Surreptitious Sharing on Android
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Puddletag 1.0.5
FOSSPICKS Sparkling gems and new releases from the world of FOSSpicks Free and Open Source Software Mike Saunders has spent a decade mining the internet for free software treasures. Here’s the result of his latest haul… Sound file tag editor Puddletag 1.0.5 e love discovering need Mutagen – this is the library programs that that handles the low-level Wostensibly perform operations of adding tags to music mundane tasks, but have so many files. On Ubuntu and Debian-based features and options that they distros, you can get all of the actually become rather cool. dependencies via the python-qt4, Puddletag is one such example: it’s python-pyparsing, python- a music file tag editor. Riveting, mutagen and python-configobj right? But when you start exploring packages. Then extract the the interface and discover some of puddletag-1.0.5.tar.gz file, go into the complexity behind it, you the resulting directory, and run actually start to admire it. And if you ./puddletag. manage a large music collection, you might find that you can’t live I, spreadsheet without it. Sure, most graphical The first thing you’ll notice is the music players on Linux include unusual interface: Puddletag looks Puddletag can work with ID3v1, ID3v2 (MP3), MP4, some kind of tag editing facility, but somewhat like a spreadsheet. This VorbisComments (Ogg and FLAC) and Musepack (mpc) tags. Puddletag is industrial strength. actually turns out to be a very good It’s written in Python (2) and uses design when you’re working on lots click on the F button in the toolbar, Qt 4 for the interface, so its main of files. -
An Architecture for Cryptography with Smart Cards and NFC Rings on Android
OpenKeychain: An Architecture for Cryptography with Smart Cards and NFC Rings on Android DOMINIK SCHÜRMANN, TU Braunschweig, Germany SERGEJ DECHAND, University of Bonn, Germany LARS WOLF, TU Braunschweig, Germany While many Android apps provide end-to-end encryption, the cryptographic keys are still stored on the device itself and can thus be stolen by exploiting vulnerabilities. External cryptographic hardware solves this issue, but is currently only used for two-factor authentication and not for communication encryption. In this paper, we design, implement, and evaluate an architecture for NFC-based cryptography on Android. Our high-level API provides cryptographic operations without requiring knowledge of public-key cryptography. By developing OpenKeychain, we were able to roll out this architecture for more than 100,000 users. It provides encryption for emails, messaging, and a password manager. We provide a threat model, NFC performance measurements, and discuss their impact on our architecture design. As an alternative form factor to smart cards, we created the prototype of an NFC signet ring. To evaluate the UI components and form factors, a lab study with 40 participants at a large company has been conducted. We measured the time required by the participants to set up the system and reply to encrypted emails. These measurements and a subsequent interview indicate that our NFC-based solutions are more user friendly in comparison to traditional password-protected keys. CCS Concepts: • Security and privacy → Usability in security and privacy; Key management; Hardware-based security protocols; • Human-centered computing → Mobile devices; Additional Key Words and Phrases: NFC, near-field communication, smart card, ring ACM Reference Format: Dominik Schürmann, Sergej Dechand, and Lars Wolf. -
A Study of Email Encryption on Android OS
International Journal of Information Engineering and Applications 2018; 1(2): 67-70 http://www.aascit.org/journal/information A Study of Email Encryption on Android OS Ghasaq Bahaa Abdulhussein Department of Computer Network Engineering, Faulty of Art Science &Technology, University of Northampton, Northampton, UK Email address Citation Ghasaq Bahaa Abdulhussein. A Study of Email Encryption on Android OS. International Journal of Information Engineering and Applications. Vol. 1, No. 2, 2018, pp. 67-70. Received : January 27, 2018; Accepted : February 18, 2018; Published : March 23, 2018 Abstract: In the past, mobile devices are used for making/receiving calls and SMS. Smartphones become the most