Your Phone Without Permission Slips: The GrapheneOS Nostr Stack

GrapheneOS plus Zapstore, Amber, Citrine, Amethyst, and White Noise creates the first phone free from corporate control over your digital life.
Your Phone Without Permission Slips: The GrapheneOS Nostr Stack

The parallel phone

In February 2014, Apple removed Blockchain’s Bitcoin wallet from the App Store without warning. The company gave only a vague reference to “an unresolved issue.” This was the last remaining native Bitcoin wallet for iOS users. Coinbase, CoinJar, and Gliph had already been purged in the preceding months.

Apple’s position was monopolistic. If you had purchased an iPhone, you had precisely zero options for using Bitcoin on your device unless you trusted a web application. The “crazy ones” who once claimed to show “no respect for the status quo” had become the status quo, and they did not care to have their payment ambitions challenged by peer-to-peer electronic cash.

The cryptocurrency community responded with predictable outrage and some memorable videos of iPhones being destroyed. But outrage accomplishes little. The real response took a decade to mature, and it required building something. That something is now operational.

Consider what happens when you install GrapheneOS on a Pixel device, then acquire your applications through Zapstore, manage your cryptographic identity with Amber, run a local Nostr relay using Citrine, publish your thoughts through Amethyst, and conduct private group conversations via White Noise. You have constructed a phone where your software choices are yours alone, your communication history stays under your control, and your identity belongs to you. Each component eliminates a specific chokepoint that centralized systems use to maintain control over users.

All of this is available today for anyone willing to spend an afternoon setting up their device.

The operating system: GrapheneOS

GrapheneOS is a hardened mobile operating system with security improvements that exceed what Google provides on stock Pixel devices. Memory allocation is fortified against entire classes of exploitation. The kernel includes mitigations that Google skips. Vanadium, the default browser, disables just-in-time compilation, eliminating the attack surface that enables most browser-based exploits.

Key for our purposes is the ability to sandbox Google Play Services if you need them, while keeping them absent from profiles you designate as clean. The choice is granular. You can maintain a profile for legacy applications that require Google’s infrastructure while keeping your freedom technology stack completely separate, with the two profiles fully isolated.

GrapheneOS currently runs only on Pixel devices, which creates an irony that critics never tire of mentioning: you must buy a Google phone to run the most Google-free mobile operating system available. The irony dissolves when you understand the reasoning. Pixels are the only devices with unlockable bootloaders that also support proper verified boot after installing an alternative operating system. Security requires specific hardware support, and Google, whatever its other sins, builds phones that do not fight against user modification.

The app store: Zapstore

The fundamental problem with centralized app distribution is structural: any entity capable of deciding what software you can install will face pressure to make decisions you disagree with. Governments demand censorship. Internal commercial interests push platform decisions. Regulators claim that non-custodial Bitcoin wallets require money transmitter licenses even though they do not custody funds.

In August 2025, Google Play announced licensing requirements that would have effectively banned most non-custodial wallet applications from fifteen jurisdictions. The company reversed course after intense criticism, but the reversal is precarious. The lesson is clear: the final obstacle for Bitcoin is no longer hostile regulators but the platform monopolists who control app distribution channels.

Zapstore eliminates this dependency. Built on the Nostr protocol, Zapstore allows developers to cryptographically sign their releases using their Nostr keys. Users verify these signatures automatically. Applications spread through a web of trust: you discover software because people you follow have recommended it or because developers you trust have published it. Any relay can carry any application, with no gatekeeper to pull the plug. If one relay refuses to host a particular release, other relays remain available.

The key manager: Amber

The average person manages authentication through passwords that are either memorable and weak or generated and forgotten. They outsource key management to corporations that can be compelled to surrender access, or they accept that their accounts exist at the pleasure of platform operators who can disable them unilaterally.

Nostr introduces a different model. Your identity is a cryptographic key pair. Your private key, your nsec, proves you are who you claim to be. Every message you publish is signed with this key. Servers hold no copy of your key, so impersonation is cryptographically blocked. Platforms own no authority over your identity, because your key exists independently of them.

This architecture creates an obvious problem: if you paste your private key into every Nostr client you try, you multiply the attack surface exponentially. Each application becomes a potential point of compromise. One poorly coded client, one malicious update, one successful phishing attempt, and your identity is stolen permanently.

Amber solves this problem. The application stores your private key in a single dedicated location. Other applications request signing operations through the NIP-55 interface. The key never leaves Amber. A compromised client can do no worse than display incorrect information; it cannot steal your ability to prove who you are.

The comparison to hardware wallets for Bitcoin is apt. Your Bitcoin private keys should live on a device dedicated exclusively to signing transactions. Your Nostr private keys should live in an application dedicated exclusively to signing events. Amber provides this functionality without requiring additional hardware, turning your existing smartphone into a signing device.

