Twelve features.
Five layers of defense.
Every feature Blink offers, explained in detail. What it does, how it works, and when you would use it. No marketing fog. Just the truth about what runs on your device.
App Protection
Protected apps silently redirect to the home screen. No lock screen. No PIN prompt. No visible indicator.
Most privacy apps put a lock screen in front of the apps you want to protect. That lock screen is a signal. Anyone who sees it knows there is something behind it worth hiding. Blink takes a fundamentally different approach: when someone opens a protected app, the phone silently returns to the home screen. There is no prompt, no animation, no clue that anything happened.
Blink monitors the foreground continuously. It does not matter whether the protected app is opened from the launcher, from recents, from a notification, or from a deep link in another app. The interception fires the same way every time. The person holding the phone sees the app appear for a fraction of a second and then the home screen, exactly as if the app had crashed or failed to load.
You choose which apps to protect. There is no limit on the number. When Blink is in its active state, every protected app is silently blocked. When Blink is inactive, everything works normally. The transition between states is controlled by a secret volume button sequence that only you know.
How it works
Blink uses standard Android foreground monitoring to detect when a protected app enters the foreground. When it does, Blink immediately fires a HOME intent, returning the device to the launcher. The entire process takes milliseconds. There is no overlay, no dialog, no lock screen inserted between the user and the home screen. To any observer, it looks like the app simply did not open.
You hand your phone to a friend to show them a photo. They swipe out of the gallery and tap your messaging app out of curiosity. The app flashes for an instant and they are back on the home screen. They try again. Same result. It looks like the app is broken. They hand the phone back. No confrontation. No explanation needed.
App Vault
Apps removed from the launcher and recents. As far as any observer can tell, the app is not installed.
App Protection stops someone from opening your apps. App Vault goes further: it removes the app from every visible surface on the device. The app disappears from the launcher, the app drawer, and recent apps. If someone scrolls through your installed apps looking for something suspicious, vaulted apps are simply not there.
The apps are not uninstalled. They remain fully functional and retain all their data. When you deactivate the vault through Blink, the apps reappear exactly where they were, with all conversations, files, and settings intact. There is no reinstallation step, no data loss, and no re-login required.
App Vault requires a one-time setup step that takes about two minutes through a browser-based guide. After that initial setup, vaulting and unvaulting apps is instant and automatic, controlled by your Blink activation state.
How it works
Blink uses Android's device management capabilities to control app visibility at the system level. Vaulted apps are hidden from the launcher and app drawer. The apps remain installed and their data stays on-device, but they do not appear in any user-facing surface. The one-time setup grants Blink the necessary permissions through a guided process in your browser. No root access, no bootloader unlock, and no warranty-voiding modifications are involved.
You have a secure messaging app that you use for confidential work communication. With App Vault enabled, the app does not appear anywhere on your device. Someone who picks up your phone and scrolls through every page of your app drawer will not find it. When you need it, you trigger Blink, and the app reappears instantly, conversations intact.
Content-Aware Protection
User-defined keyword rules. Screen scanning detects sensitive content. Configurable lockdown response. All on-device.
App Protection works at the app level: you choose which apps to block. Content-Aware Protection works at the content level: you define what words, phrases, or patterns should trigger a response, regardless of which app displays them. If a keyword you have defined appears on screen, Blink responds immediately.
You configure the response yourself. A gentle redirect sends the user to the home screen, the same way App Protection works. A full lockdown locks the device immediately, and the power button cannot bypass it. You decide which level of response matches your situation.
All rule evaluation happens on your device. There is no AI, no cloud processing, no machine learning model, and no data sent anywhere. Your keywords stay in encrypted local storage. Blink reads what is on screen, checks it against your rules, and acts. Nothing else.
How it works
Blink reads on-screen text using Android's built-in accessibility framework and matches it against your keyword rules in real time. The matching is local, deterministic, and instant. When a rule triggers, Blink fires the configured response. Rules can be scoped to specific apps or applied globally. All configuration is stored in encrypted preferences on your device.
