For most Android users, the Google Play Store is the primary destination for finding apps that power everything from entertainment to work. While it’s home to millions of useful apps, the Google Play Store isn’t everyone’s first choice, especially for users who value privacy and security.
The app marketplace is notorious for extensive data collection and has a history of security issues. In 2025, hundreds of malicious apps were discovered in the Google Play Store, despite the company’s commitment to security. For these and other reasons, an increasing number of users are seeking alternatives to the Google Play, such as Accrescent.
In this article, we offer a detailed overview of the Accrescent app store. By examining its features, security practices, and potential drawbacks, we’ll help you decide whether to make the switch.
What Is the Accrescent App Store?
The Accrescent app store is an Android app store focused on usability, security, and privacy. Its goal is to provide a seamless experience for both developers and users while leveraging the latest security and privacy practices and robust validity guarantees for installed apps.
Accrescent is available on all devices running Android 10 or any later version. It can also be installed on custom Android distributions, such as GrapheneOS.
How Much Does Accrescent Cost?
Accrescent is completely free as its founders believe that security shouldn’t come at a price. The project relies entirely on donations to cover its costs, fees, and servers, but you’re not obligated to donate to access the app store.
How To Install Accrescent
If you’re using Android 10 or higher, follow the steps below to install Accrescent:
- Open your mobile browser and visit the Accrescent website
- On the home page, scroll down and select Download Accrescent. You may see a warning that you’re downloading potentially harmful files. Tap Ok to continue*
- Open the downloaded APK file and follow the instructions to complete the installation
*You may receive a notification that you’ll need to allow installations from unknown sources to complete the process. Here’s how to do that:
- Open Settings, scroll down, and choose Apps
- Tap the three dots at the top-right corner and select Special access
- Scroll down and choose Install unknown apps
- Find your browser and switch the toggle button on its right to allow installations from “unapproved” sources
GrapheneOS users should follow these steps to set up Accrescent:
- Open your GrapheneOS app store and find Accrescent
- Select the app and install it on your device
What Features Does Accrescent Offer?
As a security-focused app store, Accrescent offers a range of features that guarantee safe installations and protect you from threats, including:
- Signed repository metadata (App signing key pinning, minimum version pinning, name verification)
- Unattended updates
- Split APK support
- No remote APK signing
- No accounts
- Strict publishing requirements
Signed Repository Metadata
Accrescent’s repository contains metadata files that the client leverages to display app information (such as the app’s title, description, or version) to the user. To offer high-level security even if the server is compromised, one of the metadata pieces is signed by a special key embedded into Accrescent. Thanks to the key, hackers won’t be able to modify any part of the metadata in the repository.
Here’s what the signed metadata helps secure:
What It Protects | Explanation |
App signing key pinning | Whenever a developer submits a new app to Accrescent, a hash of that app’s public signing key is added to the metadata repository. Each time a user attempts to download that app, Accrescent will verify the key hash and reject the installation if it doesn’t match. |
Minimum version pinning | Every app in the signed metadata has a minimum expected version. If a user attempts to install a version of an app that is below the minimum version, Accrescent will reject it to prevent tampering. |
Name verification | App names are stored in metadata, which makes it more challenging for an attacker to deceive users into installing a malicious app. |
Unattended Updates
By default, Accrescent offers automatic updates, regardless of the level of integration in your OS. It will ask for your confirmation only when you install an app; after that, you’ll receive no prompts, and Accrescent will continue updating your apps in the background.
Split APK Support
Accrescent sees apps as split APKs, which means it installs them in smaller, modular pieces, not as a single, universal APK that contains all assets, languages, and architectures particular apps support.
Here are some of the benefits of split APK support:
- Smaller app sizes: Since you don’t need to download a single APK that contains components your device doesn’t require, you save plenty of storage space.
- Faster installation times: Apps are smaller in size and contain less data, so you can quickly download them.
- Saved bandwidth: Your device won’t be burdened with unnecessary resources and code.
No Remote APK Signing
APK signing is a security process important for several reasons:
- Authentication: Identifying the app’s developer
- Integrity: Guaranteeing the app hasn’t been modified by a third party
- Secure update process: Ensuring an update can be installed only if its unique signature matches the signature of the app installed on your device
Accrescent itself never signs the apps; it allows developers to sign APKs with their own keys and then upload them to the app store. This gives developers absolute control over their app signing keys, serving as an additional security measure. If Accrescent’s servers are compromised, developers’ signing keys can’t be affected, and the app store has no authority to install modified app updates.
No Accounts
Accrescent doesn’t require you to create an account to download apps from the store (unlike Google Play). All you need to do to use the app store is to install it. This makes Accrescent highly accessible and private; user accounts can often be leveraged to track user behavior, and the no-account policy ensures that never happens.
