add repo metadata

This commit is contained in:
Nathan Freitas 2026-03-24 14:28:46 -04:00
parent 680991e9cc
commit d40a7070b9
76 changed files with 1491 additions and 0 deletions

BIN
butter.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 11 KiB

467
config.yml Normal file
View file

@ -0,0 +1,467 @@
---
# Copy this file to config.yml, then amend the settings below according to
# your system configuration.
# Custom path to the Android SDK, defaults to $ANDROID_HOME
sdk_path: /Users/fabiolamaurice/Library/Android/sdk
aapt: /Users/fabiolamaurice/Library/Android/sdk/build-tools/34.0.0/aapt
repo_name: RCBox
repo_description: Maslyonka apps
# Paths to installed versions of the Android NDK. This will be
# automatically filled out from well known sources like
# $ANDROID_HOME/ndk-bundle and $ANDROID_HOME/ndk/*. If a required
# version is missing in the buildserver VM, it will be automatically
# downloaded and installed into the standard $ANDROID_HOME/ndk/
# directory. Manually setting it here will override the auto-detected
# values. The keys can either be the "release" (e.g. r21e) or the
# "revision" (e.g. 21.4.7075529).
#
# ndk_paths:
# r10e: $ANDROID_HOME/android-ndk-r10e
# r17: ""
# 21.4.7075529: ~/Android/Ndk
# r22b: null
# Directory to store downloaded tools in (i.e. gradle versions)
# By default, these are stored in ~/.cache/fdroidserver
# cachedir: cache
# Specify paths to each major Java release that you want to support
# java_paths:
# 8: /usr/lib/jvm/java-8-openjdk
# Command or path to binary for running Ant
# ant: ant
# Command or path to binary for running maven 3
# mvn3: mvn
# Command or path to binary for running Gradle
# Defaults to using an internal gradle wrapper (gradlew-fdroid).
# gradle: gradle
# Always scan the APKs produced by `fdroid build` for known non-free classes
# scan_binary: true
# Set the maximum age (in days) of an index that a client should accept from
# this repo. Setting it to 0 or not setting it at all disables this
# functionality. If you do set this to a non-zero value, you need to ensure
# that your index is updated much more frequently than the specified interval.
# The same policy is applied to the archive repo, if there is one.
# repo_maxage: 0
# Canonical URL of the repositoy, needs to end in /repo. Is is used to identity
# the repo in the client, as well.
repo_url: https://maslyonka.com/fdroid/repo
#
# Base URL for per-package pages on the website of this repo,
# i.e. https://f-droid.org/packages/<appid>/ This should be accessible
# with a browser. Setting it to null or not setting this disables the
# feature.
# repo_web_base_url: https://MyFirstFDroidRepo.org/packages/
#
# As above, but for the archive repo.
#
# archive_url: https://f-droid.org/archive
# archive_web_base_url:
# archive_name: My First F-Droid Archive Demo
# archive_description: >-
# The repository of older versions of packages from the main demo repository.
# archive_older sets the number of versions kept in the main repo, with all
# older ones going to the archive. Set it to 0, and there will be no archive
# repository, and no need to define the other archive_ values.
#
# archive_older: 3
# The repo's icon defaults to a file called 'icon.png' in the 'icons'
# folder for each section, e.g. repo/icons/icon.png and
# archive/icons/icon.png. To use a different filename for the icons,
# set the filename here. You must still copy it into place in
# repo/icons/ and/or archive/icons/.
#
repo_icon: butter.png
# archive_icon: myicon.png
# This allows a specific kind of insecure APK to be included in the
# 'repo' section. Since April 2017, APK signatures that use MD5 are
# no longer considered valid, jarsigner and apksigner will return an
# error when verifying. `fdroid update` will move APKs with these
# disabled signatures to the archive. This option stops that
# behavior, and lets those APKs stay part of 'repo'.
#
# allow_disabled_algorithms: true
# Normally, all apps are collected into a single app repository, like on
# https://f-droid.org. For certain situations, it is better to make a repo
# that is made up of APKs only from a single app. For example, an automated
# build server that publishes nightly builds.
# per_app_repos: true
# `fdroid update` will create a link to the current version of a given app.
# This provides a static path to the current APK. To disable the creation of
# this link, uncomment this:
# make_current_version_link: false
# By default, the "current version" link will be based on the "Name" of the
# app from the metadata. You can change it to use a different field from the
# metadata here:
# current_version_name_source: packageName
# Optionally, override home directory for gpg
# gpghome: /home/fdroid/somewhere/else/.gnupg
# The ID of a GPG key for making detached signatures for APKs. Optional.
# gpgkey: 1DBA2E89
# The key (from the keystore defined below) to be used for signing the
# repository itself. This is the same name you would give to keytool or
# jarsigner using -alias. (Not needed in an unsigned repository).
repo_keyalias: 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa
# Optionally, the public key for the key defined by repo_keyalias above can
# be specified here. There is no need to do this, as the public key can and
# will be retrieved from the keystore when needed. However, specifying it
# manually can allow some processing to take place without access to the
# keystore.
# repo_pubkey: ...
# The keystore to use for release keys when building. This needs to be
# somewhere safe and secure, and backed up! The best way to manage these
# sensitive keys is to use a "smartcard" (aka Hardware Security Module). To
# configure F-Droid to use a smartcard, set the keystore file using the keyword
# "NONE" (i.e. keystore: "NONE"). That makes Java find the keystore on the
# smartcard based on 'smartcardoptions' below.
keystore: keystore.p12