You define a rule for a specific project name that should never be visible if someone else is holding your phone. A colleague borrows your device to look something up. They open your email app, which is not itself protected, but an email arrives with that project name in the subject line. Blink detects the keyword and locks the device before the colleague can read the content.
SOS Duress Mode
An alternate volume sequence that switches your vault to decoy mode. Protected apps stay blocked. Designated decoy content becomes visible. Real vault content stays sealed — or is automatically erased.
Blink is activated by a specific volume button sequence. SOS mode is activated by a different one. From the outside, the two states look identical. When SOS activates, app protection stays fully active — blocked apps remain blocked. Your vault switches to its decoy face: apps and content you designated as your decoy become visible, while your real vault content stays sealed or is automatically erased based on your configured SOS actions.
SOS mode is built for coercive situations. If someone demands you unlock your phone and prove nothing is hidden, you enter the SOS sequence. They see your protected apps fail to open — as they always do, because protection is still running. They see your vault — with whatever decoy content you set up in advance. What they do not see is your real vault content, which is either hidden behind the decoy or already gone. The observer has no way to distinguish this from a phone with an innocent vault and no advanced privacy software.
There is no SOS indicator anywhere on the device. No notification, no status bar icon, no change in interface behavior. The phone appears identical to its inactive state in every observable way. The only way to exit SOS mode is to enter the real activation sequence.
How it works
SOS requires two things configured in advance: a decoy profile in App Vault — the apps or content that become visible when SOS activates — and the actions SOS should trigger (erase real vault content, lock down specific apps, or both). When the SOS sequence fires, all configured actions run immediately, and the vault switches to show your decoy. App protection continues enforcing as normal. Without App Vault configured, SOS still keeps app protection active — but the decoy swap does not apply, making it primarily useful for the blocking behavior alone.
Someone pressures you to hand over your phone and prove nothing is hidden. You enter the SOS sequence. They scroll through your apps — protected apps fail to open, same as any inactive state. They check your vault — they see your decoy content, looking completely ordinary. Your real vault content was already erased the moment SOS fired. They hand the phone back, satisfied. Your protection ran the entire time.
Notification Control
Free: notifications from protected apps silently disappear. Premium: notifications are replaced with convincing disguises.
Protecting an app is not enough if its notifications still appear on the lock screen. A message preview from a hidden messaging app reveals exactly what you are trying to protect. Blink handles notifications from protected apps so they never give you away.
On the free tier, notification control is straightforward: notifications from protected apps are silently suppressed. They never reach the lock screen, the notification shade, or any notification listener. The app still receives the notification internally, but no visible trace appears on the device.
On the premium tier, Blink replaces notifications instead of suppressing them. When a notification arrives from a protected app, Blink intercepts it and replaces it with a convincing alternative from one of 150+ disguise profiles. A message from your private chat app becomes a calendar reminder, a shipping update, a weather alert, or a system notification. The replacement looks completely genuine, down to the icon, title, and body text. You still know what the notification means because you chose the disguise. Anyone else sees something mundane.
How it works
Blink uses Android's notification listener service to monitor incoming notifications. For suppression, notifications from protected apps are silently dismissed before they reach any visible surface. For replacement, the original notification is dismissed and a new notification is posted with the selected disguise profile's content, icon, and formatting. The original notification content is never stored or logged.
Your phone is on the table during a meeting. A message arrives from a contact that no one in the room should know you communicate with. Instead of the message preview, your phone displays a shipping notification: "Your package has shipped. Estimated delivery: Thursday." The person sitting next to you glances at your screen and sees nothing worth noticing. You know it means you have a new message waiting.
Fake Incoming Call
Triggers the real phone dialer. Same ringtone, same vibration. Configurable caller name and number. Exit any situation discreetly.
Sometimes the best privacy tool is a reason to leave the room. Blink's Fake Incoming Call triggers a call that is indistinguishable from a real incoming call. It uses the actual phone dialer, not an overlay or a simulation. The phone rings with your real ringtone, vibrates normally, and shows a full-screen incoming call with the caller name and number you configured.
