/

Uncle Ted Uncle Ted Uncle Ted

The Industrial Revolution of digital security and its consequences have been a disaster for personal privacy. It is time to reclaim your digital sovereignty.

Begin Tutorial

A Cabin in the Digital Woods

Modern technology promises connection but delivers control. Your device is not your own; it is a node in a system designed for surveillance and manipulation. Uncle Ted is not merely an app—it is a declaration of independence. It transforms your device from a liability into a fortress, a digital cabin where you are the sole master. It operates on the principle that true freedom requires absolute control over one's own property and information.

"The degree of personal freedom that exists in a society is determined more by its technological structure than by its laws. We provide the structure for your freedom."

Installation & Initial Setup

Proper configuration is critical for Uncle Ted to function. Follow these steps precisely to arm your device. This process involves granting high-level permissions that enable the app's core security functions.

Step 1: Installation

Uncle Ted is too powerful for the Google Play Store. You must install it manually.

  • Download the latest app-release.apk file from the project's official GitHub repository.
  • Open the downloaded APK file on your Android device.
  • You will likely need to grant your browser or file manager permission to "Install unknown apps". This is a standard security measure.
  • Follow the on-screen prompts to complete the installation.

Step 2: Granting Core Service Permissions

Upon opening Uncle Ted for the first time, you will be greeted by the Core Services screen (PermissionsFragment). This screen is your checklist for activating the app's foundational protections. You must enable all services for the app to function correctly. Each button will take you to the relevant system settings page.

Uncle Ted Core Services Screen

The Core Services screen is the first step to securing your device.

  • Runtime Permissions: This is the first and most basic step. It grants access to the camera, microphone, location, SMS, notifications, and more. These are essential for evidence collection and sending alerts.
  • Device Admin: This is the most critical permission. It gives Uncle Ted the power to remotely lock the device, wipe all data, and prevent unauthorized uninstallation. Without this, the app's anti-theft capabilities are severely limited. When you attempt to disable this service later, the AdminReceiver will intercept the action and lock the device unless Maintenance Mode is active.
  • Accessibility Service: This service (PowerButtonService) monitors the system for when the power menu is opened. This is required for the Fake Shutdown feature, allowing the app to display a fake screen while remaining operational.
  • Draw Over Other Apps: This permission allows Uncle Ted to display its secure LockScreenActivity and FakeShutdownActivity on top of any other application, including the system UI. This ensures its security screens cannot be bypassed.
  • Usage Access (Optional): This grants the advanced ThreatDetectionEngine the ability to monitor app usage patterns for anomalies, enhancing its ability to detect sophisticated threats. While optional, it is highly recommended for maximum security.

The Dashboard: Your Security Command Center

The Dashboard is the main screen of the application (DashboardFragment). It provides an at-a-glance overview of your device's security posture, potential threats, and configuration status.

Uncle Ted Dashboard Screen

The Dashboard shows your security level, active threats, and configuration checklist.

Security Level Meter

At the top of the screen, a 5-stage progress bar and status title indicate your current security level. This score is calculated by the SecurityScoreCalculator based on which critical features and permissions you have enabled. The levels are:

  • Level 0 (Compromised): Device Admin is not active. The app is effectively useless.
  • Level 1-2 (Poor/Fair): Basic permissions are granted, but key features are disabled.
  • Level 3-4 (Good/Excellent): Most protective features are active.
  • Level 5 (Maximum): All standard security features are enabled and configured.
  • Level 6 (God Mode): Root access is detected. You have unlocked ultimate control.

Threat Assessment

This card, powered by the ThreatDetectionEngine and AISecurityOrchestrator, dynamically analyzes your device for suspicious activity. It flags potential threats such as rapid app installations, unexpected VPN usage, or anomalous data consumption, assigning a threat level from Minimal to Critical.

Security Checklist

This is a detailed list of the individual components contributing to your security score. Each item shows its status (Active/Inactive) and provides a brief description of its purpose. Use this checklist to identify and enable any remaining security features.

Core Features Arsenal

These are the primary tools at your disposal, configurable via the Authentication, Remote Control, and Features tabs in the app. They form a layered defense against theft and unauthorized access.

Uncle Ted Features Screen

The Features screen allows you to enable and disable various security triggers.

Multi-Level Authentication

Configure three distinct PINs in the Authentication tab (PinsFragment) for different scenarios. The LockScreenActivity will react based on the PIN entered.

  • Normal PIN: Safely unlocks the device.
  • Duress PIN: Unlocks the device but silently triggers a HIGH severity alert.
  • Wipe PIN: Unlocks the device but triggers a CRITICAL severity alert and initiates a full device wipe.
Uncle Ted Authentication Screen

Intruder Selfie

When enabled, the app logs failed unlock attempts. After 3 or more failures, it triggers a MEDIUM severity alert, activating the PanicActionService to discreetly take a photo using the front camera.

