โ† Back to HQ

App Stores on GrapheneOS โ€“ Who to Trust (and Who Not To)

by Alien Investor

A False Sense of Security

Just because an app works doesn't mean it was installed cleanly. Many users on GrapheneOS focus exclusively on permissions. That matters โ€” but it's incomplete. The source of an app is at least as critical as what sensors or data it's allowed to access.
An app is not just an app.

In this video we analyze the different app sources and show you the safest hierarchy.

Signatures and checksums are not nerd stuff. They are the foundation of any serious security model.

How App Trust Works on GrapheneOS

GrapheneOS follows a simple but strict principle:
The app signature is the developer's identity.

If this chain is broken, there are only two possibilities:

  1. The developer lost their key
  2. Or someone else is suddenly delivering code

Both are a problem from a security standpoint. This logic is the foundation for why some app stores make sense on GrapheneOS โ€” and others don't.

The Recommended Store Hierarchy on GrapheneOS

1. GrapheneOS App Store โ€“ the Secure Default

The GrapheneOS App Store is the first and most important starting point. It comes pre-installed on GrapheneOS and is simply called "App Store" on the device.

Why?

Everything offered here is deliberately chosen and securely integrated.

Key rule:

Anything available in the GrapheneOS App Store is the secure default.

2. Accrescent โ€“ Small, but Extremely Clean

Accrescent is unknown to many users, but it operates in its own security league. Accrescent should be installed directly from the GrapheneOS App Store โ€” that's exactly what it's designed for.

Characteristics:

Typical example: App Verifier.

Accrescent only offers a handful of apps โ€” and that's precisely the point. No app zoo. No gimmicks. Only verifiable code.

3. Obtainium โ€“ a Tool for Advanced Users

Obtainium is powerful โ€” and that's exactly what makes it dangerous if you don't know what you're doing. Obtainium is not installed through classic app stores, but directly from the project's official GitHub repository.

Advantages:

Risks:

Core point:

Obtainium is a scalpel, not a kitchen knife.
Whoever uses it takes full responsibility for the source.

4. F-Droid โ€“ Situationally Useful, but with Limitations

F-Droid is often broadly perceived as "safe." That's an oversimplification.

F-Droid can make sense:

For sensitive applications, however, F-Droid is not the first choice.

Why Aurora Store Is Problematic

Aurora is convenient. And that's exactly its problem. Factual reasons for caution:

"Aurora Store is not problematic because it demonstrably distributes malicious apps, but because it technically bypasses the strict signature and update trust model of the original Play Store. This makes the cryptographic chain of trust less transparent and less robust for the user."
Key rule:

Convenience is not a security concept.
Anyone who cares about clean provenance and verifiable updates should avoid Aurora.

User Profiles โ€“ the Underrated Superpower of GrapheneOS

GrapheneOS enables true separation at the operating system level.

Multiple User Profiles

Properties:

Typical use cases: daily use vs. banking, personal vs. work, Google-free vs. Google-isolated.

App Cloning Across Profiles

The same app package can:

Ideal for: messengers, social media, test accounts.

Work Profile with Shelter โ€“ Targeted Isolation

Shelter allows creating a work profile within a user profile.

Key properties:

Typical use: Google Play Store, Google Play Services.

This lets you isolate Google dependencies without sacrificing push notifications. Important: Not perfect, but massively better than unfiltered integration.

Decision Logic for App Sources

A simple mental checklist:

Zap Store โ€“ a New, Experimental Ecosystem

Alongside the classic app sources, a completely new model is emerging: the Zap Store. The Zap Store comes from the Nostr community and takes a fundamentally different approach than Google Play or the Apple App Store.

Core ideas:

The Zap Store is:

It's not a complete replacement yet, but a solid start and very promising.

Important:

I've written a dedicated article on this, as it would go beyond the scope here. All links are below, in the further reading box.

Conclusion

GrapheneOS doesn't force anyone into security.
It provides tools.
Whether real security results from that depends entirely on the user's decisions.
Those who want control must take responsibility.

Further Reading

Sources & Links

Direct links to the tools discussed:

GrapheneOS Support:
grapheneos.org/donate

Tools for Real Owners

Tools I use myself โ€“ for Bitcoin self-custody and digital sovereignty:

Note: Some of these links are affiliate links. If you use them, you support my work at no extra cost to you. Thanks!


Recharge (Donate)

Send fuel to the mothership

Thanks for your support โ€“ for free content, financial sovereignty and the alien resistance!