# You should not need to change these at all, unless you have a very
# customized setup for using smartcards in Java with keytool/jarsigner
# smartcardoptions: |
# -storetype PKCS11 -providerName SunPKCS11-OpenSC
# -providerClass sun.security.pkcs11.SunPKCS11
# -providerArg opensc-fdroid.cfg
# The password for the keystore (at least 6 characters). If this password is
# different than the keypass below, it can be OK to store the password in this
# file for real use. But in general, sensitive passwords should not be stored
# in text files!
keystorepass: VqbgddQmatQJuD7mK1w3dtxj3KuIQ4/RJlOGkLanzcU=
# The password for keys - the same is used for each auto-generated key as well
# as for the repository key. You should not normally store this password in a
# file since it is a sensitive password.
keypass: VqbgddQmatQJuD7mK1w3dtxj3KuIQ4/RJlOGkLanzcU=
# The distinguished name used for all keys.
keydname: CN=1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.ip6.arpa,
OU=F-Droid
# Use this to override the auto-generated key aliases with specific ones
# for particular applications. Normally, just leave it empty.
#
# keyaliases:
# com.example.app: example
#
# You can also force an app to use the same key alias as another one, using
# the @ prefix.
#
# keyaliases:
# com.example.another.plugin: "@com.example.another"
# The full path to the root of the repository. It must be specified in
# rsync/ssh format for a remote host/path. This is used for syncing a locally
# generated repo to the server that is it hosted on. It must end in the
# standard public repo name of "/fdroid", but can be in up to three levels of
# sub-directories (i.e. /var/www/packagerepos/fdroid). You can include
# multiple servers to sync to by wrapping the whole thing in {} or [], and
# including the serverwebroot strings in a comma-separated list.
#
# serverwebroot: user@example:/var/www/fdroid
# serverwebroot:
# - foo.com:/usr/share/nginx/www/fdroid
# - bar.info:/var/www/fdroid
#
# There is a special mode to only deploy the index file:
#
# serverwebroot:
# - url: 'me@b.az:/srv/fdroid'
# index_only: true
# When running fdroid processes on a remote server, it is possible to
# publish extra information about the status. Each fdroid sub-command
# can create repo/status/running.json when it starts, then a
# repo/status/<sub-command>.json when it completes. The builds logs
# and other processes will also get published, if they are running in
# a buildserver VM. The build logs name scheme is:
# .../repo/$APPID_$VERCODE.log.gz. These files are also pushed to all
# servers configured in 'serverwebroot'.
#
# deploy_process_logs: true
# The full URL to a git remote repository. You can include
# multiple servers to mirror to by adding strings to a YAML list or map.
# Servers listed here will also be automatically inserted in the mirrors list.
#
# servergitmirrors: https://github.com/user/repo
# servergitmirrors:
# - https://github.com/user/repo
# - https://gitlab.com/user/repo
#
# servergitmirrors:
# - url: https://github.com/user/repo
# - url: https://gitlab.com/user/repo
# index_only: true
# These settings allow using `fdroid deploy` for publishing APK files from
# your repository to GitHub Releases. (You should also run `fdroid update`
# every time before deploying to GitHub releases to update index files.) Here's
# an example for this deployment automation:
# https://github.com/f-droid/fdroidclient/releases/
#
# Currently, versions which are assigned to a release channel (e.g. alpha or
# beta releases) are ignored.
#
# In the example below, tokens are read from environment variables. Putting
# tokens directly into the config file is also supported but discouraged. It is
# highly recommended to use a "Fine-grained personal access token", which is
# restricted to the minimum required permissions, which are:
# * Metadata - read
# * Contents - read/write
# (https://github.com/settings/personal-access-tokens/new)
#
# github_token: {env: GITHUB_TOKEN}
# github_releases:
# - projectUrl: https://github.com/f-droid/fdroidclient
# packageNames:
# - org.fdroid.basic
# - org.fdroid.fdroid
# release_notes_prepend: |
# Re-post of official F-Droid App release from https://f-droid.org
# - projectUrl: https://github.com/example/app
# packageNames: com.example.app
# token: {env: GITHUB_TOKEN_EXAMPLE}
# Most git hosting services have hard size limits for each git repo.
# `fdroid deploy` will delete the git history when the git mirror repo
# approaches this limit to ensure that the repo will still fit when
# pushed. GitHub recommends 1GB, gitlab.com recommends 10GB.
#
# git_mirror_size_limit: 10GB
# Any mirrors of this repo, for example all of the servers declared in
# serverwebroot and all the servers declared in servergitmirrors,
# will automatically be used by the client. If one
# mirror is not working, then the client will try another. If the
# client has Tor enabled, then the client will prefer mirrors with
# .onion addresses. This base URL will be used for both the main repo
# and the archive, if it is enabled. So these URLs should end in the
# 'fdroid' base of the F-Droid part of the web server like serverwebroot.
#
# mirrors:
# - https://foo.bar/fdroid
# - http://foobarfoobarfoobar.onion/fdroid
#
# Or additional metadata can also be included by adding key/value pairs:
#
# mirrors:
# - url: https://foo.bar/fdroid
# countryCode: BA
# - url: http://foobarfoobarfoobar.onion/fdroid
#
# The list of mirrors can also be maintained in config/mirrors.yml, a
# standalone YAML file in the optional configuration directory. In
# that case, mirrors: should be removed from this file (config.yml).
# optionally specify which identity file to use when using rsync or git over SSH
#
# identity_file: ~/.ssh/fdroid_id_rsa
# If you are running the repo signing process on a completely offline machine,
# which provides the best security, then you can specify a folder to sync the
# repo to when running `fdroid deploy`. This is most likely going to
# be a USB thumb drive, SD Card, or some other kind of removable media. Make
# sure it is mounted before running `fdroid deploy`. Using the
# standard folder called 'fdroid' as the specified folder is recommended, like
# with serverwebroot.
