SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
Earthmouse: Mobile Guardian
Secure, Open-Source
Smartphone built on Google Android




                   please visit http://earthmouse.org
Android     Earthmouse
  Phone         Phone




              Anonymous
Open source
              Encrypted
  modern
              Invisible
 powerful
              Obfuscated
  flexible
              Ubiquitous
Windows                      Temporary
 Mobile
 Phone    +   Guardian
              SD Card    =    Guardian
                               Phone




                             Permanent
Android
                              Guardian
                         =
Phone
          +
              Guardian
              Firmware         Phone
               Update
HTC, Kogan, Lenova, Huawei,
Motorola, LG, Samsung, Asus




http://www.androidonhtc.com
Guardian is Viral



           Guardian
           SD Card




Guardian                  Phones can       New Communities
 Phone                   be converted          of Mice!
                       through SD Card
                      “Person to Person”
                            contact
Google Android




                 G
A movement is already underway
to create custom versions of
Android for a wide variety of
phones and purposes.... we just
need to tap into that!
Why Android?


 • Dominant open-source smartphone OS


 • Easy to convert commercially available handsets


 • Linux-based with modern development tools


 • Rich connectivity, location, and sensor features


 • Backed by Google’s resources and finances
Android Features


 • Dalvik virtual machine optimized for mobile devices
 • Integrated browser based on the open source WebKit engine
 • SQLite for structured data storage
 • Media support for common audio, video, and still image formats
   (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF)
 • GSM Telephony (hardware dependent)
 • Bluetooth, EDGE, 3G, and WiFi (hardware dependent)
 • Camera, GPS, compass, and accelerometer (hardware
   dependent)
The State of Mobile Crypto




                             G
Existing products show promise, but are out of
date, not good enough or too expensive
Existing Solutions


• Providers: CryptoPhone, SecureGSM,
  NanoPhone Suite


• Analog GSM solutions almost entirely
  for Windows Mobile Smartphones


• Corporate focus, poor quality audio,
  out of date OS and very expensive


• Products are not for covert use - they
  advertise their existence putting user
  at risk
Popular Smartphones...

iPhones and Blackberries are inherently compromised,
  closed-source and compromised by mobile carriers
Early Efforts on Android Need Work!




 A password safe for Android that protects your passwords with AES encryption. All encrypted
 information is stored in a database on the phone. No information is kept online. The only way
 to backup currently is through the export feature.


http://code.google.com/p/android-passwordsafe/
Designing a Guardian




                       G
a.e.i.o.u.’s of Guardian

anonymous           Able to be used without revealing the user


encrypted      All communication and data is secured and protected


invisible       Doesn’t reveal itself to be anything out of the ordinary


obfuscated      Hides itself within the noise and traffic of the network


ubiquitous     Widely available, easy to use, cheap and open-source
User Requirements

 • Be hidden and invisible from    • Offer “emergency” features
   the casual observer               that are quick to active

 • Provide secure                  • Open-source and able to run
   communication without             on cheap, common hardware
   complexity
                                   • Internationalized & Localized
 • Don’t incriminate the user or
   owner
The Android Operating System
Android O.S. + Guardian Security Layer

         1) Enhance existing & develop new secure applications




2) Wrap or replace Application
Framework, while adding new libraries
and core security services




                                        3) ensure kernel, runtime and
                                        virtual machine are “snoop” proof




        4) Secure or remove drivers to secure the hardware layer
Build on Existing Projects
• The Tor Project
  Tor is a software project that helps you defend against traffic
  analysis, a form of network surveillance that threatens
  personal freedom and privacy, confidential business activities
  and relationships, and state security



• Psiphon
 psiphon is a human rights software project developed by the Citizen
 Lab at the Munk Centre for International Studies that allows citizens
 in uncensored countries to provide unfettered access to the Net
 through their home computers to friends and family members who
 live behind firewalls of states that censor.


• Zfone
 ZfoneTM is a new secure VoIP phone software product which lets
 you make encrypted phone calls over the Internet. Zfone uses a new
 protocol called ZRTP, which has a better architecture than the other
 approaches to secure VoIP.
Guardian Application Suite

•Anonymous               •Encrypted Data
 Browser                  Storage

•Media+Location          •Remote Poison Pill
 Reporting Tool
                         •“911” Alert
•Encrypted Email          Mechanism

•Secure Voice            •Secure Data Auto-
 Communications           Sync
gReporter

            open-source, geotagging
            media capture report client
            http://openideals.com/greporter
gReporter




