I haven’t owned a computer in ages but used ThinkPads (followed Luke Smith). Now I use old Google Pixel models, flashing LineageOS & Magisk. They’re easy to flash ROMs on & list for cheap on eBay—around $50. Personally, I use a Pixel 2. Use a good case & screen protector. Wrapping the phone in tinfoil—at least three layers—blocks most radio signals. Put it in a ziplock bag t keep moisture out (e.g. when under water).
Old ThinkPads don’t have Intel’s Management Engine, or if present, can be flashed over with Libreboot. On mobile phones, the SIM card is an analogous backdoor, so avoid using one. Use a burner instead. But Pixels isolate the baseband by which the SIM accesses the rest of the hardware, although I’m unsure which models began to do so. Keep the device set to airplane mode.
General advice: Block mic & camera when not being used. Do the same for mobile data, Wi-Fi,
bluetooth, GPS &c. Disable internet GPS, USB debugging, &c. Set a lockscreen password of 8-12
letters/numbers (more is better). Don’t use a pattern lock. Disable all non-4G/LGE
connections (2G, 3G, & 5G): dial *#*#4636#*#*, then select 4G/LGE only for network.
To disable the rotation pop-up, run via ADB or as root:
settings put secure show_rotation_suggestions 0
Android ROMs/Root
LOS is pretty close to pure vanilla Android. It still has some bloat—namely the cellular provider system apps—as Divested Dev demonstrated. But it supports older devices, & its always good to favor older, usually cheaper priced too, hardware. Most contemporary machines are overdone for basic tasks, & seemingly neccesitated by poorly coded software. Minimize the attack surface for optimal performance, best security, & maximum privacy.
Root to de-bloat or otherwise harden the system. Keep the attack surface minimal, i.e. have few apps installed. De-bloat system apps by making a Magisk module to overlay a blank file, or directory, over the system app’s APK. If the device bootloops, go into safe mode by pressing volume-down while booting (Pixels only it seems). Disables all modules on boot after that. Universal Android Debloater has information on what the different system apps are.
To see where an APK is located, run:
cmd package path app
If you insist on using an app rather than the command line, De-Bloater may be useful.
For network monitoring, use nethogs or netstat in a terminal (both require root). PCAPdroid is an app which does the same as a VPN without root.
To make backups, in Termux run:
tar -c /path/to/files | gpg -e -r your@email -o output.tar.gpg
General Apps

- Obtainium – App Manager
- Simple Keyboard – Keyboard
- Termux – Terminal
- Open Camera – Camera
- Fossify Gallery – Image Viewer
- mpv – Media Player
- MuPDF viewer – Document Viewer
- Orbot – VPN/Proxy
- RiseupVPN – VPN
See the browser page for recommended browsers & configs.
Fossify has other apps phone calling, texting, contacts, alarm clock, &c.
If you must use a propietary app, quarantine it with Shelter.
Instead of using KeePassDX, K-9 Mail, LibreTorrent, Read You, &c., use command line programs in Termux. Although, if you can’t (or plain won’t) use the command line, then those may be useful alternatives.
Pacman (the package manager) is installable in Termux. Also install termux-api so programs can read & set the clipboard.
Remember to configure apps to use Tor as proxy: socks5://localhost:9050
Network
Disable captive portal pings to Google by running via ADB or as root:
settings put global captive_portal_mode 0
settings put global captive_portal_use_https 0
settings put global captive_portal_http_url about:blank
settings put global captive_portal_https_url about:blank
settings put global captive_portal_fallback_url about:blank
settings put global captive_portal_other_fallback_urls about:blank
For NTP:
settings put global ntp_server pool.ntp.org # or `about:blank` to disable
If all your internet traffic is going through Tor, then the DNS should be resolved at the
exit node. This includes apps connecting through Orbot as a VPN. So don’t set a system
private DNS unless you’re not using Tor. That said, use Mullvad
(
Tor).
Termux by default uses Google DNS in its /etc/resolv.conf. Make sure to change it to blank
if using Tor, or Mullvad.