#
# local_copy_dir: /media/MyUSBThumbDrive/fdroid
# If you are using local_copy_dir on an offline build/signing server, once the
# thumb drive has been plugged into the online machine, it will need to be
# synced to the copy on the online machine. To make that happen
# automatically, set sync_from_local_copy_dir to True:
#
# sync_from_local_copy_dir: true
# To upload the repo to an Amazon S3 bucket using `fdroid deploy'
# . rclone, s3cmd and apache libcloud are the available options.
# If rclone and s3cmd are not installed, apache libcloud is used.
# To use apache libcloud, add the following options to this file
# (config.yml)
#
# awsbucket: myawsfdroid
# awsaccesskeyid: SEE0CHAITHEIMAUR2USA
# awssecretkey: {env: awssecretkey}
#
# In case s3cmd is installed and rclone is not installed,
# s3cmd will be the preferred sync option.
# It will delete and recreate the whole fdroid directory each time.
# To customize how s3cmd interacts with the cloud
# provider, create a 's3cfg' file next to this file (config.yml), and
# those settings will be used instead of any 'aws' variable below.
# Secrets can be fetched from environment variables to ensure that
# they are not leaked as part of this file.
#
# awsbucket: myawsfdroid
# awsaccesskeyid: SEE0CHAITHEIMAUR2USA
# awssecretkey: {env: awssecretkey}
#
# In case rclone is installed and s3cmd is not installed,
# rclone will be the preferred sync option.
# It will sync the local folders with remote folders without
# deleting anything in one go.
# To ensure success, install rclone as per
# the instructions at https://rclone.org/install/ and also configure for
# object storage services as detailed at https://rclone.org/s3/#configuration
# By default rclone uses the configuration file at ~/.config/rclone/rclone.conf
# To specify a custom configuration file, please add the full path to the
# configuration file as below
#
# path_to_custom_rclone_config: /home/mycomputer/somedir/example.conf
#
# This setting will ignore the default rclone config found at
# ~/.config/rclone/rclone.conf
#
# Please note that rclone_config can be assigned a string or list
#
# awsbucket: myawsfdroid
# rclone_config: aws-sample-config
#
# or
#
# awsbucket: myawsfdroid
# rclone_config: [aws-sample-config, rclone-supported-service-config]
#
# In case both rclone and s3cmd are installed, the preferred sync
# tool can be specified in this file (config.yml)
# if s3cmd is preferred, set it as below
#
# s3cmd: true
#
# if rclone is preferred, set it as below
#
# rclone: true
#
# Please note that only one can be set to true at any time
# Also, in the event that both s3cmd and rclone are installed
# and both are missing from the config.yml file, the preferred
# tool will be s3cmd.
# If you want to force 'fdroid server' to use a non-standard serverwebroot.
# This will allow you to have 'serverwebroot' entries which do not end in
# '/fdroid'. (Please note that some client features expect repository URLs
# to end in '/fdroid/repo'.)
#
# nonstandardwebroot: false
# If you want to upload the release APK file to androidobservatory.org
#
# androidobservatory: false
# If you want to upload the release APK file to virustotal.com
# You have to enter your profile apikey to enable the upload.
#
# virustotal_apikey: 9872987234982734
#
# Or get it from an environment variable:
#
# virustotal_apikey: {env: virustotal_apikey}
# Keep a log of all generated index files in a git repo to provide a
# "binary transparency" log for anyone to check the history of the
# binaries that are published. This is in the form of a "git remote",
# which this machine where `fdroid update` is run has already been
# configured to allow push access (e.g. ssh key, username/password, etc)
# binary_transparency_remote: git@gitlab.com:fdroid/binary-transparency-log.git
# Set this to true to always use a build server. This saves specifying the
# --server option on dedicated secure build server hosts.
# build_server_always: true
# Limit in number of characters that fields can take up
# Only the fields listed here are supported, defaults shown
# char_limits:
# author: 256
# name: 50
# summary: 80
# description: 4000
# video: 256
# whatsNew: 500
# It is possible for the server operator to specify lists of apps that
# must be installed or uninstalled on the client (aka "push installs).
# If the user has opted in, or the device is already setup to respond
# to these requests, then F-Droid will automatically install/uninstall
# the packageNames listed. This is protected by the same signing key
# as the app index metadata.
#
# install_list:
# - at.bitfire.davdroid
# - com.fsck.k9
# - us.replicant
#
# uninstall_list:
# - com.facebook.orca
# - com.android.vending
# `fdroid lint` checks licenses in metadata against a built white list. By
# default we will require license metadata to be present and only allow
# licenses approved either by FSF or OSI. We're using the standardized SPDX
# license IDs. (https://spdx.org/licenses/)
#
# We use `python3 -m spdx-license-list print --filter-fsf-or-osi` for
# generating our default list. (https://pypi.org/project/spdx-license-list)
#
# You can override our default list of allowed licenes by setting this option.
# Just supply a custom list of licene names you would like to allow. To disable
# checking licenses by the linter, assign an empty value to lint_licenses.
#
# lint_licenses:
# - Custom-License-A
# - Another-License
# `fdroid scanner` can scan for signatures from various sources. By default
# it's configured to only use F-Droids official SUSS collection. We have
# support for these special collections:
# * 'exodus' - official exodus-privacy.org signatures
# * 'etip' - exodus privacy investigation platfrom community contributed
# signatures
# * 'suss' - official F-Droid: Suspicious or Unwanted Software Signatures
# You can also configure scanner to use custom collections of signatures here.
# They have to follow the format specified in the SUSS readme.
# (https://gitlab.com/fdroid/fdroid-suss/#cache-file-data-format)
#
# scanner_signature_sources:
# - suss
# - exodus
# - https://example.com/signatures.json
# The scanner can use signature sources from the internet. These are
# cached locally. To force them to be refreshed from the network on
# every run, set this to true:
#
# refresh_scanner: true

