The Panic mode privacy option introduced in App Cloner 2.14 allows protecting a cloned app’s internal data in case of phone theft, tactical ‘snatching’ by law enforcement or other unauthorized access of your device.
Specifically, the option will securely erase the internal app data and files when:
- A wrong password is entered or a wrong pattern is drawn (this option is available for apps that are password or pattern-protected and you may specify the maximum number of attempts)
- A USB device is attached (e.g. a forensic tool that facilitates data recovery)
- ADB debugging is enabled (ADB debugging allows installing foreign applications and retrieving files from your phone)
- Root is detected (a rooted phone allows full access to internal files of all apps)
Root detection is performed when starting the app or when the boot event is received, whichever comes first. Rooting a phone always requires the device to be rebooted. The root detection method uses a variety of indicators.
Secure erasing of files is done by overwriting the file contents, replacing the file name and extension with dummy characters followed by permanently deleting the file. Note that depending on the size of the internal files this process may take some time.
Since this functionality depends on certain system events being triggered in a timely manner, it’s highly recommended for you to test the behavior on your device by enabling the Show test notifications checkbox. This shows a notification when the panic mode is activated and the app data is erased. While testing, make sure App Cloner is running.
It’s also recommended to use the Persistent app option and create a dummy accessibility service, which ensures the app is always kept alive and won’t be put to sleep by the system, in which case the app may not receive any events.