Anonymity Android Apps Hiding.


Fixxx

Moder
Joined
20.08.24
Messages
926
Reaction score
3,566
Points
93
1763351287369.png

Everyone has apps on a phone we don’t want shown. Given the reality where any officer can stop you and dig through your device, it’s important to build protection barriers.


Problem Scenarios
  • Phone falls into someone else’s hands → app list should look “clean”.
  • Routine check by officers who will open something like Gallery and Telegram.
  • Even a quick inspection should make the phone look like an ordinary Android device.
Examples of apps you may want to hide:
  • Cryptocurrency wallet
  • Anonymous browser
  • Private messenger
  • A second messaging app/account
  • Other
Android doesn’t provide reliable built-in hiding. Most of “hider” apps are obvious at first glance and many are ad-filled. Two helpful tools here are Amarok and Shizuku.

What is Amarok
  • An app manager for hiding apps and controlling permissions.
  • Works together with Shizuku (no root required).
  • Use cases: hide Electrum, Tor Browser, private messengers and conceal app activity.
What is Shizuku (optional with root)
  • A bridge between system APIs and apps.
  • Lets apps manage system functions without root using ADB or Wi‑Fi Debugging.
  • Once started, the Shizuku service runs autonomously.
Before Starting

Recommended: a phone with a custom ROM and root for advanced features. You can also operate without root - Shizuku must be started via ADB (USB) or Wi‑Fi Debugging.

Disclaimer
  • This is a protective barrier, not absolute anonymity.
  • It doesn't automatically encrypt data.
  • Without root, hidden apps can still be discovered.
  • Not 100% secure. For stronger protection, use full-disk encryption and wipedata so seized devices yield nothing useful.
Root + custom ROM: pros and cons

Pros:
  • Auto-start Shizuku (optional).
  • Access to XHide and other PRO hiding features.
  • Full system control.
Cons:
  • More complex installation.
  • Risk of bricking or bootloop.
Without root: pros and cons

Pros:
  • Simpler and safer.
  • No risk of damaging the system.
  • Creates a minimal barrier to hide apps.
Cons:
  • Shizuku must be restarted after each reboot (via Wi‑Fi debugging).
  • Limited features.
  • Methods exist to reveal hidden apps (Google Play metadata or in Installed Apps settings).

Installation and Setup
  • Download Amarok - F‑Droid.
  • Download Shizuku - IzzySoft.
  • Launch Shizuku (ADB over USB or Wi‑Fi Debugging; with root it can auto-start).
    Enable Developer Options and Wireless Debugging, then connect via Shizuku’s notification or use ADB.
  • Open Amarok → grant access via Shizuku (or use root).
  • Select apps to hide and configure settings → they will disappear from the launcher.
Notes about Wi‑Fi Debugging:
  • Wi‑Fi is only required to start Shizuku via wireless debugging.
  • After Shizuku starts, the service runs on its own; you can turn off networking or enable airplane mode.
  • On Android 10 and below you must use USB ADB (unless rooted).
Bonus: XHide + Xposed (PRO level)

XHide removes apps even from system settings. Requirements:
  • Root
  • Xposed API > 93 (LSPosed / EdXposed)
  • Xposed Manager
Warning: incorrect Xposed installation can brick the device (bootloop).

Kill switch / WipeData + encryption
  • Factory reset with device encryption destroys keys → data becomes inaccessible.
  • Without encryption, wipedata can be recovered in a lab.
  • Root can enable automatic wipe/kill-switch for critical data.
  • (A deeper article on kill switches and wipedata will follow).

Summary
  • Shizuku + Amarok = a simple, no-root (but slightly limited) way to hide apps.
  • XHide + Xposed = PRO hiding, requires root.
  • Wipe + full-disk encryption = reliable data destruction if the device is seized.
  • Root itself is not inherently revealing if used carefully, but root gives access to system files and logs; wipedata is strongly recommended.
    This approach pairs well with a secondary/parallel user profile or “dual-space” setup to create additional confusion.
 
Top Bottom