BIN
config/.DS_Store vendored Normal file

Binary file not shown.

50
config/categories.yml Normal file
View file

@ -0,0 +1,50 @@
Connectivity:
name: Connectivity
Development:
name: Development
Games:
name: Games
Graphics:
name: Graphics
Internet:
name: Internet
Money:
name: Money
Multimedia:
name: Multimedia
Navigation:
name: Navigation
Phone & SMS:
name: Phone & SMS
Reading:
name: Reading
Science & Education:
name: Science & Education
Security:
name: Security
Sports & Health:
name: Sports & Health
System:
name: System
Theming:
name: Theming
Time:
name: Time
Writing:
name: Writing

BIN
fastlane/.DS_Store vendored Normal file

Binary file not shown.

BIN
fastlane/metadata/.DS_Store vendored Normal file

Binary file not shown.

Binary file not shown.

View file

@ -0,0 +1 @@
Orbot es una aplicación gratuita y de código abierto para Android que enruta el tráfico de internet a través de la red Tor, ayudando a proteger la privacidad, el anonimato y la seguridad en línea, además de permitir el acceso a contenido bloqueado o censurado.

View file

@ -0,0 +1 @@
Tor VPN for Android

View file

@ -0,0 +1,43 @@
Categories:
- Security
- Internet
License: GPL-3.0
AuthorName: Proton AG
AuthorEmail: support@protonvpn.com
AuthorWebSite: https://protonvpn.com/
SourceCode: https://github.com/ProtonVPN/android-app
IssueTracker: https://github.com/ProtonVPN/android-app/issues
AutoName: ProtonVPN
Summary: Privacy-focused open-source VPN client developed by Proton AG.
Description: |
ProtonVPN is a privacy-focused virtual private network service
developed by Proton AG that has fully open-sourced its client
applications across multiple platforms.
All major clients (Windows, macOS, Android, iOS, and Linux)
are available under GPL-3.0, enabling community review and
contribution. ProtonVPN emphasizes transparency, audited
security, and strong privacy protections under Swiss law.
ProtonVPN provides encrypted VPN services to protect internet
traffic from interception and surveillance while masking user
IP addresses and enhancing privacy.
The Android client source code is published on GitHub,
allowing independent security review and community
contribution. It supports features such as:
• Secure Core routing
• OpenVPN and WireGuard protocols
• Split tunneling
• Multi-platform support

View file

@ -0,0 +1,43 @@
Categories:
- Security
- Internet
License: GPL-3.0
AuthorName: Proton AG
AuthorEmail: support@protonvpn.com
AuthorWebSite: https://protonvpn.com/
SourceCode: https://github.com/ProtonVPN/android-app
IssueTracker: https://github.com/ProtonVPN/android-app/issues
AutoName: ProtonVPN
Summary: Privacy-focused open-source VPN client developed by Proton AG.
Description: |
ProtonVPN is a privacy-focused virtual private network service
developed by Proton AG that has fully open-sourced its client
applications across multiple platforms.
All major clients (Windows, macOS, Android, iOS, and Linux)
are available under GPL-3.0, enabling community review and
contribution. ProtonVPN emphasizes transparency, audited
security, and strong privacy protections under Swiss law.
ProtonVPN provides encrypted VPN services to protect internet
traffic from interception and surveillance while masking user
IP addresses and enhancing privacy.
The Android client source code is published on GitHub,
allowing independent security review and community
contribution. It supports features such as:
• Secure Core routing
• OpenVPN and WireGuard protocols
• Split tunneling
• Multi-platform support
Repo: https://github.com/ProtonVPN/android-app

29
metadata/chat.delta.yml Normal file
View file

@ -0,0 +1,29 @@
Categories:
- Messaging
- Security
License: GPL-3.0-or-later
AuthorName: DeltaChat Community
AuthorEmail: contact@delta.chat
AuthorWebSite: https://delta.chat/
SourceCode: https://github.com/deltachat/deltachat-android
IssueTracker: https://github.com/deltachat/deltachat-android/issues
AutoName: Delta Chat
Summary: Decentralized email-based secure messaging app.
Description: |
Delta Chat is a free and open-source decentralized
messenger that uses standard email protocols to
send and receive end-to-end encrypted messages
without relying on central servers.
It works across Android, iOS, and desktop platforms,
allowing users to chat securely with anyone using
an email address while maintaining privacy and
resilience against network restrictions.

View file

@ -0,0 +1,30 @@
Categories:
- Messaging
- Security
License: GPL-3.0-or-later
AuthorName: DeltaChat Community
AuthorEmail: contact@delta.chat
AuthorWebSite: https://delta.chat/
SourceCode: https://github.com/deltachat/deltachat-android
IssueTracker: https://github.com/deltachat/deltachat-android/issues
AutoName: Delta Chat
Summary: Decentralized email-based secure messaging app.
Description: |
Delta Chat is a free and open-source decentralized
messenger that uses standard email protocols to
send and receive end-to-end encrypted messages
without relying on central servers.
It works across Android, iOS, and desktop platforms,
allowing users to chat securely with anyone using
an email address while maintaining privacy and
resilience against network restrictions.
Repo: https://github.com/deltachat/deltachat-android.git

View file

View file

@ -0,0 +1,22 @@
Categories:
- Security
- Circumvention
- Connectivity
License: "Not publicly available"
AuthorName: AdGuard Software Limited
AuthorEmail: support@adguard.com
AuthorWebSite: https://adguard-vpn.com/en/welcome.html
SourceCode: https://github.com/TrustTunnel/TrustTunnel
IssueTracker: https://github.com/TrustTunnel/TrustTunnel/issues
AutoName: AdGuard VPN
Summary: Commercial VPN service that provides encrypted, privacy-focused internet connections via its proprietary apps for desktop, mobile, and browser platforms.
Description: |
AdGuard VPN helps protect users privacy and secure online activity by creating an encrypted connection between the device and the internet, hiding IP addresses and data from observers. It offers desktop, mobile, and browser extension clients, supports a strict no-logging policy, and aims to make VPN traffic harder to detect or block by blending it with normal HTTPS traffic.
While the core app is proprietary, the TrustTunnel protocol that powers connectivity is open-source on GitHub, allowing developers to inspect, modify, and extend the underlying technology.