common and typical mobile devices in recent years. They merge the PDA (personal digital assistant) with the functionality of mobile phone. Moreover, they are provided many functionality of the computers, such as processing, communication, data storage and etc. Also, they provide many services that the computers make them available, for example web browser, video call, GPS, Wi- Fi, different social media application and etc. Recently, email is one of many relevant communication services that accessed commonly using smartphones. One of most popular operating systems in smartphones that using it, is android. In this paper, email encryption on android is present using Asymmetric key for files, emails, and texts to encrypt/ decrypt, sign email/file, and verify. Both OpenKeychain and Samsung email is used in this paper to simulate the use of PGP on android. This paper proposed the use of asymmetric in the same mobile application which is compatible with all OS platforms software. Keywords: Mobile Security, Android, Security, Email, Encryption, Public Key 1. -
Nutzung Von Openpgp Auf Android
Nutzung von OpenPGP auf Android Eine Anforderungsanalyse und Studie vorhandener OpenPGP- Implementierungen Autoren Vincent Breitmoser OpenKeychain Dominik Schürmann Institut für Betriebssysteme und Rechnerverbund, TU Braunschweig OpenKeychain Unter Mitwirkung von: Bernhard Reiter Emanuel Schütze Intevation GmbH Neuer Graben 17 49074 Osnabrück https://intevation.de Werner Koch g10 code GmbH Hüttenstr. 61 40699 Erkrath https://g10code.com Dieses Werk ist unter der Lizenz „Creative Commons Namensnennung-Weitergabe unter gleichen Bedingungen Deutschland“ in Version 3.0 (abgekürzt „CC-by-sa 3.0/de“) veröffentlicht. Den rechtsverbindlichen Lizenzvertrag finden Sie unter http://creativecommons.org/licenses/by-sa/3.0/de/legalcode. Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 22899 9582-0 E-Mail: [email protected] Internet: https://www.bsi.bund.de © Bundesamt für Sicherheit in der Informationstechnik 2016 Änderungshistorie Version Datum Name Beschreibung 1.0 11.5.2016 siehe Autoren Initiale Version für die Veröffentlichung Inhaltsverzeichnis Inhaltsverzeichnis 1 Einleitung............................................................................................................................................................................................... 7 1.1 Ausgangssituation..........................................................................................................7 1.2 Ziel der Studie................................................................................................................7 -
The Chromium Mess Meets Android
The Chromium mess meets Android David Ludovino, The Chromium mess meets Android Jeremy Rand Proposals on how to get a fully free WebView build or replace it with something What is completely new WebView? Which apps use it? What's underneath it? ∗ What's the David Ludovino Jeremy Rand matter with Chromium? WebView and Replicant Replicant Chromium forks Desktop Chromium Android Chromium Stepwise cleansing GeckoView shim Mapping WebView to GeckoView GeckoView on apps ∗with support from Andr´esD and Kurtis Hanna Feedback? The Chromium mess meets Android What is WebView? David Ludovino, Jeremy Rand Renders web content (HTML, CSS, JavaScript) What is WebView? inside apps. Which apps use it? What's underneath it? API has been around since Android 1. What's the matter with Chromium? public class MainActivity extends Activity { WebView and @Override Replicant protected void onCreate(Bundle state) { Chromium super.onCreate(state); forks WebView v = new WebView(this); Desktop Chromium setContentView(v); Android Chromium Stepwise cleansing v. loadUrl ("https://replicant.us"); } GeckoView shim } Mapping WebView to GeckoView GeckoView on apps Feedback? The Chromium mess meets Android Which apps use WebView? David Apps that render HTML: email clients, RSS readers, etc. Ludovino, Jeremy Rand Became pervasive with the advent of cross-platform mobile frameworks. What is WebView? Which apps use it? What's underneath Half of the apps listed at PRISM Break depend on WebView it? What's the uses WebView does not use WebView matter with Chromium? WebView and -
Cryptoparty Handbook Copyleft Dear Friends, Scientists & Scholars