Unlike overlay-based fake call apps that display a picture on top of your screen, Blink triggers the genuine call interface that your phone uses for real calls. The same interface, the same animations, the same answer and decline buttons. If someone is watching your screen when the call comes in, they see exactly what they would see for any real call.
You configure the caller name and phone number in Blink's settings. When you need it, you trigger the call. Pick up, have a brief "conversation," and excuse yourself. The situation ends naturally, without confrontation or suspicion.
How it works
Blink uses Android's telephony framework to trigger a call through the system dialer. The call appears in the native phone interface, not in an app overlay. The ringtone and vibration pattern match your device's current settings. You configure the displayed caller name and number in advance. The call is triggered on demand, giving you a natural exit from any situation.
You are in a social situation that has become uncomfortable and you need a reason to step away. You discreetly trigger a fake call. Your phone rings with an incoming call from "Mom." You answer, say "I'll be right there," hang up, and excuse yourself. The people around you heard a real phone ring, saw a real incoming call screen, and watched you take a genuine-looking call. No suspicion. No awkward exit.
Call Scrubber
Automatic removal of call log entries. Works retroactively. By contact, number, or category.
Your call history tells a story. It shows who you talk to, how often, and when. Even if someone cannot access your messaging apps, your call log reveals communication patterns that you may need to keep private. Call Scrubber removes call log entries automatically so you do not have to remember to delete them manually.
You configure Call Scrubber by contact, by phone number, or by category. Once configured, matching call log entries are removed automatically. It works retroactively on your existing call history and continuously on new calls as they happen. You do not need to open Blink after every phone call to clean up.
Call Scrubber works independently of App Protection. Even if someone opens your phone's native dialer and scrolls through your call history, the entries you have configured for removal are already gone. There is no "recently deleted" section and no undo trail.
How it works
Blink monitors the system call log and removes entries that match your configured rules. Removal is performed directly on the call log content provider, which means the entries are genuinely deleted from the system database, not merely hidden. The scrubbing process runs automatically in the background and handles both incoming and outgoing calls.
You regularly speak with someone whose calls should not appear in your history. You add their number to Call Scrubber. From that point on, every call to or from that number is automatically removed from your call log. If someone opens your phone app and checks your recent calls, there is no record of those conversations ever happening. The calls that remain in your log look completely natural.
Disguise System
Blink appears as a system utility in the launcher. Free: 7 identities. Premium: 150+ disguise profiles.
A privacy app that shows up in the launcher as "Blink Privacy" or "App Hider" defeats its own purpose. If someone scrolls through your installed apps and sees software designed to hide things, they know you are hiding things. Blink eliminates this problem by disguising itself as a mundane system utility.
On the free tier, you choose from 7 launcher identities. Blink can appear as "System Tools," "Device Manager," "Cloud Sync," "Smart Switch," "Service Mode," "Diagnostics," and more. The app name and icon in the launcher match the disguise. If someone opens the disguised app directly, they see a minimal screen that looks consistent with the disguise identity, not a privacy app.
On the premium tier, the disguise system extends to 150+ profiles that also cover notification replacements. The notification disguise determines how replaced notifications appear, with profiles spanning categories like calendar, shipping, weather, news, fitness, and system utilities. Each profile has its own icon, title format, and body text pattern.
How it works
Blink uses Android's activity-alias system to change the launcher entry. When you select a disguise identity, the current launcher component is disabled and the selected alias is enabled. The alias has its own label and icon, so the launcher displays the disguise name and icon as if it were a different app. The change is instant and survives reboots. Notification disguise profiles are stored as templates that define the icon, title, and body format for replacement notifications.
Someone is looking through the apps on your phone. They scroll past "System Tools" without a second thought. It has a generic wrench icon and looks like every other pre-installed utility. They would never guess it is a privacy protection app. If they tap it out of curiosity, they see a screen that looks like a basic system tool. Your protection is completely invisible.
Paranoia Mode
Maximum protection tier. All features activated simultaneously.