View file

@ -0,0 +1,20 @@
Categories:
- Security
-Circumvention
- Connectivity
License: Not publicly available
AuthorName: AdGuard Software Limited
AuthorEmail: support@adguard.com
AuthorWebSite: https://adguard-vpn.com/en/welcome.html
SourceCode: https://github.com/TrustTunnel/TrustTunnel
IssueTracker: https://github.com/TrustTunnel/TrustTunnel/issues
AutoName: AdGuard VPN
Summary: Commercial VPN service that provides encrypted, privacy-focused internet connections via its proprietary apps for desktop, mobile, and browser platforms.
Description: AdGuard VPN helps protect users privacy and secure online activity by creating an encrypted connection between the device and the internet, hiding IP addresses and data from observers. It offers desktop, mobile, and browser extension clients, supports a strict no-logging policy, and aims to make VPN traffic harder to detect or block by blending it with normal HTTPS traffic. While the core app is proprietary, the TrustTunnel protocol that powers connectivity is open-source on GitHub, allowing developers to inspect, modify, and extend the underlying technology.
RepoType: git (Open-source protocol implementation)
Repo: https://github.com/TrustTunnel/TrustTunnel

Binary file not shown.

After

Width:  |  Height:  |  Size: 74 KiB

View file

@ -0,0 +1,35 @@
Categories:
- Security
- Internet
License: BSD-3-Clause
AuthorName: nthLink Team
AuthorEmail: support@nthlink.com
AuthorWebSite: https://nthlink.com/
SourceCode: https://github.com/nthlink/nthlink-os-android
IssueTracker: https://github.com/nthlink/nthlink-os-android/issues
AutoName: nthLink
Summary: Open-source VPN client focused on censorship circumvention and privacy.
Description: |
nthLink is an open-source VPN client designed to provide secure,
uncensored internet access. It uses encryption and protocol
techniques to help users reach the internet even where
connections or addresses are blocked.
The Android source code is licensed under BSD-3-Clause and is
publicly available for independent review and community
contribution, reflecting a commitment to transparency.
nthLink emphasizes:
• Encrypted tunneling
• Trusted DNS
• Resilient connections after offline periods
• Access to blocked content

View file

@ -0,0 +1,35 @@
Categories:
- Security
- Internet
License: BSD-3-Clause
AuthorName: nthLink Team
AuthorEmail: support@nthlink.com
AuthorWebSite: https://nthlink.com/
SourceCode: https://github.com/nthlink/nthlink-os-android
IssueTracker: https://github.com/nthlink/nthlink-os-android/issues
AutoName: nthLink
Summary: Open-source VPN client focused on censorship circumvention and privacy.
Description: |
nthLink is an open-source VPN client designed to provide secure,
uncensored internet access. It uses encryption and protocol
techniques to help users reach the internet even where
connections or addresses are blocked.
The Android source code is licensed under BSD-3-Clause and is
publicly available for independent review and community
contribution, reflecting a commitment to transparency.
nthLink emphasizes:
• Encrypted tunneling
• Trusted DNS
• Resilient connections after offline periods
• Access to blocked content
Repo: https://github.com/nthlink/nthlink-os-android

35
metadata/com.psiphon3.yml Normal file
View file

@ -0,0 +1,35 @@
Categories:
- Security
- Internet
License: GPL-3.0
AuthorName: Psiphon Inc.
AuthorWebSite: https://psiphon.ca/
SourceCode: https://github.com/Psiphon-Inc/psiphon-android
IssueTracker: https://github.com/Psiphon-Inc/psiphon-android/issues
AutoName: Psiphon
Summary: Open-source censorship circumvention tool using VPN, SSH, and proxy technologies.
Description: |
Psiphon is a free and open-source internet censorship
circumvention tool that helps users access blocked
content in restrictive environments.
It combines VPN, SSH, and HTTP proxy technologies
with traffic obfuscation techniques to bypass
filtering and network restrictions.
Unlike traditional anonymity networks, Psiphon
focuses primarily on censorship circumvention
rather than providing full anonymity.
The Android client source code is publicly
available under GPL-3.0 and related licenses,
enabling independent review and community
contribution.

View file

@ -0,0 +1,36 @@
Categories:
- Security
- Internet
License: GPL-3.0
AuthorName: Psiphon Inc.
AuthorWebSite: https://psiphon.ca/
SourceCode: https://github.com/Psiphon-Inc/psiphon-android
IssueTracker: https://github.com/Psiphon-Inc/psiphon-android/issues
AutoName: Psiphon
Summary: Open-source censorship circumvention tool using VPN, SSH, and proxy technologies.
Description: |
Psiphon is a free and open-source internet censorship
circumvention tool that helps users access blocked
content in restrictive environments.
It combines VPN, SSH, and HTTP proxy technologies
with traffic obfuscation techniques to bypass
filtering and network restrictions.
Unlike traditional anonymity networks, Psiphon
focuses primarily on censorship circumvention
rather than providing full anonymity.
The Android client source code is publicly
available under GPL-3.0 and related licenses,
enabling independent review and community
contribution.
Repo: https://github.com/Psiphon-Inc/psiphon-android

View file

View file

@ -0,0 +1,34 @@
Categories:
- Security
- Internet
License: GPL-2.0
AuthorName: Windscribe Limited
AuthorEmail: hello@windscribe.com
AuthorWebSite: https://windscribe.com
SourceCode: https://github.com/Windscribe/Android-App
IssueTracker: https://github.com/Windscribe/Android-App/issues
AutoName: Windscribe VPN
Summary: Open-source VPN client for Android focused on privacy and secure connections.
Description: |
Windscribe VPN for Android provides encrypted VPN
connections to protect user privacy and help
circumvent censorship.
The app supports multiple VPN protocols and
configuration options, allowing secure access
over mobile networks and public Wi-Fi.
The Android client source code is maintained
under the GPL-2.0 license and published on GitHub,
enabling transparency and community review.
Windscribe operates under a stated no-logs policy
and has undergone security audits for its Android app.

View file

@ -0,0 +1,35 @@
Categories:
- Security
- Internet
License: GPL-2.0
AuthorName: Windscribe Limited
AuthorEmail: hello@windscribe.com
AuthorWebSite: https://windscribe.com
SourceCode: https://github.com/Windscribe/Android-App
IssueTracker: https://github.com/Windscribe/Android-App/issues
AutoName: Windscribe VPN
Summary: Open-source VPN client for Android focused on privacy and secure connections.
Description: |
Windscribe VPN for Android provides encrypted VPN
connections to protect user privacy and help
circumvent censorship.
The app supports multiple VPN protocols and
configuration options, allowing secure access
over mobile networks and public Wi-Fi.
The Android client source code is maintained
under the GPL-2.0 license and published on GitHub,
enabling transparency and community review.
Windscribe operates under a stated no-logs policy
and has undergone security audits for its Android app.
Repo: https://github.com/Windscribe/Android-App

View file

@ -0,0 +1,41 @@
Categories:
- Security
- Internet
License: MPL-2.0
AuthorName: Gephyra OÜ
AuthorEmail: contact@geph.io
AuthorWebSite: https://geph.io/en
SourceCode: https://github.com/geph-official/geph5
IssueTracker: https://github.com/geph-official/geph5/issues
AutoName: Geph VPN
Summary: Open-source censorship-resistant VPN using bridge and exit node architecture.
Description: |
Geph is an open-source, privacy-focused VPN designed
to resist censorship and ISP-level blocking.
It tunnels traffic through a distributed network
of bridges and exit nodes, making VPN traffic
harder for censors to detect and block.
Geph implements privacy protections such as
blind-signature authentication, preventing
servers from linking browsing activity
to user identities.
The project publishes its core components,
including clients, GUIs, and protocols,
under open licenses on GitHub, enabling
inspection, modification, and community
participation.
Geph supports major platforms including
Windows, macOS, Linux, Android, and iOS.

View file

@ -0,0 +1,41 @@
Categories:
- Security
- Internet
License: MPL-2.0
AuthorName: Gephyra OÜ
AuthorEmail: contact@geph.io
AuthorWebSite: https://geph.io/en
SourceCode: https://github.com/geph-official/geph5
IssueTracker: https://github.com/geph-official/geph5/issues
AutoName: Geph VPN
Summary: Open-source censorship-resistant VPN using bridge and exit node architecture.
Description: |
Geph is an open-source, privacy-focused VPN designed
to resist censorship and ISP-level blocking.
It tunnels traffic through a distributed network
of bridges and exit nodes, making VPN traffic
harder for censors to detect and block.
Geph implements privacy protections such as
blind-signature authentication, preventing
servers from linking browsing activity
to user identities.
The project publishes its core components,
including clients, GUIs, and protocols,
under open licenses on GitHub, enabling
inspection, modification, and community
participation.
Geph supports major platforms including
Windows, macOS, Linux, Android, and iOS.
Repo: https://github.com/geph-official/geph5

View file

@ -0,0 +1,41 @@
Categories:
- Security
- Internet
License: GPL-3.0
AuthorName: Amnezia VPN Community
AuthorEmail: support@amnezia.org
AuthorWebSite: https://amnezia.org/
SourceCode: https://github.com/amnezia-vpn/amnezia-client
IssueTracker: https://github.com/amnezia-vpn/amnezia-client/issues
AutoName: Amnezia VPN
Summary: Open-source multi-protocol VPN client designed for censorship circumvention.
Description: |
Amnezia VPN is a free and open-source multi-protocol
VPN client that enables users to set up and self-host
their own VPN servers.
It supports standard VPN protocols including
WireGuard, OpenVPN, IKEv2/IPsec, and Shadowsocks,
along with traffic-masking and obfuscation techniques
designed to resist censorship.
The client can automatically configure servers
(including Docker-based deployments) and supports
features such as split tunneling and protocol
obfuscation for restrictive environments.
The source code is published publicly under
GPL-3.0, allowing inspection, modification,
and redistribution.

View file

@ -0,0 +1,44 @@
Categories:
- Security
- Internet
License: GPL-3.0
AuthorName: Amnezia VPN Community
AuthorEmail: support@amnezia.org
AuthorWebSite: https://amnezia.org/
SourceCode: https://github.com/amnezia-vpn/amnezia-client
IssueTracker: https://github.com/amnezia-vpn/amnezia-client/issues
AutoName: Amnezia VPN
Summary: Open-source multi-protocol VPN client designed for censorship circumvention.
Description: |
Amnezia VPN is a free and open-source multi-protocol
VPN client that enables users to set up and self-host
their own VPN servers.
It supports standard VPN protocols including
WireGuard, OpenVPN, IKEv2/IPsec, and Shadowsocks,
along with traffic-masking and obfuscation techniques
designed to resist censorship.
The client can automatically configure servers
(including Docker-based deployments) and supports
features such as split tunneling and protocol
obfuscation for restrictive environments.
Amnezia VPN is available for Windows, macOS,
Linux, Android, and iOS. The project does not
require user registration and states that it
does not maintain usage logs.
The source code is published publicly under
GPL-3.0, allowing inspection, modification,
and redistribution.
Repo: https://github.com/amnezia-vpn/amnezia-client

View file

@ -0,0 +1,33 @@
Categories:
- Messaging
- Security
License: GPL-3.0-or-later
AuthorName: Briar Project
AuthorEmail: contact@briarproject.org
AuthorWebSite: https://briarproject.org/
SourceCode: https://code.briarproject.org/briar/briar
IssueTracker: https://code.briarproject.org/briar/briar/-/issues
AutoName: Briar
Summary: Secure peer-to-peer messaging that works with or without internet access.
Description: |
Briar is an open-source, decentralized messaging
app designed for activists, journalists, and
others who require secure and resilient communication.
Messages synchronize directly between devices
using Bluetooth, Wi-Fi, or the Tor network,
without relying on central servers.
Briar offers end-to-end encrypted private chats,
forums, and blogs, supporting censorship-resistant
communication even in offline or highly restricted
network environments.

