D-Vasive on Android: Full control of camera, microphone, and permissions with native settings

  • D-Vasive alerts and blocks access to the camera, microphone, network, and location, putting control in your hands.
  • Strengthen Android: Security & Privacy panel, Permissions Manager, and two-step verification.
  • Activate Advanced Protection: Play Protect, blocking unknown apps, anti-theft, and enforced HTTPS.
  • Complete protection: Turn off Ad IDs, use Find My Device, Private Space, and hide notifications.

Privacy Protection on Android with D-Vasive

If you want to be sure that the privacy you have on your Android phone or tablet, it is necessary that it is protected. against unwanted access to any of your devices. This is exactly what it offers D Vasive, an application that has been created by John McAfee and that he himself calls the first "anti-spy" to be launched on the market.

Basically, what this development does is that, in a simple way, it adds protection against invasive applications that exist today and that are often intended to obtain information about the user. And, to do so, you access so delicate sections such as wireless connectivity and even the camera that is in the personal device (both the rear and the front).

With D-Vasive protection against this type of access is added, alerting user of everything that happens and, therefore, offering the necessary information if some unauthorized development tries to spy on what is done, either by using the microphone of a telephone and, even, by accessing the location information. In addition, with the work of John McAfee it is possible to know the applications that are installed that have access to the sections that we are commenting on, in order to proceed to their deletion if necessary.

D-Vasive interface on Android

D-Vasive app in use

Differences offered by this development

The truth is that at first you might think that D-Vasive works in a similar way to other devices on the market, but that is not the case. The latter use databases with signatures to detect malicious applications, but this can fail if the attack is carried out by a very new one. In the case of the development we are talking about, it must be said that the control layer is in the hands of the user and therefore the warnings and data regarding the hardware of your terminal are established in a unique way and, in this way, you can block everything that does not comply with the established parameters.

D-Vasive and privacy on Android

But the best example of how D-Vasive works is to see it in a video in which its possibilities and way of working are clearly explained:

Demonstration:

If you want to download for free John McAfee's latest creation, you can do so from this Google Play link. Compatibility with different Android devices is very wide, since it hardly requires any space and works on recent versions of the system. The truth is that D-Vasive is a very useful application, which it hardly consumes any resources, and it is worth trying since it is discovered that you can have greater control over the device you use. Other apps for the Google operating system you can find them at this section from our page.

How to complement D-Vasive with native Android settings

Android incorporates a panel of Security and privacy with a summary of the status, alerts and suggestions. When there are no risks, you'll see "All OK"; if there are problems, "The device is at risk" will appear with a description. Also check the section Seguridad de los datos from Google Play: Indicates what data each app uses so you can make informed decisions.

Strengthens permission control and device locking

Set up a strong passcode to protect the device encryption and values ​​biometrics knowing that it is more comfortable but with legal implications other than PIN/password. In your Google account, activate two step verification o access keys to shield sensitive data.

Periodically audit the Permissions manager. In location you can choose: Do not allow, always ask, Allow only while using the app o Always, and alternate precise location or approximate. Check Contacts, Photos and videos (With limited access to specific elements), Camera y Microphone; if something doesn't fit, revoke it. Android can reset permissions automatically in inactive apps.

Activate Advanced Protection and key features

On supported devices, Advanced Protection It bundles security layers with minimal disruption and prevents them from being accidentally disabled. It includes:

  • Applications: Google Play Protect always active; lock apps from unknown sources and activation of MTE (Memory Tagging Extension) in compatible apps.
  • Device security: anti-theft lock, offline lock y inactivity reset after 72 hours blocked to strengthen encryption.
  • Messages: protection against spam and scams and notices of unsafe links from unknown senders.
  • Red: 2G network blocking on compatible devices to reduce IMSI catcher attacks.
  • Phone Number: spam identifier y automatic call filter in admitted territories.
  • Web: Secure browsing in real time, Forced HTTPS in Chrome and protections JavaScript stricter.

Please note that Advanced Protection may block side loading and change the behavior of some features (e.g. JavaScript optimizations), although enabling and disabling them is straightforward.

Extra measures to enhance your privacy

Turn off the Advertising ID to limit commercial tracking. Configure Search my device to locate, remotely lock and erase if necessary; activate the remote lock, theft detection and the offline lock. In some models you can demand identity verification (biometrics) to change critical settings.

Manage your backupPhotos and videos in Google Photos don't use end-to-end encryption, while some other data can be encrypted with your passcode. You can transfer files to your PC via USB or wirelessly and restore them after a factory reset.

If you need to isolate apps, set up a Private space with your own PIN and, if you want, a separate Google account; to share the device, the multiple users keep data segregated. In addition, it disables 2G and, if available, requires encryption from the cellular connection. Hidden sensitive notifications on the lock screen and avoid networks WEP if your phone allows you to block them. The Custom ROMs They can provide extra privacy, but they can also offer risks: do your research before using them.

By combining it proactive monitoring from D-Vasive on camera, microphone, connectivity and placement with the native controls With Android and features like Advanced Protection, you get defense in depth that reduces your attack surface without sacrificing usability.