SlideShare a Scribd company logo
1 of 30
Download to read offline
Guardian:
G   Secure, Open-Source
    Smartphone built on
    Google Android
Guardian
  Android
                Phone
  Phone




                 G
              anonymous
Open source
              encrypted
  modern
              invisible
 powerful
              obfuscated
  flexible
              ubiquitous
Windows                      Temporary

                         =
 Mobile                       Guardian
          +   Guardian
 Phone                         Phone
              SD Card




                             Permanent
Android
                              Guardian
                         =
Phone
                               Phone
          +
              Guardian
              Firmware
               Update
HTC, Kogan, Lenova, Huawei,
Motorola, LG, Samsung, Asus




http://www.androidonhtc.com
Guardian is Viral


           Guardian
                                                     G
           SD Card



   G                                                     G
                                             G
                                                 G

Guardian
                          Phones can       New Communities
 Phone
                         be converted        of Guardians
                       through SD Card
                      “Person to Person”
                            contact
Google Android



                 G
A movement is already underway
to create custom versions of
Android for a wide variety of
phones and purposes.... we just
need to tap into that!
Why Android?

Dominant open-source smartphone OS
Easy to convert commercially available handsets
Linux-based with modern development tools
Rich connectivity, location, and sensor features
Backed by Google’s resources and finances
Android Features

 Dalvik virtual machine optimized for mobile devices
 Integrated browser based on the open source WebKit engine
 SQLite for structured data storage
 Media support for common audio, video, and still image formats
 (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF)
 GSM Telephony (hardware dependent)
 Bluetooth, EDGE, 3G, and WiFi (hardware dependent)
 Camera, GPS, compass, and accelerometer (hardware dependent)
The State of Mobile Crypto



                             G
Existing products show
promise, but are out of
date, not good enough or
too expensive
Existing Solutions
Providers: CryptoPhone,
SecureGSM, NanoPhone Suite

Analog GSM solutions almost
entirely for Windows Mobile
Smartphones

Corporate focus, poor quality
audio, out of date OS and very
expensive

Products are not for covert use
- they advertise their existence
putting user at risk
Popular Smartphones...
iPhones and Blackberries are inherently compromised,
  closed-source and compromised by mobile carriers
Early Efforts on Android Need Work!




 A password safe for Android that protects your passwords with AES encryption. All encrypted
 information is stored in a database on the phone. No information is kept online. The only way
 to backup currently is through the export feature.


http://code.google.com/p/android-passwordsafe/
Creating Guardian



                    G
a.e.i.o.u.’s of Guardian
anonymous        Able to be used without revealing the user


encrypted    All communication and data is secured and protected


invisible    Doesn’t reveal itself to be anything out of the ordinary


obfuscated   Hides itself within the noise and traffic of the network


ubiquitous   Widely available, easy to use, cheap and open-source
User Requirements
Be hidden and invisible    Offer “emergency”
from the casual observer   features that are quick to
                           active
Provide secure
communication without      Open-source and able to
complexity                 run on cheap, common
                           hardware
Don’t incriminate the
user or owner              Internationalized &
                           Localized
The Android Operating System
Android O.S. + Guardian Security Layer

         1) Enhance existing & develop new secure applications




2) Wrap or replace Application
Framework, while adding new libraries
and core security services




                                        3) ensure kernel, runtime and
                                        virtual machine are “snoop” proof




        4) Secure or remove drivers to secure the hardware layer
Build on Existing Projects
The Tor Project
Tor is a software project that helps you defend against traffic
analysis, a form of network surveillance that threatens personal
freedom and privacy, confidential business activities and
relationships, and state security


Psiphon
psiphon is a human rights software project developed by the Citizen
Lab at the Munk Centre for International Studies that allows citizens in
uncensored countries to provide unfettered access to the Net through
their home computers to friends and family members who live behind
firewalls of states that censor.

