Android hacks
2019-02-22 — 2025-07-03
Wherein practical methods for reducing default data exfiltration to Google and alternatives such as microG, de-Googled ROMs, and MTP file‑transfer workarounds are described.
I have an Android phone or tablet. How can I get things done without dicking around? How can I minimize Google’s default habit of collecting all my data? etc.
1 Emulating Android
Android in a Box — Run Android applications on any GNU/Linux operating system.
2 File transfer over USB
Usually, this means “file transfer over MTP,” which is the native/default USB protocol for filesystem access. As far as I can tell, MTP works on Windows but is surprisingly tedious on macOS. Linux is usually OK, but sometimes modern devices don’t work with the OS.
Mac users can use Google’s native app File Transfer, but it’s awful. Maybe try instead: Ganesh Rathinavel’s OpenMTP (source).
If you are looking at transferring books because your tablet is an e-reader, you can use Calibre, which has in-built connectivity.
But shouldn’t FUSE allow MTP devices to just work as part of the normal desktop Finder experience? Arch Linux thinks so.
On Linux, simple-mtpfs does the job. simple-mtpfs
is provided in homebrew. Installation and usage are terse to the point of being sullen:bash simple-mtpfs mountpoint
It doesn’t produce error messages or much feedback. In fact, if something goes wrong, it can fail silently in confusing ways (the folders exist but always appear empty).
Trybash simple-mtpfs -v -f tmp
Running it in the foreground with verbose feedback seems to work fine.
This app also worked on macOS in the past, but I’m not sure it still does because of the ongoing quagmire that is macFUSE.
To mount macOS-style devices,bash sudo simple-mtpfs -o allow_other,rw -v /Volumes/mountpoint
Contrary to the manual, on macOS the usual unmount command works for me:bash umount mountpoint
Or just quit.
Alternatively: go-mtpfs
works great for me, although I had to install it manually through a lot of complicated steps:bash sudo apt install golang-go sudo apt install libusb1-devel mkdir /tmp/go export GOPATH=/tmp/go go get github.com/hanwen/go-mtpfs mkdir xoom go-mtpfs xoom & cp -a ~/Music/Some-Album xoom/Music/ fusermount -u xoom
## Alternative distros
You don’t need to run Google’s Android distro.
I ran into these alternatives:
That was baffling, so I asked Perplexity to give me a summary of the SOTA in alternative Android distros. Below is a comparison table of leading privacy-focused Android operating systems: GrapheneOS, /e/OS, LineageOS, CalyxOS, DivestOS, and CopperheadOS. These are the most widely recommended alternatives for users seeking enhanced privacy and security on their mobile devices.
Feature | GrapheneOS | /e/OS | LineageOS | CalyxOS | DivestOS | CopperheadOS |
---|---|---|---|---|---|---|
Website | grapheneos.org | e.foundation/e-os | lineageos.org | calyxos.org | divestos.org | copperhead.co/android |
Primary Focus | Security & Privacy | Privacy, Usability | Customization | Privacy, Usability | Security & Privacy | Security & Privacy |
Base | AOSP | LineageOS | AOSP | AOSP/LineageOS | LineageOS | AOSP |
Supported Devices | Pixel-only | Many (Fairphone, etc.) | Many (196+) | Pixel, Fairphone, Moto | Many (legacy too) | Pixel (recent) |
Google Services | Optional, sandboxed | microG (default) | Optional, not included | microG (default) | Not included | Not included |
Security Hardening | Advanced (kernel, memory, app sandboxing, verified boot) | Minimal | Minimal | Some (verified boot, regular patches) | Kernel hardening, verified boot | Hardened kernel, secure boot, regular updates |
Privacy Features | Network/sensor permissions, minimal connections, hardened WebView | De-Googled, cloud alternatives, privacy ratings | De-Googled, user control | Tor integration, privacy apps | Blocks tracking, ad networks, minimal telemetry | Privacy guard, anti-tracking, ad-blocking |
Ease of Use | Technical users | User-friendly | Intermediate | User-friendly | Intermediate | Intermediate |
App Compatibility | High (sandboxed Play Services) | High (microG) | High (if GApps flashed) | High (microG) | High (F-Droid, no Play Services) | High (F-Droid, no Play Services) |
Updates | Regular, fast | Regular | Community-driven | Regular, fast | Regular, even for old devices | Regular, fast |
Notable Limitations | Pixel-only, minimal UI | Not security-hardened | No verified boot, less secure | Fewer hardening features than GrapheneOS | Small dev team, fewer features | Commercial, limited device support |
2.1 Key Takeaways
GrapheneOS: Best for users who want the highest level of security and privacy; available only for Google Pixel devices. Recommended by security experts for its advanced protection features.
/e/OS: Focuses on privacy and usability, suitable for everyday users who want a de-Googled experience with cloud alternatives and a friendly interface.
LineageOS: Offers broad device support and customization, but lacks advanced security hardening features; best for users who want control and updates for older devices.
CalyxOS: Balances privacy and usability, supports microG, and is easier for non-technical users; available for Pixel, Fairphone, and some Motorola devices.
DivestOS: Prioritizes privacy and security, supports many legacy devices, and is maintained by a small team; ideal for those wanting to revive older hardware with privacy in mind.
CopperheadOS: Commercial, hardened security OS for recent Pixel devices, with a strong focus on privacy, regular updates, and enterprise features.
3 Alternative app repositories
3.1 F-Droid
No-frills, open-source repository: F-droid
3.2 microG
MicroG is a free-software reimplementation of Google Play Services and other proprietary Android components.
3.3 APKPure
APKPure is faster and more complete than F-Droid, but has had security breaches.