Fake Shutdown

Requires the Accessibility Service. When a user tries to open the power menu, Uncle Ted intercepts it and displays a convincing fake shutdown screen (FakeShutdownActivity). The device appears off but remains fully active, sending alerts and evidence.

SIM Change Alert

The SimChangeReceiver constantly monitors the device's SIM card serial number. If it is changed or removed, a MEDIUM alert is triggered, notifying you of potential theft.

Shake to Panic

When enabled, the MonitoringService uses the accelerometer to detect vigorous shaking. This triggers a HIGH severity panic alert, useful for situations where you cannot interact with the screen.

Stealth Mode

Hides the application's icon from the launcher by disabling its activity-alias. The app can then only be opened by dialing a secret code (e.g., *#*#1234#*#*) which is detected by the SecretCodeReceiver.

Watchdog Mode

A periodic "proof-of-life" service. The WatchdogWorker runs at a configured interval (e.g., every 30 minutes) and sends a status update with battery and location information to your emergency contact. This confirms the device is still operational.

Data Destruction Tripwire

An extreme security measure. If the device fails to connect to the internet for a pre-defined duration (e.g., 24 hours), the TripwireWorker assumes the device is captured and offline. It will trigger a CRITICAL alert and initiate a full device wipe.

Safe Zone Geofence

Set a geographical "safe zone" (e.g., your home). If the device leaves this area, the GeofenceBroadcastReceiver will trigger a LOW severity alert, notifying you that the device is on the move.

God Mode: Root-Exclusive Dominance

For those who refuse to compromise. Root access unlocks Uncle Ted's most potent, system-level capabilities, managed in the Features tab. These actions, executed by RootActions.kt, operate below the standard Android framework, offering unparalleled persistence and control. Warning: Use of these features is for advanced users and assumes all legal and ethical responsibility. Misuse can permanently damage your device.

Survive Factory Reset

EXTREME DANGER: Attempts to flash a loader script to the recovery partition. This loader can re-install Uncle Ted after a factory reset. A wrong script or URL WILL BRICK YOUR DEVICE.

System App Conversion

Moves the application into the /system/priv-app directory, making it a core part of the OS and immune to standard uninstallation methods. This requires a reboot and is irreversible without root.

Unkillable Service

Deploys a root-level init.d script. This script runs at boot and constantly monitors and restarts the app's core services if they are ever terminated, ensuring true persistence.

Kernel-Level Keylogger

Directly reads input events from the kernel using getevent, capturing all keystrokes before they reach the OS. Logs can be remotely exfiltrated via SMS command.

Stealth Media & Screenshots

Utilizes the command-line screencap utility to capture the screen silently. Can also attempt to kill the cameraserver process to suppress the camera/mic privacy indicators (the "green dot").

App Data Exfiltration

Breaches the Android security sandbox to directly copy files from other apps' private data directories (e.g., /data/data/com.whatsapp/databases/msgstore.db).

Remote Command & Control

Uncle Ted can be fully controlled via SMS commands, processed by the SmsCommandReceiver. Configure your emergency contact and a master password in the Remote Control tab.

Uncle Ted Remote Control Screen

Configure your emergency contact and master password for SMS commands.

Setup

  1. Emergency Contact: Enter a phone number or email address. Alerts will be sent here. If a phone number is used, only basic text alerts can be sent. For full evidence packages (photos, videos, audio), an email address is required.
  2. SMS Command Master Password: Set a strong, unique password. This password is required to authenticate every remote command, preventing unauthorized control of your device.
  3. Email Credentials: For email alerts, you must provide the SMTP server details for a sender email account. It is highly recommended to use an "App Password" for services like Gmail, not your main account password.

SMS Command Syntax

Send an SMS to the device with the following format. Commands are not case-sensitive. Replace [password] with your actual master password.

UNCLETED [COMMAND] [ARGUMENTS] [password]

Available Commands

  • LOCK: Immediately locks the device screen.
    UNCLETED LOCK mySecretPass123
  • SIREN: Triggers a HIGH severity alert and plays a loud siren.
    UNCLETED SIREN mySecretPass123
  • WIPE: Triggers a CRITICAL alert and initiates a full device data wipe.
    UNCLETED WIPE mySecretPass123
  • SCREENSHOT (Root): Takes a stealth screenshot and emails it to the emergency contact.
    UNCLETED SCREENSHOT mySecretPass123
  • GETLOGS (Root): Emails any captured keylogger data to the emergency contact and clears the log.
    UNCLETED GETLOGS mySecretPass123
  • EXFIL (Root): Exfiltrates a specific file from another app's data folder and emails it as an attachment.
    UNCLETED EXFIL com.whatsapp databases/msgstore.db mySecretPass123

Legal & Ethical Disclaimer

This application is designed for educational and defensive security purposes ONLY. Features like stealth operations, remote data access, and data destruction carry significant ethical and legal responsibilities. Never install or use this application on a device without the owner's explicit and informed consent. Unauthorized use is strictly prohibited and may lead to severe legal consequences. The developer assumes no liability for any misuse of this software.