Hardening Android
These mitigations to common mobile threats are kept as simple as possible, with tools found in most Androids and online.
Other things are harder to cover. For example, each manufacturer has its own privacy settings somewhere, and there is a growing number of alternative apps that do not report everything you do to Google.
- Introduction
- Application stores
- Researching before installing apps
- Unwanted apps list
- Removing unwanted apps
- Browsers that protect your privacy
- Changing default apps
- Using more secure messaging services
- Using more secure email services
- Using SSH tunnels
- Using VPN services
- Using Tor proxies
- Changing MAC address
- Editing hosts file