SlideShare a Scribd company logo
1 of 26
Download to read offline
Earthmouse: Mobile Guardian
Secure, Open-Source
Smartphone built on Google Android




                   please visit http://earthmouse.org
Android     Earthmouse
  Phone         Phone




              Anonymous
Open source
              Encrypted
  modern
              Invisible
 powerful
              Obfuscated
  flexible
              Ubiquitous
Windows                      Temporary
 Mobile
 Phone    +   Guardian
              SD Card    =    Guardian
                               Phone




                             Permanent
Android
                              Guardian
                         =
Phone
          +
              Guardian
              Firmware         Phone
               Update
HTC, Kogan, Lenova, Huawei,
Motorola, LG, Samsung, Asus




http://www.androidonhtc.com
Guardian is Viral



           Guardian
           SD Card




Guardian                  Phones can       New Communities
 Phone                   be converted          of Mice!
                       through SD Card
                      “Person to Person”
                            contact
Google Android




                 G
A movement is already underway
to create custom versions of
Android for a wide variety of
phones and purposes.... we just
need to tap into that!
Why Android?


 • Dominant open-source smartphone OS


 • Easy to convert commercially available handsets


 • Linux-based with modern development tools


 • Rich connectivity, location, and sensor features


 • Backed by Google’s resources and finances
Android Features


 • Dalvik virtual machine optimized for mobile devices
 • Integrated browser based on the open source WebKit engine
 • SQLite for structured data storage
 • Media support for common audio, video, and still image formats
   (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF)
 • GSM Telephony (hardware dependent)
 • Bluetooth, EDGE, 3G, and WiFi (hardware dependent)
 • Camera, GPS, compass, and accelerometer (hardware
   dependent)
The State of Mobile Crypto




                             G
Existing products show promise, but are out of
date, not good enough or too expensive
Existing Solutions


• Providers: CryptoPhone, SecureGSM,
  NanoPhone Suite


• Analog GSM solutions almost entirely
  for Windows Mobile Smartphones


• Corporate focus, poor quality audio,
  out of date OS and very expensive


• Products are not for covert use - they
  advertise their existence putting user
  at risk
Popular Smartphones...

iPhones and Blackberries are inherently compromised,
  closed-source and compromised by mobile carriers
Early Efforts on Android Need Work!




 A password safe for Android that protects your passwords with AES encryption. All encrypted
 information is stored in a database on the phone. No information is kept online. The only way
 to backup currently is through the export feature.


http://code.google.com/p/android-passwordsafe/
Designing a Guardian




                       G
a.e.i.o.u.’s of Guardian

anonymous           Able to be used without revealing the user


encrypted      All communication and data is secured and protected


invisible       Doesn’t reveal itself to be anything out of the ordinary


obfuscated      Hides itself within the noise and traffic of the network


ubiquitous     Widely available, easy to use, cheap and open-source
User Requirements

 • Be hidden and invisible from    • Offer “emergency” features
   the casual observer               that are quick to active

 • Provide secure                  • Open-source and able to run
   communication without             on cheap, common hardware
   complexity
                                   • Internationalized & Localized
 • Don’t incriminate the user or
   owner
The Android Operating System
Android O.S. + Guardian Security Layer

         1) Enhance existing & develop new secure applications




2) Wrap or replace Application
Framework, while adding new libraries
and core security services




                                        3) ensure kernel, runtime and
                                        virtual machine are “snoop” proof




        4) Secure or remove drivers to secure the hardware layer
Build on Existing Projects
• The Tor Project
  Tor is a software project that helps you defend against traffic
  analysis, a form of network surveillance that threatens
  personal freedom and privacy, confidential business activities
  and relationships, and state security



• Psiphon
 psiphon is a human rights software project developed by the Citizen
 Lab at the Munk Centre for International Studies that allows citizens
 in uncensored countries to provide unfettered access to the Net
 through their home computers to friends and family members who
 live behind firewalls of states that censor.


• Zfone
 ZfoneTM is a new secure VoIP phone software product which lets
 you make encrypted phone calls over the Internet. Zfone uses a new
 protocol called ZRTP, which has a better architecture than the other
 approaches to secure VoIP.
Guardian Application Suite

•Anonymous               •Encrypted Data
 Browser                  Storage

•Media+Location          •Remote Poison Pill
 Reporting Tool
                         •“911” Alert
•Encrypted Email          Mechanism

•Secure Voice            •Secure Data Auto-
 Communications           Sync
gReporter

            open-source, geotagging
            media capture report client
            http://openideals.com/greporter
gReporter




  Records    Records Audio,    Transmits to
  Location    Photo, Video    Secure Server
Walkie Talkie / Push to Talk
Routing via Stenography

authoritarian state
                           Gmail
                          YouTube            “Safe”
                          Amazon             Service

