Steganography hides your message inside a photo. But what if someone finds the tool itself on your phone? See our platform-by-platform analysis for which sharing methods preserve hidden messages.
The presence of a steganography app is its own signal. If a border agent, employer, or abusive partner sees Phasm on your device, they know you have something to hide – even if they can’t read it. Hiding the app closes the last gap in your privacy chain.
Plausible Deniability
Encryption makes data unreadable, but it’s visible. An encrypted file screams “I have secrets.” Steganography goes further – it hides the fact that a secret exists at all. Your message looks like an ordinary vacation photo.
But having a steganography app installed on your phone breaks the deniability chain. If someone sees Phasm in your app drawer, the obvious question follows: “What are you hiding?” Hiding the app itself closes the loop. No app, no questions, no suspicion.
Border Crossings & Device Searches
In the United States, Customs and Border Protection operates under the border search exception – agents can inspect your device without a warrant, without probable cause, and without your consent. In 2024, CBP conducted over 43,000 device searches.
The UK’s Schedule 7 of the Terrorism Act goes further. Officers can compel you to surrender passwords and PINs. Refusal is a criminal offense carrying up to five years in prison. Seized devices may be copied and forwarded to GCHQ for analysis.
Many other countries – including China, Israel, and Australia – routinely search phones at borders. Having cryptographic or steganographic tools on your device can escalate a routine check into extended detention. The simplest defense is making sure there’s nothing unusual to find.
Censorship & Surveillance
In Russia, the SORM surveillance system processes approximately 500,000 surveillance requests annually with a rejection rate of 0.00005%. Iran’s “Smart Filtering” system inspects encrypted traffic and has blocked dozens of messaging apps. China’s Golden Shield monitors device software inventories alongside network traffic. In Myanmar, journalists have been sentenced to prison for possessing encrypted communication tools.
The threat isn’t limited to authoritarian regimes. Kaspersky documented over 31,000 cases of stalkerware – covert surveillance software installed by intimate partners – in 2023 alone. Employer-issued MDM (Mobile Device Management) profiles can inventory every app on your phone. Even in democracies, a nosy roommate or a curious friend can glance at your home screen.
You can’t control who inspects your phone. But you can control what they find.
How to Hide Phasm
iOS (iOS 18+): Hide & Lock with Face ID
iOS 18 introduced a built-in feature that makes apps genuinely invisible. This is the recommended approach – it handles everything in one step.
Steps:
- Long-press the Phasm icon on your Home Screen
- Tap “Hide and Require Face ID”
- Authenticate with Face ID (or Touch ID / passcode)
- Confirm when prompted
What this does:
- Removes Phasm from your Home Screen, App Library, Spotlight search, and Siri suggestions
- Suppresses all notifications from Phasm
- Requires Face ID to access the app
- With Stolen Device Protection enabled, passcode alone won’t work – biometrics are required
How to access Phasm when it’s hidden:
- Swipe left past all Home Screen pages to reach the App Library
- Scroll to the very bottom and tap the Hidden folder (marked with an eye icon)
- Authenticate with Face ID
- Tap Phasm – authenticate again to open
Also recommended: Go to Settings → Notifications → Phasm → Show Previews → Never. This prevents message content from appearing on your lock screen even before you hide the app.
Android: Best Option for Your Device
Android is more fragmented than iOS – the best method depends on your device manufacturer. Here are three approaches, ranked by security.
Option A: Google Private Space (Pixel / Stock Android 15+)
The strongest option for Pixel and stock Android devices.
- Go to Settings → Security & privacy → Private Space
- Set up with your Google account and choose a lock method
- Install Phasm fresh inside Private Space (from the Play Store within Private Space)
- When locked: no notifications, invisible to other apps, hidden from settings
| Note | Private Space requires a fresh install – you can’t move an existing app into it. Uninstall Phasm from your main profile first, then reinstall inside Private Space. |
Option B: Samsung Secure Folder (Galaxy devices)
Samsung’s Knox-backed isolation for Galaxy phones and tablets.
