CONTINGENCYPLAN.AI
WHEN TO LEAVE
WHERE TO GO
HOW TO EXIT
Settings
WHEN
WHERE
HOW
CONTINGENCYPLAN.AI
WHEN TO LEAVE
WHERE TO GO
HOW TO EXIT
Settings
Back to Privacy Toolkit
📱Device

GrapheneOS

The most hardened mobile operating system available, turning Pixel phones into fortress-grade devices with full Android compatibility and no Google dependencies.

Domain Rank
#1
Score
8.12

This toolkit is for informational purposes. Security needs vary by situation. No tool guarantees complete privacy or anonymity.

Evaluation Scores

Encryption Architecture9

Hardware-backed encryption with verified boot, per-profile encryption keys, and hardened memory allocator beyond stock Android.

Anonymous Usage8

Strips all Google telemetry by default; sandboxed Google Play is optional, preventing background identity leakage.

Open Source & Auditability10

Fully open source with reproducible builds; every component is auditable and the project accepts no corporate funding.

Jurisdiction & Legal Protection9

Canadian non-profit with no corporate ties; no data collection, no servers to subpoena, no jurisdiction risk.

Track Record & Trust9

Led by Daniel Micay since 2014 (as CopperheadOS, then GrapheneOS); proven hardening adopted upstream by Android.

Usability & Accessibility7

Fully functional Android experience with app store access via sandboxed Play; initial flash process requires technical comfort.

Cross-Platform Support4

Pixel phones only — excellent support for recent Pixel models but no coverage for other Android hardware or iOS.

Anonymous Payment9

Completely free; requires only a compatible Pixel phone, which can be purchased with cash at retail.

Overview

GrapheneOS is a privacy and security-hardened mobile operating system based on Android, designed for Google Pixel phones. It strips out all Google services and telemetry while adding substantial security improvements to the base Android platform — memory safety hardening, a hardened memory allocator, network and sensor permissions, verified boot with a locked bootloader, and sandboxed Google Play compatibility (so you can run apps that depend on Google services without giving Google access to your device). GrapheneOS is widely considered the most secure mobile operating system available to consumers.

For someone preparing for a crisis exit, your phone is the most dangerous device you carry. It contains your location history, your contacts, your messages, your photos, your financial accounts, and constant telemetry streamed to Google or Apple. A stock Android phone sends data to Google approximately 340 times per day even when idle. GrapheneOS eliminates this surveillance by removing Google's code from the operating system entirely. Your phone becomes a tool you control rather than a surveillance device you carry.

GrapheneOS is the foundation of a private mobile setup. Once installed, it provides the secure platform on which you run Signal, ProtonMail, Mullvad VPN, and every other privacy tool in your stack. Without a secure operating system, every privacy app you install is built on compromised ground — a stock Android or iOS device can read your screen, access your clipboard, log your keystrokes, and report your location regardless of what apps you use.

Encryption Architecture

GrapheneOS uses full-disk encryption with AES-256-XTS, enabled by default and tied to your lock screen credential. The encryption implementation is hardened beyond stock Android — GrapheneOS uses a stronger key derivation function (increased iterations) and implements additional protections against brute-force attacks on the lock screen, including a hardware-backed escalating delay that makes rapid guessing impractical even with physical access to the device. After a configurable number of failed unlock attempts, the device can be set to wipe itself.

The verified boot chain ensures that every component of the operating system is cryptographically signed and verified before execution. If any system file has been modified — whether by malware, a physical attacker, or a compromised update — the device will refuse to boot and alert the user. GrapheneOS extends Android's verified boot with its own signing keys, meaning even Google cannot push unauthorized modifications. The bootloader is locked after installation, which is a critical security measure that most custom ROMs cannot match (they require an unlocked bootloader, which weakens device security).

Anonymous Usage

GrapheneOS requires no account to use. There is no Google account requirement, no device registration, no telemetry, and no analytics. When you first boot a GrapheneOS device, you set up a lock screen credential and you're done — no email, no phone number, no name, no terms of service requiring identification. The operating system makes zero network connections that could identify you or the device unless you explicitly configure them.

GrapheneOS includes sandboxed Google Play compatibility, which lets you install Google Play Services as a regular app (not a privileged system component) in a separate user profile. This means apps that require Google Play Services (like many banking apps) can function, but Google's code runs in a sandbox with only the permissions you explicitly grant — it cannot access sensors, contacts, location, or other apps without your approval. You can create multiple user profiles on the device, each completely isolated, allowing you to maintain separate identities (e.g., a personal profile and an anonymous profile) on the same phone.

Open Source & Auditability

GrapheneOS is fully open source, with all code available on GitHub. The project publishes source code for the operating system, the hardened Vanadium browser, the hardened PDF viewer, the camera app, and all other included applications. Builds are reproducible, meaning anyone can compile the source code and verify it produces the same binary as the official release. This is a critical security property that very few operating systems achieve.

The project has been audited by Trail of Bits (2020), one of the most respected security firms in the industry, which found the hardening measures to be effective and well-implemented. GrapheneOS regularly incorporates the latest Android security patches — often faster than stock Pixel phones receive them — and publishes detailed changelogs documenting every modification to the base Android code. The development process is transparent, with all code reviews and design decisions discussed publicly on GitHub and the project's community channels.

