Skip to content

DresOperatingSystems/Android-Degoogling

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Android-Degoogling

A Complete Rooted DeGoogling Guide (TWRP + Magisk + MicroG + Fossify) – For 2026

Project Goal: Turn any stock Android phone into a fully private, FOSS only device with no Google tracking, no Google Services, and only open source replacements.

Why: Because of all the restrictions google is bringing into place over the open source communites, to bring you back your privacy, to stop your data being sold.

⚠️ EXTREME WARNING

Rooting and flashing can brick your device, void your warranty, trip Knox/SafetyNet and wipe all data.
Back up everything (photos, apps, files) before starting.
This is advanced — if you're not comfortable with ADB/fastboot or device specific guides stop and use a non root method.
Proceed at your own risk.

Make a full TWRP backup after rooting (Boot + System + Data + Vendor) before any debloating.


Table of Contents


What You Will Need

Download only from these official links (March 2026). Install F-Droid first.

  • F-Droid (main FOSS store): Download APK | Site
  • Inure App Manager (debloat + management): GitHub Releases
  • Shizuku (root-like advanced permissions): GitHub Releases
  • TWRP (custom recovery): twrp.me → search your exact device model
  • Magisk (root + modules): GitHub Releases
  • De-Bloater (fine-tune system apps): F-Droid | GitHub
  • Noogle microG (Magisk module – replaces Google Services): GitHub Releases
  • LSPosed (advanced modules): GitHub Releases
  • SD Maid SE (deep cleaner): F-Droid
  • Fossify suite (Phone, Messages, Gallery, Calendar, Files, Launcher, Contacts, Music, etc.): fossify.org/apps (install all via F-Droid)
  • DuckDuckGo Privacy Browser (Chrome replacement): F-Droid
  • Aurora Store (anonymous Play Store access): F-Droid
  • HeliBoard (offline keyboard): F-Droid
  • Tuta Mail (Gmail replacement – end-to-end encrypted email): F-Droid
  • Cromite System WebView (privacy + ad-blocking WebView): GitHub Releases → download arm64_SystemWebView.apk (or arm)
  • Open WebView (Magisk module – makes WebView switching permanent): GitHub

Replacement Overview

Here’s exactly what each app replaces and why it’s better for privacy:

App Replaces Why it’s better
Fossify Phone Stock Phone / Dialer Fully open source, zero telemetry
Fossify Messages Stock SMS / Messaging Privacyfirst, no Google tracking
DuckDuckGo Privacy Browser Chrome Private search engine + tracker blocking
Tuta Mail Gmail End to end encrypted email (no Google account or scanning)
HeliBoard Gboard Completely offline keyboard, no data sent anywhere
Cromite System WebView Android System WebView Blocks ads & trackers in every app that loads web content
Aurora Store Google Play Store Anonymous downloads, no Google account required
Noogle microG Google Play Services Full compatibility for apps without any Google tracking
Fossify Gallery / Calendar / Files / Launcher Stock equivalents All open source, no cloud sync or telemetry

Step 1: Unlock the Bootloader

Device specific – required for TWRP + Magisk. Usually wipes data.

  1. Enable Developer Options (Settings → About phone → tap Build number 7 times).
  2. Turn on OEM unlocking + USB debugging.
  3. Install ADB & Fastboot on PC (platform tools from Google).
  4. adb reboot bootloader
  5. fastboot flashing unlock (or fastboot oem unlock on older devices).
  6. Confirm on phone.

Samsung / Huawei / carrier locked phones: Use official unlock or Download Mode.
Exact instructions: Search “[your exact model] unlock bootloader” on XDA Developers. Follow that guide only.

Phone will factory reset. Set up again + re enable USB debugging.


Step 2: Install TWRP (Custom Recovery)

TWRP = full backups + easy flashing.

  1. Go to twrp.me and search your exact device model.
  2. Download the latest .img (and .zip if available).
  3. Follow the exact instructions on that device’s TWRP page (they are device specific).

Typical commands:

adb reboot bootloader
fastboot boot twrp-xxxx.img          # temporary boot
# In TWRP: Install → select TWRP .zip (or Advanced → Install Recovery Ramdisk)

Reboot to recovery to confirm TWRP is installed.

No TWRP for your device? Use Magisk patching method only (below) or check XDA for unofficial builds.


Step 3: Install Magisk (Root)

Two methods — pick one.

Recommended: Magisk Patching (works on almost everything)

  1. Download latest Magisk APK from GitHub.
  2. Extract your boot.img (or init_boot.img) from stock firmware.
  3. Install Magisk app → Install → Select and Patch a File → choose boot.img.
  4. magisk_patched_xxxx.img appears in Downloads.
  5. Pull to PC: adb pull /sdcard/Download/magisk_patched_xxxx.img
  6. adb reboot bootloader
  7. fastboot flash boot magisk_patched_xxxx.img (or init_boot if needed).
  8. (Often required) Flash patched vbmeta.img with --disable verity --disable verification.
  9. Reboot. Magisk app should show “Installed”.

Alternative: Via TWRP (easier for many)

  • Rename Magisk APK to .zip
  • Boot to TWRP → Install → flash the .zip

Samsung note: Use Recovery mode + Odin with patched AP.tar.

Reboot → open Magisk app → you’re rooted!


