Classification: Restricted SC-DEPLOY StealthX // SecureCall

Field Deployment Guide

Complete installation, setup, and deployment procedures for SecureCall · Last updated February 2026

Option 1: Google Play (Recommended)

Google Play Store Deployment

The official and recommended deployment method. Google Play ensures automatic updates, signature verification, and the smoothest installation experience. All three SecureCall tiers are available through a single listing with in-app upgrade.

Version Description Link
SecureCall (Free) E2E encrypted calls, 10 contacts maximum, 15-minute call limit per session Google Play
SecureCall Pro Unlimited calls and contacts, HD audio, anti-recording protection, certificate pinning In-App Upgrade
SecureCall Premium Everything in Pro + GhostNet IP masking, hardware keystore, all security detections enforced In-App Upgrade
Recommendation: Start with the free tier to verify compatibility with your device and network. You can upgrade to Pro or Premium at any time from within the app without losing your contacts or SecureCall ID.
Option 2: GitHub Releases

APK Sideloading (Advanced Users)

For users who prefer not to use Google Play, or whose devices lack Play Services, the official APK is available from GitHub Releases. This method requires enabling sideloading on your device.

Source-Available License: SecureCall uses a Source-Available License. Building from source is not permitted under the license terms. Only official APK releases from the GitHub Releases page or Google Play are authorized for deployment. Inspect the source code for transparency, but deploy from official binaries only.

Sideloading Procedure

  1. Navigate to github.com/NeaBouli/stealth/releases on your device or computer.
  2. Download the latest .apk file from the Assets section of the most recent release.
  3. On your Android device, go to Settings → Security → Install unknown apps and enable the permission for your browser or file manager.
  4. Open the downloaded APK file and tap Install. Android will verify the package signature before proceeding.
  5. After installation, disable "Install unknown apps" for the browser/file manager to maintain device security.

If you downloaded the APK on a computer, transfer it to your Android device via USB cable, cloud storage, or a local network file share. Then open it from a file manager on the device.

Minimum Asset Specifications

Device Requirements

SecureCall has been designed to run efficiently on a wide range of Android hardware. The following are the minimum specifications required for stable operation.

Requirement Minimum Specification Notes
Android Version Android 10 (API 29) Required for scoped storage and modern security APIs. Android 14+ recommended for full screen recording detection.
Free Storage 50 MB Includes the app binary, native Rust library, and runtime cache. No persistent data storage beyond preferences.
RAM 2 GB The Rust crypto engine and audio pipeline operate in native memory. Devices with 3+ GB will have smoother multitasking.
Permissions Microphone (required) Microphone access is mandatory for voice calls. The app will prompt on first launch. Notification permission is requested for call alerts.
Network WiFi or mobile data A stable internet connection is required. VoIP calls consume approximately 1-2 MB per minute of call time. TURN relay is used automatically when direct connections fail.
Architecture arm64-v8a The native Rust crypto library is compiled for 64-bit ARM. Virtually all modern Android devices support this architecture.
Initial Field Setup

First-Time Configuration

After installation, follow these five steps to complete the initial deployment and make your first encrypted call.

Step 1: Grant Permissions

When you first open SecureCall, the system will request the Microphone permission. This is required for voice calls and cannot be bypassed. Tap Allow when prompted.

On Android 13+, you will also be asked for the Notification permission. Granting this allows SecureCall to alert you to incoming calls even when the app is in the background.

Step 2: Automatic Key Generation

SecureCall automatically generates your cryptographic identity on first launch:

This process takes less than one second and requires no user interaction. There is no account creation, no email, no phone number verification.

Step 3: Get Your SecureCall ID

Your unique, anonymous SecureCall ID is displayed in the app's main screen. This ID is the only identifier associated with your account. Share it with your contacts through any channel you trust: messaging app, in person, printed QR code, or any other method.

Your SecureCall ID is not linked to your phone number, email, name, or any other personal information.

Step 4: Add Contacts

  1. Navigate to the Contacts tab in the bottom navigation bar.
  2. Tap the "+" button in the top-right corner.
  3. Enter your contact's SecureCall ID in the input field.
  4. Optionally assign a display name for local reference (stored only on your device).
  5. The contact appears in your list, ready for encrypted calls.

Step 5: Make Your First Call

  1. From the Contacts tab, locate the contact you want to call.
  2. Tap the phone icon next to their name to initiate the call.
  3. Wait for the connection to establish. The encryption handshake (X25519 key exchange + HKDF key derivation) takes 1-2 seconds.
  4. The lock icon turns green when the call is fully encrypted end-to-end.
  5. Speak freely. Your voice is encrypted with XChaCha20-Poly1305 before leaving your device.
Tip: Both parties must have SecureCall installed and must have added each other as contacts. The call will not connect if the recipient is offline or has not registered their public key with the signaling server.
Fault Diagnosis

Troubleshooting Common Issues

If you encounter problems during installation or operation, consult the following fault diagnosis procedures.

App Won't Install

Microphone Permission Denied

Can't Connect to Server

No Audio During Call

Still stuck? If none of the above solutions resolve your issue, please open a detailed bug report on GitHub Issues including your device model, Android version, and a description of the problem. Do not include any call content or private keys in bug reports.