Skip to content

TechRepublic

Trending Now

man in a red hoodie studying on a laptop
Image: StackCommerce
Article

Explore 800+ hours of software training for only $49.99

Pentagon finds concerning vulnerabilities on blockchain
Article

Pentagon finds concerning vulnerabilities on blockchain

Video Call Chatting Communication Concept
Image: Getty Images/iStockphoto
Article

Employers need to embrace new tech for new ways of working

Supply chain management concept vector illustration
Image: Visual Generation/Adobe Stock
Article

Unfortunately, the global chip shortage will continue

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Security

Five free encryption apps to help secure your Android device

By Jack Wallen August 17, 2015, 2:56 PM PDT

Image
1
of 7
Previous Next

Intro
Intro
Five free encryption apps to help secure your Android device

Introduction

Image: iStockphoto.com/Pepgooner

Introduction

Do your hats tend to fall into the tinfoil range? Are yournafraid there is always somebody watching you? If so, rest assured that thernAndroid ecosystem offers plenty of apps to soothe your paranoia. But which appsrnare the must-haves? Here are five apps you should immediately install and putrnto work. They’ll bring you peace in the knowledge that your mobile data is farrnmore secure than those around you.

Note:rnThis gallery is also available as an article.

Image: iStockphoto.com/Pepgooner
Orbot Proxy with Tor
Orbot Proxy with Tor
Five free encryption apps to help secure your Android device

Orbot Proxy with Tor

Orbot Proxy with Tor

To use Tor on Android, your best bet is Orbot Proxy withrnTor. Once you have it installed and connected, it will encrypt all internetrntraffic leaving your device. This is the onlyrnapp that produces a truly secure and encrypted connection for your Androidrndevice. If you are really paranoid, you need Orbot Proxy with Tor. It’s free…rnwhat do you have to lose?

CSipSimple
CSipSimple
Five free encryption apps to help secure your Android device

CSipSimple

CSipSimple

CSipSimple lets you do encrypted SIP callingrnvia your Android device. It’s open source and free, and it offers an easy-to-usernWizard for setting up the app. You are required to have an account on a SIPrnserver, and I highly recommend using Ostel. It works seamlessly and has its own wizard for setting up the SIP accountrnwithin CSipSimple. Even the Ostel account is free—so the only cost associatedrnwith this will be any data usage from your provider.

CSipSimple
CSipSimple
Five free encryption apps to help secure your Android device

CSipSimple

CSipSimple

You can set up CSipSimple to only usernWi-Fi, to avoid any charges whatsoever. CSipSimple uses rewrite/filtering rulesrnto integrate with Android and allows you to record calls.

ChatSecure
ChatSecure
Five free encryption apps to help secure your Android device

ChatSecure

ChatSecure

With ChatSecure, setting up an OTR session is simple. Whenrnyou start a chat with someone, you can first verify the contact and then startrnthe encryption. This app isn’t perfect. You might run into instances where thernencryption won’t start or the connection with Orbot isn’t made. But shouldrneither happen, you can restart the app and try again. It doesn’t occur often,rnbut when you’re dealing with the need for 100% security, you don’t want to usernthe app without the aid of Tor.

Built-in device encryption
Built-in device encryption
Five free encryption apps to help secure your Android device

Built-in device encryption

Built-in device encryption

This option is for those who want to ensure the privacy ofrntheir device should it fall into the wrong hands. This built-in encryptionrnsystem works with all data—including app data, downloaded files… everything on yourrndevice.

Built-in device encryption
Built-in device encryption
Five free encryption apps to help secure your Android device

Built-in device encryption

Built-in device encryption

This level of security does come with its drawbacks. First, older (or lower-end) devices might see a hit on thernperformance. (Newer and flagship devices shouldn’t so much as hiccup withrnsystem-wide encryption.) Second, you’ll have to enter the encryption passwordrnon every startup of the device—but that’s a small price to pay for this levelrnof security. Pay it and be safe. Also understand that once you’ve encryptedrnyour Android device, the only way to disable the encryption is to do a factoryrnreset. Note: Android Lollipop defaults to device encryption.

  • Security
  • Software
  • Account Information

    Share with Your Friends

    Five free encryption apps to help secure your Android device

    Your email has been sent

Share: Five free encryption apps to help secure your Android device
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice