News & Updates

Ulkrov Update: Now Completely Free and Supporting Android 16

We have released a new version of Ulkrov with several important changes. Most notably, the app is now completely free. All features, including those that previously required a premium license, are now available to all users. We have removed the premium restrictions to make th...
Read More →

DroidMDM v1.1 Released: Now Optimized for Enterprise Fleets

We are proud to announce the release of DroidMDM v1.1, a significant improvement that transforms our powerful tool into a robust solution suitable for enterprise use. While DroidMDM started as a tool for power users, this update marks a major step forward. We have greatly opt...
Read More →

Introducing Two New Free Privacy Tools for Our Community

As part of our mission to empower users, we're excited to expand the Durvex suite with a new "Free Tools" section. These are simple, powerful utilities designed to enhance your digital security and privacy, available for everyone to use. 1. Strong Password Genera...
Read More →

Introducing DroidMDM: A Powerful, Free MDM for Android Power Users

Today, we are thrilled to announce the initial release of a new, powerful tool in the Durvex suite: DroidMDM. Mobile Device Management (MDM) solutions are typically reserved for large corporations with complex IT needs and big budgets. We wanted to change that. DroidMDM is de...
Read More →

Ulkrov Vault v1.1 Released with Android 16 Support

We're excited to announce the release of Ulkrov Vault version 1.1, a significant update focused on future-proofing the app and improving performance. What's New in v1.1? Full Android 16 Compatibility: Proactive support for the latest ...
Read More →

Articles & Guides

Reclaiming Your Phone: The Deep Dive into GrapheneOS and LineageOS

When you buy a smartphone today, you aren't just buying hardware; you are signing up for a 24/7 surveillance program. Samsung, Xiaomi, and Google fill their "stock" Android versions with unremovable bloatware, system-level trackers, and advertising IDs that report your location, app usage, a...
Read More →

The AI Dilemma: Why Your "Private" Chatbot Is Spying on You (And How to Fix It)

Artificial Intelligence is the biggest technological shift of our decade. Tools like ChatGPT, Claude, and DeepSeek feel like magic. But magic comes with a price, and in this case, the price is your data. The Cloud: Unlimited Power, Zero Privacy Let's be blunt: cloud models a...
Read More →

The Invisible Leak: Why Encryption Alone Won't Save You (It's Metadata)

You use Signal. You encrypt your hard drive. You use a VPN. You think you are invisible. But you are forgetting the one thing that has taken down more hackers, whistleblowers, and privacy advocates than any weak password: Metadata. The Envelope vs. The Letter ...
Read More →

Linux vs macOS vs Windows: Do you really Own Your Computer?

We are told that when we buy a computer, we own it. But in 2025, the operating system you choose determines whether you are the owner, a tenant, or the product. Let's break down the three giants and rate them based on the only metric that matters: Control. Linux:...
Read More →

The End of Freedom? Google's War on Sideloading and What It Means for You

Android was once the bastion of open-source freedom. It was the operating system for users who wanted to *own* their hardware. But recent moves by Google suggest that the era of freedom is being suffocated by a corporate monopoly determined to turn your phone into a walled garden. ...
Read More →

Digital Minimalism is a Security Strategy, Not Just a Lifestyle

Most people view digital minimalism as a way to reclaim time or improve mental health. While those are valid benefits, there is a hard security argument for deleting apps and reducing your digital footprint: Attack Surface Reduction. Every App is a Door ...
Read More →

What is DNS-over-HTTPS (DoH) and Why Your ISP Hates It

For decades, the "phone book" of the internet, the Domain Name System (DNS), has been completely unencrypted. This means that every time you type a website address, your Internet Service Provider (ISP) knows exactly where you are going. Enter DNS-over-HTTPS (DoH), a protocol ...
Read More →

Mastering Android Runtime Permissions: A Developer's Perspective

Since Android 6.0 (Marshmallow), Google shifted to a "Runtime Permission" model. Apps no longer get all permissions at installation; they must ask for them when needed. However, managing this as a user, and understanding it as a developer, is key to device security. Normal v...
Read More →

Why Fedora Asahi Remix is the Future of Linux on Apple Silicon

For a long time, buying an M1 or M2 Mac meant saying goodbye to native Linux. Virtual machines were the only option. That changed with the Asahi Linux project, and specifically, the Fedora Asahi Remix. Not Just a VM Unlike running Linux in a VM (like UTM), Asahi ...
Read More →

The Ultimate Guide to Enforcing a dnsmasq Allowlist on macOS

Most content filters are easy to bypass. They're browser extensions, apps you can force-quit, or DNS settings you can change in 30 seconds. If you're looking for a truly robust solution, you need to lock down your system at the DNS level in a way that can't be impulsively changed. ...
Read More →

What is Browser Fingerprinting (And How to Stop It)?

For years, we've been trained to "clear our cookies" to protect our privacy online. But what if trackers could still identify you, even with no cookies, no logged-in accounts, and while using a VPN? This is the reality of browser fingerprinting, a stealthy and highly effectiv...
Read More →

What Are ADB Commands? A Beginner's Guide

If you've spent any time exploring the world of Android customization or power-user features, you've almost certainly heard of ADB. But what is it, and how do you use it? ADB stands for Android Debug Bridge. It's a versatile, official command-line tool from Google that lets y...
Read More →

What is a Device Owner App? (And Why You'd Want One)

You may have seen the term "Device Owner" in the context of Android security or Mobile Device Management (MDM) solutions. It sounds important, but what does it actually mean? A Device Owner is a special type of application on Android that has high-level administrative privile...
Read More →

Why an Offline Vault is More Secure & Reliable Than a Cloud Vault

In a world where our most sensitive digital information is increasingly stored on remote servers, a critical question arises: Who really holds the keys to your digital kingdom? The debate between cloud convenience and local security is more relevant than ever. Let's break dow...
Read More →