  Records    Records Audio,    Transmits to
  Location    Photo, Video    Secure Server
Walkie Talkie / Push to Talk
Routing via Stenography

authoritarian state
                           Gmail
                          YouTube            “Safe”
                          Amazon             Service

                           Skype



 Route encrypted data exchange through common services
    (Gmail, YouTube, Amazon, etc), as to not stand out
Earthmouse: Mobile Guardian
Secure, Open-Source
Smartphone built on Google Android




                   please visit http://earthmouse.org

Contenu connexe

Tendances

Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz
 
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talkJames Atkinson
 
INFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingINFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingJaymie Murray
 
Convenient Security is not an Oxymoron
Convenient Security is not an OxymoronConvenient Security is not an Oxymoron
Convenient Security is not an OxymoronAleksei Goldbergs
 
Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityCrash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityArturo Filastò
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011EASTWEST Public Relations
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?IoT Academy
 
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011Andris Soroka
 
TechRadar#32 ibeacon
TechRadar#32 ibeaconTechRadar#32 ibeacon
TechRadar#32 ibeaconFan Jiang
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 
Ultrabook Win8 Freedom Effortless Infographic
Ultrabook Win8 Freedom Effortless InfographicUltrabook Win8 Freedom Effortless Infographic
Ultrabook Win8 Freedom Effortless InfographicLiberteks
 
Rfid and the Mobile phone quiz
Rfid and the Mobile phone quizRfid and the Mobile phone quiz
Rfid and the Mobile phone quizTheodor Tolstoy
 

Tendances (19)

Lorex Security
Lorex SecurityLorex Security
Lorex Security
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based Company
 
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk
 
INFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingINFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile Computing
 
Convenient Security is not an Oxymoron
Convenient Security is not an OxymoronConvenient Security is not an Oxymoron
Convenient Security is not an Oxymoron
 
Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityCrash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and security
 
Amy mania - Put Words In My Mouth - DC2711 2019
Amy mania - Put Words In My Mouth - DC2711 2019Amy mania - Put Words In My Mouth - DC2711 2019
Amy mania - Put Words In My Mouth - DC2711 2019
 
Article Writing
Article WritingArticle Writing
Article Writing
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Ecom Ex-Handy 09 - ATEX Hazardous Area Mobile Phone
Ecom Ex-Handy 09 - ATEX Hazardous Area Mobile PhoneEcom Ex-Handy 09 - ATEX Hazardous Area Mobile Phone
Ecom Ex-Handy 09 - ATEX Hazardous Area Mobile Phone
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
 
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
 
TechRadar#32 ibeacon
TechRadar#32 ibeaconTechRadar#32 ibeacon
TechRadar#32 ibeacon
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
Avoiding a BYOD Blowup!
Avoiding a BYOD Blowup!Avoiding a BYOD Blowup!
Avoiding a BYOD Blowup!
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 
Ultrabook Win8 Freedom Effortless Infographic
Ultrabook Win8 Freedom Effortless InfographicUltrabook Win8 Freedom Effortless Infographic
Ultrabook Win8 Freedom Effortless Infographic
 
Rfid and the Mobile phone quiz
Rfid and the Mobile phone quizRfid and the Mobile phone quiz
Rfid and the Mobile phone quiz
 

Similaire à Earthmouse: Mobile Guardian

The Guardian Project
The Guardian ProjectThe Guardian Project
The Guardian Projectnatdefreitas
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaGarvit Arya
 
Android - A brief introduction
Android - A brief introductionAndroid - A brief introduction
Android - A brief introductionRoshan Gautam
 
Mobile CMS - CMSExpo 2010
Mobile CMS - CMSExpo 2010Mobile CMS - CMSExpo 2010
Mobile CMS - CMSExpo 2010Tom Deryckere
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosPriyanka Aash
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon Berlin
 
Android and android phones
Android and android phonesAndroid and android phones
Android and android phonesabie01523
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 

Similaire à Earthmouse: Mobile Guardian (20)

The Guardian Project
The Guardian ProjectThe Guardian Project
The Guardian Project
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
POWERPOINT2
POWERPOINT2POWERPOINT2
POWERPOINT2
 
Android
AndroidAndroid
Android
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
ANDROID.SREE
ANDROID.SREEANDROID.SREE
ANDROID.SREE
 
Anjali
AnjaliAnjali
Anjali
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
 
Android - A brief introduction
Android - A brief introductionAndroid - A brief introduction
Android - A brief introduction
 
Mobile CMS - CMSExpo 2010
Mobile CMS - CMSExpo 2010Mobile CMS - CMSExpo 2010
Mobile CMS - CMSExpo 2010
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 
Smart phone
Smart phoneSmart phone
Smart phone
 