Amber supports multiple accounts with precise permission controls, allowing you to authorize specific applications for specific operations while denying others. It works offline for local signing and supports NIP-46 remote signing for browser-based clients.

The local relay: Citrine

In the Nostr protocol, relays are servers that store and distribute messages. Most users connect to public relays operated by third parties. This is convenient but introduces familiar problems: the relay operator can see what you post, what you request, and when you are online. They can sell this information, censor your content, or comply with government demands for your data.

Citrine runs a Nostr relay directly on your Android device. Your private notes, drafts, bookmarks, application settings, and encrypted messages can be stored locally, accessible only to you. Every post you publish can be backed up to your local relay, ensuring you retain a complete archive of your own writing regardless of what happens to public relays. Combined with Orbot, you can expose your Citrine relay as a Tor hidden service, allowing contacts to reach your relay over the Tor network while keeping your physical location and network identity private.

Consider a journalist maintaining source communications. The standard operational security advice is complex: use Signal, but understand that Signal’s servers can see metadata. Use encrypted email, but understand that email headers leak information. With Citrine, you run your own communications infrastructure on a device you carry. The server is in your pocket, beyond the reach of subpoenas.

Citrine supports database export and import for backup purposes, allows restoration of contact lists if client applications malfunction, and provides user management for controlling who can post to your relay.

The client: Amethyst

Amethyst is the interface through which most users interact with Nostr on Android. It is the most feature-complete Nostr client available for the platform, supporting social networking, group chats, direct messages, media feeds, marketplaces, live streaming, and Lightning Network payments through zaps.

The application integrates with Amber for signing, with Citrine for local relay functionality, and with Zapstore for updates. It routes traffic through Tor via Orbot for users who require network anonymity. It supports the outbox model for censorship resistance, ensuring that your posts can reach followers even if specific relays refuse to carry them.

Amethyst functions as a laboratory for Nostr development. Features that prove successful here often appear in other clients. With over fifty thousand downloads and thirty-five thousand active users, the application demonstrates that decentralized social networking works at scale.

The secure messenger: White Noise

Nostr’s existing direct message implementations are inadequate. NIP-04 and NIP-17 provide encryption, but past messages become vulnerable if current keys are compromised. Group conversations scale poorly. Adding a hundred participants to a chat degrades performance to the point of unusability.

White Noise fixes this by implementing Messaging Layer Security, the IETF-standardized encryption protocol, on top of Nostr’s decentralized transport.

Metadata protection is the critical layer. Signal encrypts message contents but operates through centralized servers that observe who communicates with whom and when. Nostr’s public relays similarly leak metadata even when message contents are encrypted. White Noise obfuscates these communication patterns, concealing both content and the identities of correspondents.

MLS provides forward secrecy and post-compromise security. If an attacker compromises your current keys, past messages remain protected. The protocol scales to groups of thousands.

No centralized backend exists. Developers publish open source code and run no infrastructure of their own. When the European Union proposed Chat Control 2.0, mandating backdoor access to encrypted communications, the response writes itself: the architecture offers governments nothing to work with: the server belongs to users, the client is open source, and interception is cryptographically blocked.

White Noise implements the Marmot Protocol for interoperability. Other Nostr clients can integrate MLS support and communicate with White Noise users directly. The protocol is a contribution to the commons, not a proprietary silo.

White Noise is still early. The alpha released in July 2025, and the application is not yet feature complete. But the architecture is sound, the cryptography is standardized, and the code is open for inspection. What exists today works.

The complete stack

Each component is valuable independently. Together, they constitute something more significant: a phone where every major corporate or governmental chokepoint has been eliminated.

The operating system answers to you. Applications come from a decentralized store that cannot be shut down. Your identity exists independently of any platform, your data lives on infrastructure you control, and publications reach followers across many relays with no single point to block. Group conversations carry forward secrecy and metadata protection that the architecture itself enforces.

The stack serves anyone who has watched a bank freeze accounts without explanation, a social media platform ban users arbitrarily, or an app store remove software for “policy violations” that change quarterly. The freedom technology stack provides exit from a system where your ability to communicate and transact exists at the pleasure of corporations who do not particularly care about you.

They are ready now.

Conclusion

The Bitcoin community spent years complaining about app store censorship before building alternatives. The Nostr community learned from this experience and prioritized infrastructure from the beginning. GrapheneOS developers understood that security is meaningless without sovereignty over your own device. These parallel efforts have converged into a stack that ships with strong defaults, ready to use.

You can continue requesting permission from Apple and Google for the software you run, the people you communicate with, and the transactions you make. That permission can always be revoked. The alternative is yours permanently.



Loading comments…