Cloaked: Protect your privacy icon

Phone

Cloaked: Protect your privacy

Productivity cloaked ⭐ 4.00 100,000+
Version 2.80.1 Everyone

Screenshots

Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Cloaked: Protect your privacy screenshot
Permissions Explained 15 permissions requested View details

This app requests 15 permissions. The table below explains what each permission may allow and what users should review before installing.

Status Permission What it means Why it may be used User safety note
ℹ️ Review Read Your Contacts read your contacts This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Modify Your Contacts modify your contacts This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Approximate Location (network Based) approximate location (network-based) This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Precise Location (gps And Network Based) precise location (GPS and network-based) This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Directly Call Phone Numbers directly call phone numbers This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Read The Contents Of Your Usb Storage read the contents of your USB storage This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Modify Or Delete The Contents Of Your Usb Storage modify or delete the contents of your USB storage This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Record Audio record audio This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review View Wi Fi Connections view Wi-Fi connections This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review View Network Connections view network connections This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Change Network Connectivity change network connectivity This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Full Network Access full network access This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Run At Startup run at startup This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Prevent Device From Sleeping prevent device from sleeping This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.
ℹ️ Review Receive Data From Internet receive data from Internet This is an Android permission or app-specific permission requested by the app. The app may use this permission for features related to its category, device support, background behavior, storage, connectivity, or system integration. Review this permission before installing, especially if it does not match the app’s expected purpose.

About Cloaked: Protect your privacy

Keep you and your family safe from spam, scams, identity theft, and financial fraud. Spam can be more than an annoyance - it’s often a symptom of a bigger problem: exposed data that puts you at risk of identity theft and financial fraud. With Cloaked, you gain full control over how, when, and where you share your information, stopping spammers and scammers before they can do serious harm. Stay one step ahead and protect yourself from the threats lurking behind every unwanted email or text. WHY CHOOSE CLOAKED? • GENERATE UNLIMITED EMAIL & PHONE ALIASES: Cloaked generates working phone numbers, email addresses, passwords, and soon virtual credit cards - so you can hide your real identity when you sign up or shop online. Using aliases for signup and replacing older credentials drastically cuts down spam and exposure. • REMOVE EXPOSED PERSONAL INFO FROM DATA BROKERS: Cloaked scans and removes your data (name, address, age, phone, email) from 120+ brokers, reducing unwanted spam and risk of fraud. • GET $1 MILLION IDENTITY THEFT INSURANCE: Cloaked gives you peace of mind with $1 million in coverage - protecting you from the financial fallout of an identity theft. SPAM IS A WARNING SIGN Getting bombarded by spam emails, texts, and calls isn’t just annoying - it’s often a red flag that your personal data is floating around the internet. Spammers thrive on exposed information, using it to target you with scams that trick you into handing over even more data. But that’s just the beginning. When criminals gain access to enough of your personal details, they can commit identity theft, drain your finances, or even try to open new credit lines in your name. WHY IT MATTERS Data brokers collect, buy, and sell your information - everything from your phone number to your shopping habits. Once your details land in the wrong hands, you may start seeing a spike in spam. It’s like the smoke before the fire: while spam is a nuisance, the bigger risk is that the same exposed data could end up in a hacker’s playbook. Phishing links, fake customer support calls, and too-good-to-be-true offers are all designed to steal more of your identity. Before you know it, you could be dealing with fraudulent charges or loans taken out in your name. HOW CLOAKED KEEPS YOU SAFE Cloaked gives you working email addresses, phone numbers, and more - no need to share your real credentials. If a site or app experiences a breach, criminals only get your alias instead of your true data. Also, Cloaked automatically scans and removes your details (name, address, email, phone number) from over 120 data brokers. Less data “out there” means fewer opportunities for spammers and thieves. Even if a scammer does slip through, Cloaked backs you with $1 million in identity theft coverage to help cover the financial fallout. Built-In Privacy VPN (Beta) Enhance your online privacy with Cloaked’s built-in VPN, currently in beta. When enabled, our VPN securely encrypts your internet traffic and masks your…

What Cloaked: Protect your privacy Is Used For

Cloaked: Protect your privacy appears to be a privacy and identity-protection app for Android phones. Based on the metadata, people may use it to reduce exposure of personal information, manage contact details used online, and create alternate email addresses or phone numbers when signing up for services. That kind of setup is commonly used to separate a real phone number or email from shopping, account creation, or other places where spam can start.

The app also appears to focus on helping users address data exposure from brokers and unwanted outreach tied to that exposure. Its listed permissions suggest it may need access to contacts, network connectivity, audio, and location to support alias creation, account management, and privacy-related checks or communications. Because it is a phone app with internet access and startup/background capabilities, it seems intended for ongoing personal-use privacy management rather than a one-time tool.

Common uses

  • Create alternate email addresses or phone numbers for signups
  • Reduce use of your primary contact details online
  • Manage privacy-related contact and identity information
  • Help limit spam tied to exposed personal data
  • Support privacy checks that may involve network or location access
  • Use on an Android phone for ongoing personal privacy management
Best for:
privacy-focused users phone app users online signup protection spam reduction identity management

App Details

Package:
app.android.cloaked
Category:
Productivity
Developer:
cloaked
Version:
2.80.1
Updated:
Mar 30, 2026
Min Android:
10
Age Rating:
Everyone
Contains Ads:
No
In-App Purchases:
Yes

Official Listing

  • Official listing available on Google Play
  • Package name: app.android.cloaked
  • Age rating: Everyone

Explore More

Browse more apps in Productivity or explore the Phone hub .

Related Productivity Apps

Microsoft OneDrive icon

Microsoft OneDrive

Productivity Microsoft Corporation

Securely save and share your favorite memories and files across your devices.

Version Varies with device 89.8 MB ⭐ 4.60 5,000,000,000+ installs
Google One icon

Google One

Productivity Google LLC

Cloud storage, automatic phone backup, and more.

Version 1.302.885140631 25.5 MB ⭐ 4.10 1,000,000,000+ installs
Microsoft Word: Edit Documents icon

Microsoft Word: Edit Documents

Productivity Microsoft Corporation

Craft your story with formatting and grammar tools to ensure it’s right, always

Version Varies with device 120.4 MB ⭐ 4.80 1,000,000,000+ installs
Microsoft Excel: Spreadsheets icon

Microsoft Excel: Spreadsheets

Productivity Microsoft Corporation

Use powerful, industry-leading AI tools to generate visual charts from any data

Version Varies with device 230.4 MB ⭐ 4.80 1,000,000,000+ installs
Microsoft PowerPoint icon

Microsoft PowerPoint

Productivity Microsoft Corporation

Seamlessly integrate data and reports to build your presentation to impress

Version Varies with device 226.3 MB ⭐ 4.80 1,000,000,000+ installs
Microsoft Outlook icon

Microsoft Outlook

Productivity Microsoft Corporation

Stay on top of multiple accounts with emails, calendars & contacts in one place

Version 5.2611.0 106.4 MB ⭐ 4.40 1,000,000,000+ installs

How to Download Cloaked: Protect your privacy

If this app is not hosted directly on APKApps official link, then for the safest and most up-to-date version, install it from its official Google Play listing.