de Secure PDF Viewer](assets/img/android/secure_pdf_viewer-dark.svg#only-dark){ align=right }
|
|
|
|
**Secure PDF Viewer** est un visualiseur de PDF basé sur [pdf.js](https://en.wikipedia.org/wiki/PDF.js) qui ne nécessite aucune autorisation. Le PDF est introduit dans une [webview](https://developer.android.com/guide/webapps/webview) [sandboxed](https://en.wikipedia.org/wiki/Sandbox_(software_development)). Cela signifie qu'il n'a pas besoin d'autorisation directe pour accéder au contenu ou aux fichiers.
|
|
|
|
[Content-Security-Policy](https://fr.wikipedia.org/wiki/Content_Security_Policy) est utilisé pour faire en sorte que les propriétés JavaScript et de style dans la WebView soient entièrement statiques.
|
|
|
|
[:octicons-repo-16: Dépôt](https://github.com/GrapheneOS/PdfViewer){ .md-button .md-button--primary }
|
|
[:octicons-code-16:](https://github.com/GrapheneOS/PdfViewer){ .card-link title="Code source" }
|
|
[:octicons-heart-16:](https://grapheneos.org/donate){ .card-link title=Contribuer }
|
|
|
|
??? downloads "Téléchargements"
|
|
|
|
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=app.grapheneos.pdfviewer.play)
|
|
- [:simple-github: GitHub](https://github.com/GrapheneOS/PdfViewer/releases)
|
|
- [:material-cube-outline: Magasin d'application de GrapheneOS](https://github.com/GrapheneOS/Apps/releases)
|
|
|
|
## Obtenir des applications
|
|
|
|
### Magasin d'applications GrapheneOS
|
|
|
|
GrapheneOS's app store is available on [GitHub](https://github.com/GrapheneOS/Apps/releases). It supports Android 12 and above and is capable of updating itself. The app store has standalone applications built by the GrapheneOS project such as the [Auditor](https://attestation.app/), [Camera](https://github.com/GrapheneOS/Camera), and [PDF Viewer](https://github.com/GrapheneOS/PdfViewer). If you are looking for these applications, we highly recommend that you get them from GrapheneOS's app store instead of the Play Store, as the apps on their store are signed by the GrapheneOS's project own signature that Google does not have access to.
|
|
|
|
### Aurora Store
|
|
|
|
The Google Play Store requires a Google account to login which is not great for privacy. You can get around this by using an alternative client, such as Aurora Store.
|
|
|
|
!!! recommendation
|
|
|
|
![Logo Aurora Store](assets/img/android/aurora-store.webp){ align=right }
|
|
|
|
**Aurora Store** est un client Google Play Store qui ne nécessite pas de compte Google, de services Google Play ou microG pour télécharger des applications.
|
|
|
|
[:octicons-home-16: Page d'accueil](https://auroraoss.com/){ .md-button .md-button--primary }
|
|
[:octicons-code-16:](https://gitlab.com/AuroraOSS/AuroraStore){ .card-link title="Code source" }
|
|
|
|
??? downloads "Téléchargements"
|
|
|
|
- [:simple-gitlab: GitLab](https://gitlab.com/AuroraOSS/AuroraStore/-/releases)
|
|
|
|
Aurora Store does not allow you to download paid apps with their anonymous account feature. You can optionally log in with your Google account with Aurora Store to download apps you have purchased, which does give access to the list of apps you've installed to Google, however you still benefit from not requiring the full Google Play client and Google Play Services or microG on your device.
|
|
|
|
### Manuellement avec les notifications RSS
|
|
|
|
For apps that are released on platforms like GitHub and GitLab, you may be able to add an RSS feed to your [news aggregator](/news-aggregators) that will help you keep track of new releases.
|
|
|
|
![APK RSS](./assets/img/android/rss-apk-light.png#only-light) ![APK RSS](./assets/img/android/rss-apk-dark.png#only-dark) ![Notes de version APK](./assets/img/android/rss-changes-light.png#only-light) ![Notes de version APK](./assets/img/android/rss-changes-dark.png#only-dark)
|
|
|
|
#### GitHub
|
|
|
|
On GitHub, using [Secure Camera](#secure-camera) as an example, you would navigate to its [releases page](https://github.com/GrapheneOS/Camera/releases) and append `.atom` to the URL:
|
|
|
|
`https://github.com/GrapheneOS/Camera/releases.atom`
|
|
|
|
#### GitLab
|
|
|
|
On GitLab, using [Aurora Store](#aurora-store) as an example, you would navigate to its [project repository](https://gitlab.com/AuroraOSS/AuroraStore) and append `/-/tags?format=atom` to the URL:
|
|
|
|
`https://gitlab.com/AuroraOSS/AuroraStore/-/tags?format=atom`
|
|
|
|
#### Vérifier les empreintes numériques des APK
|
|
|
|
If you download APK files to install manually, you can verify their signature with the [`apksigner`](https://developer.android.com/studio/command-line/apksigner) tool, which is a part of Android [build-tools](https://developer.android.com/studio/releases/build-tools).
