Fixxx
Moder
- Joined
- 20.08.24
- Messages
- 926
- Reaction score
- 3,566
- Points
- 93

Everyone has apps on a phone we don’t want shown. Given the reality where any officer can stop you and dig through your device, it’s important to build protection barriers.
Problem Scenarios
- Phone falls into someone else’s hands → app list should look “clean”.
- Routine check by officers who will open something like Gallery and Telegram.
- Even a quick inspection should make the phone look like an ordinary Android device.
- Cryptocurrency wallet
- Anonymous browser
- Private messenger
- A second messaging app/account
- Other
What is Amarok
- An app manager for hiding apps and controlling permissions.
- Works together with Shizuku (no root required).
- Use cases: hide Electrum, Tor Browser, private messengers and conceal app activity.
What is Shizuku (optional with root)
- A bridge between system APIs and apps.
- Lets apps manage system functions without root using ADB or Wi‑Fi Debugging.
- Once started, the Shizuku service runs autonomously.
Before Starting
Recommended: a phone with a custom ROM and root for advanced features. You can also operate without root - Shizuku must be started via ADB (USB) or Wi‑Fi Debugging.
Disclaimer
- This is a protective barrier, not absolute anonymity.
- It doesn't automatically encrypt data.
- Without root, hidden apps can still be discovered.
- Not 100% secure. For stronger protection, use full-disk encryption and wipedata so seized devices yield nothing useful.
Root + custom ROM: pros and cons
Pros:
- Auto-start Shizuku (optional).
- Access to XHide and other PRO hiding features.
- Full system control.
- More complex installation.
- Risk of bricking or bootloop.
Without root: pros and cons
Pros:
- Simpler and safer.
- No risk of damaging the system.
- Creates a minimal barrier to hide apps.
- Shizuku must be restarted after each reboot (via Wi‑Fi debugging).
- Limited features.
- Methods exist to reveal hidden apps (Google Play metadata or in Installed Apps settings).
Installation and Setup
- Download Amarok - F‑Droid.
- Download Shizuku - IzzySoft.
- Launch Shizuku (ADB over USB or Wi‑Fi Debugging; with root it can auto-start).
Enable Developer Options and Wireless Debugging, then connect via Shizuku’s notification or use ADB. - Open Amarok → grant access via Shizuku (or use root).
- Select apps to hide and configure settings → they will disappear from the launcher.
- Wi‑Fi is only required to start Shizuku via wireless debugging.
- After Shizuku starts, the service runs on its own; you can turn off networking or enable airplane mode.
- On Android 10 and below you must use USB ADB (unless rooted).
Bonus: XHide + Xposed (PRO level)
XHide removes apps even from system settings. Requirements:
- Root
- Xposed API > 93 (LSPosed / EdXposed)
- Xposed Manager
Kill switch / WipeData + encryption
- Factory reset with device encryption destroys keys → data becomes inaccessible.
- Without encryption, wipedata can be recovered in a lab.
- Root can enable automatic wipe/kill-switch for critical data.
- (A deeper article on kill switches and wipedata will follow).
Summary
- Shizuku + Amarok = a simple, no-root (but slightly limited) way to hide apps.
- XHide + Xposed = PRO hiding, requires root.
- Wipe + full-disk encryption = reliable data destruction if the device is seized.
- Root itself is not inherently revealing if used carefully, but root gives access to system files and logs; wipedata is strongly recommended.
This approach pairs well with a secondary/parallel user profile or “dual-space” setup to create additional confusion.