Step 4: Install Core FOSS Apps

  1. Install F-Droid.
  2. From F-Droid install all of these:
    • Inure App Manager
    • Shizuku
    • SD Maid SE
    • All Fossify apps
    • DuckDuckGo Privacy Browser
    • HeliBoard
    • Aurora Store
    • Tuta Mail

Step 5: Install Magisk Modules

Open Magisk app → Modules → Install from storage:

  • Noogle microG
  • LSPosed
  • Open WebView (recommended for Cromite)

Reboot.


Step 6: Set Up Noogle microG (Replaces Google Services)

  1. Open Magisk → tap the action button on Noogle microG → grant permissions.
  2. Open microG Settings app.
  3. Self Check → fix every unticked item until all are ticked.
  4. Signature spoofing must say “OK” (use LSPosed + Zygisk if needed).
  5. Now microG should be enabled

Step 7: Change System WebView to Cromite (Privacy + Ad Blocking)

Stock WebView phones home to Google. Cromite blocks trackers & ads system-wide.

Easiest method:

  1. Install arm64_SystemWebView.apk from Cromite GitHub.
  2. Settings → System → Developer options → WebView implementation → select Cromite WebView.
  3. Reboot.

If it doesn’t appear:

  • Use the Open WebView Magisk module (already installed).
  • Search up how to change for your system specifically
  • If MicroG fails then you will have to uninstall the lsposed module

Test: Open Aurora Store or any web loading app — ads/trackers should be gone.


Step 8: Set Up Shizuku

Shizuku gives apps like Inure powerful system access without needing full root for every single action. It’s safer, lighter, and works perfectly with your existing Magisk root.

Why use Shizuku?

  • Lets Inure and other tools debloat safely and deeply.
  • Survives reboots when set up correctly.
  • Three methods available — we use the root method because your device is already rooted.

Step by step Root Setup (Recommended)

  1. Open the Shizuku app.
  2. If Magisk prompts for root permission, grant it to Shizuku permanently.
  3. On the main screen where it says root tap Start (big button).
  4. You’ll see a black screen with white writing saying the service has started.
  5. (Optional but recommended) In Shizuku settings → enable Auto start on boot and Keep alive.

Grant Permissions to Apps

  • Later when you open Inure it will automatically ask for Shizuku access — approve it and give it all permissions.
  • You can view/manage granted apps in Shizuku → “Authorized apps”.

Test it: Reboot your phone once. Open Shizuku again — it should auto start and show “Running” with root. If not, repeat the root start step.

You’re now ready for the deepest, safest debloating possible.


Step 9: Fine Tune Debloat & Cleanup

Now we remove every trace of Google safely.

9.1 Inure App Manager (Recommended Bulk Removal)

  1. Open Inure App Manager.
  2. Grant it full access — choose Root and Shizuku. Approve everything it asks for.
  3. Go to the Debloat tab.
  4. Tap select all (box icon).
  5. Select Recommended debloat list.
  6. This automatically selects everything your device doesn’t need (Google bloat, carrier junk, unused system apps, etc.).
  7. Review the list carefully (uncheck anything you want to keep), then tap Debloat to remove everything.
  8. Restart the phone. if inure looks likes it doing nothing then leave it as it is digging through your system to remove everything

9.2 De-Bloater App (Fine-Tuning)

  1. Open the De-Bloater app (requires root — it will detect Magisk automatically).
  2. Scan system apps.
  3. Remove all remaining Google system apps, including:
    • Gmail
    • Google Search
    • Chrome
    • Any leftover Play Services pieces
    • Other unwanted system bloat
  4. Apply changes and reboot.

⚠️ CRITICAL WARNING
You MUST have installed the replacements first (Tuta Mail for Gmail, Fossify Phone/Messages, DuckDuckGo, HeliBoard, etc.). Removing Gmail, Phone, or Messages without replacements will break email, calls and texting until you restore a TWRP backup.

9.3 Final Cleanup

Open SD Maid SE → run full scan + CorpseFinder → delete every Google remnant.


Step 10: Final Setup & Defaults

Settings → Apps → Defaults:

  • Browser → DuckDuckGo Privacy Browser
  • Keyboard → HeliBoard
  • Launcher → Fossify Launcher
  • Phone → Fossify Phone
  • Messages → Fossify Messages
  • Email → Tuta Mail (set as default for mailto links)

Aurora Store: Use Anonymous mode.

LSPosed modules (optional): Hide My Applist, Play Integrity Fix etc.


Step 11: Test & Backup

  • Test calls, SMS, email (Tuta), web content — everything should work via MicroG + Cromite.
  • TWRP backup (if not done already).
  • If anything breaks → restore backup in TWRP in seconds.

Contributing & Support

You now have a 100% degoogled device — no Google apps, no Google Services, Cromite WebView everywhere, only FOSS + MicroG + Tuta.

Device specific help? Drop your exact model in Issues and we will add a custom debloat list or flashable ZIP.

Tested and works on:
- Motorola Moto G32 (we have a custom recovery on our github profile for it)
- Motorola Moto G7 Plus
- Samsung Galaxy A05s

If this works on your device then can you please report it with proof to the DresOS team so we can add it to our list of working device's

Contact us here:

https://dresoperatingsystems.github.io/

Made with ❤️ for privacy by DresOS

Releases

No releases published

Packages