Cryptoparty Handbook Copyleft Dear friends, scientists & scholars, Today we’ll reclaim our privacy and improve browsing experience step-by-step. There is a diference between protecting your grandma sharing cake recipes, and a human rights activist in a hostile country. Your granny might not be the right person to sell a prepaid SIM & burner-phone to. An activist might consider the below steps entry-level basics, even dangerous if not tailored to the individual. But we all need protection. Even more so if you assume that «you got nothing to hide». «Arguing that you don’t care about the right to privacy because you have nothing to hide is no diferent than saying you don’t care about free speech because you have nothing to say.» – Edward Snowden Those with nothing to hide still like curtains in their bedroom and prefer public restrooms equipped with locks minus the CCTV cameras. If you need further convincing, the movie “Nothing to Hide” is available free online. The following pages contain a list of useful software, search engines, and additional privacy aids to help you take control of your digital privacy. A dictionary of terms is located at the end. cryptoparty.rs copyleft Email Encryption Thunderbird is a desktop email client, which with its Enigmail extension is used for encrypting, decrypting, digitally signing and verifying digitally signed emails. Supported platforms: Windows, Mac, Linux. [1][WARNING: Look at the footnote below!] mozilla.org/thunderbird/ K-9 Mail is an Android email client, which when used with Android GPG agents like APG or OpenKeyChain can provide seamless exchange of encrypted and signed emails. -
Handreichung Zum Thema Digitale Selbstverteidigung Auf Mobilgeräten
Digitale Selbstverteidigung: Mobilgeräte – v.2020.05.03 aus Bayreuth 1 / 7 Mobilgeräte Hinweis: Da Betriebssysteme für Mobilgeräte laufend weiterentwickelt und zudem von den Geräteherstellern stark angepasst werden, ist es möglich, dass bestimmte Einstellun- gen bei dir nicht auffindbar oder unter anderen Menüpunkten zu finden sind. Auch ändern sich die Apps von Entwicklern, sodass wir keine Aktualität garantieren können. Als Orien- tierung ist diese Handreichung aber durchaus gut geeignet. Für Anfänger [Android & iOS] Bildschirmsperre einrichten: • Mobilgeräte gehen oft verloren oder werden geklaut. Damit Fremde nicht direkt auf dein Gerät zugreifen können, solltest du eine PIN (Persönliche IdentifikationsNummer) oder ein Passwort zum Entsperren des Geräts wählen. Insbesondere Wischgesten und Sperrmuster bieten oft keinen ausreichenden Schutz vor Fremdzugriff. Biometrische Merkmale wie Fingerabdrücke oder Iris-/Gesichtscans können von Dritten kopiert werden und sind im Gegensatz zu anderen Schutzmechanismen nicht (einfach) änder- bar. Nicht genutzte Dienste deaktivieren: • Aktivierte Dienste WLAN, GPS und Bluetooth können deine Postion an Dritte verraten. Daher solltest du diese Schnittstellen („Verbindungen“) nur dann aktivieren, WENN du sie gerade tatsächlich benötigst (d. h. Zu exakt diesem Zeitpunkt). Synchronisation beschränken oder abschalten: • Kalender, Kontakte und viele weitere Daten und Apps werden häufig standardmäßig mit den Servern von Google oder Apple synchronisiert. Diese privaten Daten musst du nicht mit Datenkraken teilen. ° Android: Unter Einstellungen entsprechende Dienste deaktivieren. ° iOS: Unter Einstellungen → *dein Accountname* iCloud-Apps von der Synchronisa- tion ausschließen. Apps kritisch hinterfragen: • Viele Apps verlangen deutlich mehr Berechtigungen, als für Funktion der jeweiligen eigentlich notwendig sind. Prüfe bei Neuinstallation oder dem Aktualisieren von Apps, welche Rechte angefordert werden. Eine Taschenlampen-App braucht z. B. -
Studying the Characteristics of Logging Practices in Mobile Apps: a Case Study on F-Droid