                           Skype



 Route encrypted data exchange through common services
    (Gmail, YouTube, Amazon, etc), as to not stand out
Earthmouse: Mobile Guardian
Secure, Open-Source
Smartphone built on Google Android




                   please visit http://earthmouse.org

More Related Content

What's hot

Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz
 
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talkJames Atkinson
 
INFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingINFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingJaymie Murray
 
Convenient Security is not an Oxymoron
Convenient Security is not an OxymoronConvenient Security is not an Oxymoron
Convenient Security is not an OxymoronAleksei Goldbergs
 
Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityCrash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityArturo Filastò
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011EASTWEST Public Relations
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?IoT Academy
 
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011Andris Soroka
 
TechRadar#32 ibeacon
TechRadar#32 ibeaconTechRadar#32 ibeacon
TechRadar#32 ibeaconFan Jiang
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Dejan Pogačnik
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 
Ultrabook Win8 Freedom Effortless Infographic
Ultrabook Win8 Freedom Effortless InfographicUltrabook Win8 Freedom Effortless Infographic
Ultrabook Win8 Freedom Effortless InfographicLiberteks
 
Rfid and the Mobile phone quiz
Rfid and the Mobile phone quizRfid and the Mobile phone quiz
Rfid and the Mobile phone quizTheodor Tolstoy
 

What's hot (19)

Lorex Security
Lorex SecurityLorex Security
Lorex Security
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based Company
 
2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk2009 05 18 sdp bbn talk
2009 05 18 sdp bbn talk
 
INFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingINFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile Computing
 
Convenient Security is not an Oxymoron
Convenient Security is not an OxymoronConvenient Security is not an Oxymoron
Convenient Security is not an Oxymoron
 
Crash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and securityCrash course of Mobile (SS7) privacy and security
Crash course of Mobile (SS7) privacy and security
 
Amy mania - Put Words In My Mouth - DC2711 2019
Amy mania - Put Words In My Mouth - DC2711 2019Amy mania - Put Words In My Mouth - DC2711 2019
Amy mania - Put Words In My Mouth - DC2711 2019
 
Article Writing
Article WritingArticle Writing
Article Writing
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Ecom Ex-Handy 09 - ATEX Hazardous Area Mobile Phone
Ecom Ex-Handy 09 - ATEX Hazardous Area Mobile PhoneEcom Ex-Handy 09 - ATEX Hazardous Area Mobile Phone
Ecom Ex-Handy 09 - ATEX Hazardous Area Mobile Phone
 
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
Mark de Groot - Meetup: Help Mijn IoT-device wordt gehackt?
 
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011DSS - ITSEC Conference - Cellcrypt - Making secure voice calls  - Riga Nov2011
DSS - ITSEC Conference - Cellcrypt - Making secure voice calls - Riga Nov2011
 
TechRadar#32 ibeacon
TechRadar#32 ibeaconTechRadar#32 ibeacon
TechRadar#32 ibeacon
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015Kaspersky Internet Security Multi-Device 2015
Kaspersky Internet Security Multi-Device 2015
 
Avoiding a BYOD Blowup!
Avoiding a BYOD Blowup!Avoiding a BYOD Blowup!
Avoiding a BYOD Blowup!
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 
Ultrabook Win8 Freedom Effortless Infographic
Ultrabook Win8 Freedom Effortless InfographicUltrabook Win8 Freedom Effortless Infographic
Ultrabook Win8 Freedom Effortless Infographic
 
Rfid and the Mobile phone quiz
Rfid and the Mobile phone quizRfid and the Mobile phone quiz
Rfid and the Mobile phone quiz
 

Similar to Earthmouse: Mobile Guardian

The Guardian Project
The Guardian ProjectThe Guardian Project
The Guardian Projectnatdefreitas
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devicesjraja01
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaGarvit Arya
 
Android - A brief introduction
Android - A brief introductionAndroid - A brief introduction
Android - A brief introductionRoshan Gautam
 
Mobile CMS - CMSExpo 2010
Mobile CMS - CMSExpo 2010Mobile CMS - CMSExpo 2010
Mobile CMS - CMSExpo 2010Tom Deryckere
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosPriyanka Aash
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon Berlin
 
Android and android phones
Android and android phonesAndroid and android phones
Android and android phonesabie01523
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyMichael Davis
 

Similar to Earthmouse: Mobile Guardian (20)

The Guardian Project
The Guardian ProjectThe Guardian Project
The Guardian Project
 
Securing hand held computing devices
Securing hand held computing devicesSecuring hand held computing devices
Securing hand held computing devices
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
POWERPOINT2
POWERPOINT2POWERPOINT2
POWERPOINT2
 
Android
AndroidAndroid
Android
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
ANDROID SECURITY
ANDROID SECURITYANDROID SECURITY
ANDROID SECURITY
 
ANDROID.SREE
ANDROID.SREEANDROID.SREE
ANDROID.SREE
 
Anjali
AnjaliAnjali
Anjali
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
 
Android - A brief introduction
Android - A brief introductionAndroid - A brief introduction
Android - A brief introduction
 