Note that this applies only to users. Developers need to set up accounts on the developer console to publish apps.
Strict Publishing Requirements
Before an app is published on the Accrescent app store, it has to meet strict requirements that confirm its security and functionality. There are two types of checks:
- Automatic: These checks are performed automatically on all apps before the developer submits them. In the event of any kind of failure, the developer will see an error in their console, and their submission request will be rejected.
- Manual: These checks are performed by reviewers who analyze apps based on a predetermined list of requirements to ensure objectivity.
What Are the Potential Drawbacks?
Accrescent offers unique security and privacy options to minimize the risk of cyberattacks and protect your information. Still, there are certain drawbacks to consider before switching to the app store:
Potential Drawback | Explanation |
Alpha software | Accrescent is still in alpha testing, which means it offers limited availability and hasn’t been widely released. There’s no ETA for the app store’s stable release, but you can always keep an eye on the public roadmap that displays the current development stage. |
Limited app availability | Since Accrescent is relatively new, its app selection is modest. You can expect new Accrescent apps to be added in the future, but there’s no information available on when this will happen or how. |
Lack of a third-party audit | Accrescent is an open-source project, so you can inspect its code and perform your own security checks. Still, some users find it concerning that a third-party security audit hasn’t been published. |
No open-source exclusivity | Although Accrescent is open-source, developers can submit both open-source and proprietary apps to the app store. While this approach isn’t necessarily a drawback, some users may not agree with it. |
What Do Users Think About Accrescent?
Reviews are limited since the app store is still in early development stages. On forums like Reddit, however, users agree that the app store offers enhanced security and consider it a valuable, privacy-oriented alternative to the Google Play Store.
Those who had a chance to try it agreed that the features look promising and can’t wait to see what happens next.
Should You Switch to the Accrescent App Store?
The decision to switch to the Accrescent app store depends on your priorities. While the app store is excellent for security-conscious users and individuals who use GrapheneOS, it’s essential to be aware of its downsides, most notably the limited number of available apps.
Deciding to switch to Accrescent is a valuable step toward reducing security and privacy risks as it:
- Minimizes the chances of a malicious app infiltrating your device
- Protects your personal information from being collected and shared with third parties
While using Accrescent helps you protect your device and mobile integrity to a degree, it doesn’t shield you from all security threats, some of which can come from unexpected sources, such as your mobile carrier.
Even well-resourced providers have experienced numerous data breaches in recent years that affected millions of users. So, even if you switch to the Accrescent app store, your security and privacy could still be jeopardized unless you opt for a privacy-focused mobile carrier, such as Cape. With a unique approach to data collection and handling, an innovative infrastructure, and a revolutionary feature set, Cape offers unmatched security and protection.
Meet Cape: The Secure Carrier Designed for Today’s Threats
Traditional carriers collect detailed records of your calls, texts, and locations. That data becomes a liability—fueling surveillance, breaches, and leaks.
Cape takes a different approach. We’re a privacy-first carrier that collects only the bare minimum required to keep your service running. What little data is necessary is stored briefly, never shared, and never sold. With less data to compromise, you’re better protected from the start.
At the core of our network is Cape’s own cloud-native, software-based mobile core. A mobile core is the backbone of a cellular network that controls the complex systems to connect people across endpoints. By running our own network, Cape can control how data flows through your device and implement modern security protocols.
Other security-first features of Cape include:
Feature | Description |
Your account is secured with a cryptographic signature generated from a 24-word recovery phrase, stored only on your device. Not even Cape can access it. This ensures only you can authorize sensitive changes like SIM transfers. | |
Cape doesn’t ask for your name or billing address. Payments are tokenized through Stripe, with financial records stored completely separate from your account information—so your identity can’t be linked to your subscription. | |
Our proprietary signaling proxy validates network requests in real time, blocking suspicious activity before it connects. This keeps your location data private and protects against telecom exploits. | |
Both voicemail content and metadata are encrypted and then re-encrypted with your private key, making them accessible only from your device. |
Cape offers all the benefits of a premium carrier, even with the added security and privacy safeguards. At $99/month (taxes and fees included, no hidden costs), you get:
- Unlimited 4G and 5G with fast speeds
- Unlimited talk and text
- Free international roaming (for eligible countries and devices)
Get the Cape-Level Protection To Secure Your Communications
You can sign up for Cape using our anonymous onboarding process here.
We’ve partnered with technology leaders Proton to help you build a privacy-first ecosystem. You can choose between Proton Unlimited and Proton VPN Plus when you become a Cape subscriber—and you only pay an extra $1 for six months.

