_____ _               _               _____ ____  
 / ____| |             | |             | ____|___ \ 
| (___ | |__   __ _  __| | _____      _| |__   __) |
 \___ \| '_ \ / _` |/ _` |/ _ \ \ /\ / /___ \ |__ < 
 ____) | | | | (_| | (_| | (_) \ V  V / ___) |___) |
|_____/|_| |_|\__,_|\__,_|\___/ \_/\_/ |____/|____/ 

Step 1: The ROM

Since the ROM is the first thing one has installed on their Android device, this is the first thing we should consider, for a few different reasons.

Step 1.1: Base Apps

Since we are going *No Gapps*, we can't rely on Google's versions of the base apps - that is, the clock, calendar, contacts, phone, texting, and gallery apps that come preinstalled. Most ROMs come with the AOSP or their own versions of these apps preinstalled and you won't have to worry about them. A few, such as Pure Nexus, assume that you are installing a Google Apps package that contains Google's versions of these apps and does not include most of them. You can still use these ROMs, but be aware that you will have to find alternatives for these apps. There is a [chart of alternatives]({{< link path="/android/no-gapps/alternatives" type="content" >}}) on this website that you can reference, if needed.

Step 1.2: (microG) Signature Spoofing Support

If you are using [microG](https://microg.org/) as a replacement for the Google Play Services, the ROM that you install needs to have support for signature spoofing. In short, this allows microG to pretend to be the official Google Play Services, otherwise the system and other apps won't listen to it. You can find more on the microG wiki, but here is a summary:

Some ROMs are patched by the developer to support signature spoofing and you don't have to do anything more. Of these ROMs, those on Android 6/7 implement spoofing like any other system permission and the system will ask the user before allowing the permission. There is a list of these ROMs available at the wiki link above that should stay updated. The only ones that I am aware of are OmniROM and the OnePlus phone versions of Resurrection Remix.

OmniROM Resurrection Remix

Most ROMs do not have this patch because of perceived security issues. These can still be patched to support signature spoofing, but only if they are not odexed or have been deodexed). You can find links to a few different patching tools on the microG wiki, linked above (more likely up-to-date) or below:

Haystack on GitHub Needle on GitHub Tingle on GitHub

Android platform tools (ADB, etc.) Python website Signature Spoofing on the microG wiki XDA Developers thread about odex and deodexing