Jurisdiction & Legal Protection

GrapheneOS is a nonprofit open-source project with no legal entity controlling it in a traditional sense. The lead developer, Daniel Micay, is Canadian, and the project operates as a community-driven effort. There is no company to subpoena, no server infrastructure storing user data, and no organization that can be compelled to modify the software. The operating system runs entirely on your device with no cloud dependencies.

Because GrapheneOS is open source and installed on hardware you physically possess, jurisdiction questions are largely moot. No government can compel GrapheneOS to install a backdoor because the project is transparent and decentralized — any modification would be visible in the public source code. The device itself may be subject to border search in some countries (especially the U.S., where border agents have broad authority to search electronic devices), which is why GrapheneOS's strong encryption and the ability to create dummy user profiles are important: you can set up a clean profile with no sensitive data as the default, with your actual profile hidden behind a separate PIN.

Track Record & Trust

GrapheneOS has been under active development since 2014 (originally as CopperheadOS before a organizational split in 2018). Daniel Micay, the project founder, is one of the most respected security engineers in the Android ecosystem, having contributed hardening patches to the upstream Android Open Source Project (AOSP) that benefit all Android users. The project has never experienced a security breach or backdoor incident.

GrapheneOS is recommended by Edward Snowden, Privacy Guides, the Electronic Frontier Foundation, and numerous security professionals. It is used by journalists, security researchers, and high-risk individuals worldwide. The project's technical reputation is based on concrete security improvements — not marketing claims — and these improvements are verifiable in the open-source code. The community is active and technically sophisticated, providing rapid identification and discussion of any security concerns.

Usability & Accessibility

GrapheneOS looks and feels like stock Android — the same launcher, the same settings app, the same notification system. If you've used a Pixel phone, you already know the interface. The difference is what's missing: no Google account prompts, no Google Assistant, no Google Play Store (unless you choose to install the sandboxed version). For most users, the app ecosystem is the main adjustment — you'll use F-Droid (an open-source app store) and Aurora Store (which lets you download apps from Google Play without a Google account) instead of the Play Store.

The installation process is the main usability barrier. You need a supported Pixel phone and a computer with a web browser to run the web-based installer. The process takes about 15-20 minutes and involves unlocking the bootloader, flashing the OS, and relocking the bootloader. It's well-documented with a step-by-step guide on grapheneos.org, and thousands of non-technical users have completed it successfully. Once installed, the day-to-day experience is smooth and familiar — it's just Android without Google watching.

Cross-Platform Support

GrapheneOS is exclusively available for Google Pixel phones. This sounds limiting, but it's a deliberate choice — Pixel phones are the only Android devices that support verified boot with a custom operating system and a relocked bootloader, which is a non-negotiable security requirement. Currently supported devices include the Pixel 4a (5G) through the latest Pixel 9 series. Older Pixel models that have reached end-of-life for security updates are dropped from GrapheneOS support.

The Pixel hardware requirement means you need to purchase a specific phone. For crisis preparation, buy a Pixel with cash from a retail store — avoid online orders that link the device's IMEI to your identity. The Pixel 7a or Pixel 8a offer the best value, with strong hardware and years of remaining security update support. GrapheneOS does not support tablets, laptops, or non-Pixel phones. For desktop/laptop security, see Tails OS or Qubes OS.

Anonymous Payment

GrapheneOS itself is completely free — it's open-source software that you download and install at no cost. There are no paid features, no subscriptions, and no financial relationship with the project required to use the full operating system. The project is funded by donations.

The cost associated with GrapheneOS is the Pixel phone hardware. A new Pixel 7a costs approximately $350-450, and a used Pixel can be found for significantly less. The key to anonymous acquisition is purchasing the phone with cash at a physical retail store (Best Buy, Target, Walmart, or a carrier store) without providing identification. Do not activate the phone with a carrier in-store. Do not provide a loyalty card or use a credit card. Walk in, buy the phone with cash, walk out. The phone's IMEI is not linked to your identity until you insert a SIM card and connect to a carrier.

Setup Guide

Purchase a supported Google Pixel phone with cash from a retail store. The Pixel 8a or Pixel 7a are recommended for their balance of price, hardware quality, and update longevity. Do not activate the phone in-store, do not insert a SIM card, and do not connect to Wi-Fi during the stock Android setup. You only need the phone powered on enough to enable developer options — you don't need to complete Google's setup wizard.

On a computer, visit the GrapheneOS web installer at grapheneos.org/install/web. Connect your Pixel to the computer via USB. Follow the step-by-step instructions: enable OEM unlocking in Developer Options (Settings > About Phone > tap Build Number 7 times > Developer Options > OEM Unlocking), unlock the bootloader via the web installer, flash GrapheneOS, and relock the bootloader. The relocking step is critical — an unlocked bootloader allows physical attackers to modify the OS. The entire process takes 15-20 minutes and requires no technical knowledge beyond following the instructions.

After installation, boot into GrapheneOS and set a strong alphanumeric lock screen password (not a simple PIN — this password protects your encryption). Skip any connectivity during initial setup. Once on the home screen, connect to Wi-Fi through a VPN (configure Mullvad VPN as the first app you install, using an APK downloaded from mullvad.net on another device). Install F-Droid for open-source apps and Aurora Store for apps from the Google Play catalog. Set up sandboxed Google Play if you need apps that require Google services — install it in a separate user profile to isolate it from your main profile. Install Signal, ProtonMail, and your password manager. Your phone is now a hardened, private device that reports nothing to anyone.

Last evaluated: 2026-03-28
WHEN
WHERE
HOW