|
|
|
|
1. Installez [Java JDK](https://www.oracle.com/java/technologies/downloads/).
|
|
|
|
2. Téléchargez les [outils de ligne de commande d'Android Studio](https://developer.android.com/studio#command-tools).
|
|
|
|
3. Extrayez l'archive téléchargée :
|
|
|
|
```bash
|
|
unzip commandlinetools-*.zip
|
|
cd cmdline-tools
|
|
./bin/sdkmanager --sdk_root=./ "build-tools;29.0.3"
|
|
```
|
|
|
|
4. Exécutez la commande de vérification de la signature :
|
|
|
|
```bash
|
|
./build-tools/29.0.3/apksigner verify --print-certs ../Camera-37.apk
|
|
```
|
|
|
|
5. Les hachés obtenus peuvent ensuite être comparés avec une autre source. Certains développeurs, comme Signal, [montrent les empreintes numériques](https://signal.org/android/apk/) sur leur site web.
|
|
|
|
```bash
|
|
Signer #1 certificate DN: CN=GrapheneOS
|
|
Signer #1 certificate SHA-256 digest: 6436b155b917c2f9a9ed1d15c4993a5968ffabc94947c13f2aeee14b7b27ed59
|
|
Signer #1 certificate SHA-1 digest: 23e108677a2e1b1d6e6b056f3bb951df7ad5570c
|
|
Signer #1 certificate MD5 digest: dbbcd0cac71bd6fa2102a0297c6e0dd3
|
|
```
|
|
|
|
### F-Droid
|
|
|
|
![Logo F-Droid](assets/img/android/f-droid.svg){ align=right width=120px }
|
|
|
|
==We do **not** currently recommend F-Droid as a way to obtain apps.== F-Droid is often recommended as an alternative to Google Play, particularly in the privacy community. The option to add third-party repositories and not be confined to Google's walled garden has led to its popularity. F-Droid additionally has [reproducible builds](https://f-droid.org/en/docs/Reproducible_Builds/) for some applications and is dedicated to free and open-source software. However, there are [notable problems](https://privsec.dev/posts/android/f-droid-security-issues/) with the official F-Droid client, their quality control, and how they build, sign, and deliver packages.
|
|
|
|
Due to their process of building apps, apps in the official F-Droid repository often fall behind on updates. F-Droid maintainers also reuse package IDs while signing apps with their own keys, which is not ideal as it gives the F-Droid team ultimate trust.
|
|
|
|
Other popular third-party repositories such as [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) alleviate some of these concerns. The IzzyOnDroid repository pulls builds directly from GitHub and is the next best thing to the developers' own repositories. However, it is not something that we can recommend, as apps are typically [removed](https://github.com/vfsfitvnm/ViMusic/issues/240#issuecomment-1225564446) from that respository when they make it to the main F-Droid repository. While that makes sense (since the goal of that particular repository is to host apps before they're accepted into the main F-Droid repository), it can leave you with installed apps which no longer receive updates.
|
|
|
|
That said, the [F-Droid](https://f-droid.org/en/packages/) and [IzzyOnDroid](https://apt.izzysoft.de/fdroid/) repositories are home to countless apps, so they can be a useful tool to search for and discover open-source apps that you can then download through Play Store, Aurora Store, or by getting the APK directly from the developer. It is important to keep in mind that some apps in these repositories have not been updated in years and may rely on unsupported libraries, among other things, posing a potential security risk. You should use your best judgement when looking for new apps via this method.
|
|
|
|
!!! note "À noter"
|
|
|
|
Dans certains cas rares, le développeur d'une application ne la distribue que par le biais de F-Droid ([Gadgetbridge](https://gadgetbridge.org/) en est un exemple). Si vous avez vraiment besoin d'une telle application, nous vous recommandons d'utiliser [Neo Store](https://github.com/NeoApplications/Neo-Store/) au lieu de l'application officielle F-Droid pour l'obtenir.
|
|
|
|
## Critères
|
|
|
|
**Veuillez noter que nous ne sommes affiliés à aucun des projets que nous recommandons.** En plus de [nos critères de base](about/criteria.md), nous avons développé un ensemble d'exigences claires pour nous permettre de fournir des recommandations objectives. Nous vous suggérons de vous familiariser avec cette liste avant de choisir d'utiliser un projet, et de mener vos propres recherches pour vous assurer que c'est le bon choix pour vous.
|
|
|
|
!!! example "Cette section est récente"
|
|
|
|
Nous travaillons à l'établissement de critères définis pour chaque section de notre site, et celles-ci peuvent être sujet à changement. Si vous avez des questions sur nos critères, veuillez [poser la question sur notre forum](https://discuss.privacyguides.net/latest) et ne supposez pas que nous n'avons pas pris en compte un élément dans nos recommandations s'il ne figure pas dans la liste. De nombreux facteurs sont pris en compte et discutés lorsque nous recommandons un projet, et la documentation de chacun d'entre eux est en cours.
|
|
|
|
### Systèmes d'exploitation
|
|
|
|
- Doit être un logiciel open source.
|
|
- Must support bootloader locking with custom AVB key support.
|
|
- Must receive major Android updates within 0-1 months of release.
|
|
- Must receive Android feature updates (minor version) within 0-14 days of release.
|
|
- Must receive regular security patches within 0-5 days of release.
|
|
- Must **not** be "rooted" out of the box.
|
|
- Must **not** enable Google Play Services by default.
|
|
- Must **not** require system modification to support Google Play Services.
|
|
|
|
### Appareils
|
|
|
|
- Must support at least one of our recommended custom operating systems.
|
|
- Must be currently sold new in stores.
|
|
- Must receive a minimum of 5 years of security updates.
|
|
- Must have dedicated secure element hardware.
|
|
|
|
### Applications
|
|
|
|
- Applications on this page must not be applicable to any other software category on the site.
|
|
- General applications should extend or replace core system functionality.
|
|
- Applications should receive regular updates and maintenance.
|