I want to harden an Android security-focused APK so that it remains fully undetectable when scanned by Play Protect and the major anti-virus engines aggregated on services like VirusTotal. The core objective isn’t a one-off compile: I need a clear, repeatable method—scripts, build flags, obfuscation steps or packing techniques—that lets me produce the same FUD result whenever the source is updated. What I expect from you: • A working proof-of-concept APK built from a simple “Hello World” template that shows zero (or near-zero) detections on VirusTotal. • A step-by-step guide (text or video) covering every tool and command you use—apktool, Gradle, Android Studio, ProGuard/R8, DexGuard, custom encryption layers, anti-emulator checks, etc.—so I can reproduce the build on my own machine. • Explanations of any trade-offs that affect stability or Android policy compliance, plus tips for keeping the app FUD across future AV signature updates. Your solution should run on a standard Windows or Ubuntu workstation and rely only on publicly obtainable tools or clearly documented custom scripts. If you have questions about my environment or need sample code, let me know early so we can keep iterations to a minimum.