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.7 KiB

View file

@ -0,0 +1,34 @@
Categories:
- Internet
- Security
License: MPL-2.0
AuthorName: F-Droid / Mozilla Community
AuthorWebSite: https://f-droid.org/packages/org.mozilla.fennec_fdroid/
SourceCode: https://gitlab.com/relan/fennecbuild
IssueTracker: https://gitlab.com/relan/fennecbuild/-/issues
AutoName: Fennec F-Droid
Summary: Privacy-focused Android web browser based on Firefox.
Description: |
Fennec F-Droid is an open-source Android web browser
forked from Mozillas Firefox releases with
proprietary components and telemetry removed to
comply with F-Droid standards.
It uses the Gecko rendering engine to support
modern web standards and includes features such as:
• Private browsing
• Enhanced tracking protection
• Extension support
• Firefox Sync compatibility
The project aims to provide a fully open-source
Firefox-based browser while minimizing external tracking.

View file

@ -0,0 +1,39 @@
Categories:
- Multimedia
- Internet
License: GPL-3.0-or-later
AuthorName: Team NewPipe
AuthorEmail: team@newpipe.net
AuthorWebSite: https://newpipe.net/
SourceCode: https://github.com/TeamNewPipe/NewPipe
IssueTracker: https://github.com/TeamNewPipe/NewPipe/issues
AutoName: NewPipe
Summary: Open-source privacy-friendly YouTube client for Android.
Description: |
NewPipe is a free and open-source Android media player
that provides a privacy-focused alternative to the
official YouTube app.
It allows users to watch videos, stream audio,
and download media without relying on Google APIs,
advertisements, or account requirements.
Features include:
• Background playback
• Custom playlists
• Low-data streaming modes
• Downloadable media
NewPipe is maintained by Team NewPipe and aims
to provide lightweight, feature-rich access
to web-based media services while respecting user privacy.

View file

@ -0,0 +1,39 @@
Categories:
- Multimedia
- Internet
License: GPL-3.0-or-later
AuthorName: Team NewPipe
AuthorEmail: team@newpipe.net
AuthorWebSite: https://newpipe.net/
SourceCode: https://github.com/TeamNewPipe/NewPipe
IssueTracker: https://github.com/TeamNewPipe/NewPipe/issues
AutoName: NewPipe
Summary: Open-source privacy-friendly YouTube client for Android.
Description: |
NewPipe is a free and open-source Android media player
that provides a privacy-focused alternative to the
official YouTube app.
It allows users to watch videos, stream audio,
and download media without relying on Google APIs,
advertisements, or account requirements.
Features include:
• Background playback
• Custom playlists
• Low-data streaming modes
• Downloadable media
NewPipe is maintained by Team NewPipe and aims
to provide lightweight, feature-rich access
to web-based media services while respecting user privacy.
Repo: https://github.com/TeamNewPipe/NewPipe.git

View file

@ -0,0 +1,35 @@
Categories:
- Messaging
- Internet
- Security
License: GPL-2.0-or-later
AuthorName: Telegram Messenger LLP
AuthorEmail: security@telegram.org
AuthorWebSite: https://telegram.org/
SourceCode: https://github.com/TelegramOrg/Telegram-Android
IssueTracker: https://github.com/TelegramOrg/Telegram-Android/issues
AutoName: Telegram
Summary: Cloud-based messaging app with optional end-to-end encrypted chats.
Description: |
Telegram is a cloud-based messaging platform
focused on speed, simplicity, and security.
It provides private chats, groups, channels,
voice and video calls, and file sharing.
Telegram offers optional end-to-end encrypted
“Secret Chats,” while regular chats are encrypted
in transit and stored in the cloud for
multi-device synchronization.
The official Android client is open source
and supports reproducible builds.

Binary file not shown.

After

Width:  |  Height:  |  Size: 41 KiB

View file

@ -0,0 +1,35 @@
Categories:
- Messaging
- Internet
- Security
License: GPL-2.0-or-later
AuthorName: Telegram Messenger LLP
AuthorEmail: security@telegram.org
AuthorWebSite: https://telegram.org/
SourceCode: https://github.com/TelegramOrg/Telegram-Android
IssueTracker: https://github.com/TelegramOrg/Telegram-Android/issues
AutoName: Telegram
Summary: Cloud-based messaging app with optional end-to-end encrypted chats.
Description: |
Telegram is a cloud-based messaging platform
focused on speed, simplicity, and security.
It provides private chats, groups, channels,
voice and video calls, and file sharing.
Telegram offers optional end-to-end encrypted
“Secret Chats,” while regular chats are encrypted
in transit and stored in the cloud for
multi-device synchronization.
The official Android client is open source
and supports reproducible builds.
Repo: https://github.com/TelegramOrg/Telegram-Android.git

View file

@ -0,0 +1,24 @@
Categories:
- Internet
- Security
License: BSD-3-Clause
AuthorName: Guardian Project
AuthorEmail: support@guardianproject.info
AuthorWebSite: https://orbot.app/
SourceCode: https://github.com/guardianproject/orbot-android
IssueTracker: https://github.com/guardianproject/orbot-android/issues
OpenCollective: GuardianProject
AutoName: Orbot
Summary: Tor VPN
Description: |
Orbot is a free and open-source mobile application that routes
internet traffic through the Tor network to enhance privacy and
security. It helps users encrypt their connection and access
blocked content while protecting against network surveillance
RepoType: git
Repo: https://github.com/guardianproject/orbot-android
AutoUpdateMode: None
UpdateCheckMode: None

Binary file not shown.