Individual features protect individual surfaces. App Protection stops app access. App Vault removes apps from the launcher. Notification Control handles message previews. Call Scrubber cleans the call log. Each feature addresses one vector. Paranoia Mode addresses all of them at once.
When Paranoia Mode is enabled, every premium feature is activated simultaneously at its maximum setting. Protected apps are blocked. Vaulted apps are hidden. Notifications are replaced. Call history is scrubbed. Hidden contacts are invisible. Content-Aware Protection is active. There is no gap, no surface left unprotected, and no feature you forgot to enable.
Paranoia Mode is for situations where partial protection is not enough. If you need to be certain that every trace of your private activity is managed, Paranoia Mode ensures that nothing is left to chance or memory. One setting, total coverage.
How it works
Paranoia Mode is a master switch that activates all protection features simultaneously. Rather than configuring each feature individually, you enable Paranoia Mode and every layer of defense engages. The individual feature configurations you have already set are respected. Paranoia Mode ensures they are all active at the same time, eliminating the risk of leaving one layer disabled.
You are entering a situation where you need absolute certainty that your phone reveals nothing. You enable Paranoia Mode before you leave. Every app is protected or vaulted. Every notification is disguised. Every call log entry for sensitive contacts is scrubbed. Content keywords are monitored. You walk into the situation knowing that every surface of your device is covered, without having to check each feature individually.
Banking Mode
Auto-pauses certain permissions for banking app compatibility. Re-enables protection automatically.
Some banking and financial apps detect certain system-level permissions and refuse to launch if they are present. This is a security measure on the bank's part, and it creates a conflict: the same permissions that enable Blink's advanced protection can prevent your banking app from opening.
Banking Mode solves this cleanly. When you open a banking app, Blink temporarily pauses the permissions that cause the conflict. The banking app opens normally, works normally, and sees nothing unusual. When you leave the banking app, Blink automatically re-enables your protection. You do not need to manually toggle anything, and you do not need to choose between privacy and banking.
Banking Mode requires a one-time device setup. After the initial configuration, the pause-and-resume cycle is fully automatic. Your banking app works every time, and your protection is restored every time.
How it works
Blink detects when a banking app enters the foreground and temporarily adjusts the permissions that trigger the banking app's security check. The adjustment is narrow and specific: only the permissions that cause the conflict are paused, and they are re-enabled automatically when the banking app leaves the foreground. The one-time setup is guided and takes about two minutes. No root access or device modification is required.
You use Blink with advanced protection enabled. You open your banking app to check a transaction. The app opens normally, shows your account, and lets you complete your business. You close it and return to your home screen. Blink's protection is already re-enabled. You did not have to open Blink, toggle any settings, or think about compatibility. It just worked.
Screen Escape
Protected apps never appear in recents or on the lock screen after a session ends.
Blocking a protected app from opening is only half the problem. If the app appears in the recent apps screen, someone can see it was recently used. If the app's content appears on the lock screen when the phone is locked, the protection is meaningless. Screen Escape ensures that after Blink's session ends, no trace of the protected app remains on any visible surface.
When a Blink session ends, Screen Escape clears protected apps from the recent apps screen. There is no thumbnail, no app name, and no card for the protected app in the recents list. If the phone is locked immediately after using a protected app, the lock screen shows the home screen, not the protected app's content.
Screen Escape works automatically whenever Blink's active session ends. You do not need to remember to clear your recents manually, and you do not need to worry about what the lock screen will show if someone picks up your phone after you set it down.
How it works
When a Blink session ends, Screen Escape fires a HOME intent to bring the device to the launcher and clears any residual foreground state. Protected apps are removed from the recent apps list so no thumbnail or app card remains. The transition happens in milliseconds, before the lock screen has a chance to capture the protected app's content. Screen Escape is designed to work reliably across Samsung, Xiaomi, OPPO, and other Android manufacturers.
You were using a protected messaging app. Your phone's screen turns off and someone picks it up a minute later. They unlock the phone and check recents to see what you were doing. The recents screen shows the home screen and some other apps. The messaging app is not there. They check the lock screen transition. It shows the home screen. There is no evidence that the messaging app was ever open.