A hardened device is only as secure as the person using it. Hardware and software provide the foundation, but your daily habits determine whether that foundation holds. This guide covers the practices that matter.
GrapheneOS supports multiple user profiles, each with its own isolated app data, storage, and permissions. Use them deliberately.
When a profile is not active, its data is encrypted and inaccessible. This is real compartmentalisation, not just separate app folders.
Every app you install is a potential data channel. Be selective.
Your network connections reveal as much as your app activity.
GrapheneOS receives security patches directly, often ahead of stock Android. Install updates as soon as they are available. Do not delay. Security vulnerabilities are actively exploited, and patches close those windows.
Enable auto-reboot (configured on devices we ship). This forces the device to restart after a period of inactivity, returning it to the encrypted "Before First Unlock" state. If someone gains physical access after a reboot, they face full-disk encryption rather than a live, unlocked filesystem.
The most common security failures are behavioural, not technical. Do not click links from unknown sources. Do not enter credentials on unfamiliar pages. Do not share your device PIN. Do not leave your device unlocked and unattended. Do not assume that because the device is secure, you are immune to social engineering.
The device does the hard work. Your job is to not undo it.
Browse secure devices that ship fully configured, or reach out on WhatsApp.