: To function, it requires access to storage (for reading/writing config files) and phone state (to generate a unique hardware ID).
: Supports sharing the secure connection via Hotspot or USB Tethering.
: Utilizes SSH and VPN tunneling to encrypt traffic.