Zfone
ZfoneTM is a new secure VoIP phone software product which lets you
make encrypted phone calls over the Internet. Zfone uses a new
protocol called ZRTP, which has a better architecture than the other
approaches to secure VoIP.
Guardian Application Suite
 Anonymous         Encrypted Data
 Browser           Storage
 Media+Location    Remote Poison Pill
 Reporting Tool
                   “911” Alert
 Encrypted Email   Mechanism
 Secure Voice      Secure Data Auto-
 Communications    Sync
gReporter

            open-source, geotagging
            media capture report client
            http://openideals.com/greporter




                                              G
gReporter




 Records    Records Audio,    Transmits to
 Location    Photo, Video    Secure Server
Walkie Talkie Push to Talk
Routing via Stenography
authoritarian state
                           Gmail
                          YouTube             “Safe”
        G                                  Organization
                          Amazon
                           Skype



 Route encrypted data exchange through common services
    (Gmail, YouTube, Amazon, etc), as to not stand out
What is Needed



                 G
Community
 Launch an official, public project in order to recruit
 open-source developers, supporters and potential
 users and funders
 Recruit the top open-source Android kernel hackers,
 app developers
 Find pilot project partners to test and validate
 technology in the field
 Create a strong brand around the project, like
 TorProject.org has
Funding / Model

Work with existing projects (Tor, Psiphon) to extend
their funding and focus to support Android
Apply for new grants through existing “tech activist”
funding organizations
Create a business model for selling pre-configured or
customized firmwares and telephones to consumers
and larger organizations
Guardian
Nathanial Freitas
nathan@freitas.net
                                 G
@natdefreitas
skype: nathanialfreitas

http://openideals.com/guardian
a project of
Students for a Free Tibet
http://studentsforafreetibet.org




                                   G

More Related Content

What's hot

Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryKyle Conklin
 
Holoptica Group Presentation
Holoptica Group PresentationHoloptica Group Presentation
Holoptica Group PresentationGeorge Perkous
 
Brightbox infographic Key paradigms
Brightbox infographic Key paradigmsBrightbox infographic Key paradigms
Brightbox infographic Key paradigmsJoel Martin
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesBabu Kumar
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali OWASP Delhi
 
Contactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyContactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyMerchant360, Inc.
 
The LifeSize Advantage
The LifeSize AdvantageThe LifeSize Advantage
The LifeSize Advantagehtmarket1ng
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7Chin Wan Lim
 
Android HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFCAndroid HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFCNFC Forum
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFIDDevnology
 
Making rfid available to all, the tego way
Making rfid available to all, the tego wayMaking rfid available to all, the tego way
Making rfid available to all, the tego wayBock Mary
 
PKNSP Objetos Conectados
PKNSP Objetos ConectadosPKNSP Objetos Conectados
PKNSP Objetos ConectadosDaniel Dias
 
Near field communication
Near field communicationNear field communication
Near field communicationNishank Magoo
 

What's hot (20)

Trade Secrets in the Video Game Industry
Trade Secrets in the Video Game IndustryTrade Secrets in the Video Game Industry
Trade Secrets in the Video Game Industry
 
Holoptica Group Presentation
Holoptica Group PresentationHoloptica Group Presentation
Holoptica Group Presentation
 
Brightbox infographic Key paradigms
Brightbox infographic Key paradigmsBrightbox infographic Key paradigms
Brightbox infographic Key paradigms
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slides
 
DNA_NEW
DNA_NEWDNA_NEW
DNA_NEW
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 
Contactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile LoyaltyContactless NFC Tags For Mobile Loyalty
Contactless NFC Tags For Mobile Loyalty
 
Disha Tek Corporation, New Delhi, MAGIC-SS
Disha Tek Corporation, New Delhi, MAGIC-SSDisha Tek Corporation, New Delhi, MAGIC-SS
Disha Tek Corporation, New Delhi, MAGIC-SS
 
The LifeSize Advantage
The LifeSize AdvantageThe LifeSize Advantage
The LifeSize Advantage
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
Android HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFCAndroid HCE: An intro into the world of NFC
Android HCE: An intro into the world of NFC
 