Mobile CMS - CMSExpo 2010
Mobile CMS - CMSExpo 2010Mobile CMS - CMSExpo 2010
Mobile CMS - CMSExpo 2010
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Defcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddosDefcon 22-weston-hecker-burner-phone-ddos
Defcon 22-weston-hecker-burner-phone-ddos
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 
Smart phone
Smart phoneSmart phone
Smart phone
 
Android and android phones
Android and android phonesAndroid and android phones
Android and android phones
 
ISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and PrivacyISACA CACS 2012 - Mobile Device Security and Privacy
ISACA CACS 2012 - Mobile Device Security and Privacy
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Earthmouse: Mobile Guardian

  • 1. Earthmouse: Mobile Guardian Secure, Open-Source Smartphone built on Google Android please visit http://earthmouse.org
  • 2. Android Earthmouse Phone Phone Anonymous Open source Encrypted modern Invisible powerful Obfuscated flexible Ubiquitous
  • 3. Windows Temporary Mobile Phone + Guardian SD Card = Guardian Phone Permanent Android Guardian = Phone + Guardian Firmware Phone Update
  • 4. HTC, Kogan, Lenova, Huawei, Motorola, LG, Samsung, Asus http://www.androidonhtc.com
  • 5. Guardian is Viral Guardian SD Card Guardian Phones can New Communities Phone be converted of Mice! through SD Card “Person to Person” contact
  • 7. A movement is already underway to create custom versions of Android for a wide variety of phones and purposes.... we just need to tap into that!
  • 8. Why Android? • Dominant open-source smartphone OS • Easy to convert commercially available handsets • Linux-based with modern development tools • Rich connectivity, location, and sensor features • Backed by Google’s resources and finances
  • 9. Android Features • Dalvik virtual machine optimized for mobile devices • Integrated browser based on the open source WebKit engine • SQLite for structured data storage • Media support for common audio, video, and still image formats (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF) • GSM Telephony (hardware dependent) • Bluetooth, EDGE, 3G, and WiFi (hardware dependent) • Camera, GPS, compass, and accelerometer (hardware dependent)
  • 10. The State of Mobile Crypto G
  • 11. Existing products show promise, but are out of date, not good enough or too expensive
  • 12. Existing Solutions • Providers: CryptoPhone, SecureGSM, NanoPhone Suite • Analog GSM solutions almost entirely for Windows Mobile Smartphones • Corporate focus, poor quality audio, out of date OS and very expensive • Products are not for covert use - they advertise their existence putting user at risk
  • 13. Popular Smartphones... iPhones and Blackberries are inherently compromised, closed-source and compromised by mobile carriers
  • 14. Early Efforts on Android Need Work! A password safe for Android that protects your passwords with AES encryption. All encrypted information is stored in a database on the phone. No information is kept online. The only way to backup currently is through the export feature. http://code.google.com/p/android-passwordsafe/
  • 16. a.e.i.o.u.’s of Guardian anonymous Able to be used without revealing the user encrypted All communication and data is secured and protected invisible Doesn’t reveal itself to be anything out of the ordinary obfuscated Hides itself within the noise and traffic of the network ubiquitous Widely available, easy to use, cheap and open-source
  • 17. User Requirements • Be hidden and invisible from • Offer “emergency” features the casual observer that are quick to active • Provide secure • Open-source and able to run communication without on cheap, common hardware complexity • Internationalized & Localized • Don’t incriminate the user or owner
  • 19. Android O.S. + Guardian Security Layer 1) Enhance existing & develop new secure applications 2) Wrap or replace Application Framework, while adding new libraries and core security services 3) ensure kernel, runtime and virtual machine are “snoop” proof 4) Secure or remove drivers to secure the hardware layer
  • 20. Build on Existing Projects • The Tor Project Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security • Psiphon psiphon is a human rights software project developed by the Citizen Lab at the Munk Centre for International Studies that allows citizens in uncensored countries to provide unfettered access to the Net through their home computers to friends and family members who live behind firewalls of states that censor. • Zfone ZfoneTM is a new secure VoIP phone software product which lets you make encrypted phone calls over the Internet. Zfone uses a new protocol called ZRTP, which has a better architecture than the other approaches to secure VoIP.
  • 21. Guardian Application Suite •Anonymous •Encrypted Data Browser Storage •Media+Location •Remote Poison Pill Reporting Tool •“911” Alert •Encrypted Email Mechanism •Secure Voice •Secure Data Auto- Communications Sync
  • 22. gReporter open-source, geotagging media capture report client http://openideals.com/greporter
  • 23. gReporter Records Records Audio, Transmits to Location Photo, Video Secure Server
  • 24. Walkie Talkie / Push to Talk
  • 25. Routing via Stenography authoritarian state Gmail YouTube “Safe” Amazon Service Skype Route encrypted data exchange through common services (Gmail, YouTube, Amazon, etc), as to not stand out
  • 26. Earthmouse: Mobile Guardian Secure, Open-Source Smartphone built on Google Android please visit http://earthmouse.org