Android and android phones
Android and android phonesAndroid and android phones
Android and android phones
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 

Dernier

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Dernier (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Earthmouse: Mobile Guardian

  • 1. Earthmouse: Mobile Guardian Secure, Open-Source Smartphone built on Google Android please visit http://earthmouse.org
  • 2. Android Earthmouse Phone Phone Anonymous Open source Encrypted modern Invisible powerful Obfuscated flexible Ubiquitous
  • 3. Windows Temporary Mobile Phone + Guardian SD Card = Guardian Phone Permanent Android Guardian = Phone + Guardian Firmware Phone Update
  • 4. HTC, Kogan, Lenova, Huawei, Motorola, LG, Samsung, Asus http://www.androidonhtc.com
  • 5. Guardian is Viral Guardian SD Card Guardian Phones can New Communities Phone be converted of Mice! through SD Card “Person to Person” contact
  • 7. A movement is already underway to create custom versions of Android for a wide variety of phones and purposes.... we just need to tap into that!
  • 8. Why Android? • Dominant open-source smartphone OS • Easy to convert commercially available handsets • Linux-based with modern development tools • Rich connectivity, location, and sensor features • Backed by Google’s resources and finances
  • 9. Android Features • Dalvik virtual machine optimized for mobile devices • Integrated browser based on the open source WebKit engine • SQLite for structured data storage • Media support for common audio, video, and still image formats (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF) • GSM Telephony (hardware dependent) • Bluetooth, EDGE, 3G, and WiFi (hardware dependent) • Camera, GPS, compass, and accelerometer (hardware dependent)
  • 10. The State of Mobile Crypto G
  • 11. Existing products show promise, but are out of date, not good enough or too expensive
  • 12. Existing Solutions • Providers: CryptoPhone, SecureGSM, NanoPhone Suite • Analog GSM solutions almost entirely for Windows Mobile Smartphones • Corporate focus, poor quality audio, out of date OS and very expensive • Products are not for covert use - they advertise their existence putting user at risk
  • 13. Popular Smartphones... iPhones and Blackberries are inherently compromised, closed-source and compromised by mobile carriers
  • 14. Early Efforts on Android Need Work! A password safe for Android that protects your passwords with AES encryption. All encrypted information is stored in a database on the phone. No information is kept online. The only way to backup currently is through the export feature. http://code.google.com/p/android-passwordsafe/
  • 16. a.e.i.o.u.’s of Guardian anonymous Able to be used without revealing the user encrypted All communication and data is secured and protected invisible Doesn’t reveal itself to be anything out of the ordinary obfuscated Hides itself within the noise and traffic of the network ubiquitous Widely available, easy to use, cheap and open-source
  • 17. User Requirements • Be hidden and invisible from • Offer “emergency” features the casual observer that are quick to active • Provide secure • Open-source and able to run communication without on cheap, common hardware complexity • Internationalized & Localized • Don’t incriminate the user or owner
  • 19. Android O.S. + Guardian Security Layer 1) Enhance existing & develop new secure applications 2) Wrap or replace Application Framework, while adding new libraries and core security services 3) ensure kernel, runtime and virtual machine are “snoop” proof 4) Secure or remove drivers to secure the hardware layer
  • 20. Build on Existing Projects • The Tor Project Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security • Psiphon psiphon is a human rights software project developed by the Citizen Lab at the Munk Centre for International Studies that allows citizens in uncensored countries to provide unfettered access to the Net through their home computers to friends and family members who live behind firewalls of states that censor. • Zfone ZfoneTM is a new secure VoIP phone software product which lets you make encrypted phone calls over the Internet. Zfone uses a new protocol called ZRTP, which has a better architecture than the other approaches to secure VoIP.
  • 21. Guardian Application Suite •Anonymous •Encrypted Data Browser Storage •Media+Location •Remote Poison Pill Reporting Tool •“911” Alert •Encrypted Email Mechanism •Secure Voice •Secure Data Auto- Communications Sync
  • 22. gReporter open-source, geotagging media capture report client http://openideals.com/greporter
  • 23. gReporter Records Records Audio, Transmits to Location Photo, Video Secure Server
  • 24. Walkie Talkie / Push to Talk
  • 25. Routing via Stenography authoritarian state Gmail YouTube “Safe” Amazon Service Skype Route encrypted data exchange through common services (Gmail, YouTube, Amazon, etc), as to not stand out
  • 26. Earthmouse: Mobile Guardian Secure, Open-Source Smartphone built on Google Android please visit http://earthmouse.org