Lets you install Google apps without giving them deep system control, preventing unwanted tracking and data collection while maintaining app compatibility.
Entering a secret PIN instantly erases all data, preventing forced unlocks in emergencies, such as theft, border crossings, or coercion.
Changes number positions on the PIN entry screen, making it harder for someone to steal your code by watching your screen.
Requires both a fingerprint and a PIN/password, preventing unauthorized access if your fingerprint is stolen or forced.
Reboots the phone after a set time of inactivity, ensuring sensitive data is put at rest in case of loss or theft.
Strengthens how apps run by blocking memory leaks and exploit techniques, reducing the risk of malware or unauthorized access.
Blocks an app's internet access, stopping data leaks, hidden tracking, and malicious background connections.
Prevents apps from accessing motion sensors like the gyroscope, stopping covert tracking and spying methods.
Uses per-connection MAC randomization, making it impossible for networks to track your device between locations.
Removes hidden metadata (time, location, device info) from screenshots, preventing apps from secretly collecting extra details.
Reduces failed fingerprint attempts to five, making brute-force unlocking much harder for an attacker.
Saves your phone data securely, so even if stolen, nobody can access it without your password.
Includes memory protections that block hackers from using common tricks to exploit software vulnerabilities.
Fixes known Android VPN issues to ensure no data leaks outside the encrypted VPN tunnel.
Wipes stored data from memory when the phone is locked, preventing forensic tools from recovering sensitive information.
Removes hidden metadata (time, location, device info) from screenshots, preventing apps from secretly collecting extra details.
A Chromium-based browser with extra security, blocking tracking scripts and fingerprinting.
Lets apps access only selected files instead of full storage, reducing data exposure and app abuse.
Supports up to 32 profiles, allowing multiple independent environments on a single device.
Lets notifications from inactive profiles appear in the active one, so you don’t miss important alerts.
Disables insecure 2G/3G networks that are easily intercepted by hackers or fake cell towers.
Blocks USB data transfer when locked, preventing unauthorized data access from charging stations or malicious cables.
Default settings prioritize security, requiring users to manually enable risky features if needed.
Allows up to 128-character passwords, enabling stronger security over Android’s 16-character limit.
Comes with only essential apps, reducing the attack surface and unnecessary data collection.
Strengthens bootloader security by ensuring that unlocking requires the original owner’s credentials, reducing the risk of unauthorized modifications or OS replacements.
Automatically limits background apps from consuming system resources or running hidden processes, reducing spyware risks and battery drain.