Take Control of Your Cellphone: Wireless Screen Mirroring with scrcpy & Tailscale
Control a Android Device Wirelessly Including Full Screen Mirroring
Using scrcpy & Tailscale, along with your mobile device's data - and an interesting use...
Project: DIY Thermal Drone (Part 1)
This started as a deep dive into
scrcpy—learning how to mirror and control my cellphone from my PC. But I wanted to push the limits: fully wireless, over mobile data, using the phone as a passthrough for external peripherals.Specifically? A thermal camera dongle.
Can I strap this entire rig to a drone- the cellphone with the thermal dongle- and build a ghetto thermal-image capable drone?
This post covers the initial remote camera setup, starting of with some initial food for thought, further diving deeper into things to give us an intresting end product- hopefully. Because this is a project you'll definitely want to show off, I’m also breaking down the CMD OpSec you need first. These privacy and security commands ensure you can share your progress safely—without doxing your IP or accidentally handing the internet full access to your phone.
Some time ago, I'd discoverred scrcpyC- my phone's(and not just phone...but phones) screen, oh that delicate sceens of ours on our devices. Some times, all in, full on shatter, some pixels barely visible- other times, it'd start with a small fracture... still usable, until it isn't. And o course everything is now set up to 2FA.... even setting up a new device...go to apply our accounts onto it and you get a pop up that reads, "please see the security code we sent to..." to the other phone..the one you are replacing...because...because...the screen doesn't work, you can't see anything on it, nor most times click on anything. The phone buzzed, dingged, a notification something came through at that moment. For sure it was that damn 2FA code! Learning about OTG- some phones, all it takes is to plug in a wired mouse and keyboard through a small USB hub..and you can control your phone again...but, you are still stuck since you can't see anything.
Continue down the rabit hole and come across scrcpy- how could one not, it is a pretty popular/ powerful tool. Using it, a complete mirror of your device can be emulated on your PC... with full on controls- many, many other options...such as giving it a command to shut down the phone's screen while still mirroring it on your PC- to save battery life- other commands can change frame rates, quality, to lower any possible lag. Really cool program. I have made a posit about it some time ago... in this post, I'll be exploring scrcpy further, in an more advanced way- for some unconventional means
Though scrcpy allows for the control of your wireless device, it is still tethered, physically, by USB to your PC. Doesn't have to be. And this is some seriously cool setup- control that wireless device, wirelessly. Fully control your Android phone from your PC—viewing your screen and controlling it with your mouse and keyboard—from anywhere you have cellphone coverage. We will do this fully wirelessly (no USB after the first setup, and no shared Wi-Fi) by combining scrcpy (screen mirroring) and Tailscale (a zero-config VPN).
Initial Housekeeping & Privacy (OpSec)
Before we start connecting devices, we need to talk about privacy. If you plan to share screenshots, stream, or record your setup process, the commands we use will return personally identifiable information (IP addresses, computer names, file paths).
Don't DOX yourself. Use the following commands in your Command Prompt (cmd) to anonymize your session.
1. Anonymize Your Command Prompt
By default, CMD shows your full file path (which often includes your real name). You can change this using the prompt command.
- Remove the path entirely (changes prompt to
>):prompt $G - Use a Linux-style prompt (changes prompt to
$):prompt $$ - Personalize it for your blog:
prompt zkitszo $G
2. Clear the Screen (Wipe Old Output)
If you already opened CMD and have paths showing, changing the prompt doesn't hide the text above it. To instantly clear the active window of any previous output, use the clear screen command:
cls
3. Hide Your Profile Name in Directory Strings
When referencing paths in your tutorials, you can use a Windows variable instead of typing out your actual computer username. Use %USERPROFILE% to hide the computer name.
- Example:
%USERPROFILE%\Downloads\scrcpy\is the universal equivalent toC:\Users\zkitszo\Downloads\scrcpy\.
4. Advanced: Spoof Your Environment Variables
Many networking tools automatically pull your PC's name or your Windows username to stamp onto logs or outputs. You can temporarily fake these just for that specific CMD window.
set USERNAME=Anon
set COMPUTERNAME=Terminal
set USERPROFILE=C:\Users\Anon
5. Advanced: Filter Entire Lines
To hide any line of text that contains a specific word or IP address, use the /V switch with findstr. This tells CMD to print everything except lines containing your secret string.
ipconfig | findstr /V "192.168"
6. Make the Anonymous Prompt Persistent (Optional)
If you want CMD to automatically load an anonymous prompt every time you open it, you can modify the Windows Registry. Run this in an Administrator CMD window:
reg add "HKCU\Software\Microsoft\Command Processor" /v AutoRun /t REG_SZ /d "prompt $G" /f
Phase 2: The Wireless scrcpy Setup
Step 1: Download the Required Resources
On your PC:
- Download Tailscale for Windows: Tailscale Download Page
- Download scrcpy: scrcpy GitHub Releases (Scroll to "Assets", download the
scrcpy-win64-vX.X.X.zipfile, and extract it to your PC).
On your Android Phone:
- Download Tailscale for Android: Google Play Store Link
Step 2: Set Up Tailscale
Tailscale creates a secure, private network between your devices, tricking them into thinking they are on the same local Wi-Fi.
- Install and open Tailscale on your PC. Log in.
- Install and open Tailscale on your Android phone. Log in using the exact same account.
- On the Tailscale app on your phone, note the IP address at the top (it usually starts with
100.x.x.x). Write this IP address down.
Step 3: Enable Developer Mode & USB Debugging
- Go to your phone's Settings > About Phone.
- Find the Build Number and tap it 7 times quickly to unlock Developer options.
- Go back to the main Settings menu, search for Developer Options, and turn on USB Debugging.
Step 4: The Initial USB Connection (One-Time Setup)
You need a USB cable just for this initial handshake.
- Connect your phone to your PC with a USB cable. (If prompted on your phone, tap "Allow USB debugging").
- Open the folder where you extracted scrcpy.
- In the address bar at the top of the folder window, type
cmdand press Enter to open a command prompt in that directory. - Copy and paste the following command:
adb tcpip 5555
Once that completes, unplug your phone from the USB cable. Leave the command prompt window open.
Step 5: Connect Wirelessly over Tailscale
Now, connect the PC to the phone using the Tailscale IP address you wrote down. Type adb connect followed by your phone's Tailscale IP, and add :5555 to the end.
adb connect 100.x.x.x:5555
Step 6: Launch scrcpy (Optimized for Lag)
Because you are streaming over a mobile data connection, default settings will stutter. We need to lower the bitrate, reduce the resolution, and cap the framerate. Copy and paste this final command:
scrcpy --video-bit-rate=2M --max-size=800 --max-fps=30
A window will pop up showing your phone screen. You are now controlling your device over mobile data!
The Next Chapter
Part 1 Complete- using phone's data, scrcpy, Tailscale, full access to your device, from almost anywhere(there's data coverage).
Next, I'll take the above and apply it to the "ghetto thermal drone" setup. I already have the thermal dongle, my current phone, and a small drone.
I'll go over setting it all up, flight testing, and likely troubleshooting a few concerns I've already identified. I'll also look into specific hardware and explore cellphone options to see how lightweight and small a phone I can get that will still work with the thermal dongle. All that and more in Part 2.
Link will be posted here once the post is up- if you've seen it up and I had forgotten to edit it into here, please let me know.
Did you learn anything from this post? Shared it with you community? Had more to add or know easier ways of doing similar? Let me know.