View file

@ -0,0 +1 @@
Orbot es una aplicación gratuita y de código abierto para Android que enruta el tráfico de internet a través de la red Tor, ayudando a proteger la privacidad, el anonimato y la seguridad en línea, además de permitir el acceso a contenido bloqueado o censurado.

View file

@ -0,0 +1 @@
Tor VPN for Android

View file

@ -0,0 +1 @@
Orbot es una aplicación gratuita y de código abierto para Android que enruta el tráfico de internet a través de la red Tor, ayudando a proteger la privacidad, el anonimato y la seguridad en línea, además de permitir el acceso a contenido bloqueado o censurado.

View file

@ -0,0 +1 @@
Tor VPN for Android

View file

@ -0,0 +1,32 @@
Categories:
- Internet
- Security
License: MPL-2.0
AuthorName: The Tor Project, Inc.
AuthorEmail: contact@torproject.org
AuthorWebSite: https://www.torproject.org/
SourceCode: https://gitlab.torproject.org/tpo/applications/tor-browser
IssueTracker: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues
AutoName: Tor Browser
Summary: Privacy-focused browser that routes traffic through the Tor network.
Description: |
Tor Browser is the official web browser developed
by The Tor Project. It enables anonymous browsing
by routing internet traffic through the Tor network.
The browser blocks trackers, resists fingerprinting,
and helps protect users from surveillance and
traffic analysis.
Built on open-source Firefox code with additional
privacy enhancements, Tor Browser supports secure
access to blocked content and helps users bypass
censorship in restrictive environments.

View file

@ -0,0 +1,33 @@
Categories:
- Internet
- Security
License: MPL-2.0
AuthorName: The Tor Project, Inc.
AuthorEmail: contact@torproject.org
AuthorWebSite: https://www.torproject.org/
SourceCode: https://gitlab.torproject.org/tpo/applications/tor-browser
IssueTracker: https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues
AutoName: Tor Browser
Summary: Privacy-focused browser that routes traffic through the Tor network.
Description: |
Tor Browser is the official web browser developed
by The Tor Project. It enables anonymous browsing
by routing internet traffic through the Tor network.
The browser blocks trackers, resists fingerprinting,
and helps protect users from surveillance and
traffic analysis.
Built on open-source Firefox code with additional
privacy enhancements, Tor Browser supports secure
access to blocked content and helps users bypass
censorship in restrictive environments.

View file

@ -0,0 +1,33 @@
Categories:
- Security
- Internet
License: GPL-3.0
AuthorName: LEAP Encryption Access Project
AuthorWebSite: https://bitmask.net/
SourceCode: https://github.com/leapcode/bitmask_android
IssueTracker: https://github.com/leapcode/bitmask_android/issues
AutoName: Bitmask
Summary: Open-source VPN client focused on encrypted and censorship-resistant access.
Description: |
Bitmask is an open-source VPN client developed by
the LEAP Encryption Access Project.
It enables secure, encrypted communication by
routing network traffic through trusted VPN
providers or self-hosted services.
Bitmask is designed to help users bypass
censorship and reduce exposure to surveillance.
The project emphasizes ease of use, no logging,
and transparency through publicly available
source code. It supports Android and desktop
platforms and works with multiple providers.

View file

@ -0,0 +1,34 @@
Categories:
- Security
- Internet
License: GPL-3.0
AuthorName: LEAP Encryption Access Project
AuthorWebSite: https://bitmask.net/
SourceCode: https://github.com/leapcode/bitmask_android
IssueTracker: https://github.com/leapcode/bitmask_android/issues
AutoName: Bitmask
Summary: Open-source VPN client focused on encrypted and censorship-resistant access.
Description: |
Bitmask is an open-source VPN client developed by
the LEAP Encryption Access Project.
It enables secure, encrypted communication by
routing network traffic through trusted VPN
providers or self-hosted services.
Bitmask is designed to help users bypass
censorship and reduce exposure to surveillance.
The project emphasizes ease of use, no logging,
and transparency through publicly available
source code. It supports Android and desktop
platforms and works with multiple providers.
Repo: https://github.com/leapcode/bitmask_android

View file

@ -0,0 +1,24 @@
Categories:
- Security
- Privacy
- Connectivity
License: GPL-3.0
AuthorName: LEAP Encryption Access Project (LEAP)
AuthorEmail: support@riseup.net
AuthorWebSite: https://riseup.net/vpn
SourceCode: https://0xacab.org/leap/bitmask_android
IssueTracker: https://0xacab.org/leap/bitmask_android/-/issues
AutoName: se.leap.riseupvpn
Summary: Free, privacy-focused VPN service by the Riseup collective.
Description: |
RiseupVPN is a free, privacy-focused VPN service provided by the Riseup collective. It offers encrypted internet traffic routing without requiring user accounts or retaining identifiable logs.
The Android app is an open-source application licensed under GPL-3.0 and is based on the Bitmask VPN client developed by LEAP. The service is donation-supported and designed to provide easy, anonymous, censorship-resistant VPN access.
Users can report bugs or request support through the Riseup support system.

View file

@ -0,0 +1,9 @@
AuthorName: ''
Categories:
- RCEE_Repo
CurrentVersionCode: 2147483647
IssueTracker: ''
Name: Riseup VPN
SourceCode: ''
Summary: ''
WebSite: ''