Fido and Touch ID
Fido and Touch IDFido and Touch ID
Fido and Touch ID
 
NFC wallet
NFC walletNFC wallet
NFC wallet
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFID
 
Making rfid available to all, the tego way
Making rfid available to all, the tego wayMaking rfid available to all, the tego way
Making rfid available to all, the tego way
 
10.1.1.70.1834
10.1.1.70.183410.1.1.70.1834
10.1.1.70.1834
 
PKNSP Objetos Conectados
PKNSP Objetos ConectadosPKNSP Objetos Conectados
PKNSP Objetos Conectados
 
Near field communication
Near field communicationNear field communication
Near field communication
 

Similar to The Guardian Project

Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardianearthmouse
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon Berlin
 
Google Glass
Google GlassGoogle Glass
Google Glassshiva0529
 
Android os
Android osAndroid os
Android osManasa \
 
Android and android phones
Android and android phonesAndroid and android phones
Android and android phonesabie01523
 
Android operating system
Android operating systemAndroid operating system
Android operating systemVinayaga Sundar
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
Android and Android phones
Android and Android phonesAndroid and Android phones
Android and Android phonesdayango
 
Android - A brief introduction
Android - A brief introductionAndroid - A brief introduction
Android - A brief introductionRoshan Gautam
 
Android development
Android developmentAndroid development
Android developmentAsif Larra
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaGarvit Arya
 
Android, iPhone and application development
Android, iPhone and application developmentAndroid, iPhone and application development
Android, iPhone and application developmentKieran Gutteridge
 

Similar to The Guardian Project (20)

Earthmouse: Mobile Guardian
Earthmouse: Mobile GuardianEarthmouse: Mobile Guardian
Earthmouse: Mobile Guardian
 
Droidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhoferDroidcon2013 key2 share_dmitrienko_fraunhofer
Droidcon2013 key2 share_dmitrienko_fraunhofer
 
POWERPOINT2
POWERPOINT2POWERPOINT2
POWERPOINT2
 
Google Glass
Google GlassGoogle Glass
Google Glass
 
Android os
Android osAndroid os
Android os
 
Android viswapriya viswa 1
Android viswapriya viswa 1Android viswapriya viswa 1
Android viswapriya viswa 1
 
Android and android phones
Android and android phonesAndroid and android phones
Android and android phones
 
Android operating system
Android operating systemAndroid operating system
Android operating system
 
ANDROID.SREE
ANDROID.SREEANDROID.SREE
ANDROID.SREE
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
Android and Android phones
Android and Android phonesAndroid and Android phones
Android and Android phones
 
Android
AndroidAndroid
Android
 
Android - A brief introduction
Android - A brief introductionAndroid - A brief introduction
Android - A brief introduction
 
Android
AndroidAndroid
Android
 
Android ppt
 Android ppt Android ppt
Android ppt
 
Android 1
Android 1 Android 1
Android 1
 
Google glass final
Google glass finalGoogle glass final
Google glass final
 
Android development
Android developmentAndroid development
Android development
 
Mobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit AryaMobile Malwares Analysis - Garvit Arya
Mobile Malwares Analysis - Garvit Arya
 
Android, iPhone and application development
Android, iPhone and application developmentAndroid, iPhone and application development
Android, iPhone and application development
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

