4. HTC, Kogan, Lenova, Huawei,
Motorola, LG, Samsung, Asus
http://www.androidonhtc.com
5. Guardian is Viral
Guardian
G
SD Card
G G
G
G
Guardian
Phones can New Communities
Phone
be converted of Guardians
through SD Card
“Person to Person”
contact
7. A movement is already underway
to create custom versions of
Android for a wide variety of
phones and purposes.... we just
need to tap into that!
8. Why Android?
Dominant open-source smartphone OS
Easy to convert commercially available handsets
Linux-based with modern development tools
Rich connectivity, location, and sensor features
Backed by Google’s resources and finances
9. Android Features
Dalvik virtual machine optimized for mobile devices
Integrated browser based on the open source WebKit engine
SQLite for structured data storage
Media support for common audio, video, and still image formats
(MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF)
GSM Telephony (hardware dependent)
Bluetooth, EDGE, 3G, and WiFi (hardware dependent)
Camera, GPS, compass, and accelerometer (hardware dependent)
12. Existing Solutions
Providers: CryptoPhone,
SecureGSM, NanoPhone Suite
Analog GSM solutions almost
entirely for Windows Mobile
Smartphones
Corporate focus, poor quality
audio, out of date OS and very
expensive
Products are not for covert use
- they advertise their existence
putting user at risk
14. Early Efforts on Android Need Work!
A password safe for Android that protects your passwords with AES encryption. All encrypted
information is stored in a database on the phone. No information is kept online. The only way
to backup currently is through the export feature.
http://code.google.com/p/android-passwordsafe/
16. a.e.i.o.u.’s of Guardian
anonymous Able to be used without revealing the user
encrypted All communication and data is secured and protected
invisible Doesn’t reveal itself to be anything out of the ordinary
obfuscated Hides itself within the noise and traffic of the network
ubiquitous Widely available, easy to use, cheap and open-source
17. User Requirements
Be hidden and invisible Offer “emergency”
from the casual observer features that are quick to
active
Provide secure
communication without Open-source and able to
complexity run on cheap, common
hardware
Don’t incriminate the
user or owner Internationalized &
Localized
19. Android O.S. + Guardian Security Layer
1) Enhance existing & develop new secure applications
2) Wrap or replace Application
Framework, while adding new libraries
and core security services
3) ensure kernel, runtime and
virtual machine are “snoop” proof
4) Secure or remove drivers to secure the hardware layer
20. Build on Existing Projects
The Tor Project
Tor is a software project that helps you defend against traffic
analysis, a form of network surveillance that threatens personal
freedom and privacy, confidential business activities and
relationships, and state security
Psiphon
psiphon is a human rights software project developed by the Citizen
Lab at the Munk Centre for International Studies that allows citizens in
uncensored countries to provide unfettered access to the Net through
their home computers to friends and family members who live behind
firewalls of states that censor.
Zfone
ZfoneTM is a new secure VoIP phone software product which lets you
make encrypted phone calls over the Internet. Zfone uses a new
protocol called ZRTP, which has a better architecture than the other
approaches to secure VoIP.
21. Guardian Application Suite
Anonymous Encrypted Data
Browser Storage
Media+Location Remote Poison Pill
Reporting Tool
“911” Alert
Encrypted Email Mechanism
Secure Voice Secure Data Auto-
Communications Sync
22. gReporter
open-source, geotagging
media capture report client
http://openideals.com/greporter
G
23. gReporter
Records Records Audio, Transmits to
Location Photo, Video Secure Server
25. Routing via Stenography
authoritarian state
Gmail
YouTube “Safe”
G Organization
Amazon
Skype
Route encrypted data exchange through common services
(Gmail, YouTube, Amazon, etc), as to not stand out
27. Community
Launch an official, public project in order to recruit
open-source developers, supporters and potential
users and funders
Recruit the top open-source Android kernel hackers,
app developers
Find pilot project partners to test and validate
technology in the field
Create a strong brand around the project, like
TorProject.org has
28. Funding / Model
Work with existing projects (Tor, Psiphon) to extend
their funding and focus to support Android
Apply for new grants through existing “tech activist”
funding organizations
Create a business model for selling pre-configured or
customized firmwares and telephones to consumers
and larger organizations