Empirical Software Engineering https://doi.org/10.1007/s10664-019-09687-9 Studying the characteristics of logging practices in mobile apps: a case study on F-Droid Yi Zeng1 · Jinfu Chen1 · Weiyi Shang1 · Tse-Hsun (Peter) Chen1 © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract Logging is a common practice in software engineering. Prior research has investigated the characteristics of logging practices in system software (e.g., web servers or databases) as well as desktop applications. However, despite the popularity of mobile apps, little is known about their logging practices. In this paper, we sought to study logging practices in mobile apps. In particular, we conduct a case study on 1,444 open source Android apps in the F- Droid repository. Through a quantitative study, we find that although mobile app logging is less pervasive than server and desktop applications, logging is leveraged in almost all studied apps. However, we find that there exist considerable differences between the log- ging practices of mobile apps and the logging practices in server and desktop applications observed by prior studies. In order to further understand such differences, we conduct a fire- house email interview and a qualitative annotation on the rationale of using logs in mobile app development. By comparing the logging level of each logging statement with devel- opers’ rationale of using the logs, we find that all too often (35.4%), the chosen logging level and the rationale are inconsistent. Such inconsistency may prevent the useful runtime information to be recorded or may generate unnecessary logs that may cause performance overhead. -
A Worldwide Survey of Encryption Products
A Worldwide Survey of Encryption Products Bruce Schneier Kathleen Seidel Saranya Vijayakumar Berkman Center for Internet Independent Researcher Harvard College and Society [email protected] [email protected] Harvard University [email protected] February 11, 2016 Version 1.0 Introduction Data security is a worldwide problem, and there is a wide world of encryption solutions available to help solve this problem. Most of these products are developed and sold by for-profit entities, although some are created as free open-source projects. They are available, either for sale or free download, all over the world. In 1999, a group of researchers from George Washington University attempted to survey the worldwide market for encryption products [HB+99]. The impetus for their survey was the ongoing debate about US encryption export controls. By collecting information about 805 hardware and software encryption products from 35 countries outside the US, the researchers showed that restricting the export of encryption products did nothing to reduce their availability around the world, while at the same time putting US companies at a competitive disadvantage in the information security market. Seventeen years later, we have tried to replicate this survey. Findings We collected information on as many encryption products as we could find anywhere in the world. This is a summary of our findings: We have identified 865 hardware or software products incorporating encryption from 55 different countries. This includes 546 encryption products from outside the US, representing two-thirds of the total. Table 1 summarizes the number of products from each country. The most common non-US country for encryption products is Germany, with 112 products. -
Download K-9 Mail Apk
Download k-9 mail apk click here to download K-9 Mail v @cketti cketti released this 6 days ago · 22 Downloads. MB kapk · Source code (zip) · Source code (www.doorway.ru) · Latest release. www.doorway.ru K-9 Mail. Build Status Join the chat. K-9 Mail is an open-source email client for Android. Download. K-9 Mail can be downloaded from a couple of. Download. K-9 Mail is available through a variety of channels. Google Play. Get it on Google Play. Amazon. K-9 Mail in Amazon's Appstore for Android. F-Droid. Download K-9 Mail APK file v (www.doorway.ru). K-9 Mail is a % free and open source email client for Android. K-9 Mail is an open source email client with support for multiple accounts, search, IMAP push email, multi-folder sync, flagging, filing, signatures, BCC-self. Download K-9 Mail APK (latest version) for Samsung, Huawei, Xiaomi, LG, HTC, Lenovo and all other Android phones, tablets and devices. Download K-9 Mail apk and all version history for Android. K-9 Mail is a % free and open source email client for Android. Version: () Package: www.doorway.ruk9 2, downloads. MB (3,, bytes). Min: Android (Ice Cream Sandwich MR1, API. You are about to download K-9 Mail Latest APK for Android, K-9 Mail is an open source email client withsupport for multiple accounts, search, IMAP push. If you would like to contribute financially to k9mail, consider donating to the local Although APK downloads are available below to give you the choice, you.