Hardware memory tagging
ARM MTE on supported Pixels probabilistically catches use-after-free and inter-object overflows in real time. Both kernel and user-space.
Features
A list of what HardenedOS actually does — kernel hardening, exploit mitigations, per-app permission controls, lock-screen defenses, network privacy, and a hardened browser. Everything below is on by default; most things are opt-out, not opt-in.
Hardware-rooted
The Pixel's secure element holds the root of trust. Every binary loaded at boot — bootloader, kernel, system, recovery — is hash-checked against a measurement signed at build time. Tamper anywhere and the device refuses to boot.
Continuous, end-to-end verification from the boot ROM up. Failed signatures halt the boot.
Remote-verifiable proof of firmware version, bootloader state, and OS identity, signed by the secure element.
Bootloader, radio, and boot-partition fingerprints are checked at boot; mismatch is fatal.
USB data lines are blocked at the OS level when the device is locked. Configurable per device profile.
Device verified
attested 2 minutes ago
Memory & exploits
The hard problem in mobile OS security is memory-corruption bugs in C/C++. HardenedOS stacks defenses so a single bug rarely turns into code execution.
ARM MTE on supported Pixels probabilistically catches use-after-free and inter-object overflows in real time. Both kernel and user-space.
Custom heap allocator with metadata isolation, quarantining, canaries, and randomized free lists. Slows attacks; turns silent corruption into hard crashes.
Memory is wiped the moment it's deallocated. Prevents an attacker from grabbing residue from a freed buffer.
Memory is zeroed during startup so nothing carries over from a previous boot — no residual keys, plaintexts, or stale heap state.
Java JIT off by default; JavaScript JIT off in the system browser. Closes a category of escape vectors at the cost of some compute speed.
Each app process is restricted to the syscalls it actually needs. Sandbox escapes that depend on rare syscalls don't get the chance.
Branch Target Identification and Pointer Authentication are enabled for OS userspace. Cuts the legs out from common ROP/JOP exploitation.
Kernel stack memory is automatically cleared. Closes information-leak side channels that depend on uninitialized stack reads.
Per-app permissions
Stock Android lets you deny "location" and call it a day. HardenedOS lets you deny network, sensors, and scope file or contact access to a single folder or person — all per-app, all reversible, all visible.
Block direct and indirect network access for any app. Yes — including apps that thought it was a given. Apps continue to function offline.
Deny accelerometer, gyroscope, compass, and the rest of the non-standard sensors per app. Useful for anti-fingerprinting.
Grant access to specific folders, not all storage. The app sees only what you point at.
Grant access to specific contacts or groups, not the whole address book. The app sees only those.
Owners can block secondary users from installing apps. A device handed to a kid stays clean.
Compass · v3.2.1
requesting access
App still launches. No data leaves the device.
Required for the app's purpose. Granted.
/Documents/Trips
App sees one folder. Everything else is invisible.
App can't enumerate your address book.
Physical security & duress
Most phone breaches don't involve zero-days — they involve a person standing over your shoulder, or a border agent demanding the PIN. HardenedOS plans for that.
Every unlock attempt randomizes the keypad layout. Shoulder-surfing the position of your finger no longer reveals the digits.
Fingerprint unlocks the device and the PIN must follow. A forced fingerprint scan alone doesn't grant access.
Set a second PIN that, when entered, irreversibly wipes the device. Looks identical to a wrong PIN; doesn't tell the operator.
If the device sits locked for a configurable interval, it reboots — clearing decryption keys from RAM and forcing full re-authentication.
Up to 128 characters without needing a Device Manager workaround. Cold-storage-grade lock-screen secrets work.
Enter PIN
Layout randomized · keys reshuffle on next attempt
Network privacy
Mobile devices leak identity in places most people don't think about — Wi-Fi probes, cellular fallback to insecure radios, DNS bypassing the VPN. HardenedOS closes those.
Every Wi-Fi network gets a fresh, random MAC address. Coffee-shop trackers can't recognize your device next time.
DHCP state is wiped between reconnections, so the same network can't fingerprint the device by its lease history.
Disable 2G, 3G, and 5G. Reduces baseband attack surface and dodges the well-known weaknesses of 2G fallback.
System resolver respects the active VPN; multicast and direct-interface bypasses are blocked at the OS level.
Apps can't specify a tunnel interface to bypass the user's VPN. The tunnel is the only path out.
Position estimation runs on-device against open data. No cell-tower or Wi-Fi-fingerprint requests sent to a third party.
Hardened web
A Chromium-derived web view, hardened beyond stock. Same defenses as the rest of the OS plus browser-specific work to deny attackers the cheapest path in.
MTE applies to the browser's main allocator on supported Pixels. Catches heap exploits in the highest-risk process.
Each origin runs in its own renderer process. A compromise in one site can't reach across to another.
Tracker and ad lists ship with the browser. Toggleable per site if a page genuinely needs them to load.
JavaScript JIT disabled out of the box; opt back in per site. Trades JS performance for closing a major exploit category.
The UA string strips OS version, device model, and patch level. Cuts a chunk of fingerprinting signal.
OS-bundled web services forbid embedded third-party content via CSP. Can't load a tracker through the back door.
Profiles & identities
Real isolation between profiles, not just separate launchers. Decryption keys are per-profile; ending a session purges them from RAM.
Stock Android caps at 4. We raise to 32 — enough for a family, a small organization, or a daily-driver split between use-cases.
Log out of a profile to disable its apps and purge encryption keys from RAM. Re-entry requires the profile's lock secret.
Sensitive notification content is masked on the lock screen by default. Notifications still arrive, sender names just don't preview.
Hide apps you can't or don't want to uninstall — they don't run, don't appear, but config is preserved if you flip it back later.
Switch profile
Personal
Work
Travel
+ 29 more profile slots available
The features above ship with every HardenedOS device, every reseller, every tier. Not optional. Not upsold.