Phone

I haven’t owned a computer in ages but used ThinkPads (followed Luke Smith). Now I use old Google Pixel models, flashing LineageOS & Magisk. They’re easy to flash ROMs on & list for cheap on eBay—around $50. Personally, I use a Pixel 2. Use a good case & screen protector. Wrapping the phone in tinfoil—at least three layers—blocks most radio signals. Put it in a zip-lock bag to keep moisture out (e.g. when under water).

Old ThinkPads don’t have Intel’s Management Engine, or if present, can be flashed over with Libreboot. On mobile phones, the SIM card is an analogous backdoor, so avoid using one. Use a burner instead. But Pixels isolate the baseband by which the SIM accesses the rest of the hardware, although I’m unsure which models began to do so. Keep the device set to airplane mode.

General advice: Block mic & camera when not being used. Do the same for mobile data, Wi-Fi, blue-tooth, GPS &c. Disable internet GPS, USB debugging, &c. Set a lock-screen password of 8-12 letters/numbers (more is better). Don’t use a pattern lock. Disable all non-4G/LGE connections (2G, 3G, & 5G): dial *#*#4636#*#*, then select 4G/LGE only for network.

To change the screen attributes, run via ADB or as root:

wm size 720x1280	# resolution
wm density 210		# dpi

To disable the rotation pop-up, run via ADB or as root:

settings put secure show_rotation_suggestions 0

Operating System & Root

LOS is pretty close to pure vanilla Android. It still has some bloat—namely the cellular provider system apps—as Divested Dev demonstrated. But it supports older devices, & its always good to favor older, usually cheaper priced too, hardware. Most contemporary machines are overdone for basic tasks, & seemingly necessitated by poorly coded software. Minimize the attack surface for optimal performance, best security, & maximum privacy.

Root to de-bloat or otherwise harden the system. Keep the attack surface minimal, i.e. have few apps installed. De-bloat system apps by making a Magisk module to overlay a blank file, or directory, over the system app’s APK. If the device boot-loops, go into safe mode by pressing volume-down while booting (Pixels only it seems). Disables all modules on boot after that. Universal Android Debloater has information on what the different system apps are.

To see where an APK is located, run:

cmd package path app

If you insist on using an app rather than the command line, De-Bloater may be useful.

General Apps

/pix/tech/homescreen.jpg
My homescreen, mpv & MuPDF hidden.

I directly download the APKs for apps using a script. Use Obtainium if you want an app manager.

See the browser page for recommended browsers & configs.

Fossify has other apps for phone calling, texting, contacts, alarm clock, &c.

I use Lawnchair for a launcher with Lawnicons, but its purely decorative.

If you must use a proprietary app, quarantine it with Shelter.

/pix/tech/neofetch.jpg
neofetch in Termux.

Instead of using KeePassDX, K-9 Mail, QR & Barcode Scanner, LibreTorrent, Read You, &c., use command line programs in Termux. Although, if you can’t (or plain won’t) use the command line, then those may be useful alternatives.

Pacman (the package manager) is installable in Termux. Also install Termux:API so programs can read & set the clipboard or open files in apps &c.

To stop Android from killing Termux, follow this guide

Remember to configure apps to use Tor as proxy: socks5://localhost:9050

For per-process network monitoring, use nethogs on the terminal (requires root). PCAPdroid is an app which does the same as a VPN without root.

To make backups, in Termux run:

tar -cp /path/to/files | gpg -o output.tar.gpg -r your@email -e

See how to make a GPG key.

Network

Disable captive portal pings to Google by running via ADB or as root:

settings put global captive_portal_mode 0
settings put global captive_portal_use_https 0
settings put global captive_portal_http_url about:blank
settings put global captive_portal_https_url about:blank
settings put global captive_portal_fallback_url about:blank
settings put global captive_portal_other_fallback_urls about:blank

For NTP:

settings put global ntp_server pool.ntp.org # or `about:blank` to disable

If all your internet traffic is going through Tor, then the DNS should be resolved at the exit node. This includes apps connecting through Orbot as a VPN. So don’t set a system private DNS unless you’re not using Tor. That said, use Mullvad (🧅 Tor).

Termux by default uses Google DNS in its /etc/resolv.conf. Make sure to change it to blank if using Tor, or Mullvad.