The Guardian Project

  • 1. Guardian: G Secure, Open-Source Smartphone built on Google Android
  • 2. Guardian Android Phone Phone G anonymous Open source encrypted modern invisible powerful obfuscated flexible ubiquitous
  • 3. Windows Temporary = Mobile Guardian + Guardian Phone Phone SD Card Permanent Android Guardian = Phone Phone + Guardian Firmware Update
  • 4. HTC, Kogan, Lenova, Huawei, Motorola, LG, Samsung, Asus http://www.androidonhtc.com
  • 5. Guardian is Viral Guardian G SD Card G G G G Guardian Phones can New Communities Phone be converted of Guardians through SD Card “Person to Person” contact
  • 7. A movement is already underway to create custom versions of Android for a wide variety of phones and purposes.... we just need to tap into that!
  • 8. Why Android? Dominant open-source smartphone OS Easy to convert commercially available handsets Linux-based with modern development tools Rich connectivity, location, and sensor features Backed by Google’s resources and finances
  • 9. Android Features Dalvik virtual machine optimized for mobile devices Integrated browser based on the open source WebKit engine SQLite for structured data storage Media support for common audio, video, and still image formats (MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, GIF) GSM Telephony (hardware dependent) Bluetooth, EDGE, 3G, and WiFi (hardware dependent) Camera, GPS, compass, and accelerometer (hardware dependent)
  • 10. The State of Mobile Crypto G
  • 11. Existing products show promise, but are out of date, not good enough or too expensive
  • 12. Existing Solutions Providers: CryptoPhone, SecureGSM, NanoPhone Suite Analog GSM solutions almost entirely for Windows Mobile Smartphones Corporate focus, poor quality audio, out of date OS and very expensive Products are not for covert use - they advertise their existence putting user at risk
  • 13. Popular Smartphones... iPhones and Blackberries are inherently compromised, closed-source and compromised by mobile carriers
  • 14. Early Efforts on Android Need Work! A password safe for Android that protects your passwords with AES encryption. All encrypted information is stored in a database on the phone. No information is kept online. The only way to backup currently is through the export feature. http://code.google.com/p/android-passwordsafe/
  • 16. a.e.i.o.u.’s of Guardian anonymous Able to be used without revealing the user encrypted All communication and data is secured and protected invisible Doesn’t reveal itself to be anything out of the ordinary obfuscated Hides itself within the noise and traffic of the network ubiquitous Widely available, easy to use, cheap and open-source
  • 17. User Requirements Be hidden and invisible Offer “emergency” from the casual observer features that are quick to active Provide secure communication without Open-source and able to complexity run on cheap, common hardware Don’t incriminate the user or owner Internationalized & Localized
  • 19. Android O.S. + Guardian Security Layer 1) Enhance existing & develop new secure applications 2) Wrap or replace Application Framework, while adding new libraries and core security services 3) ensure kernel, runtime and virtual machine are “snoop” proof 4) Secure or remove drivers to secure the hardware layer
  • 20. Build on Existing Projects The Tor Project Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security Psiphon psiphon is a human rights software project developed by the Citizen Lab at the Munk Centre for International Studies that allows citizens in uncensored countries to provide unfettered access to the Net through their home computers to friends and family members who live behind firewalls of states that censor. Zfone ZfoneTM is a new secure VoIP phone software product which lets you make encrypted phone calls over the Internet. Zfone uses a new protocol called ZRTP, which has a better architecture than the other approaches to secure VoIP.
  • 21. Guardian Application Suite Anonymous Encrypted Data Browser Storage Media+Location Remote Poison Pill Reporting Tool “911” Alert Encrypted Email Mechanism Secure Voice Secure Data Auto- Communications Sync
  • 22. gReporter open-source, geotagging media capture report client http://openideals.com/greporter G
  • 23. gReporter Records Records Audio, Transmits to Location Photo, Video Secure Server
  • 25. Routing via Stenography authoritarian state Gmail YouTube “Safe” G Organization Amazon Skype Route encrypted data exchange through common services (Gmail, YouTube, Amazon, etc), as to not stand out
  • 27. Community Launch an official, public project in order to recruit open-source developers, supporters and potential users and funders Recruit the top open-source Android kernel hackers, app developers Find pilot project partners to test and validate technology in the field Create a strong brand around the project, like TorProject.org has
  • 28. Funding / Model Work with existing projects (Tor, Psiphon) to extend their funding and focus to support Android Apply for new grants through existing “tech activist” funding organizations Create a business model for selling pre-configured or customized firmwares and telephones to consumers and larger organizations
  • 29. Guardian Nathanial Freitas nathan@freitas.net G @natdefreitas skype: nathanialfreitas http://openideals.com/guardian
  • 30. a project of Students for a Free Tibet http://studentsforafreetibet.org G