- Go to Settings → Biometrics and security → Secure Folder (on some One UI 7+ devices: Settings → Security and privacy → Secure Folder)
- Sign into your Samsung Account and choose a lock type (fingerprint, PIN, or pattern)
- Add Phasm to Secure Folder (tap + → Apps)
- Knox hardware encryption isolates Phasm completely from your main profile
Option C: Other Manufacturers
- Xiaomi/Redmi: Second Space (Settings → Special Features → Second Space) – creates an entirely separate user profile
- OnePlus: Hidden Space (swipe right in the app drawer) – hides selected apps behind a gesture
Comparison
| Method | Devices | Security |
|---|---|---|
| Google Private Space | Pixel, stock Android 15+ | Strong – Hardware-backed isolation |
| Samsung Secure Folder | Galaxy (Knox-equipped) | Strong – Knox hardware encryption |
| Xiaomi Second Space | Xiaomi, Redmi, POCO | Moderate – Separate user profile |
| OnePlus Hidden Space | OnePlus | Basic – App drawer hiding |
Fallback for any Android device: At minimum, disable notifications. Go to Settings → Apps → Phasm → Notifications → Off. This won’t hide the app, but it prevents Phasm from surfacing in your notification shade or lock screen.
Three Layers Deep
Steganography protects your message. App stealth protects your tool. Combined with Phasm’s client-side encryption (AES-256-GCM-SIV with Argon2id key derivation), you get three layers of protection:
- Encryption – your message is unreadable without the passphrase
- Steganography – your message is invisible inside an ordinary photo. Ghost mode uses adaptive embedding from academic research designed to resist statistical detection
- Plausible deniability – no one knows you have a steganography tool at all
If your hidden photo will pass through messaging apps or cloud services before reaching the recipient, Armor mode is built to handle that. Learn how Armor mode survives JPEG recompression. For short messages, Armor’s Fortress sub-mode goes even further – it auto-activates and survives even WhatsApp standard recompression, a channel that defeats most steganographic methods.
No accounts, no cloud, no trace. Try Phasm in your browser or get the app for iOS / Android.
Frequently Asked Questions
Can someone find steganography apps on my phone?
Without using the hiding methods described above, yes – a steganography app is visible in your app drawer, App Store/Play Store purchase history, and device storage like any other app. Forensic analysis tools used by law enforcement can also detect installed applications. However, iOS 18’s “Hide and Require Face ID” feature removes the app from your Home Screen, App Library, Spotlight search, and Siri suggestions. On Android, Google Private Space and Samsung Secure Folder provide hardware-backed isolation that hides apps from the main profile entirely.
How do I hide apps on iPhone without deleting them?
On iOS 18 and later, long-press any app icon and tap “Hide and Require Face ID.” This removes the app from your Home Screen, App Library, Spotlight search, and Siri suggestions while keeping it fully installed and functional. To access hidden apps, swipe to the App Library, scroll to the bottom, and tap the Hidden folder (requires Face ID authentication). For additional privacy, go to Settings, then Notifications, then select the app, and set Show Previews to Never to prevent content from appearing on your lock screen.
What is the most private way to send a secret message?
The most private approach combines three layers: encryption (making the message unreadable without a passphrase), steganography (hiding the encrypted message inside an ordinary-looking photo), and app stealth (hiding the tool itself). Phasm provides all three – AES-256-GCM-SIV encryption with Argon2id key derivation, content-adaptive steganographic embedding, and compatibility with iOS and Android app-hiding features. All processing happens client-side with no servers, no accounts, and no data leaving your device. For delivery, use AirDrop, email, or “send as file” on messaging apps to preserve the steganographic data intact.
Can border agents search my phone for hidden apps?
In many countries, yes. In the United States, Customs and Border Protection can inspect devices at the border without a warrant under the border search exception – over 43,000 device searches were conducted in 2024. The UK’s Schedule 7 of the Terrorism Act can compel you to surrender passwords, with refusal carrying up to five years in prison. iOS 18’s hidden app feature removes the app from visible locations, and with Stolen Device Protection enabled, biometric authentication (not just a passcode) is required to access hidden apps. On Android, Private Space and Secure Folder provide hardware-backed isolation that keeps apps invisible to the main device profile.